Sciweavers

232 search results - page 10 / 47
» An Effective System for Mining Web Log
Sort
View
ACSAC
2003
IEEE
15 years 5 months ago
Log Correlation for Intrusion Detection: A Proof of Concept
Intrusion detection is an important part of networkedsystems security protection. Although commercial products exist, finding intrusions has proven to be a difficult task with l...
Cristina Abad, Jed Taylor, Cigdem Sengul, William ...
JWSR
2008
98views more  JWSR 2008»
14 years 11 months ago
Mining and Improving Composite Web Services Recovery Mechanisms
: Ensuring composite services reliability is a challenging problem. Indeed, due to the inherent autonomy and heterogeneity of Web services it is difficult to predict and reason abo...
Sami Bhiri, Walid Gaaloul, Claude Godart
BPM
2009
Springer
157views Business» more  BPM 2009»
15 years 25 days ago
ProM: The Process Mining Toolkit
Nowadays, all kinds of information systems store detailed information in logs. Examples of such systems include classical workflow management systems (Staffware), ERP systems (SAP)...
Wil M. P. van der Aalst, Boudewijn F. van Dongen, ...
WWW
2008
ACM
16 years 11 days ago
Analysis of geographic queries in a search engine log
Geography is becoming increasingly important in web search. Search engines can often return better results to users by analyzing features such as user location or geographic terms...
Qingqing Gan, Josh Attenberg, Alexander Markowetz,...
WWW
2011
ACM
14 years 6 months ago
Unsupervised query segmentation using only query logs
We introduce an unsupervised query segmentation scheme that uses query logs as the only resource and can effectively capture the structural units in queries. We believe that Web s...
Nikita Mishra, Rishiraj Saha Roy, Niloy Ganguly, S...