BibSLEIGH
BibSLEIGH corpus
BibSLEIGH tags
BibSLEIGH bundles
BibSLEIGH people
CC-BY
Open Knowledge
XHTML 1.0 W3C Rec
CSS 2.1 W3C CanRec
email twitter
Used together with:
queri (65)
base (55)
search (52)
use (48)
system (46)

Stem log$ (all stems)

415 papers:

SIGMODSIGMOD-2015-BernsteinDDP #concurrent #database #optimisation
Optimizing Optimistic Concurrency Control for Tree-Structured, Log-Structured Databases (PAB, SD, BD, MP), pp. 1295–1309.
SIGMODSIGMOD-2015-MoffittSAM #collaboration #data access
Collaborative Access Control in WebdamLog (VZM, JS, SA, GM), pp. 197–211.
VLDBVLDB-2015-WangKSPZNRKS
Building a Replicated Logging System with Apache Kafka (GW, JK, SS, KP, MZ, NN, JR, JK, JS), pp. 1654–1665.
SANERSANER-2015-CaiS15a #analysis #dependence #fine-grained #named
TRACERJD: Generic trace-based dynamic dependence analysis with fine-grained logging (HC, RAS), pp. 489–493.
CHICHI-2015-FourneyWH
Exploring Time-Dependent Concerns about Pregnancy and Childbirth from Search Logs (AF, RWW, EH), pp. 737–746.
CHICHI-2015-LeeCN #process #visualisation
Patina Engraver: Visualizing Activity Logs as Patina in Fashionable Trackers (MHL, SC, TJN), pp. 1173–1182.
CSCWCSCW-2015-WieseMHZ #quote
“You Never Call, You Never Write”: Call and SMS Logs Do Not Always Indicate Tie Strength (JW, JKM, JIH, JZ), pp. 765–774.
HCIDUXU-DD-2015-FilhoPV15b #automation #mobile #testing #usability
Emotions Logging in Automated Usability Tests for Mobile Devices (JFF, WP, TV), pp. 428–435.
HCIHIMI-IKC-2015-NakashimaMHOWP #nondeterminism
Kick Extraction for Reducing Uncertainty in RoboCup Logs (TN, SM, JH, OO, PW, MP), pp. 622–633.
HCIHIMI-IKD-2015-YoshinoO #using
Proposal of a Data Presentation Technique Using Four-Frame Cartoon Expression for a LifeLog System (TY, IO), pp. 235–246.
CAiSECAiSE-2015-TsuchiyaWFOM #configuration management #feedback #interactive #requirements #traceability #using
Interactive Recovery of Requirements Traceability Links Using User Feedback and Configuration Management Logs (RT, HW, YF, KO, RM), pp. 247–262.
ICMLICML-2015-DjolongaK #modelling #scalability
Scalable Variational Inference in Log-supermodular Models (JD, AK), pp. 1804–1813.
ICMLICML-2015-HanMS #probability #scalability
Large-scale log-determinant computation through stochastic Chebyshev expansions (IH, DM, JS), pp. 908–917.
ICMLICML-2015-HuangWSLC #classification #image #learning #metric #set #symmetry
Log-Euclidean Metric Learning on Symmetric Positive Definite Manifold with Application to Image Set Classification (ZH, RW, SS, XL, XC), pp. 720–729.
ICMLICML-2015-SwaminathanJ #feedback #learning
Counterfactual Risk Minimization: Learning from Logged Bandit Feedback (AS, TJ), pp. 814–823.
KDDKDD-2015-PengKLC #approximate #clustering #rank #using
Subspace Clustering Using Log-determinant Rank Approximation (CP, ZK, HL, QC), pp. 925–934.
SIGIRSIGIR-2015-Baeza-Yates #incremental #query
Incremental Sampling of Query Logs (RABY), pp. 1093–1096.
SACSAC-2015-BraunPPJ #adaptation #named #web
LogSec: adaptive protection for the wild wild web (BB, KP, JP, MJ), pp. 2149–2156.
SACSAC-2015-PintoMCS #process #using
Using event logs and the Ψ-theory to analyse business processes (PLP, CM, AC, MMdS), pp. 1195–1202.
ESEC-FSEESEC-FSE-2015-BusanyM #analysis #behaviour #statistics
Behavioral log analysis with statistical guarantees (NB, SM), pp. 898–901.
ICSEICSE-v1-2015-ZhuHFZLZ #developer #learning
Learning to Log: Helping Developers Make Informed Logging Decisions (JZ, PH, QF, HZ, MRL, DZ), pp. 415–425.
ICSEICSE-v2-2015-PecchiaCCC #assessment #development #industrial #process
Industry Practices and Event Logging: Assessment of a Critical Software Development Process (AP, MC, GC, DC), pp. 169–178.
SOSPSOSP-2015-MatveevSFM #concurrent #lightweight #named #programming
Read-log-update: a lightweight synchronization mechanism for concurrent programming (AM, NS, PF, PM), pp. 168–183.
TAPTAP-2015-GrinchteinCP #analysis #constraints #optimisation #protocol
A Constraint Optimisation Model for Analysis of Telecommunication Protocol Logs (OG, MC, JP), pp. 137–154.
DATEDATE-2014-BalckGP #generative #modelling #protocol #testing #using
Model-based protocol log generation for testing a telecommunication test harness using CLP (KB, OG, JP), pp. 1–4.
VLDBVLDB-2014-WangJ #memory management #scalability
Scalable Logging through Emerging Non-Volatile Memory (TW, RJ), pp. 865–876.
VLDBVLDB-2014-WangMO #lightweight
Lightweight Indexing of Observational Data in Log-Structured Storage (SW, DM, BCO), pp. 529–540.
VLDBVLDB-2014-XuCC #clustering #graph #named
LogGP: A Log-based Dynamic Graph Partitioning Method (NX, LC, BC), pp. 1917–1928.
VLDBVLDB-2015-HuangSQ14 #transaction
NVRAM-aware Logging in Transaction Systems (JH, KS, MKQ), pp. 389–400.
ICSMEICSME-2014-ShangNHJ #comprehension #development #using
Understanding Log Lines Using Development Knowledge (WS, MN, AEH, ZMJ), pp. 21–30.
MSRMSR-2014-KhodabandelouHDS #modelling #process
Unsupervised discovery of intentional process models from event logs (GK, CH, RD, CS), pp. 282–291.
STOCSTOC-2014-Goodrich #algorithm #sorting
Zig-zag sort: a simple deterministic data-oblivious sorting algorithm running in O(n log n) time (MTG), pp. 684–693.
ICALPICALP-v1-2014-GavinskyL #reduction
En Route to the Log-Rank Conjecture: New Reductions and Equivalent Formulations (DG, SL), pp. 514–524.
FMFM-2014-ButinM #analysis
Log Analysis for Data Protection Accountability (DB, DLM), pp. 163–178.
HCIHCI-TMT-2014-SantanaB #personalisation
Log-Based Personalization Tool as an Assistive Technology (VFdS, MCCB), pp. 433–444.
HCIHIMI-AS-2014-KoyamaYKT #named
ChoiceLog: Life Log System Based on Choices for Supporting Decision-Making (JK, KY, IK, YT), pp. 172–183.
CAiSECAiSE-2014-ChanYGM #development #execution #mining #process
Mining Event Logs to Assist the Development of Executable Process Variants (NNC, KY, WG, JM), pp. 548–563.
CAiSECAiSE-2014-FolinoGP #low level #mining #modelling #multi #predict #process
Mining Predictive Process Models out of Low-level Multidimensional Logs (FF, MG, LP), pp. 533–547.
CAiSECAiSE-2014-KalamatianosK #independence #reduction #streaming
Schema Independent Reduction of Streaming Log Data (TK, KK), pp. 394–408.
CAiSECAiSE-2014-PikaWFHLA #behaviour #framework #using
An Extensible Framework for Analysing Resource Behaviour Using Event Logs (AP, MTW, CJF, AHMtH, ML, WMPvdA), pp. 564–579.
CIKMCIKM-2014-SpirinHDKB #analysis #facebook #graph #network #online #people #query #scalability #social
People Search within an Online Social Network: Large Scale Analysis of Facebook Graph Search Query Logs (NVS, JH, MD, KGK, MB), pp. 1009–1018.
CIKMCIKM-2014-TuLLH #ad hoc #documentation #information retrieval
Log-Bilinear Document Language Model for Ad-hoc Information Retrieval (XT, JL, BL, TH), pp. 1895–1898.
CIKMCIKM-2014-VermaY #query
Entity Oriented Task Extraction from Query Logs (MV, EY), pp. 1975–1978.
CIKMCIKM-2014-YeLQPM #generative
A Generative Model for Generating Relevance Labels from Human Judgments and Click-Logs (XY, JL, ZQ, BP, DM), pp. 1907–1910.
ECIRECIR-2014-YangPSS #case study #e-commerce #query #scalability #using
A Study of Query Term Deletion Using Large-Scale E-commerce Search Logs (BY, NP, GS, NS), pp. 235–246.
ICPRICPR-2014-SamantaC #classification #using
Indian Classical Dance Classification on Manifold Using Jensen-Bregman LogDet Divergence (SS, BC), pp. 4507–4512.
ICPRICPR-2014-ZhangWL #using #video
Video Text Extraction Using the Fusion of Color Gradient and Log-Gabor Filter (ZZ, WW, KL), pp. 2938–2943.
KDDKDD-2014-SiposFMW #maintenance #predict
Log-based predictive maintenance (RS, DF, FM, ZW), pp. 1867–1876.
KDDKDD-2014-TagamiHTOTT
Filling context-ad vocabulary gaps with click logs (YT, TH, YT, SO, KT, AT), pp. 1955–1964.
RecSysRecSys-2014-Zhang #recommendation
Browser-oriented universal cross-site recommendation and explanation based on user browsing logs (YZ), pp. 433–436.
SIGIRSIGIR-2014-AlonsoS #crowdsourcing #query
Building a query log via crowdsourcing (OA, MS), pp. 939–942.
SIGIRSIGIR-2014-MorenoDC #clustering #query #web
Query log driven web search results clustering (JGM, GD, GC), pp. 777–786.
SIGIRSIGIR-2014-UstaAVOU #analysis #education #how #learning #student
How k-12 students search for learning?: analysis of an educational search engine log (AU, ISA, IBV, RO, ÖU), pp. 1151–1154.
ECOOPECOOP-2014-LeeKZ #concurrent #execution #multi
Infrastructure-Free Logging and Replay of Concurrent Execution on Multiple Cores (KHL, DK, XZ), pp. 232–256.
SACSAC-2014-UnoI #music #named #recommendation
MALL: a life log based music recommendation system and portable music player (AU, TI), pp. 939–944.
ICSEICSE-2014-BeschastnikhBEK #behaviour #concurrent #modelling
Inferring models of concurrent systems from logs of their behavior with CSight (IB, YB, MDE, AK), pp. 468–479.
PPoPPPPoPP-2014-LeeKZ #concurrent #execution #multi
Infrastructure-free logging and replay of concurrent execution on multiple cores (KHL, DK, XZ), pp. 371–372.
SMTSMT-2014-CarlssonGP #analysis #constraints #programming #protocol
Protocol Log Analysis with Constraint Programming (MC, OG, JP), pp. 17–26.
ICDARICDAR-2013-KimuraHUIOK
The Reading-Life Log — Technologies to Recognize Texts That We Read (TK, RH, SU, MI, SO, KK), pp. 91–95.
SIGMODSIGMOD-2013-ChristensenL #adaptation
Adaptive log compression for massive log data (RC, FL), pp. 1283–1284.
FASEFASE-2013-LeoniDG #branch #execution #process
Discovering Branching Conditions from Business Process Execution Logs (MdL, MD, LGB), pp. 114–129.
ICSMEICSM-2013-LarssonH #debugging #mining
Mining Telecom System Logs to Facilitate Debugging Tasks (AL, AHL), pp. 536–539.
ICSMEICSM-2013-SyerJNHNF #execution #performance
Leveraging Performance Counters and Execution Logs to Diagnose Memory-Related Performance Issues (MDS, ZMJ, MN, AEH, MNN, PF), pp. 110–119.
MSRMSR-2013-FuLLDZX #analysis #behaviour #comprehension
Contextual analysis of program logs for understanding system behaviors (QF, JGL, QL, RD, DZ, TX), pp. 397–400.
DLTDLT-J-2012-GeffertP13
Unary Coded NP-Complete Languages in Aspace(log log n) (VG, DP), p. 1167–?.
ICALPICALP-v1-2013-GlasserNRSW #polynomial #reduction #set
Autoreducibility of Complete Sets for Log-Space and Polynomial-Time Reductions (CG, DTN, CR, ALS, MW), pp. 473–484.
SEFMSEFM-2013-CristiaRF #framework #generative #testing
{log} as a Test Case Generator for the Test Template Framework (MC, GR, CSF), pp. 229–243.
CHICHI-2013-BentleyT #behaviour #mobile #power of
The power of mobile notifications to increase wellbeing logging behavior (FB, KT), pp. 1095–1098.
HCIHIMI-LCCB-2013-WatabeMH #process
Application to Help Learn the Process of Transforming Mathematical Expressions with a Focus on Study Logs (TW, YM, YH), pp. 157–164.
CAiSECAiSE-2013-PikaAFHW #process #profiling
Profiling Event Logs to Configure Risk Indicators for Process Delays (AP, WMPvdA, CJF, AHMtH, MTW), pp. 465–481.
ICEISICEIS-v3-2013-FerreiraFSCRPO #analysis #interactive #search-based
Log Analysis of Human Computer Interactions Regarding Break The Glass Accesses to Genetic Reports (AMF, PF, CSP, RJCC, PPR, AdCP, VO), pp. 46–53.
ICEISICEIS-v3-2013-LucasXB #enterprise #realtime #visualisation
Visualizing ERP Usage Logs in Real Time (WTL, JX, TB), pp. 83–90.
CIKMCIKM-2013-QianSYZL #mining #query
Dynamic query intent mining from a search log stream (YnQ, TS, JY, QZ, CL), pp. 1205–1208.
ECIRECIR-2013-CarpinetoR #concept #graph #query #semantics
Semantic Search Log k-Anonymization with Generalized k-Cores of Query Concept Graph (CC, GR), pp. 110–121.
ECIRECIR-2013-SaadK #adaptation #intranet #navigation
Exploiting Click Logs for Adaptive Intranet Navigation (SZS, UK), pp. 792–795.
SACSAC-2013-FangYK #database
MLC-flash-friendly logging and recovery for databases (HWF, MYY, TWK), pp. 1541–1546.
SACSAC-2013-HayashiIN #recommendation #visual notation
A visual analytics tool for system logs adopting variable recommendation and feature-based filtering (AH, TI, SN), pp. 996–998.
SACSAC-2013-Perez-PalacinCM #named #predict #trade-off
log2cloud: log-based prediction of cost-performance trade-offs for cloud deployments (DPP, RC, JM), pp. 397–404.
ICSEICSE-2013-King #forensics
Measuring the forensic-ability of audit logs for nonrepudiation (JK), pp. 1419–1422.
LCTESLCTES-2013-GuanWWCS #named
BLog: block-level log-block management for NAND flash memorystorage systems (YG, GW, YW, RC, ZS), pp. 111–120.
LCTESLCTES-2013-WangLWS #hybrid #memory management #named #reduction
FTL2: a hybrid flash translation layer with logging for write reduction in flash memory (TW, DL, YW, ZS), pp. 91–100.
SOSPSOSP-2013-BalakrishnanMWWPWDRZZ #data type #distributed #named
Tango: distributed data structures over a shared log (MB, DM, TW, MW, VP, MW, JDD, SR, TZ, AZ), pp. 325–340.
CASECASE-2012-HoSY #data mining #mining #modelling
Data Mining of Life Log for Developing a User model-based Service Application (YH, ESS, TY), pp. 757–760.
SIGMODSIGMOD-2012-SearsR #named
bLSM: a general purpose log structured merge tree (RS, RR), pp. 217–228.
VLDBVLDB-2012-LeeLLLR #data analysis #framework #twitter
The Unified Logging Infrastructure for Data Analytics at Twitter (GL, JL, CL, AL, DVR), pp. 1771–1780.
VLDBVLDB-2012-MorishimaSMAF #crowdsourcing #declarative #framework #named
CyLog/Crowd4U: A Declarative Platform for Complex Data-centric Crowdsourcing (AM, NS, TM, HA, SF), pp. 1918–1921.
VLDBVLDB-2012-TaliusDDK #fault #query #transaction
Transaction Log Based Application Error Recovery and Point In-Time Query (TT, RD, AD, HK), pp. 1781–1789.
VLDBVLDB-2012-VoWACO #database #in the cloud #named #scalability
LogBase: A Scalable Log-structured Database System in the Cloud (HTV, SW, DA, GC, BCO), pp. 1004–1015.
STOCSTOC-2012-KhotPV #preprocessor #problem
2log1-ε n hardness for the closest vector problem with preprocessing (SK, PP, NKV), pp. 277–288.
DLTDLT-2012-GeffertP
Unary Coded NP-Complete Languages in ASPACE (log log n) (VG, DP), pp. 166–177.
IFMIFM-2012-SchunselaarMS #declarative #modelling
Patterns for a Log-Based Strengthening of Declarative Compliance Models (DMMS, FMM, NS), pp. 327–342.
CAiSECAiSE-2012-BrouckeWBV #generative #process
Improved Artificial Negative Event Generation to Enhance Process Event Logs (SKLMvB, JDW, BB, JV), pp. 254–269.
CAiSECAiSE-2012-LyIMR #data transformation #mining #process #semantics
Data Transformation and Semantic Log Purging for Process Mining (LTL, CI, JM, SRM), pp. 238–253.
CAiSECAiSE-2012-MaggiBA #declarative #modelling #performance #process
Efficient Discovery of Understandable Declarative Process Models from Event Logs (FMM, RPJCB, WMPvdA), pp. 270–285.
ICEISICEIS-J-2012-BabaianL12a #automation #interface
Composing Interface Demonstrations Automatically from Usage Logs (TB, WTL), pp. 376–392.
CIKMCIKM-2012-MahajanRTM #algorithm #named #recommendation
LogUCB: an explore-exploit algorithm for comments recommendation (DKM, RR, CT, AM), pp. 6–15.
CIKMCIKM-2012-WustBRBKP #database #enterprise #in memory #performance
Efficient logging for enterprise workloads on column-oriented in-memory databases (JW, JHB, FR, SB, JK, HP), pp. 2085–2089.
ECIRECIR-2012-LvZ #modelling #normalisation
A Log-Logistic Model-Based Interpretation of TF Normalization of BM25 (YL, CZ), pp. 244–255.
ICPRICPR-2012-BagdanovBLM #detection #multi
Multi-pose face detection for accurate face logging (ADB, ADB, GL, IM), pp. 2448–2451.
ICPRICPR-2012-LiW #encoding #matrix #recognition #using
Iris recognition using ordinal encoding of Log-Euclidean covariance matrices (PL, GW), pp. 2420–2423.
SIGIRSIGIR-2012-AdeyanjuSAKRF #adaptation #concept #query #recommendation
Adaptation of the concept hierarchy model with search logs for query recommendation on intranets (IAA, DS, MDA, UK, ANDR, MF), pp. 5–14.
SIGIRSIGIR-2012-ChinS #analysis
Survival analysis of click logs (SCC, WNS), pp. 1149–1150.
SIGIRSIGIR-2012-HuQLJPZ #mining #query #topic
Mining query subtopics from search log data (YH, YnQ, HL, DJ, JP, QZ), pp. 305–314.
SIGIRSIGIR-2012-WhiteH #persistent
Studies of the onset and persistence of medical concerns in search logs (RWW, EH), pp. 265–274.
RERE-2012-MendizabalSS #approach #elicitation #performance #requirements
Log-based approach for performance requirements elicitation and prioritization (OMM, MS, RS), pp. 297–302.
SACSAC-2012-MakanjuZML #clustering #composition #detection #identification
Spatio-temporal decomposition, clustering and identification for alert detection in system logs (AM, ANZH, EEM, ML), pp. 621–628.
SACSAC-2012-MenezesOV #abstraction #composition #coordination #pervasive
Dynamic composition of coordination abstractions for pervasive systems: the case of LogOp (RM, AO, MV), pp. 1557–1559.
SACSAC-2012-Perez-CastilloGPW #repository
Integrating event logs into KDM repositories (RPC, IGRdG, MP, BW), pp. 1095–1102.
ICSEICSE-2012-Elyasov #testing
Log-based testing (AE), pp. 1591–1594.
ICSEICSE-2012-Shang #developer #using
Bridging the divide between software developers and operators using logs (WS), pp. 1583–1586.
ICSEICSE-2012-YuanPZ #open source
Characterizing logging practices in open-source software (DY, SP, YZ), pp. 102–112.
OSDIOSDI-2012-YuanPHLLTZS
Be Conservative: Enhancing Failure Diagnosis with Proactive Logging (DY, SP, PH, YL, MMJL, XT, YZ, SS), pp. 293–306.
ICLPICLP-2012-NovelliVPD #architecture #named
LOG-IDEAH: ASP for Architectonic Asset Preservation (VN, MDV, JAP, DD), pp. 393–403.
ICSTICST-2012-MizanF #analysis #automation #performance
Automated Performance Model Construction through Event Log Analysis (AM, GF), pp. 636–641.
ICSTICST-2012-TonellaMNJLH #approximate #execution #modelling
Finding the Optimal Balance between Over and Under Approximation of Models Inferred from Execution Logs (PT, AM, DCN, YJ, KL, MH), pp. 21–30.
ICTSSICTSS-2012-Havelund #analysis
Requirements-Driven Log Analysis (Extended Abstract) (KH), pp. 1–4.
DACDAC-2011-ChangS #approach
Plugging versus logging: a new approach to write buffer management for solid-state disks (LPC, YCS), pp. 23–28.
ICDARICDAR-2011-ForcherADGR #semantics #towards
Semantic Logging: Towards Explanation-Aware DAS (BF, SA, AD, MG, TRB), pp. 1140–1144.
SIGMODSIGMOD-2011-ElmeleegyEL #generative #query
Leveraging query logs for schema mapping generation in U-MAP (HE, AKE, JL), pp. 121–132.
SIGMODSIGMOD-2011-PoundPT #approach #mining #web
Facet discovery for structured web search: a query-log mining approach (JP, SP, PT), pp. 169–180.
VLDBVLDB-2011-KimLMPH #named
IPL-P: In-Page Logging with PCRAM (KK, SWL, BM, CP, JYH), pp. 1363–1366.
PLDIPLDI-2011-LeeZSZ #generative #towards
Toward generating reducible replay logs (KHL, YZ, NS, XZ), pp. 246–257.
STOCSTOC-2011-ValiantV
Estimating the unseen: an n/log(n)-sample estimator for entropy and support size, shown optimal via new CLTs (GV, PV), pp. 685–694.
LATALATA-2011-LisitsaPS #automaton
Planarity of Knots, Register Automata and LogSpace Computability (AL, IP, RS), pp. 366–377.
ICFPICFP-2011-ShiversT #composition #functional
Modular rollback through control logging: a pair of twin functional pearls (OS, AJT), pp. 58–68.
CHICHI-2011-FourneyMT #analysis #interactive #query #usability
Characterizing the usability of interactive applications through query log analysis (AF, RM, MAT), pp. 1817–1826.
HCIHCD-2011-IharaKY #simulation
Human Affordance as Life-Log for Environmental Simulations (MI, MK, TY), pp. 235–242.
HCIHIMI-v2-2011-EitokuMMYMA #information management #quote
“Life Portal”: An Information Access Scheme Based on Life Logs (SE, MM, RM, TY, SyM, MA), pp. 11–20.
HCIIDGD-2011-OginoKIK #behaviour #comprehension
Smart Store Understanding Consumer’s Preference through Behavior Logs (AO, TK, YI, TK), pp. 385–392.
ICEISICEIS-v3-2011-JuniorNI #bibliography #execution #identification #legacy #source code
Survey and Proposal of a Method for Business Rules Identification in Legacy Systems Source Code and Execution Logs (WARJ, GSdN, CI), pp. 207–213.
CIKMCIKM-2011-BingLW #query #social #topic #using
Using query log and social tagging to refine queries based on latent topics (LB, WL, TLW), pp. 583–592.
CIKMCIKM-2011-CuiLYJJHGCD #framework #multi #random
Multi-view random walk framework for search task discovery from click-through log (JC, HL, JY, LJ, RJ, JH, YG, ZC, XD), pp. 135–140.
CIKMCIKM-2011-GaoXHCH #named #transaction
PCMLogging: reducing transaction logging overhead with PCM (SG, JX, BH, BC, HH), pp. 2401–2404.
CIKMCIKM-2011-GurajadaK #maintenance #online
Index tuning for query-log based on-line index maintenance (SG, PSK), pp. 1997–2000.
CIKMCIKM-2011-MaLL #using
Selecting related terms in query-logs using two-stage SimRank (YM, HL, YL), pp. 1969–1972.
CIKMCIKM-2011-OzertemVL #set #using
Suggestion set utility maximization using session logs (UO, EV, LL), pp. 105–114.
CIKMCIKM-2011-TangLP #generative #named
LogSig: generating system events from raw textual logs (LT, TL, CSP), pp. 785–794.
CIKMCIKM-2011-YanGC #higher-order #learning #query #recommendation
Context-aware query recommendation by learning high-order relation in query logs (XY, JG, XC), pp. 2073–2076.
ECIRECIR-2011-AlbakourKNKSFR #evaluation #named #query #using
AutoEval: An Evaluation Methodology for Evaluating Query Suggestions Using Query Logs (MDA, UK, NN, YK, DS, MF, ANDR), pp. 605–610.
ECIRECIR-2011-ArampatzisED
Enhancing Deniability against Query-Logs (AA, PSE, GD), pp. 117–128.
ECIRECIR-2011-NunzioLM #analysis #multi
Multilingual Log Analysis: LogCLEF (GMDN, JL, TM), pp. 675–678.
KDIRKDIR-2011-OzakiE #difference #empirical #estimation
Estimation of Implicit user Influence from Proxy Logs — An Empirical Study on the Effects of Time Difference and Popularity (TO, ME), pp. 250–255.
KDIRKDIR-2011-SethCRSB #analysis #query #similarity
A Tale of Two (Similar) Cities — Inferring City Similarity through Geo-spatial Query Log Analysis (RS, MC, DR, DS, SB), pp. 179–189.
KEODKEOD-2011-PinchukINDBP #analysis #distributed #semantics #visual notation
Augmenting Semantics to Distributed Agents Logs — Enabling Graphical After Action Analysis of Federated Agents Logs (RP, SI, TN, TD, CB, GP), pp. 232–241.
SEKESEKE-2011-FronzaSSV #predict #using
Failure Prediction based on Log Files Using the Cox Proportional Hazard Model (IF, AS, GS, JV), pp. 456–461.
SIGIRSIGIR-2011-BerberichKLZ #ranking
Improving local search ranking through external logs (KB, ACK, DL, PZ), pp. 785–794.
SIGIRSIGIR-2011-BhatiaMM #query
Query suggestions in the absence of query logs (SB, DM, PM), pp. 795–804.
SIGIRSIGIR-2011-ElsweilerHH #behaviour #comprehension #email #interactive
Understanding re-finding behavior in naturalistic email interaction logs (DE, MH, MH), pp. 35–44.
SIGIRSIGIR-2011-FangSSKM #analysis #query
Analysis of an expert search query log (YF, NS, LS, JK, APM), pp. 1189–1190.
SIGIRSIGIR-2011-FeildAG #distributed #named
CrowdLogging: distributed, private, and anonymous search logging (HAF, JA, JG), pp. 375–384.
SIGIRSIGIR-2011-InagakiBCM #mobile #using #web
Enhancing mobile search using web search log data (YI, JB, YC, MM), pp. 1201–1202.
SIGIRSIGIR-2011-JiangPL #mining #web
Enhancing web search by mining search and browse logs (DJ, JP, HL), pp. 1295–1296.
SIGIRSIGIR-2011-WeerkampBKMBR #analysis #people
People searching for people: analysis of a people search engine log (WW, RB, BK, EM, KB, MdR), pp. 45–54.
OOPSLAOOPSLA-2011-AdamsKMMCD #polynomial
Flow-sensitive type recovery in linear-log time (MDA, AWK, JM, MM, AC, RKD), pp. 483–498.
PADLPADL-2011-MantadelisPJVB #ad hoc #mobile #network
Analysing a Publish/Subscribe System for Mobile Ad Hoc Networks with ProbLog (TM, KP, GJ, YV, YB), pp. 34–37.
SACSAC-2011-GomiI #analysis
A personal photograph browser for life log analysis based on location, time, and person (AG, TI), pp. 1245–1251.
SACSAC-2011-JinKKHM #fine-grained
Sector log: fine-grained storage management for solid state drives (SJ, JHK, JK, JH, SM), pp. 360–367.
SACSAC-2011-KadriE #mining #nondeterminism #sequence #web
Mining uncertain web log sequences with access history probabilities (OK, CIE), pp. 1059–1060.
SACSAC-2011-KontogiannisWM #clustering #comprehension #reduction #runtime
Event clustering for log reduction and run time system understanding (KK, AW, SM), pp. 191–192.
SACSAC-2011-MakanjuZM #retrieval #using
Storage and retrieval of system log events using a structured schema based on message type transformation (AM, ANZH, EEM), pp. 528–533.
SACSAC-2011-Marty #forensics
Cloud application logging for forensics (RM), pp. 178–184.
ESEC-FSEESEC-FSE-2011-BeschastnikhABE #behaviour #modelling #named
Synoptic: studying logged behavior with inferred models (IB, JA, YB, MDE), pp. 448–451.
ASPLOSASPLOS-2011-VeeraraghavanLWOCFN #named
DoublePlay: parallelizing sequential logging and replay (KV, DL, BW, JO, PMC, JF, SN), pp. 15–26.
ASPLOSASPLOS-2011-YuanZPZS
Improving software diagnosability via log enhancement (DY, JZ, SP, YZ, SS), pp. 3–14.
HPCAHPCA-2011-CarreteroVARMG #hardware #process #using
Hardware/software-based diagnosis of load-store queues using expandable activity logs (JC, XV, JA, TR, MM, AG), pp. 321–331.
DACDAC-2010-GaoYWY #analysis #correlation #estimation #performance #statistics
Efficient tail estimation for massive correlated log-normal sums: with applications in statistical leakage analysis (MG, ZY, YW, ZY), pp. 475–480.
DATEDATE-2010-SheaSC #identifier #performance
Scoped identifiers for efficient bit aligned logging (RS, MBS, YC), pp. 1450–1455.
SIGMODSIGMOD-2010-BlanasPERST #algorithm #comparison #pipes and filters
A comparison of join algorithms for log processing in MaPreduce (SB, JMP, VE, JR, EJS, YT), pp. 975–986.
SIGMODSIGMOD-2010-KimWS #approach #independence #memory management #performance
Page-differential logging: an efficient and DBMS-independent approach for storing data into flash memory (YRK, KYW, IYS), pp. 363–374.
SIGMODSIGMOD-2010-TaoYSPL #summary
Logging every footstep: quantile summaries for the entire history (YT, KY, CS, JP, FL), pp. 639–650.
VLDBVLDB-2010-JohnsonPSAA #approach #named #scalability
Aether: A Scalable Approach to Logging (RJ, IP, RS, MA, AA), pp. 681–692.
VLDBVLDB-2010-KimJW #adaptation #mobile
Adaptive Logging for Mobile Device (YSK, HJ, KGW), pp. 1481–1492.
ICSMEICSM-2010-ZawawyKM #analysis
Log filtering and interpretation for root cause analysis (HZ, KK, JM), pp. 1–5.
MSRMSR-2010-NagappanV #mining
Abstracting log lines to log event types for mining software system logs (MN, MAV), pp. 114–117.
STOCSTOC-2010-BhaskaraCCFV #approximate #detection
Detecting high log-densities: an O(n1/4) approximation for densest k-subgraph (AB, MC, EC, UF, AV), pp. 201–210.
STOCSTOC-2010-GoelKK #graph
Perfect matchings in o(n log n) time in regular bipartite graphs (AG, MK, SK), pp. 39–46.
SEFMSEFM-2010-MetayerMP #architecture #design
Designing Log Architectures for Legal Evidence (DLM, EM, MLP), pp. 156–165.
CHICHI-2010-FlorLJPKC #case study #mobile #process
The case of the disappearing Ox: a field study of mobile activity and context logging (GdlF, PL, MJ, JP, RK, AC), pp. 473–482.
CHICHI-2010-KarkkainenVV #case study #mobile #process
I don’t mind being logged, but want to remain in control: a field study of mobile activity and context logging (TK, TV, KVVM), pp. 163–172.
CIKMCIKM-2010-BurghardtBGC #question
Search-log anonymization and advertisement: are they mutually exclusive? (TB, KB, AG, CC), pp. 1269–1272.
CIKMCIKM-2010-CarmanCHB #modelling #personalisation #query #topic #towards #using
Towards query log based personalization using topic models (MJC, FC, MH, MB), pp. 1849–1852.
CIKMCIKM-2010-KotovKDC #profiling #query #ranking #web
Temporal query log profiling to improve web search ranking (AK, PK, LD, YC), pp. 1149–1158.
ECIRECIR-2010-GoharianFYM #peer-to-peer #query #using
Enriching Peer-to-Peer File Descriptors Using Association Rules on Query Logs (NG, OF, WGY, JM), pp. 636–639.
ICMLICML-2010-XuHFPJ #detection #mining #problem #scalability
Detecting Large-Scale System Problems by Mining Console Logs (WX, LH, AF, DAP, MIJ), pp. 37–46.
KDDKDD-2010-AgarwalAKK #modelling #multi #scalability
Estimating rates of rare events with multiple hierarchies through scalable log-linear models (DA, RA, RK, NK), pp. 213–222.
KDIRKDIR-2010-VeilumuthuR
Aggregation of Implicit Feedbacks from Search Engine Log Files (AV, PR), pp. 269–274.
SEKESEKE-2010-Nehmer #approach #consistency #exception
A Log-Assisted Approach Enforcing Consistency in the Presence of Exceptions (NN), pp. 757–764.
SIGIRSIGIR-2010-Huggett #n-gram #named
Agro-Gator: digesting experts, logs, and N-grams (MH), p. 706.
SIGIRSIGIR-2010-JiangPL #challenge #information retrieval #mining #web
Search and browse log mining for web information retrieval: challenges, methods, and applications (DJ, JP, HL), p. 912.
SIGIRSIGIR-2010-TorresHS #analysis #information retrieval #query
Query log analysis in the context of information retrieval for children (SDT, DH, PS), pp. 847–848.
SIGIRSIGIR-2010-WangLC #bound #detection #query
Intent boundary detection in search query logs (CJW, KHYL, HHC), pp. 749–750.
SIGIRSIGIR-2010-WhiteH #web
Assessing the scenic route: measuring the value of search trails in web logs (RWW, JH), pp. 587–594.
ICSEICSE-2010-Nagappan #analysis #execution
Analysis of execution log files (MN), pp. 409–412.
ASPLOSASPLOS-2010-VlachosGKCFGM #monitoring #named #online #parallel #thread
ParaLog: enabling and accelerating online parallel monitoring of multithreaded applications (EV, MLG, MAK, SC, BF, PBG, TCM), pp. 271–284.
ASPLOSASPLOS-2010-YuanMXTZP #fault #named #runtime
SherLog: error diagnosis by connecting clues from run-time logs (DY, HM, WX, LT, YZ, SP), pp. 143–154.
HPDCHPDC-2010-HoeflerSL #named #scalability #simulation
LogGOPSim: simulating large-scale applications in the LogGOPS model (TH, TS, AL), pp. 597–604.
CASECASE-2009-VeilumuthuR #clustering #query
Intent based clustering of search engine query log (AV, PR), pp. 647–652.
DACDAC-2009-LiuYKC #algorithm
An O(n log n) path-based obstacle-avoiding algorithm for rectilinear Steiner tree construction (CHL, SYY, SYK, YHC), pp. 314–319.
SIGMODSIGMOD-2009-Chen #named #performance
FlashLogging: exploiting flash devices for synchronous logging performance (SC), pp. 73–86.
SIGMODSIGMOD-2009-JiangYCC #ad hoc #detection #named #query
AIDE: ad-hoc intents detection engine over query logs (YJ, HTY, KCCC, YSC), pp. 1091–1094.
VLDBVLDB-2009-SearsB #revisited
Segment-based recovery: Write ahead logging revisited (RS, EAB), pp. 490–501.
MSRMSR-2009-BajracharyaL #code search #mining #topic
Mining search topics from a code search engine usage log (SKB, CVL), pp. 111–120.
MSRMSR-2009-Kuhn #automation #component #evolution #source code #using #word
Automatic labeling of software components and their evolution using log-likelihood ratio of word frequencies in source code (AK), pp. 175–178.
HCIHCD-2009-JarrettQRAS #analysis #development #metric #testing #usability #using #web
Using Measurements from Usability Testing, Search Log Analysis and Web Traffic Analysis to Inform Development of a Complex Web Site Used for Complex Tasks (CJ, WQ, IR, SA, VS), pp. 729–738.
HCIHCI-AUII-2009-ImamuraOK #analysis #behaviour #modelling #ubiquitous
Modeling Personal Preferences on Commodities by Behavior Log Analysis with Ubiquitous Sensing (NI, AO, TK), pp. 294–303.
ICEISICEIS-ISAS-2009-Petrusel #mining #modelling #process #workflow
Mining and Modeling Decision Workflows from DSS User Activity Logs (RP), pp. 144–149.
CIKMCIKM-2009-ClinchantG #constraints #information retrieval #word
Retrieval constraints and word frequency distributions: a log-logistic model for IR (SC, ÉG), pp. 1975–1978.
CIKMCIKM-2009-HongHVAA #effectiveness #query
Effective anonymization of query logs (YH, XH, JV, NRA, VA), pp. 1465–1468.
CIKMCIKM-2009-HuangE #query #web
Analyzing and evaluating query reformulation strategies in web search logs (JH, ENE), pp. 77–86.
CIKMCIKM-2009-MeijWR #modelling #normalisation #query
A query model based on normalized log-likelihood (EM, WW, MdR), pp. 1903–1906.
CIKMCIKM-2009-NaLM
Dynamic in-page logging for flash-aware B-tree index (GJN, SWL, BM), pp. 1485–1488.
CIKMCIKM-2009-WangTSZ #effectiveness
Beyond hyperlinks: organizing information footprints in search logs to support effective browsing (XW, BT, AS, CZ), pp. 1237–1246.
ECIRECIR-2009-OrlandoS #mining #query
Mining Query Logs (SO, FS), pp. 814–817.
ICMLICML-2009-QiTZCZ #learning #metric #performance
An efficient sparse metric learning in high-dimensional space via l1-penalized log-determinant regularization (GJQ, JT, ZJZ, TSC, HJZ), pp. 841–848.
KDDKDD-2009-Kumar #challenge #mining #web
Mining web logs: applications and challenges (RK), pp. 3–4.
KDDKDD-2009-MakanjuZM #clustering #using
Clustering event logs using iterative partitioning (AM, ANZH, EEM), pp. 1255–1264.
KDDKDD-2009-ZhouJPL #data-driven #framework
OLAP on search logs: an infrastructure supporting data-driven applications in search engines (BZ, DJ, JP, HL), pp. 1395–1404.
KDIRKDIR-2009-SaneifarBLPR #mining
Mining for Relevant Terms from Log Files (HS, SB, AL, PP, MR), pp. 77–84.
SIGIRSIGIR-2009-CarmanBGC #comparison #query #statistics
A statistical comparison of tag and query logs (MJC, MB, RG, FC), pp. 123–130.
SIGIRSIGIR-2009-SakaiN #analysis #query #wiki
Serendipitous search via wikipedia: a query log analysis (TS, KN), pp. 780–781.
SACSAC-2009-ChoudhuriG #embedded #named #nondeterminism
FlashBox: a system for logging non-deterministic events in deployed embedded systems (SC, TG), pp. 1676–1682.
SACSAC-2009-KingLS #network #taxonomy
A taxonomy and adversarial model for attacks against network log anonymization (JK, KL, AJS), pp. 1286–1293.
SOSPSOSP-2009-XuHFPJ #detection #mining #problem #scalability
Detecting large-scale system problems by mining console logs (WX, LH, AF, DAP, MIJ), pp. 117–132.
DocEngDocEng-2008-GormishWPH #approach #distributed #documentation #flexibility #metadata #security
Document logs: a distributed approach to metadata for better security and flexibility (MJG, GW, KWP, PH), pp. 119–122.
VLDBVLDB-2008-Bar-YossefG #mining #query
Mining search engine query logs via suggestion sampling (ZBY, MG), pp. 54–65.
VLDBVLDB-2008-NezhadBSCA #process
Process spaceship: discovering and exploring process views from event logs in data spaces (HRMN, BB, RSP, FC, PA), pp. 1412–1415.
VLDBVLDB-2008-SearsCB #named #replication
Rose: compressed, log-structured replication (RS, MC, EAB), pp. 526–537.
VLDBVLDB-2008-TliliDPVAMCL
P2P logging and timestamping for reconciliation (MT, WKD, EP, PV, RA, PM, GC, SL), pp. 1420–1423.
STOCSTOC-2008-FakcharoenpholL #algorithm #approximate #problem
An o(log2 k)-approximation algorithm for the k-vertex connected spanning subgraph problem (JF, BL), pp. 153–158.
CHICHI-2008-HayesGAT #behaviour #named
CareLog: a selective archiving tool for behavior management in schools (GRH, LMG, GDA, KNT), pp. 685–694.
CAiSECAiSE-2008-SerrourGKB #correlation #interactive #protocol
Message Correlation and Business Protocol Discovery in Service Interaction Logs (BS, DPG, HK, BB), pp. 405–419.
ICEISICEIS-AIDSS-2008-BezerraW #algorithm #detection #process
Anomaly Detection Algorithms in Business Process Logs (FdLB, JW), pp. 11–18.
CIKMCIKM-2008-ByrdNTPCGV #automation
Semi-automated logging of contact center telephone calls (RJB, MSN, WT, YP, KSFC, SCG, KV), pp. 133–142.
CIKMCIKM-2008-JonesK #automation #query #segmentation #topic
Beyond the session timeout: automatic hierarchical segmentation of search topics in query logs (RJ, KLK), pp. 699–708.
CIKMCIKM-2008-WangZ #effectiveness #mining #query
Mining term association patterns from search logs for effective query reformulation (XW, CZ), pp. 479–488.
ICPRICPR-2008-GuZ #metric #similarity
A similarity measure under Log-Euclidean metric for stereo matching (QG, JZ), pp. 1–4.
ICPRICPR-2008-JinLH #learning #prototype
Prototype learning with margin-based conditional log-likelihood loss (XJ, CLL, XH), pp. 1–4.
ICPRICPR-2008-PalanderB #geometry
Epipolar geometry and log-polar transform in wide baseline stereo matching (KP, SSB), pp. 1–4.
SIGIRSIGIR-2008-HuCBLCY #mining #query #web
Web query translation via web log mining (RH, WC, PB, YL, ZC, QY), pp. 749–750.
SACSAC-2008-BezerraW #algorithm #detection #process
Anomaly detection algorithms in logs of process aware systems (FdLB, JW), pp. 951–952.
ICLPICLP-2008-AnhRD #implementation #using
An Implementation of Extended P-Log Using XASP (HTA, CDPKR, CVD), pp. 739–743.
ICLPICLP-2008-KimmigCRDR #execution #on the #performance #source code
On the Efficient Execution of ProbLog Programs (AK, VSC, RR, BD, LDR), pp. 175–189.
ICLPICLP-2008-MuggletonST #bias #declarative #logic programming #named #using
TopLog: ILP Using a Logic Program Declarative Bias (SM, JCAS, ATN), pp. 687–692.
ICLPICLP-2008-Santos #bias #declarative #logic programming #named #using
TopLog: ILP Using a Logic Program Declarative Bias (JCAS), pp. 818–819.
ICSTICST-2008-KodreZR #approach #statistics #testing
Statistical Sampling Based Approach to Alleviate Log Replay Testing (RK, HZ, DJR), pp. 533–536.
IJCARIJCAR-2008-FurbachGHP #named
LogAnswer — A Deduction-Based Question Answering System (System Description) (UF, IG, HH, BP), pp. 139–146.
SIGMODSIGMOD-2007-0002SL #middleware
Log-based recovery for middleware servers (RW, BS, DBL), pp. 425–436.
SIGMODSIGMOD-2007-LeeM #approach #design
Design of flash-based DBMS: an in-page logging approach (SWL, BM), pp. 55–66.
CHICHI-2007-SellenFAHRW #case study #memory management #using
Do life-logging technologies support memory for the past?: an experimental study using sensecam (AS, AF, MA, SH, CR, KRW), pp. 81–90.
HCIHCI-IDU-2007-FujiokaTKO #coordination #detection #problem #usability
Tool for Detecting Webpage Usability Problems from Mouse Click Coordinate Logs (RF, RT, YK, HO), pp. 438–445.
HCIHCI-IPT-2007-KimRB #smarttech
Wearable Healthcare Gadget for Life-Log Service Based on WPAN (SHK, DWR, CB), pp. 837–844.
CIKMCIKM-2007-JonesKPT #privacy #query #quote #what
“I know what you did last summer”: query logs and user privacy (RJ, RK, BP, AT), pp. 909–914.
ICMLICML-2007-AndrewG #modelling #scalability
Scalable training of L1-regularized log-linear models (GA, JG), pp. 33–40.
ICMLICML-2007-GlobersonKCC #algorithm #predict
Exponentiated gradient algorithms for log-linear structured prediction (AG, TK, XC, MC), pp. 305–312.
KDDKDD-2007-Baeza-YatesT #query #semantics
Extracting semantic relations from query logs (RABY, AT), pp. 76–85.
SIGIRSIGIR-2007-GaoNNZHWH #query #using
Cross-lingual query suggestion using query logs of different languages (WG, CN, JYN, MZ, JH, KFW, HWH), pp. 463–470.
SIGIRSIGIR-2007-TeevanAJP #query
Information re-retrieval: repeat queries in Yahoo’s logs (JT, EA, RJ, MASP), pp. 151–158.
SIGIRSIGIR-2007-WangZ #web
Learn from web search logs to organize search results (XW, CZ), pp. 87–94.
SIGIRSIGIR-2007-WhiteCC #pseudo #query #refinement
Comparing query logs and pseudo-relevance feedbackfor web-search query refinement (RWW, CLAC, SC), pp. 831–832.
SACSAC-2007-ChiangH #adaptation #file system #performance
Improving the performance of log-structured file systems with adaptive block rearrangement (MLC, JSH), pp. 1136–1140.
SACSAC-2007-DingZ #web
Log-based indexing to improve web site search (C(D, JZ), pp. 829–833.
HPCAHPCA-2007-YenBMMVHSW #hardware #memory management #named #transaction
LogTM-SE: Decoupling Hardware Transactional Memory from Caches (LY, JB, MRM, KEM, HV, MDH, MMS, DAW), pp. 261–272.
HPDCHPDC-2007-ImranRLL #coordination #grid #mobile
A proxy-based uncoordinated checkpointing scheme with pessimistic message logging for mobile grid systems (NI, IR, YKL, SL), pp. 237–238.
DACDAC-2006-LiLP #analysis #power management #statistics
Projection-based statistical analysis of full-chip leakage power with non-log-normal distributions (XL, JL, LTP), pp. 103–108.
VLDBVLDB-2006-SteinleAGL #dependence #generative #mining #novel
Mapping Moving Landscapes by Mining Mountains of Logs: Novel Techniques for Dependency Model Generation (MS, KA, SG, CL), pp. 1093–1102.
MSRMSR-2006-GermanRS #comprehension #using
Using evolutionary annotations from change logs to enhance program comprehension (DMG, PCR, MADS), pp. 159–162.
WCREWCRE-2006-GanesanMKY #aspect-oriented #case study #product line #source code
Discovering Organizational Aspects from the Source Code History Log during the Product Line Planning Phase — A Case Study (DG, DM, JK, KY), pp. 211–220.
STOCSTOC-2006-Ben-OrPV
Byzantine agreement in the full-information model in O(log n) rounds (MBO, EP, VV), pp. 179–186.
EDOCEDOC-2006-OgasawaraTY #execution #modelling #process
Estimating Structures of Business Process Models from Execution Logs (SO, KT, TY), pp. 106–115.
CIKMCIKM-2006-ZhuangC #query #ranking #using
Re-ranking search results using query logs (ZZ, SC), pp. 860–861.
ECIRECIR-2006-WangVR #collaboration
A User-Item Relevance Model for Log-Based Collaborative Filtering (JW, APdV, MJTR), pp. 37–48.
ICPRICPR-v2-2006-Mancas-ThillouG #using
Character Segmentation-by-Recognition Using Log-Gabor Filters (CMT, BG), pp. 901–904.
ICPRICPR-v3-2006-BalciAF
Subpixel Alignment of MRI Data Under Cartesian and Log-Polar Sampling (MB, MA, HF), pp. 607–610.
ICPRICPR-v4-2006-YaoLYZL06a #algorithm #recognition #using
Iris Recognition Algorithm Using Modified Log-Gabor Filters (PY, JL, XY, ZZ, BL), pp. 461–464.
KDDKDD-2006-FormanKS #mining
Pragmatic text mining: minimizing human effort to quantify many issues in call logs (GF, EK, JS), pp. 852–861.
KDDKDD-2006-WedigM #analysis #personalisation #query #scalability
A large-scale analysis of query logs for assessing personalization opportunities (SW, OM), pp. 742–747.
KRKR-2006-Rosati #datalog #integration #logic
DL+log: Tight Integration of Description Logics and Disjunctive Datalog (RR), pp. 68–78.
SEKESEKE-2006-GaaloulG #analysis #mining #statistics #workflow
A Workflow Mining Tool based on Logs Statistical Analysis (WG, CG), pp. 595–600.
SIGIRSIGIR-2006-BlunsomKC #classification #modelling
Question classification with log-linear models (PB, KK, JRC), pp. 615–616.
SIGIRSIGIR-2006-Buzikashvili #multi #web
An exploratory web log study of multitasking (NB), pp. 623–624.
SIGIRSIGIR-2006-ParikhK #feedback #named #query #using
Unity: relevance feedback using user query logs (JP, SK), pp. 689–690.
SIGIRSIGIR-2006-TeevanAJP #query
History repeats itself: repeat queries in Yahoo’s logs (JT, EA, RJ, MASP), pp. 703–704.
SACSAC-2006-WuKC #file system #memory management #performance
Efficient initialization and crash recovery for log-based file systems over flash memory (CHW, TWK, LPC), pp. 896–900.
HPCAHPCA-2006-MooreBMHW #memory management #named #transaction
LogTM: log-based transactional memory (KEM, JB, MJM, MDH, DAW), pp. 254–265.
ICLPICLP-2006-RuckhausKPG #approach #datalog #owl
Integrating Datalog with OWL: Exploring the AL-log Approach (ER, VK, BP, BCG), pp. 455–456.
STOCSTOC-2005-AgarwalCMM #algorithm #approximate #problem
O(sqrt(log n)) approximation algorithms for min UnCut, min 2CNF deletion, and directed cut problems (AA, MC, KM, YM), pp. 573–581.
STOCSTOC-2005-Ajtai #representation
Representing hard lattices with O(n log n) bits (MA), pp. 94–103.
STOCSTOC-2005-Ben-SassonS #complexity #query
Simple PCPs with poly-log rate and query complexity (EBS, MS), pp. 266–275.
STOCSTOC-2005-Reingold
Undirected ST-connectivity in log-space (OR), pp. 376–385.
STOCSTOC-2005-Trifonov #algorithm
An O(log n log log n) space algorithm for undirected st-connectivity (VT), pp. 626–633.
CIKMCIKM-2005-ZhaoBG05a #named #web
WAM-Miner: in the search of web access motifs from historical web log data (QZ, SSB, LG), pp. 421–428.
KDDKDD-2005-LiLMP #framework #mining
An integrated framework on mining logs files for computing system management (TL, FL, SM, WP), pp. 776–781.
MLDMMLDM-2005-HalveyKS #clustering #internet #navigation #predict #using
Birds of a Feather Surf Together: Using Clustering Methods to Improve Navigation Prediction from Internet Log Files (MH, MTK, BS), pp. 174–183.
SEKESEKE-2005-WangM #behaviour #web
Recovering Individual Accessing Behaviour from Web Logs (LW, CM), pp. 590–595.
CSLCSL-2005-Perron #proving
A Propositional Proof System for Log Space (SP), pp. 509–524.
VLDBVLDB-2004-SnodgrassYC #detection
Tamper Detection in Audit Logs (RTS, S(Y, CSC), pp. 504–515.
STOCSTOC-2004-ChuzhoyGHKKN #approximate #symmetry
Asymmetric k-center is log* n-hard to approximate (JC, SG, EH, SK, GK, JN), pp. 21–27.
ICALPICALP-2004-FlumGW #bound #nondeterminism #parametricity
Bounded Fixed-Parameter Tractability and log2n Nondeterministic Bits (JF, MG, MW), pp. 555–567.
ICALPICALP-2004-FuW #algorithm
A 2O(n1-(1/d)log n) Time Algorithm for d-Dimensional Protein Folding in the HP-Model (BF, WW), pp. 630–644.
CIKMCIKM-2004-SrinivasanADZ #analysis #grammarware #web
Grammar-based task analysis of web logs (SS, AA, PMD, VZ), pp. 244–245.
ICPRICPR-v1-2004-KeysersN #analysis #linear #modelling
Linear Discriminant Analysis and Discriminative Log-linear Modeling (DK, HN), pp. 156–159.
ICPRICPR-v2-2004-KimBC #image
Hough Transform in Log-Polar Image Including Foveal and Peripheral Information (JSK, YSB, SIC), pp. 60–63.
ICPRICPR-v4-2004-SchindlerB #geometry #image
The Epipolar Geometry of the Log-Polar Image Plane (KS, HB), pp. 40–43.
SIGIRSIGIR-2004-BeitzelJCGF #analysis #query #scalability #topic #web
Hourly analysis of a very large topically categorized web query log (SMB, ECJ, AC, DAG, OF), pp. 321–328.
VLDBVLDB-2003-LiuLBHTS #database #multi #transaction
Capturing Global Transactions from Multiple Recovery Log Files in a Partitioned Database System (CL, BGL, SB, EH, TCT, JS), pp. 987–996.
STOCSTOC-2003-BobkovT
Modified log-sobolev inequalities, mixing and hypercontractivity (SB, PT), pp. 287–296.
ICEISICEIS-v4-2003-PierozziGAC #analysis #towards #web
Towards Web Site User’s Profile: Log File Analysis (IPJ, EGG, MdCFA, CAdC), pp. 395–398.
KDDKDD-2003-WuBY #modelling #multi
Screening and interpreting multi-item associations based on log-linear modeling (XW, DB, YY), pp. 276–285.
SIGIRSIGIR-2003-Anick #feedback #refinement #using #web
Using terminological feedback for web search refinement: a log-based study (PGA), pp. 88–95.
SACSAC-2003-RagothamanP #assessment #hybrid #segmentation
Hybrid Log Segmentation for Assured Damage Assessment (PR, BP), pp. 522–527.
DocEngDocEng-2002-WongL #multi #query #xml
Managing and querying multi-version XML data with update logging (RKW, NL), pp. 74–81.
VLDBVLDB-2002-OhuraTPK #internet #mining #query #using #web
Experiments on Query Expansion for Internet Yellow Page Services Using Web Log Mining (YO, KT, IP, MK), pp. 1008–1018.
STOCSTOC-2002-Han #linear #sorting
Deterministic sorting in O(nlog log n) time and linear space (YH), pp. 602–608.
CIAACIAA-2002-Korner #automaton #finite #on the
On Minimizing Cover Automata for Finite Languages in O(n log n) Time (HK), pp. 117–127.
ICALPICALP-2002-BrodalLOP #problem #statistics #string
Solving the String Statistics Problem in Time O(n log n) (GSB, RBL, , CNSP), pp. 728–739.
ICPRICPR-v2-2002-YeungB #analysis #mobile #towards
Towards Log-Polar Fixation for Mobile Robots — Analysis of Corner Tracking on the Log-Polar Camera (AY, NB), pp. 300–303.
ICPRICPR-v3-2002-AndreuR #image #industrial
Enhancement of Annual Rings on Industrial CT Images of Logs (JPA, AR), pp. 261–264.
ICPRICPR-v3-2002-HontaniSKA #feature model #image #symmetry
Vibratory Image Feature Extraction Based on Local Log-Polar Symmetry (HH, JS, AK, SA), pp. 839–842.
ICPRICPR-v4-2002-TraverP #estimation #image #segmentation #using
Motion Estimation and Figure-Ground Segmentation Using Log-Polar Images (VJT, FP), pp. 166–169.
OSDIOSDI-2002-DunlapKCBC #analysis #named
ReVirt: Enabling Intrusion Analysis Through Virtual-Machine Logging and Replay (GWD, STK, SC, MAB, PMC), pp. 211–224.
STOCSTOC-2001-CanettiKPR #black box #concurrent
Black-box concurrent zero-knowledge requires Ω(log n) rounds (RC, JK, EP, AR), pp. 570–579.
KDDKDD-2001-YangZL #mining #modelling #predict #web
Mining web logs for prediction models in WWW caching and prefetching (QY, HHZ, ITYL), pp. 473–478.
SIGIRSIGIR-2001-MillerRS #algorithm #matrix #using
Modifications of Kleinberg’s HITS Algorithm Using Matrix Exponentiation and WebLog Records (JCM, GR, FS), pp. 444–445.
SACSAC-2001-BosschereJ #coordination
Synchronous coordination in the Log coordination model (KDB, JMJ), pp. 151–158.
PPoPPPPoPP-2001-InoFH #analysis #named #parallel
LogGPS: a parallel computational model for synchronization analysis (FI, NF, KH), pp. 133–142.
SIGMODSIGMOD-2000-Lomet #logic #online #using
High Speed On-line Backup When Using Logical Log Operations (DBL), pp. 34–45.
ITiCSEITiCSE-2000-Chang #analysis #concept #learning #web
Discovering learning patterns from Web logs by concept transformation analysis (poster session) (CKC), pp. 186–187.
CIKMCIKM-2000-Norvag #case study #comparative #database
A Comparative Study of Log-Only and In-Place Update Based Temporal Object Database Systems (KN), pp. 496–503.
ICMLICML-2000-Khardon #learning
Learning Horn Expressions with LogAn-H (RK), pp. 471–478.
ICPRICPR-v1-2000-BerensF
Log-Opponent Chromaticity Coding of Color Space (JB, GDF), pp. 1206–1211.
KDDKDD-2000-BeefermanB #clustering #query
Agglomerative clustering of a search engine query log (DB, ALB), pp. 407–416.
SIGIRSIGIR-2000-ChuangPLC #interactive #web
Auto-construction of a live thesaurus from search term logs for interactive Web search (SLC, HTP, WHL, LFC), pp. 334–336.
SACSAC-2000-BarbosaC #coordination
A Coordination Language for Collective Agent Based Systems: GroupLog (FB, JCC), pp. 189–195.
SACSAC-2000-PandaT #dependence #information management
Data Dependency Based Logging for Defensive Information Warfare (BP, ST), pp. 361–365.
SACSAC-2000-ParkY #distributed #lightweight #memory management
A Lightweight Casual Logging Scheme for Recoverable Distributed Shared Memory (TP, HYY), pp. 661–666.
SACSAC-2000-SrinivasaS #behaviour #transaction
Discerning Behavioral Properties by Analyzing Transaction Logs (SS, MS), pp. 281–282.
ICSEICSE-2000-AndrewsZ #analysis
Broad-spectrum studies of log file analysis (JHA, YZ), pp. 105–114.
SIGMODSIGMOD-1999-LometT #logic
Logical Logging to Extend Recovery to New Domains (DBL, MRT), pp. 73–84.
VLDBVLDB-1999-Campbell #architecture #sql
The New Locking, Logging, and Recovery Architecture of Microsoft SQL Server 7.0 (DC), p. 249.
CHICHI-1999-CohenWP #interface #multi #named #video
Logjam: A Tangible Multi-Person Interface for Video Logging (JC, MW, PP), pp. 128–135.
HCIHCI-EI-1999-Harel #automation #usability #validation
Automatic Operation Logging and Usability Validation (AH), pp. 1128–1133.
SIGIRSIGIR-1999-LimaP #query #recognition
Phrase Recognition and Expansion for Short, Precision-Biased Queries Based on a Query Log (EFdL, JOP), pp. 145–152.
OSDIOSDI-1999-WangAP #file system #programmable
Virtual Log Based File Systems for a Programmable Disk (RYW, TEA, DAP), pp. 29–43.
PPoPPPPoPP-1999-Sundaram-StukelV #analysis #predict #using
Predictive Analysis of a Wavefront Application using LogGP (DSS, MKV), pp. 141–150.
ASEASE-1998-Andrews #analysis #testing #tool support #using
Testing using Log File Analysis: Tools, Methods, and Issues (JHA), p. 157–?.
VLDBVLDB-1998-MuthOPW #data access #design #implementation #performance
Design, Implementation, and Performance of the LHAM Log-Structured History Data Access Method (PM, PEO, AP, GW), pp. 452–463.
ICPRICPR-1998-AhrnsN #realtime #similarity #using
Real-time monocular fixation control using the log-polar transformation and a confidence-based similarity measure (IA, HN), pp. 310–315.
HPDCHPDC-1998-Al-TawilM #quantifier
LogGP Quantified: The Case for MPI (KAT, CAM), pp. 366–367.
STOCSTOC-1997-ColeH #pattern matching #random #set
Tree Pattern Matching and Subset Matching in Randomized O(n log3m) Time (RC, RH), pp. 66–75.
STOCSTOC-1997-OstrovskyR #algorithm
Universal O(Congestion + Dilation + log1+epsilonN) Local Control Packet Switching Algorithms (RO, YR), pp. 644–653.
HPDCHPDC-1997-NetzerX #distributed #game studies #source code
Replaying Distributed Programs without Message Logging (RHBN, YX), pp. 137–147.
SOSPSOSP-1997-NeefeWRCA #adaptation #file system #performance
Improving the Performance of Log-Structured File Systems with Adaptive Methods (JMN, DSR, AMC, RYW, TEA), pp. 238–251.
CADECADE-1997-EhrensbergerZ #logic #named
DiaLog: A System for Dialogue Logic (JE, CZ), pp. 446–460.
CAVCAV-1997-Klarlund #algorithm #online #refinement
An n log n Algorithm for Online BDD Refinement (NK), pp. 107–118.
CAVCAV-1997-LindenstraussSS #logic programming #named #query #source code #termination
TermiLog: A System for Checking Termination of Queries to Logic Programs (NL, YS, AS), pp. 444–447.
STOCSTOC-1996-Ma #fault tolerance #network #sorting
An O(n log n)-Size Fault-Tolerant Sorting Network (Extended Abstract) (YM), pp. 266–275.
CIKMCIKM-1996-AndrewsLSS #database #implementation #on the #programming language
On Implementing SchemaLog — A Database Programming Language (AA, NS, LVSL, INS), pp. 309–316.
ICPRICPR-1996-CapurroPS #image
Vergence and tracking fusing log-polar images (CC, FP, GS), pp. 740–744.
ICDARICDAR-v1-1995-GuerfaliP #generative #modelling
The Delta LogNormal theory for the generation and modeling of cursive characters (WG, RP), pp. 495–498.
STOCSTOC-1995-GoldmannH
Monotone circuits for connectivity have depth (log n)2-o(1) (Extended Abstract) (MG, JH), pp. 569–574.
STOCSTOC-1995-KushilevitzOR #communication #polynomial
Log-space polynomial end-to-end communication (EK, RO, AR), pp. 559–568.
ICALPICALP-1995-NikoletseasRSY #graph #memory management #probability
Stochastic Graphs Have Short Memory: Fully Dynamic Connectivity in Poly-Log Expected Time (SEN, JHR, PGS, MY), pp. 159–170.
HPDCHPDC-1995-Menon #array #comparison #performance
A Performance Comparison of RAID-5 and Log-Structured Arrays (JM0), pp. 167–178.
SOSPSOSP-1995-CheritonD #memory management
Logged Virtual Memory (DRC, KJD), pp. 26–39.
ICLPICLP-1995-SagonasW #execution #implementation #performance #prolog
Efficient Execution of HiLog in WAM-based Prolog Implementations (KFS, DSW), pp. 349–363.
STOCSTOC-1994-GargH #algorithm #approximate #problem
An O(log k) approximation algorithm for the k minimum spanning tree problem in the plane (NG, DSH), pp. 432–438.
CHICHI-1994-WeberP94a #named #realtime #video
Marquee: a tool for real-time video logging (KW, AP), pp. 58–64.
CIKMCIKM-1994-KeenD #named
XEL: Extended Ephemeral Logging for Log Storage Management (JSK, WJD), pp. 312–321.
ICLPILPS-1994-SagonasW #compilation #prolog
A Portable Compiler for Integrating HiLog into Prolog Systems (KFS, DSW), p. 682.
SIGMODSIGMOD-1993-KeenD #evaluation #performance
Performance Evaluation of Ephemeral Logging (JSK, WJD), pp. 187–196.
VLDBVLDB-1993-HoskingBM #comparative #evaluation #performance #persistent #programming language
Update Logging for Persistent Programming Languages: A Comparative Performance Evaluation (ALH, EWB, JEBM), pp. 429–440.
ICALPICALP-1993-AnderssonM
Dynamic Interpolation Search in o(log log n) Time (AA, CM), pp. 15–27.
PPDPPLILP-1993-BugliesiN #implementation #named
SelfLog: Language and Implementation (MB, GN), pp. 412–413.
PPoPPPPoPP-1993-CullerKPSSSSE #named #parallel #towards
LogP: Towards a Realistic Model of Parallel Computation (DEC, RMK, DAP, AS, KES, EES, RS, TvE), pp. 1–12.
ICLPICLP-1993-Smith #logic programming #multi #named
MultiLog: Data Or-Parallel Logic Programming (DAS), pp. 314–331.
ICLPILPS-1993-Paterson-JonesW
Extending the WAM for HiLog (RPJ, PTW), p. 654.
SIGMODSIGMOD-1992-JhingranK #analysis #database #protocol #using
Analysis of Recovery in a Database System Using a Write-Ahead Log Protocol (AJ, PK), pp. 175–184.
SIGMODSIGMOD-1992-MohanL #concurrent #named #performance #using
ARIES/IM: An Efficient and High Concurrency Index Management Method Using Write-Ahead Logging (CM, FEL), pp. 371–380.
STOCSTOC-1992-AjtaiM #algorithm #linear #programming
A Deterministic Poly(log log N)-Time N-Processor Algorithm for Linear Programming in Fixed Dimension (MA, NM), pp. 327–338.
ASPLOSASPLOS-1992-BurrowsJLM #file system #online
On-Line Data Compression in a Log-Structured File System (MB, CJ, BWL, TM), pp. 2–9.
PODSPODS-1991-Ross91a #on the
On Negation in HiLog (KAR), pp. 206–215.
STOCSTOC-1991-ApplegateK #integration
Sampling and Integration of Near Log-Concave functions (DA, RK), pp. 156–163.
PPDPPLILP-1991-Gloess #logic #order
U-Log, An Ordered Sorted Logic with Typed Attributes (PYG), pp. 275–286.
SOSPSOSP-1991-RosenblumO #design #file system #implementation
The Design and Implementation of a Log-Structured File System (MR, JKO), pp. 1–15.
ICLPICLP-1991-DovierOPR #finite #logic programming #programming language #set
{log}: A Logic Programming Language with Finite Sets (AD, EGO, EP, GR), pp. 111–124.
PODSPODS-1990-ConsensM #named #recursion #visual notation
GraphLog: a Visual Formalism for Real Life Recursion (MPC, AOM), pp. 404–416.
SIGMODSIGMOD-1990-ConsensM #query #visual notation
The G+/GraphLog Visual Query System (MPC, AOM), p. 388.
STOCSTOC-1990-SchriftS
The Discrete Log is Very Discreet (AWS, AS), pp. 405–415.
HTHT-1989-ConsensM #hypermedia #query
Expressing Structural Hypertext Queries in GraphLog (MPC, AOM), pp. 269–292.
VLDBVLDB-1989-RothermelM #named #transaction
ARIES/NT: A Recovery Method Based on Write-Ahead Logging for Nested Transactions (KR, CM), pp. 337–346.
STOCSTOC-1989-Upfal
An O(log N) Deterministic Packet Routing Scheme (Preliminary Version) (EU), pp. 241–250.
FPCAFPCA-1989-RufW #functional #logic #nondeterminism #programming #unification
Nondeterminism and Unification in LogScheme: Integrating Logic and Functional Programming (ER, DW), pp. 327–339.
ICLPNACLP-1989-ChenKW #first-order #higher-order #logic programming #named #semantics
HiLog: A First-Order Semantics for Higher-Order Logic Programming Constructs (WC, MK, DSW), pp. 1090–1114.
RTARTA-1989-Snyder #algorithm #equation #generative #performance #set
Efficient Ground Completion: An O(n log n) Algorithm for Generating Reduced Sets of Ground Rewrite Rules Equivalent to a Set of Ground Equations E (WS), pp. 419–433.
SIGMODSIGMOD-1987-DanielsST #distributed #transaction
Distributed Logging for Transaction Processing (DSD, AZS, DST), pp. 82–96.
VLDBVLDB-1987-KahlerR #database
Extending Logging for Database Snapshot Refresh (BK, OR), pp. 389–398.
VLDBVLDB-1987-Moss #transaction
Log-Based Recovery for Nested Transactions (JEBM), pp. 427–432.
SOSPSOSP-1987-FinlaysonC
Log Files: An Extended File Service Exploiting Write-Once Storage (RSF, DRC), pp. 139–148.
SOSPSOSP-1987-Hagmann #commit #file system #using
Reimplementing the Cedar File System Using Logging and Group Commit (RBH), pp. 155–162.
STOCSTOC-1986-AjtaiKSS #parallel
Deterministic Selection in O(log log N) Parallel Time (MA, JK, WLS, ES), pp. 188–195.
STOCSTOC-1986-LuekerMR #difference #linear #programming
Linear Programming with Two Variables per Inequality in Poly-Log Time (Preliminary Version) (GSL, NM, VR), pp. 196–205.
STOCSTOC-1984-BilardiP #network #sorting
A Minimum Area VLSI Network for O(log n) Time Sorting (GB, FPP), pp. 64–70.
STOCSTOC-1984-Willard #protocol
Log-Logarithmic Protocols for Resolving Ethernet and Semaphore Conflicts (Preliminary Report) (DEW), pp. 512–521.
SIGIRSIGIR-1984-Tolle #analysis #evaluation #information management #monitoring #transaction
Monitoring and Evaluation of Information Systems Via Transaction Log Analysis (JT), pp. 247–258.
PODSPODS-1983-PetersonS #protocol
LOG Write-Ahead Protocols and IMS/VS Logging (RJP, JPS), pp. 216–243.
STOCSTOC-1983-AjtaiKS #network #sorting
An O(n log n) Sorting Network (MA, JK, ES), pp. 1–9.
STOCSTOC-1983-LongW #how #question
How Discreet is the Discrete Log? (DLL, AW), pp. 413–420.
SIGIRSIGIR-1983-Tolle #analysis #online #transaction
Transactional Log Analysis: Online Catalogs (JT), pp. 147–160.
DACDAC-1981-Lauther #algorithm
An O (N log N) algorithm for Boolean mask operations (UL), pp. 555–562.
ICALPICALP-1981-Reif #network
Minimum S-T Cut of a Planar Undirected Network in O(n log²(n)) Time (JHR), pp. 56–67.
STOCSTOC-1980-Bloniarz #algorithm
A Shortest-Path Algorithm with Expected Time O(n^2 log n log ^* n) (PAB), pp. 378–384.
VLDBVLDB-1979-Reuter #database
Minimizing the I/O-Operations for Undo-Logging in Database Systems (AR0), pp. 164–172.
STOCSTOC-1979-Cook #polynomial
Deterministic CFL’s Are Accepted Simultaneously in Polynomial Time and Log Squared Space (SAC), pp. 338–345.
STOCSTOC-1978-Miller #morphism #on the
On the n^log n Isomorphism Technique: A Preliminary Report (GLM), pp. 51–58.
STOCSTOC-1977-YaoAR #bound #problem
An Ω(n² log n) Lower Bound to the Shortest Paths Problem (ACCY, DA, RLR), pp. 11–17.

Bibliography of Software Language Engineering in Generated Hypertext (BibSLEIGH) is created and maintained by Dr. Vadim Zaytsev.
Hosted as a part of SLEBOK on GitHub.