415 papers:
SIGMOD-2015-BernsteinDDP #concurrent #database #optimisation- Optimizing Optimistic Concurrency Control for Tree-Structured, Log-Structured Databases (PAB, SD, BD, MP), pp. 1295–1309.
SIGMOD-2015-MoffittSAM #collaboration #data access- Collaborative Access Control in WebdamLog (VZM, JS, SA, GM), pp. 197–211.
VLDB-2015-WangKSPZNRKS- Building a Replicated Logging System with Apache Kafka (GW, JK, SS, KP, MZ, NN, JR, JK, JS), pp. 1654–1665.
SANER-2015-CaiS15a #analysis #dependence #fine-grained #named- TRACERJD: Generic trace-based dynamic dependence analysis with fine-grained logging (HC, RAS), pp. 489–493.
CHI-2015-FourneyWH- Exploring Time-Dependent Concerns about Pregnancy and Childbirth from Search Logs (AF, RWW, EH), pp. 737–746.
CHI-2015-LeeCN #process #visualisation- Patina Engraver: Visualizing Activity Logs as Patina in Fashionable Trackers (MHL, SC, TJN), pp. 1173–1182.
CSCW-2015-WieseMHZ #quote- “You Never Call, You Never Write”: Call and SMS Logs Do Not Always Indicate Tie Strength (JW, JKM, JIH, JZ), pp. 765–774.
DUXU-DD-2015-FilhoPV15b #automation #mobile #testing #usability- Emotions Logging in Automated Usability Tests for Mobile Devices (JFF, WP, TV), pp. 428–435.
HIMI-IKC-2015-NakashimaMHOWP #nondeterminism- Kick Extraction for Reducing Uncertainty in RoboCup Logs (TN, SM, JH, OO, PW, MP), pp. 622–633.
HIMI-IKD-2015-YoshinoO #using- Proposal of a Data Presentation Technique Using Four-Frame Cartoon Expression for a LifeLog System (TY, IO), pp. 235–246.
CAiSE-2015-TsuchiyaWFOM #configuration management #feedback #interactive #requirements #traceability #using- Interactive Recovery of Requirements Traceability Links Using User Feedback and Configuration Management Logs (RT, HW, YF, KO, RM), pp. 247–262.
ICML-2015-DjolongaK #modelling #scalability- Scalable Variational Inference in Log-supermodular Models (JD, AK), pp. 1804–1813.
ICML-2015-HanMS #probability #scalability- Large-scale log-determinant computation through stochastic Chebyshev expansions (IH, DM, JS), pp. 908–917.
ICML-2015-HuangWSLC #classification #image #learning #metric #set #symmetry- Log-Euclidean Metric Learning on Symmetric Positive Definite Manifold with Application to Image Set Classification (ZH, RW, SS, XL, XC), pp. 720–729.
ICML-2015-SwaminathanJ #feedback #learning- Counterfactual Risk Minimization: Learning from Logged Bandit Feedback (AS, TJ), pp. 814–823.
KDD-2015-PengKLC #approximate #clustering #rank #using- Subspace Clustering Using Log-determinant Rank Approximation (CP, ZK, HL, QC), pp. 925–934.
SIGIR-2015-Baeza-Yates #incremental #query- Incremental Sampling of Query Logs (RABY), pp. 1093–1096.
SAC-2015-BraunPPJ #adaptation #named #web- LogSec: adaptive protection for the wild wild web (BB, KP, JP, MJ), pp. 2149–2156.
SAC-2015-PintoMCS #process #using- Using event logs and the Ψ-theory to analyse business processes (PLP, CM, AC, MMdS), pp. 1195–1202.
ESEC-FSE-2015-BusanyM #analysis #behaviour #statistics- Behavioral log analysis with statistical guarantees (NB, SM), pp. 898–901.
ICSE-v1-2015-ZhuHFZLZ #developer #learning- Learning to Log: Helping Developers Make Informed Logging Decisions (JZ, PH, QF, HZ, MRL, DZ), pp. 415–425.
ICSE-v2-2015-PecchiaCCC #assessment #development #industrial #process- Industry Practices and Event Logging: Assessment of a Critical Software Development Process (AP, MC, GC, DC), pp. 169–178.
SOSP-2015-MatveevSFM #concurrent #lightweight #named #programming- Read-log-update: a lightweight synchronization mechanism for concurrent programming (AM, NS, PF, PM), pp. 168–183.
TAP-2015-GrinchteinCP #analysis #constraints #optimisation #protocol- A Constraint Optimisation Model for Analysis of Telecommunication Protocol Logs (OG, MC, JP), pp. 137–154.
DATE-2014-BalckGP #generative #modelling #protocol #testing #using- Model-based protocol log generation for testing a telecommunication test harness using CLP (KB, OG, JP), pp. 1–4.
VLDB-2014-WangJ #memory management #scalability- Scalable Logging through Emerging Non-Volatile Memory (TW, RJ), pp. 865–876.
VLDB-2014-WangMO #lightweight- Lightweight Indexing of Observational Data in Log-Structured Storage (SW, DM, BCO), pp. 529–540.
VLDB-2014-XuCC #clustering #graph #named- LogGP: A Log-based Dynamic Graph Partitioning Method (NX, LC, BC), pp. 1917–1928.
VLDB-2015-HuangSQ14 #transaction- NVRAM-aware Logging in Transaction Systems (JH, KS, MKQ), pp. 389–400.
ICSME-2014-ShangNHJ #comprehension #development #using- Understanding Log Lines Using Development Knowledge (WS, MN, AEH, ZMJ), pp. 21–30.
MSR-2014-KhodabandelouHDS #modelling #process- Unsupervised discovery of intentional process models from event logs (GK, CH, RD, CS), pp. 282–291.
STOC-2014-Goodrich #algorithm #sorting- Zig-zag sort: a simple deterministic data-oblivious sorting algorithm running in O(n log n) time (MTG), pp. 684–693.
ICALP-v1-2014-GavinskyL #reduction- En Route to the Log-Rank Conjecture: New Reductions and Equivalent Formulations (DG, SL), pp. 514–524.
FM-2014-ButinM #analysis- Log Analysis for Data Protection Accountability (DB, DLM), pp. 163–178.
HCI-TMT-2014-SantanaB #personalisation- Log-Based Personalization Tool as an Assistive Technology (VFdS, MCCB), pp. 433–444.
HIMI-AS-2014-KoyamaYKT #named- ChoiceLog: Life Log System Based on Choices for Supporting Decision-Making (JK, KY, IK, YT), pp. 172–183.
CAiSE-2014-ChanYGM #development #execution #mining #process- Mining Event Logs to Assist the Development of Executable Process Variants (NNC, KY, WG, JM), pp. 548–563.
CAiSE-2014-FolinoGP #low level #mining #modelling #multi #predict #process- Mining Predictive Process Models out of Low-level Multidimensional Logs (FF, MG, LP), pp. 533–547.
CAiSE-2014-KalamatianosK #independence #reduction #streaming- Schema Independent Reduction of Streaming Log Data (TK, KK), pp. 394–408.
CAiSE-2014-PikaWFHLA #behaviour #framework #using- An Extensible Framework for Analysing Resource Behaviour Using Event Logs (AP, MTW, CJF, AHMtH, ML, WMPvdA), pp. 564–579.
CIKM-2014-SpirinHDKB #analysis #facebook #graph #network #online #people #query #scalability #social- People Search within an Online Social Network: Large Scale Analysis of Facebook Graph Search Query Logs (NVS, JH, MD, KGK, MB), pp. 1009–1018.
CIKM-2014-TuLLH #ad hoc #documentation #information retrieval- Log-Bilinear Document Language Model for Ad-hoc Information Retrieval (XT, JL, BL, TH), pp. 1895–1898.
CIKM-2014-VermaY #query- Entity Oriented Task Extraction from Query Logs (MV, EY), pp. 1975–1978.
CIKM-2014-YeLQPM #generative- A Generative Model for Generating Relevance Labels from Human Judgments and Click-Logs (XY, JL, ZQ, BP, DM), pp. 1907–1910.
ECIR-2014-YangPSS #case study #e-commerce #query #scalability #using- A Study of Query Term Deletion Using Large-Scale E-commerce Search Logs (BY, NP, GS, NS), pp. 235–246.
ICPR-2014-SamantaC #classification #using- Indian Classical Dance Classification on Manifold Using Jensen-Bregman LogDet Divergence (SS, BC), pp. 4507–4512.
ICPR-2014-ZhangWL #using #video- Video Text Extraction Using the Fusion of Color Gradient and Log-Gabor Filter (ZZ, WW, KL), pp. 2938–2943.
KDD-2014-SiposFMW #maintenance #predict- Log-based predictive maintenance (RS, DF, FM, ZW), pp. 1867–1876.
KDD-2014-TagamiHTOTT- Filling context-ad vocabulary gaps with click logs (YT, TH, YT, SO, KT, AT), pp. 1955–1964.
RecSys-2014-Zhang #recommendation- Browser-oriented universal cross-site recommendation and explanation based on user browsing logs (YZ), pp. 433–436.
SIGIR-2014-AlonsoS #crowdsourcing #query- Building a query log via crowdsourcing (OA, MS), pp. 939–942.
SIGIR-2014-MorenoDC #clustering #query #web- Query log driven web search results clustering (JGM, GD, GC), pp. 777–786.
SIGIR-2014-UstaAVOU #analysis #education #how #learning #student- How k-12 students search for learning?: analysis of an educational search engine log (AU, ISA, IBV, RO, ÖU), pp. 1151–1154.
ECOOP-2014-LeeKZ #concurrent #execution #multi- Infrastructure-Free Logging and Replay of Concurrent Execution on Multiple Cores (KHL, DK, XZ), pp. 232–256.
SAC-2014-UnoI #music #named #recommendation- MALL: a life log based music recommendation system and portable music player (AU, TI), pp. 939–944.
ICSE-2014-BeschastnikhBEK #behaviour #concurrent #modelling- Inferring models of concurrent systems from logs of their behavior with CSight (IB, YB, MDE, AK), pp. 468–479.
PPoPP-2014-LeeKZ #concurrent #execution #multi- Infrastructure-free logging and replay of concurrent execution on multiple cores (KHL, DK, XZ), pp. 371–372.
SMT-2014-CarlssonGP #analysis #constraints #programming #protocol- Protocol Log Analysis with Constraint Programming (MC, OG, JP), pp. 17–26.
ICDAR-2013-KimuraHUIOK- The Reading-Life Log — Technologies to Recognize Texts That We Read (TK, RH, SU, MI, SO, KK), pp. 91–95.
SIGMOD-2013-ChristensenL #adaptation- Adaptive log compression for massive log data (RC, FL), pp. 1283–1284.
FASE-2013-LeoniDG #branch #execution #process- Discovering Branching Conditions from Business Process Execution Logs (MdL, MD, LGB), pp. 114–129.
ICSM-2013-LarssonH #debugging #mining- Mining Telecom System Logs to Facilitate Debugging Tasks (AL, AHL), pp. 536–539.
ICSM-2013-SyerJNHNF #execution #performance- Leveraging Performance Counters and Execution Logs to Diagnose Memory-Related Performance Issues (MDS, ZMJ, MN, AEH, MNN, PF), pp. 110–119.
MSR-2013-FuLLDZX #analysis #behaviour #comprehension- Contextual analysis of program logs for understanding system behaviors (QF, JGL, QL, RD, DZ, TX), pp. 397–400.
DLT-J-2012-GeffertP13- Unary Coded NP-Complete Languages in Aspace(log log n) (VG, DP), p. 1167–?.
ICALP-v1-2013-GlasserNRSW #polynomial #reduction #set- Autoreducibility of Complete Sets for Log-Space and Polynomial-Time Reductions (CG, DTN, CR, ALS, MW), pp. 473–484.
SEFM-2013-CristiaRF #framework #generative #testing- {log} as a Test Case Generator for the Test Template Framework (MC, GR, CSF), pp. 229–243.
CHI-2013-BentleyT #behaviour #mobile #power of- The power of mobile notifications to increase wellbeing logging behavior (FB, KT), pp. 1095–1098.
HIMI-LCCB-2013-WatabeMH #process- Application to Help Learn the Process of Transforming Mathematical Expressions with a Focus on Study Logs (TW, YM, YH), pp. 157–164.
CAiSE-2013-PikaAFHW #process #profiling- Profiling Event Logs to Configure Risk Indicators for Process Delays (AP, WMPvdA, CJF, AHMtH, MTW), pp. 465–481.
ICEIS-v3-2013-FerreiraFSCRPO #analysis #interactive #search-based- Log Analysis of Human Computer Interactions Regarding Break The Glass Accesses to Genetic Reports (AMF, PF, CSP, RJCC, PPR, AdCP, VO), pp. 46–53.
ICEIS-v3-2013-LucasXB #enterprise #realtime #visualisation- Visualizing ERP Usage Logs in Real Time (WTL, JX, TB), pp. 83–90.
CIKM-2013-QianSYZL #mining #query- Dynamic query intent mining from a search log stream (YnQ, TS, JY, QZ, CL), pp. 1205–1208.
ECIR-2013-CarpinetoR #concept #graph #query #semantics- Semantic Search Log k-Anonymization with Generalized k-Cores of Query Concept Graph (CC, GR), pp. 110–121.
ECIR-2013-SaadK #adaptation #intranet #navigation- Exploiting Click Logs for Adaptive Intranet Navigation (SZS, UK), pp. 792–795.
SAC-2013-FangYK #database- MLC-flash-friendly logging and recovery for databases (HWF, MYY, TWK), pp. 1541–1546.
SAC-2013-HayashiIN #recommendation #visual notation- A visual analytics tool for system logs adopting variable recommendation and feature-based filtering (AH, TI, SN), pp. 996–998.
SAC-2013-Perez-PalacinCM #named #predict #trade-off- log2cloud: log-based prediction of cost-performance trade-offs for cloud deployments (DPP, RC, JM), pp. 397–404.
ICSE-2013-King #forensics- Measuring the forensic-ability of audit logs for nonrepudiation (JK), pp. 1419–1422.
LCTES-2013-GuanWWCS #named- BLog: block-level log-block management for NAND flash memorystorage systems (YG, GW, YW, RC, ZS), pp. 111–120.
LCTES-2013-WangLWS #hybrid #memory management #named #reduction- FTL2: a hybrid flash translation layer with logging for write reduction in flash memory (TW, DL, YW, ZS), pp. 91–100.
SOSP-2013-BalakrishnanMWWPWDRZZ #data type #distributed #named- Tango: distributed data structures over a shared log (MB, DM, TW, MW, VP, MW, JDD, SR, TZ, AZ), pp. 325–340.
CASE-2012-HoSY #data mining #mining #modelling- Data Mining of Life Log for Developing a User model-based Service Application (YH, ESS, TY), pp. 757–760.
SIGMOD-2012-SearsR #named- bLSM: a general purpose log structured merge tree (RS, RR), pp. 217–228.
VLDB-2012-LeeLLLR #data analysis #framework #twitter- The Unified Logging Infrastructure for Data Analytics at Twitter (GL, JL, CL, AL, DVR), pp. 1771–1780.
VLDB-2012-MorishimaSMAF #crowdsourcing #declarative #framework #named- CyLog/Crowd4U: A Declarative Platform for Complex Data-centric Crowdsourcing (AM, NS, TM, HA, SF), pp. 1918–1921.
VLDB-2012-TaliusDDK #fault #query #transaction- Transaction Log Based Application Error Recovery and Point In-Time Query (TT, RD, AD, HK), pp. 1781–1789.
VLDB-2012-VoWACO #database #in the cloud #named #scalability- LogBase: A Scalable Log-structured Database System in the Cloud (HTV, SW, DA, GC, BCO), pp. 1004–1015.
STOC-2012-KhotPV #preprocessor #problem- 2log1-ε n hardness for the closest vector problem with preprocessing (SK, PP, NKV), pp. 277–288.
DLT-2012-GeffertP- Unary Coded NP-Complete Languages in ASPACE (log log n) (VG, DP), pp. 166–177.
IFM-2012-SchunselaarMS #declarative #modelling- Patterns for a Log-Based Strengthening of Declarative Compliance Models (DMMS, FMM, NS), pp. 327–342.
CAiSE-2012-BrouckeWBV #generative #process- Improved Artificial Negative Event Generation to Enhance Process Event Logs (SKLMvB, JDW, BB, JV), pp. 254–269.
CAiSE-2012-LyIMR #data transformation #mining #process #semantics- Data Transformation and Semantic Log Purging for Process Mining (LTL, CI, JM, SRM), pp. 238–253.
CAiSE-2012-MaggiBA #declarative #modelling #performance #process- Efficient Discovery of Understandable Declarative Process Models from Event Logs (FMM, RPJCB, WMPvdA), pp. 270–285.
ICEIS-J-2012-BabaianL12a #automation #interface- Composing Interface Demonstrations Automatically from Usage Logs (TB, WTL), pp. 376–392.
CIKM-2012-MahajanRTM #algorithm #named #recommendation- LogUCB: an explore-exploit algorithm for comments recommendation (DKM, RR, CT, AM), pp. 6–15.
CIKM-2012-WustBRBKP #database #enterprise #in memory #performance- Efficient logging for enterprise workloads on column-oriented in-memory databases (JW, JHB, FR, SB, JK, HP), pp. 2085–2089.
ECIR-2012-LvZ #modelling #normalisation- A Log-Logistic Model-Based Interpretation of TF Normalization of BM25 (YL, CZ), pp. 244–255.
ICPR-2012-BagdanovBLM #detection #multi- Multi-pose face detection for accurate face logging (ADB, ADB, GL, IM), pp. 2448–2451.
ICPR-2012-LiW #encoding #matrix #recognition #using- Iris recognition using ordinal encoding of Log-Euclidean covariance matrices (PL, GW), pp. 2420–2423.
SIGIR-2012-AdeyanjuSAKRF #adaptation #concept #query #recommendation- Adaptation of the concept hierarchy model with search logs for query recommendation on intranets (IAA, DS, MDA, UK, ANDR, MF), pp. 5–14.
SIGIR-2012-ChinS #analysis- Survival analysis of click logs (SCC, WNS), pp. 1149–1150.
SIGIR-2012-HuQLJPZ #mining #query #topic- Mining query subtopics from search log data (YH, YnQ, HL, DJ, JP, QZ), pp. 305–314.
SIGIR-2012-WhiteH #persistent- Studies of the onset and persistence of medical concerns in search logs (RWW, EH), pp. 265–274.
RE-2012-MendizabalSS #approach #elicitation #performance #requirements- Log-based approach for performance requirements elicitation and prioritization (OMM, MS, RS), pp. 297–302.
SAC-2012-MakanjuZML #clustering #composition #detection #identification- Spatio-temporal decomposition, clustering and identification for alert detection in system logs (AM, ANZH, EEM, ML), pp. 621–628.
SAC-2012-MenezesOV #abstraction #composition #coordination #pervasive- Dynamic composition of coordination abstractions for pervasive systems: the case of LogOp (RM, AO, MV), pp. 1557–1559.
SAC-2012-Perez-CastilloGPW #repository- Integrating event logs into KDM repositories (RPC, IGRdG, MP, BW), pp. 1095–1102.
ICSE-2012-Elyasov #testing- Log-based testing (AE), pp. 1591–1594.
ICSE-2012-Shang #developer #using- Bridging the divide between software developers and operators using logs (WS), pp. 1583–1586.
ICSE-2012-YuanPZ #open source- Characterizing logging practices in open-source software (DY, SP, YZ), pp. 102–112.
OSDI-2012-YuanPHLLTZS- Be Conservative: Enhancing Failure Diagnosis with Proactive Logging (DY, SP, PH, YL, MMJL, XT, YZ, SS), pp. 293–306.
ICLP-2012-NovelliVPD #architecture #named- LOG-IDEAH: ASP for Architectonic Asset Preservation (VN, MDV, JAP, DD), pp. 393–403.
ICST-2012-MizanF #analysis #automation #performance- Automated Performance Model Construction through Event Log Analysis (AM, GF), pp. 636–641.
ICST-2012-TonellaMNJLH #approximate #execution #modelling- Finding the Optimal Balance between Over and Under Approximation of Models Inferred from Execution Logs (PT, AM, DCN, YJ, KL, MH), pp. 21–30.
ICTSS-2012-Havelund #analysis- Requirements-Driven Log Analysis (Extended Abstract) (KH), pp. 1–4.
DAC-2011-ChangS #approach- Plugging versus logging: a new approach to write buffer management for solid-state disks (LPC, YCS), pp. 23–28.
ICDAR-2011-ForcherADGR #semantics #towards- Semantic Logging: Towards Explanation-Aware DAS (BF, SA, AD, MG, TRB), pp. 1140–1144.
SIGMOD-2011-ElmeleegyEL #generative #query- Leveraging query logs for schema mapping generation in U-MAP (HE, AKE, JL), pp. 121–132.
SIGMOD-2011-PoundPT #approach #mining #web- Facet discovery for structured web search: a query-log mining approach (JP, SP, PT), pp. 169–180.
VLDB-2011-KimLMPH #named- IPL-P: In-Page Logging with PCRAM (KK, SWL, BM, CP, JYH), pp. 1363–1366.
PLDI-2011-LeeZSZ #generative #towards- Toward generating reducible replay logs (KHL, YZ, NS, XZ), pp. 246–257.
STOC-2011-ValiantV- Estimating the unseen: an n/log(n)-sample estimator for entropy and support size, shown optimal via new CLTs (GV, PV), pp. 685–694.
LATA-2011-LisitsaPS #automaton- Planarity of Knots, Register Automata and LogSpace Computability (AL, IP, RS), pp. 366–377.
ICFP-2011-ShiversT #composition #functional- Modular rollback through control logging: a pair of twin functional pearls (OS, AJT), pp. 58–68.
CHI-2011-FourneyMT #analysis #interactive #query #usability- Characterizing the usability of interactive applications through query log analysis (AF, RM, MAT), pp. 1817–1826.
HCD-2011-IharaKY #simulation- Human Affordance as Life-Log for Environmental Simulations (MI, MK, TY), pp. 235–242.
HIMI-v2-2011-EitokuMMYMA #information management #quote- “Life Portal”: An Information Access Scheme Based on Life Logs (SE, MM, RM, TY, SyM, MA), pp. 11–20.
IDGD-2011-OginoKIK #behaviour #comprehension- Smart Store Understanding Consumer’s Preference through Behavior Logs (AO, TK, YI, TK), pp. 385–392.
ICEIS-v3-2011-JuniorNI #bibliography #execution #identification #legacy #source code- Survey and Proposal of a Method for Business Rules Identification in Legacy Systems Source Code and Execution Logs (WARJ, GSdN, CI), pp. 207–213.
CIKM-2011-BingLW #query #social #topic #using- Using query log and social tagging to refine queries based on latent topics (LB, WL, TLW), pp. 583–592.
CIKM-2011-CuiLYJJHGCD #framework #multi #random- Multi-view random walk framework for search task discovery from click-through log (JC, HL, JY, LJ, RJ, JH, YG, ZC, XD), pp. 135–140.
CIKM-2011-GaoXHCH #named #transaction- PCMLogging: reducing transaction logging overhead with PCM (SG, JX, BH, BC, HH), pp. 2401–2404.
CIKM-2011-GurajadaK #maintenance #online- Index tuning for query-log based on-line index maintenance (SG, PSK), pp. 1997–2000.
CIKM-2011-MaLL #using- Selecting related terms in query-logs using two-stage SimRank (YM, HL, YL), pp. 1969–1972.
CIKM-2011-OzertemVL #set #using- Suggestion set utility maximization using session logs (UO, EV, LL), pp. 105–114.
CIKM-2011-TangLP #generative #named- LogSig: generating system events from raw textual logs (LT, TL, CSP), pp. 785–794.
CIKM-2011-YanGC #higher-order #learning #query #recommendation- Context-aware query recommendation by learning high-order relation in query logs (XY, JG, XC), pp. 2073–2076.
ECIR-2011-AlbakourKNKSFR #evaluation #named #query #using- AutoEval: An Evaluation Methodology for Evaluating Query Suggestions Using Query Logs (MDA, UK, NN, YK, DS, MF, ANDR), pp. 605–610.
ECIR-2011-ArampatzisED- Enhancing Deniability against Query-Logs (AA, PSE, GD), pp. 117–128.
ECIR-2011-NunzioLM #analysis #multi- Multilingual Log Analysis: LogCLEF (GMDN, JL, TM), pp. 675–678.
KDIR-2011-OzakiE #difference #empirical #estimation- Estimation of Implicit user Influence from Proxy Logs — An Empirical Study on the Effects of Time Difference and Popularity (TO, ME), pp. 250–255.
KDIR-2011-SethCRSB #analysis #query #similarity- A Tale of Two (Similar) Cities — Inferring City Similarity through Geo-spatial Query Log Analysis (RS, MC, DR, DS, SB), pp. 179–189.
KEOD-2011-PinchukINDBP #analysis #distributed #semantics #visual notation- Augmenting Semantics to Distributed Agents Logs — Enabling Graphical After Action Analysis of Federated Agents Logs (RP, SI, TN, TD, CB, GP), pp. 232–241.
SEKE-2011-FronzaSSV #predict #using- Failure Prediction based on Log Files Using the Cox Proportional Hazard Model (IF, AS, GS, JV), pp. 456–461.
SIGIR-2011-BerberichKLZ #ranking- Improving local search ranking through external logs (KB, ACK, DL, PZ), pp. 785–794.
SIGIR-2011-BhatiaMM #query- Query suggestions in the absence of query logs (SB, DM, PM), pp. 795–804.
SIGIR-2011-ElsweilerHH #behaviour #comprehension #email #interactive- Understanding re-finding behavior in naturalistic email interaction logs (DE, MH, MH), pp. 35–44.
SIGIR-2011-FangSSKM #analysis #query- Analysis of an expert search query log (YF, NS, LS, JK, APM), pp. 1189–1190.
SIGIR-2011-FeildAG #distributed #named- CrowdLogging: distributed, private, and anonymous search logging (HAF, JA, JG), pp. 375–384.
SIGIR-2011-InagakiBCM #mobile #using #web- Enhancing mobile search using web search log data (YI, JB, YC, MM), pp. 1201–1202.
SIGIR-2011-JiangPL #mining #web- Enhancing web search by mining search and browse logs (DJ, JP, HL), pp. 1295–1296.
SIGIR-2011-WeerkampBKMBR #analysis #people- People searching for people: analysis of a people search engine log (WW, RB, BK, EM, KB, MdR), pp. 45–54.
OOPSLA-2011-AdamsKMMCD #polynomial- Flow-sensitive type recovery in linear-log time (MDA, AWK, JM, MM, AC, RKD), pp. 483–498.
PADL-2011-MantadelisPJVB #ad hoc #mobile #network- Analysing a Publish/Subscribe System for Mobile Ad Hoc Networks with ProbLog (TM, KP, GJ, YV, YB), pp. 34–37.
SAC-2011-GomiI #analysis- A personal photograph browser for life log analysis based on location, time, and person (AG, TI), pp. 1245–1251.
SAC-2011-JinKKHM #fine-grained- Sector log: fine-grained storage management for solid state drives (SJ, JHK, JK, JH, SM), pp. 360–367.
SAC-2011-KadriE #mining #nondeterminism #sequence #web- Mining uncertain web log sequences with access history probabilities (OK, CIE), pp. 1059–1060.
SAC-2011-KontogiannisWM #clustering #comprehension #reduction #runtime- Event clustering for log reduction and run time system understanding (KK, AW, SM), pp. 191–192.
SAC-2011-MakanjuZM #retrieval #using- Storage and retrieval of system log events using a structured schema based on message type transformation (AM, ANZH, EEM), pp. 528–533.
SAC-2011-Marty #forensics- Cloud application logging for forensics (RM), pp. 178–184.
ESEC-FSE-2011-BeschastnikhABE #behaviour #modelling #named- Synoptic: studying logged behavior with inferred models (IB, JA, YB, MDE), pp. 448–451.
ASPLOS-2011-VeeraraghavanLWOCFN #named- DoublePlay: parallelizing sequential logging and replay (KV, DL, BW, JO, PMC, JF, SN), pp. 15–26.
ASPLOS-2011-YuanZPZS- Improving software diagnosability via log enhancement (DY, JZ, SP, YZ, SS), pp. 3–14.
HPCA-2011-CarreteroVARMG #hardware #process #using- Hardware/software-based diagnosis of load-store queues using expandable activity logs (JC, XV, JA, TR, MM, AG), pp. 321–331.
DAC-2010-GaoYWY #analysis #correlation #estimation #performance #statistics- Efficient tail estimation for massive correlated log-normal sums: with applications in statistical leakage analysis (MG, ZY, YW, ZY), pp. 475–480.
DATE-2010-SheaSC #identifier #performance- Scoped identifiers for efficient bit aligned logging (RS, MBS, YC), pp. 1450–1455.
SIGMOD-2010-BlanasPERST #algorithm #comparison #pipes and filters- A comparison of join algorithms for log processing in MaPreduce (SB, JMP, VE, JR, EJS, YT), pp. 975–986.
SIGMOD-2010-KimWS #approach #independence #memory management #performance- Page-differential logging: an efficient and DBMS-independent approach for storing data into flash memory (YRK, KYW, IYS), pp. 363–374.
SIGMOD-2010-TaoYSPL #summary- Logging every footstep: quantile summaries for the entire history (YT, KY, CS, JP, FL), pp. 639–650.
VLDB-2010-JohnsonPSAA #approach #named #scalability- Aether: A Scalable Approach to Logging (RJ, IP, RS, MA, AA), pp. 681–692.
VLDB-2010-KimJW #adaptation #mobile- Adaptive Logging for Mobile Device (YSK, HJ, KGW), pp. 1481–1492.
ICSM-2010-ZawawyKM #analysis- Log filtering and interpretation for root cause analysis (HZ, KK, JM), pp. 1–5.
MSR-2010-NagappanV #mining- Abstracting log lines to log event types for mining software system logs (MN, MAV), pp. 114–117.
STOC-2010-BhaskaraCCFV #approximate #detection- Detecting high log-densities: an O(n1/4) approximation for densest k-subgraph (AB, MC, EC, UF, AV), pp. 201–210.
STOC-2010-GoelKK #graph- Perfect matchings in o(n log n) time in regular bipartite graphs (AG, MK, SK), pp. 39–46.
SEFM-2010-MetayerMP #architecture #design- Designing Log Architectures for Legal Evidence (DLM, EM, MLP), pp. 156–165.
CHI-2010-FlorLJPKC #case study #mobile #process- The case of the disappearing Ox: a field study of mobile activity and context logging (GdlF, PL, MJ, JP, RK, AC), pp. 473–482.
CHI-2010-KarkkainenVV #case study #mobile #process- I don’t mind being logged, but want to remain in control: a field study of mobile activity and context logging (TK, TV, KVVM), pp. 163–172.
CIKM-2010-BurghardtBGC #question- Search-log anonymization and advertisement: are they mutually exclusive? (TB, KB, AG, CC), pp. 1269–1272.
CIKM-2010-CarmanCHB #modelling #personalisation #query #topic #towards #using- Towards query log based personalization using topic models (MJC, FC, MH, MB), pp. 1849–1852.
CIKM-2010-KotovKDC #profiling #query #ranking #web- Temporal query log profiling to improve web search ranking (AK, PK, LD, YC), pp. 1149–1158.
ECIR-2010-GoharianFYM #peer-to-peer #query #using- Enriching Peer-to-Peer File Descriptors Using Association Rules on Query Logs (NG, OF, WGY, JM), pp. 636–639.
ICML-2010-XuHFPJ #detection #mining #problem #scalability- Detecting Large-Scale System Problems by Mining Console Logs (WX, LH, AF, DAP, MIJ), pp. 37–46.
KDD-2010-AgarwalAKK #modelling #multi #scalability- Estimating rates of rare events with multiple hierarchies through scalable log-linear models (DA, RA, RK, NK), pp. 213–222.
KDIR-2010-VeilumuthuR- Aggregation of Implicit Feedbacks from Search Engine Log Files (AV, PR), pp. 269–274.
SEKE-2010-Nehmer #approach #consistency #exception- A Log-Assisted Approach Enforcing Consistency in the Presence of Exceptions (NN), pp. 757–764.
SIGIR-2010-Huggett #n-gram #named- Agro-Gator: digesting experts, logs, and N-grams (MH), p. 706.
SIGIR-2010-JiangPL #challenge #information retrieval #mining #web- Search and browse log mining for web information retrieval: challenges, methods, and applications (DJ, JP, HL), p. 912.
SIGIR-2010-TorresHS #analysis #information retrieval #query- Query log analysis in the context of information retrieval for children (SDT, DH, PS), pp. 847–848.
SIGIR-2010-WangLC #bound #detection #query- Intent boundary detection in search query logs (CJW, KHYL, HHC), pp. 749–750.
SIGIR-2010-WhiteH #web- Assessing the scenic route: measuring the value of search trails in web logs (RWW, JH), pp. 587–594.
ICSE-2010-Nagappan #analysis #execution- Analysis of execution log files (MN), pp. 409–412.
ASPLOS-2010-VlachosGKCFGM #monitoring #named #online #parallel #thread- ParaLog: enabling and accelerating online parallel monitoring of multithreaded applications (EV, MLG, MAK, SC, BF, PBG, TCM), pp. 271–284.
ASPLOS-2010-YuanMXTZP #fault #named #runtime- SherLog: error diagnosis by connecting clues from run-time logs (DY, HM, WX, LT, YZ, SP), pp. 143–154.
HPDC-2010-HoeflerSL #named #scalability #simulation- LogGOPSim: simulating large-scale applications in the LogGOPS model (TH, TS, AL), pp. 597–604.
CASE-2009-VeilumuthuR #clustering #query- Intent based clustering of search engine query log (AV, PR), pp. 647–652.
DAC-2009-LiuYKC #algorithm- An O(n log n) path-based obstacle-avoiding algorithm for rectilinear Steiner tree construction (CHL, SYY, SYK, YHC), pp. 314–319.
SIGMOD-2009-Chen #named #performance- FlashLogging: exploiting flash devices for synchronous logging performance (SC), pp. 73–86.
SIGMOD-2009-JiangYCC #ad hoc #detection #named #query- AIDE: ad-hoc intents detection engine over query logs (YJ, HTY, KCCC, YSC), pp. 1091–1094.
VLDB-2009-SearsB #revisited- Segment-based recovery: Write ahead logging revisited (RS, EAB), pp. 490–501.
MSR-2009-BajracharyaL #code search #mining #topic- Mining search topics from a code search engine usage log (SKB, CVL), pp. 111–120.
MSR-2009-Kuhn #automation #component #evolution #source code #using #word- Automatic labeling of software components and their evolution using log-likelihood ratio of word frequencies in source code (AK), pp. 175–178.
HCD-2009-JarrettQRAS #analysis #development #metric #testing #usability #using #web- Using Measurements from Usability Testing, Search Log Analysis and Web Traffic Analysis to Inform Development of a Complex Web Site Used for Complex Tasks (CJ, WQ, IR, SA, VS), pp. 729–738.
HCI-AUII-2009-ImamuraOK #analysis #behaviour #modelling #ubiquitous- Modeling Personal Preferences on Commodities by Behavior Log Analysis with Ubiquitous Sensing (NI, AO, TK), pp. 294–303.
ICEIS-ISAS-2009-Petrusel #mining #modelling #process #workflow- Mining and Modeling Decision Workflows from DSS User Activity Logs (RP), pp. 144–149.
CIKM-2009-ClinchantG #constraints #information retrieval #word- Retrieval constraints and word frequency distributions: a log-logistic model for IR (SC, ÉG), pp. 1975–1978.
CIKM-2009-HongHVAA #effectiveness #query- Effective anonymization of query logs (YH, XH, JV, NRA, VA), pp. 1465–1468.
CIKM-2009-HuangE #query #web- Analyzing and evaluating query reformulation strategies in web search logs (JH, ENE), pp. 77–86.
CIKM-2009-MeijWR #modelling #normalisation #query- A query model based on normalized log-likelihood (EM, WW, MdR), pp. 1903–1906.
CIKM-2009-NaLM- Dynamic in-page logging for flash-aware B-tree index (GJN, SWL, BM), pp. 1485–1488.
CIKM-2009-WangTSZ #effectiveness- Beyond hyperlinks: organizing information footprints in search logs to support effective browsing (XW, BT, AS, CZ), pp. 1237–1246.
ECIR-2009-OrlandoS #mining #query- Mining Query Logs (SO, FS), pp. 814–817.
ICML-2009-QiTZCZ #learning #metric #performance- An efficient sparse metric learning in high-dimensional space via l1-penalized log-determinant regularization (GJQ, JT, ZJZ, TSC, HJZ), pp. 841–848.
KDD-2009-Kumar #challenge #mining #web- Mining web logs: applications and challenges (RK), pp. 3–4.
KDD-2009-MakanjuZM #clustering #using- Clustering event logs using iterative partitioning (AM, ANZH, EEM), pp. 1255–1264.
KDD-2009-ZhouJPL #data-driven #framework- OLAP on search logs: an infrastructure supporting data-driven applications in search engines (BZ, DJ, JP, HL), pp. 1395–1404.
KDIR-2009-SaneifarBLPR #mining- Mining for Relevant Terms from Log Files (HS, SB, AL, PP, MR), pp. 77–84.
SIGIR-2009-CarmanBGC #comparison #query #statistics- A statistical comparison of tag and query logs (MJC, MB, RG, FC), pp. 123–130.
SIGIR-2009-SakaiN #analysis #query #wiki- Serendipitous search via wikipedia: a query log analysis (TS, KN), pp. 780–781.
SAC-2009-ChoudhuriG #embedded #named #nondeterminism- FlashBox: a system for logging non-deterministic events in deployed embedded systems (SC, TG), pp. 1676–1682.
SAC-2009-KingLS #network #taxonomy- A taxonomy and adversarial model for attacks against network log anonymization (JK, KL, AJS), pp. 1286–1293.
SOSP-2009-XuHFPJ #detection #mining #problem #scalability- Detecting large-scale system problems by mining console logs (WX, LH, AF, DAP, MIJ), pp. 117–132.
DocEng-2008-GormishWPH #approach #distributed #documentation #flexibility #metadata #security- Document logs: a distributed approach to metadata for better security and flexibility (MJG, GW, KWP, PH), pp. 119–122.
VLDB-2008-Bar-YossefG #mining #query- Mining search engine query logs via suggestion sampling (ZBY, MG), pp. 54–65.
VLDB-2008-NezhadBSCA #process- Process spaceship: discovering and exploring process views from event logs in data spaces (HRMN, BB, RSP, FC, PA), pp. 1412–1415.
VLDB-2008-SearsCB #named #replication- Rose: compressed, log-structured replication (RS, MC, EAB), pp. 526–537.
VLDB-2008-TliliDPVAMCL- P2P logging and timestamping for reconciliation (MT, WKD, EP, PV, RA, PM, GC, SL), pp. 1420–1423.
STOC-2008-FakcharoenpholL #algorithm #approximate #problem- An o(log2 k)-approximation algorithm for the k-vertex connected spanning subgraph problem (JF, BL), pp. 153–158.
CHI-2008-HayesGAT #behaviour #named- CareLog: a selective archiving tool for behavior management in schools (GRH, LMG, GDA, KNT), pp. 685–694.
CAiSE-2008-SerrourGKB #correlation #interactive #protocol- Message Correlation and Business Protocol Discovery in Service Interaction Logs (BS, DPG, HK, BB), pp. 405–419.
ICEIS-AIDSS-2008-BezerraW #algorithm #detection #process- Anomaly Detection Algorithms in Business Process Logs (FdLB, JW), pp. 11–18.
CIKM-2008-ByrdNTPCGV #automation- Semi-automated logging of contact center telephone calls (RJB, MSN, WT, YP, KSFC, SCG, KV), pp. 133–142.
CIKM-2008-JonesK #automation #query #segmentation #topic- Beyond the session timeout: automatic hierarchical segmentation of search topics in query logs (RJ, KLK), pp. 699–708.
CIKM-2008-WangZ #effectiveness #mining #query- Mining term association patterns from search logs for effective query reformulation (XW, CZ), pp. 479–488.
ICPR-2008-GuZ #metric #similarity- A similarity measure under Log-Euclidean metric for stereo matching (QG, JZ), pp. 1–4.
ICPR-2008-JinLH #learning #prototype- Prototype learning with margin-based conditional log-likelihood loss (XJ, CLL, XH), pp. 1–4.
ICPR-2008-PalanderB #geometry- Epipolar geometry and log-polar transform in wide baseline stereo matching (KP, SSB), pp. 1–4.
SIGIR-2008-HuCBLCY #mining #query #web- Web query translation via web log mining (RH, WC, PB, YL, ZC, QY), pp. 749–750.
SAC-2008-BezerraW #algorithm #detection #process- Anomaly detection algorithms in logs of process aware systems (FdLB, JW), pp. 951–952.
ICLP-2008-AnhRD #implementation #using- An Implementation of Extended P-Log Using XASP (HTA, CDPKR, CVD), pp. 739–743.
ICLP-2008-KimmigCRDR #execution #on the #performance #source code- On the Efficient Execution of ProbLog Programs (AK, VSC, RR, BD, LDR), pp. 175–189.
ICLP-2008-MuggletonST #bias #declarative #logic programming #named #using- TopLog: ILP Using a Logic Program Declarative Bias (SM, JCAS, ATN), pp. 687–692.
ICLP-2008-Santos #bias #declarative #logic programming #named #using- TopLog: ILP Using a Logic Program Declarative Bias (JCAS), pp. 818–819.
ICST-2008-KodreZR #approach #statistics #testing- Statistical Sampling Based Approach to Alleviate Log Replay Testing (RK, HZ, DJR), pp. 533–536.
IJCAR-2008-FurbachGHP #named- LogAnswer — A Deduction-Based Question Answering System (System Description) (UF, IG, HH, BP), pp. 139–146.
SIGMOD-2007-0002SL #middleware- Log-based recovery for middleware servers (RW, BS, DBL), pp. 425–436.
SIGMOD-2007-LeeM #approach #design- Design of flash-based DBMS: an in-page logging approach (SWL, BM), pp. 55–66.
CHI-2007-SellenFAHRW #case study #memory management #using- Do life-logging technologies support memory for the past?: an experimental study using sensecam (AS, AF, MA, SH, CR, KRW), pp. 81–90.
HCI-IDU-2007-FujiokaTKO #coordination #detection #problem #usability- Tool for Detecting Webpage Usability Problems from Mouse Click Coordinate Logs (RF, RT, YK, HO), pp. 438–445.
HCI-IPT-2007-KimRB #smarttech- Wearable Healthcare Gadget for Life-Log Service Based on WPAN (SHK, DWR, CB), pp. 837–844.
CIKM-2007-JonesKPT #privacy #query #quote #what- “I know what you did last summer”: query logs and user privacy (RJ, RK, BP, AT), pp. 909–914.
ICML-2007-AndrewG #modelling #scalability- Scalable training of L1-regularized log-linear models (GA, JG), pp. 33–40.
ICML-2007-GlobersonKCC #algorithm #predict- Exponentiated gradient algorithms for log-linear structured prediction (AG, TK, XC, MC), pp. 305–312.
KDD-2007-Baeza-YatesT #query #semantics- Extracting semantic relations from query logs (RABY, AT), pp. 76–85.
SIGIR-2007-GaoNNZHWH #query #using- Cross-lingual query suggestion using query logs of different languages (WG, CN, JYN, MZ, JH, KFW, HWH), pp. 463–470.
SIGIR-2007-TeevanAJP #query- Information re-retrieval: repeat queries in Yahoo’s logs (JT, EA, RJ, MASP), pp. 151–158.
SIGIR-2007-WangZ #web- Learn from web search logs to organize search results (XW, CZ), pp. 87–94.
SIGIR-2007-WhiteCC #pseudo #query #refinement- Comparing query logs and pseudo-relevance feedbackfor web-search query refinement (RWW, CLAC, SC), pp. 831–832.
SAC-2007-ChiangH #adaptation #file system #performance- Improving the performance of log-structured file systems with adaptive block rearrangement (MLC, JSH), pp. 1136–1140.
SAC-2007-DingZ #web- Log-based indexing to improve web site search (C(D, JZ), pp. 829–833.
HPCA-2007-YenBMMVHSW #hardware #memory management #named #transaction- LogTM-SE: Decoupling Hardware Transactional Memory from Caches (LY, JB, MRM, KEM, HV, MDH, MMS, DAW), pp. 261–272.
HPDC-2007-ImranRLL #coordination #grid #mobile- A proxy-based uncoordinated checkpointing scheme with pessimistic message logging for mobile grid systems (NI, IR, YKL, SL), pp. 237–238.
DAC-2006-LiLP #analysis #power management #statistics- Projection-based statistical analysis of full-chip leakage power with non-log-normal distributions (XL, JL, LTP), pp. 103–108.
VLDB-2006-SteinleAGL #dependence #generative #mining #novel- Mapping Moving Landscapes by Mining Mountains of Logs: Novel Techniques for Dependency Model Generation (MS, KA, SG, CL), pp. 1093–1102.
MSR-2006-GermanRS #comprehension #using- Using evolutionary annotations from change logs to enhance program comprehension (DMG, PCR, MADS), pp. 159–162.
WCRE-2006-GanesanMKY #aspect-oriented #case study #product line #source code- Discovering Organizational Aspects from the Source Code History Log during the Product Line Planning Phase — A Case Study (DG, DM, JK, KY), pp. 211–220.
STOC-2006-Ben-OrPV- Byzantine agreement in the full-information model in O(log n) rounds (MBO, EP, VV), pp. 179–186.
EDOC-2006-OgasawaraTY #execution #modelling #process- Estimating Structures of Business Process Models from Execution Logs (SO, KT, TY), pp. 106–115.
CIKM-2006-ZhuangC #query #ranking #using- Re-ranking search results using query logs (ZZ, SC), pp. 860–861.
ECIR-2006-WangVR #collaboration- A User-Item Relevance Model for Log-Based Collaborative Filtering (JW, APdV, MJTR), pp. 37–48.
ICPR-v2-2006-Mancas-ThillouG #using- Character Segmentation-by-Recognition Using Log-Gabor Filters (CMT, BG), pp. 901–904.
ICPR-v3-2006-BalciAF- Subpixel Alignment of MRI Data Under Cartesian and Log-Polar Sampling (MB, MA, HF), pp. 607–610.
ICPR-v4-2006-YaoLYZL06a #algorithm #recognition #using- Iris Recognition Algorithm Using Modified Log-Gabor Filters (PY, JL, XY, ZZ, BL), pp. 461–464.
KDD-2006-FormanKS #mining- Pragmatic text mining: minimizing human effort to quantify many issues in call logs (GF, EK, JS), pp. 852–861.
KDD-2006-WedigM #analysis #personalisation #query #scalability- A large-scale analysis of query logs for assessing personalization opportunities (SW, OM), pp. 742–747.
KR-2006-Rosati #datalog #integration #logic- DL+log: Tight Integration of Description Logics and Disjunctive Datalog (RR), pp. 68–78.
SEKE-2006-GaaloulG #analysis #mining #statistics #workflow- A Workflow Mining Tool based on Logs Statistical Analysis (WG, CG), pp. 595–600.
SIGIR-2006-BlunsomKC #classification #modelling- Question classification with log-linear models (PB, KK, JRC), pp. 615–616.
SIGIR-2006-Buzikashvili #multi #web- An exploratory web log study of multitasking (NB), pp. 623–624.
SIGIR-2006-ParikhK #feedback #named #query #using- Unity: relevance feedback using user query logs (JP, SK), pp. 689–690.
SIGIR-2006-TeevanAJP #query- History repeats itself: repeat queries in Yahoo’s logs (JT, EA, RJ, MASP), pp. 703–704.
SAC-2006-WuKC #file system #memory management #performance- Efficient initialization and crash recovery for log-based file systems over flash memory (CHW, TWK, LPC), pp. 896–900.
HPCA-2006-MooreBMHW #memory management #named #transaction- LogTM: log-based transactional memory (KEM, JB, MJM, MDH, DAW), pp. 254–265.
ICLP-2006-RuckhausKPG #approach #datalog #owl- Integrating Datalog with OWL: Exploring the AL-log Approach (ER, VK, BP, BCG), pp. 455–456.
STOC-2005-AgarwalCMM #algorithm #approximate #problem- O(sqrt(log n)) approximation algorithms for min UnCut, min 2CNF deletion, and directed cut problems (AA, MC, KM, YM), pp. 573–581.
STOC-2005-Ajtai #representation- Representing hard lattices with O(n log n) bits (MA), pp. 94–103.
STOC-2005-Ben-SassonS #complexity #query- Simple PCPs with poly-log rate and query complexity (EBS, MS), pp. 266–275.
STOC-2005-Reingold- Undirected ST-connectivity in log-space (OR), pp. 376–385.
STOC-2005-Trifonov #algorithm- An O(log n log log n) space algorithm for undirected st-connectivity (VT), pp. 626–633.
CIKM-2005-ZhaoBG05a #named #web- WAM-Miner: in the search of web access motifs from historical web log data (QZ, SSB, LG), pp. 421–428.
KDD-2005-LiLMP #framework #mining- An integrated framework on mining logs files for computing system management (TL, FL, SM, WP), pp. 776–781.
MLDM-2005-HalveyKS #clustering #internet #navigation #predict #using- Birds of a Feather Surf Together: Using Clustering Methods to Improve Navigation Prediction from Internet Log Files (MH, MTK, BS), pp. 174–183.
SEKE-2005-WangM #behaviour #web- Recovering Individual Accessing Behaviour from Web Logs (LW, CM), pp. 590–595.
CSL-2005-Perron #proving- A Propositional Proof System for Log Space (SP), pp. 509–524.
VLDB-2004-SnodgrassYC #detection- Tamper Detection in Audit Logs (RTS, S(Y, CSC), pp. 504–515.
STOC-2004-ChuzhoyGHKKN #approximate #symmetry- Asymmetric k-center is log* n-hard to approximate (JC, SG, EH, SK, GK, JN), pp. 21–27.
ICALP-2004-FlumGW #bound #nondeterminism #parametricity- Bounded Fixed-Parameter Tractability and log2n Nondeterministic Bits (JF, MG, MW), pp. 555–567.
ICALP-2004-FuW #algorithm- A 2O(n1-(1/d)log n) Time Algorithm for d-Dimensional Protein Folding in the HP-Model (BF, WW), pp. 630–644.
CIKM-2004-SrinivasanADZ #analysis #grammarware #web- Grammar-based task analysis of web logs (SS, AA, PMD, VZ), pp. 244–245.
ICPR-v1-2004-KeysersN #analysis #linear #modelling- Linear Discriminant Analysis and Discriminative Log-linear Modeling (DK, HN), pp. 156–159.
ICPR-v2-2004-KimBC #image- Hough Transform in Log-Polar Image Including Foveal and Peripheral Information (JSK, YSB, SIC), pp. 60–63.
ICPR-v4-2004-SchindlerB #geometry #image- The Epipolar Geometry of the Log-Polar Image Plane (KS, HB), pp. 40–43.
SIGIR-2004-BeitzelJCGF #analysis #query #scalability #topic #web- Hourly analysis of a very large topically categorized web query log (SMB, ECJ, AC, DAG, OF), pp. 321–328.
VLDB-2003-LiuLBHTS #database #multi #transaction- Capturing Global Transactions from Multiple Recovery Log Files in a Partitioned Database System (CL, BGL, SB, EH, TCT, JS), pp. 987–996.
STOC-2003-BobkovT- Modified log-sobolev inequalities, mixing and hypercontractivity (SB, PT), pp. 287–296.
ICEIS-v4-2003-PierozziGAC #analysis #towards #web- Towards Web Site User’s Profile: Log File Analysis (IPJ, EGG, MdCFA, CAdC), pp. 395–398.
KDD-2003-WuBY #modelling #multi- Screening and interpreting multi-item associations based on log-linear modeling (XW, DB, YY), pp. 276–285.
SIGIR-2003-Anick #feedback #refinement #using #web- Using terminological feedback for web search refinement: a log-based study (PGA), pp. 88–95.
SAC-2003-RagothamanP #assessment #hybrid #segmentation- Hybrid Log Segmentation for Assured Damage Assessment (PR, BP), pp. 522–527.
DocEng-2002-WongL #multi #query #xml- Managing and querying multi-version XML data with update logging (RKW, NL), pp. 74–81.
VLDB-2002-OhuraTPK #internet #mining #query #using #web- Experiments on Query Expansion for Internet Yellow Page Services Using Web Log Mining (YO, KT, IP, MK), pp. 1008–1018.
STOC-2002-Han #linear #sorting- Deterministic sorting in O(nlog log n) time and linear space (YH), pp. 602–608.
CIAA-2002-Korner #automaton #finite #on the- On Minimizing Cover Automata for Finite Languages in O(n log n) Time (HK), pp. 117–127.
ICALP-2002-BrodalLOP #problem #statistics #string- Solving the String Statistics Problem in Time O(n log n) (GSB, RBL, AÖ, CNSP), pp. 728–739.
ICPR-v2-2002-YeungB #analysis #mobile #towards- Towards Log-Polar Fixation for Mobile Robots — Analysis of Corner Tracking on the Log-Polar Camera (AY, NB), pp. 300–303.
ICPR-v3-2002-AndreuR #image #industrial- Enhancement of Annual Rings on Industrial CT Images of Logs (JPA, AR), pp. 261–264.
ICPR-v3-2002-HontaniSKA #feature model #image #symmetry- Vibratory Image Feature Extraction Based on Local Log-Polar Symmetry (HH, JS, AK, SA), pp. 839–842.
ICPR-v4-2002-TraverP #estimation #image #segmentation #using- Motion Estimation and Figure-Ground Segmentation Using Log-Polar Images (VJT, FP), pp. 166–169.
OSDI-2002-DunlapKCBC #analysis #named- ReVirt: Enabling Intrusion Analysis Through Virtual-Machine Logging and Replay (GWD, STK, SC, MAB, PMC), pp. 211–224.
STOC-2001-CanettiKPR #black box #concurrent- Black-box concurrent zero-knowledge requires Ω(log n) rounds (RC, JK, EP, AR), pp. 570–579.
KDD-2001-YangZL #mining #modelling #predict #web- Mining web logs for prediction models in WWW caching and prefetching (QY, HHZ, ITYL), pp. 473–478.
SIGIR-2001-MillerRS #algorithm #matrix #using- Modifications of Kleinberg’s HITS Algorithm Using Matrix Exponentiation and WebLog Records (JCM, GR, FS), pp. 444–445.
SAC-2001-BosschereJ #coordination- Synchronous coordination in the Log coordination model (KDB, JMJ), pp. 151–158.
PPoPP-2001-InoFH #analysis #named #parallel- LogGPS: a parallel computational model for synchronization analysis (FI, NF, KH), pp. 133–142.
SIGMOD-2000-Lomet #logic #online #using- High Speed On-line Backup When Using Logical Log Operations (DBL), pp. 34–45.
ITiCSE-2000-Chang #analysis #concept #learning #web- Discovering learning patterns from Web logs by concept transformation analysis (poster session) (CKC), pp. 186–187.
CIKM-2000-Norvag #case study #comparative #database- A Comparative Study of Log-Only and In-Place Update Based Temporal Object Database Systems (KN), pp. 496–503.
ICML-2000-Khardon #learning- Learning Horn Expressions with LogAn-H (RK), pp. 471–478.
ICPR-v1-2000-BerensF- Log-Opponent Chromaticity Coding of Color Space (JB, GDF), pp. 1206–1211.
KDD-2000-BeefermanB #clustering #query- Agglomerative clustering of a search engine query log (DB, ALB), pp. 407–416.
SIGIR-2000-ChuangPLC #interactive #web- Auto-construction of a live thesaurus from search term logs for interactive Web search (SLC, HTP, WHL, LFC), pp. 334–336.
SAC-2000-BarbosaC #coordination- A Coordination Language for Collective Agent Based Systems: GroupLog (FB, JCC), pp. 189–195.
SAC-2000-PandaT #dependence #information management- Data Dependency Based Logging for Defensive Information Warfare (BP, ST), pp. 361–365.
SAC-2000-ParkY #distributed #lightweight #memory management- A Lightweight Casual Logging Scheme for Recoverable Distributed Shared Memory (TP, HYY), pp. 661–666.
SAC-2000-SrinivasaS #behaviour #transaction- Discerning Behavioral Properties by Analyzing Transaction Logs (SS, MS), pp. 281–282.
ICSE-2000-AndrewsZ #analysis- Broad-spectrum studies of log file analysis (JHA, YZ), pp. 105–114.
SIGMOD-1999-LometT #logic- Logical Logging to Extend Recovery to New Domains (DBL, MRT), pp. 73–84.
VLDB-1999-Campbell #architecture #sql- The New Locking, Logging, and Recovery Architecture of Microsoft SQL Server 7.0 (DC), p. 249.
CHI-1999-CohenWP #interface #multi #named #video- Logjam: A Tangible Multi-Person Interface for Video Logging (JC, MW, PP), pp. 128–135.
HCI-EI-1999-Harel #automation #usability #validation- Automatic Operation Logging and Usability Validation (AH), pp. 1128–1133.
SIGIR-1999-LimaP #query #recognition- Phrase Recognition and Expansion for Short, Precision-Biased Queries Based on a Query Log (EFdL, JOP), pp. 145–152.
OSDI-1999-WangAP #file system #programmable- Virtual Log Based File Systems for a Programmable Disk (RYW, TEA, DAP), pp. 29–43.
PPoPP-1999-Sundaram-StukelV #analysis #predict #using- Predictive Analysis of a Wavefront Application using LogGP (DSS, MKV), pp. 141–150.
ASE-1998-Andrews #analysis #testing #tool support #using- Testing using Log File Analysis: Tools, Methods, and Issues (JHA), p. 157–?.
VLDB-1998-MuthOPW #data access #design #implementation #performance- Design, Implementation, and Performance of the LHAM Log-Structured History Data Access Method (PM, PEO, AP, GW), pp. 452–463.
ICPR-1998-AhrnsN #realtime #similarity #using- Real-time monocular fixation control using the log-polar transformation and a confidence-based similarity measure (IA, HN), pp. 310–315.
HPDC-1998-Al-TawilM #quantifier- LogGP Quantified: The Case for MPI (KAT, CAM), pp. 366–367.
STOC-1997-ColeH #pattern matching #random #set- Tree Pattern Matching and Subset Matching in Randomized O(n log3m) Time (RC, RH), pp. 66–75.
STOC-1997-OstrovskyR #algorithm- Universal O(Congestion + Dilation + log1+epsilonN) Local Control Packet Switching Algorithms (RO, YR), pp. 644–653.
HPDC-1997-NetzerX #distributed #game studies #source code- Replaying Distributed Programs without Message Logging (RHBN, YX), pp. 137–147.
SOSP-1997-NeefeWRCA #adaptation #file system #performance- Improving the Performance of Log-Structured File Systems with Adaptive Methods (JMN, DSR, AMC, RYW, TEA), pp. 238–251.
CADE-1997-EhrensbergerZ #logic #named- DiaLog: A System for Dialogue Logic (JE, CZ), pp. 446–460.
CAV-1997-Klarlund #algorithm #online #refinement- An n log n Algorithm for Online BDD Refinement (NK), pp. 107–118.
CAV-1997-LindenstraussSS #logic programming #named #query #source code #termination- TermiLog: A System for Checking Termination of Queries to Logic Programs (NL, YS, AS), pp. 444–447.
STOC-1996-Ma #fault tolerance #network #sorting- An O(n log n)-Size Fault-Tolerant Sorting Network (Extended Abstract) (YM), pp. 266–275.
CIKM-1996-AndrewsLSS #database #implementation #on the #programming language- On Implementing SchemaLog — A Database Programming Language (AA, NS, LVSL, INS), pp. 309–316.
ICPR-1996-CapurroPS #image- Vergence and tracking fusing log-polar images (CC, FP, GS), pp. 740–744.
ICDAR-v1-1995-GuerfaliP #generative #modelling- The Delta LogNormal theory for the generation and modeling of cursive characters (WG, RP), pp. 495–498.
STOC-1995-GoldmannH- Monotone circuits for connectivity have depth (log n)2-o(1) (Extended Abstract) (MG, JH), pp. 569–574.
STOC-1995-KushilevitzOR #communication #polynomial- Log-space polynomial end-to-end communication (EK, RO, AR), pp. 559–568.
ICALP-1995-NikoletseasRSY #graph #memory management #probability- Stochastic Graphs Have Short Memory: Fully Dynamic Connectivity in Poly-Log Expected Time (SEN, JHR, PGS, MY), pp. 159–170.
HPDC-1995-Menon #array #comparison #performance- A Performance Comparison of RAID-5 and Log-Structured Arrays (JM0), pp. 167–178.
SOSP-1995-CheritonD #memory management- Logged Virtual Memory (DRC, KJD), pp. 26–39.
ICLP-1995-SagonasW #execution #implementation #performance #prolog- Efficient Execution of HiLog in WAM-based Prolog Implementations (KFS, DSW), pp. 349–363.
STOC-1994-GargH #algorithm #approximate #problem- An O(log k) approximation algorithm for the k minimum spanning tree problem in the plane (NG, DSH), pp. 432–438.
CHI-1994-WeberP94a #named #realtime #video- Marquee: a tool for real-time video logging (KW, AP), pp. 58–64.
CIKM-1994-KeenD #named- XEL: Extended Ephemeral Logging for Log Storage Management (JSK, WJD), pp. 312–321.
ILPS-1994-SagonasW #compilation #prolog- A Portable Compiler for Integrating HiLog into Prolog Systems (KFS, DSW), p. 682.
SIGMOD-1993-KeenD #evaluation #performance- Performance Evaluation of Ephemeral Logging (JSK, WJD), pp. 187–196.
VLDB-1993-HoskingBM #comparative #evaluation #performance #persistent #programming language- Update Logging for Persistent Programming Languages: A Comparative Performance Evaluation (ALH, EWB, JEBM), pp. 429–440.
ICALP-1993-AnderssonM- Dynamic Interpolation Search in o(log log n) Time (AA, CM), pp. 15–27.
PLILP-1993-BugliesiN #implementation #named- SelfLog: Language and Implementation (MB, GN), pp. 412–413.
PPoPP-1993-CullerKPSSSSE #named #parallel #towards- LogP: Towards a Realistic Model of Parallel Computation (DEC, RMK, DAP, AS, KES, EES, RS, TvE), pp. 1–12.
ICLP-1993-Smith #logic programming #multi #named- MultiLog: Data Or-Parallel Logic Programming (DAS), pp. 314–331.
ILPS-1993-Paterson-JonesW- Extending the WAM for HiLog (RPJ, PTW), p. 654.
SIGMOD-1992-JhingranK #analysis #database #protocol #using- Analysis of Recovery in a Database System Using a Write-Ahead Log Protocol (AJ, PK), pp. 175–184.
SIGMOD-1992-MohanL #concurrent #named #performance #using- ARIES/IM: An Efficient and High Concurrency Index Management Method Using Write-Ahead Logging (CM, FEL), pp. 371–380.
STOC-1992-AjtaiM #algorithm #linear #programming- A Deterministic Poly(log log N)-Time N-Processor Algorithm for Linear Programming in Fixed Dimension (MA, NM), pp. 327–338.
ASPLOS-1992-BurrowsJLM #file system #online- On-Line Data Compression in a Log-Structured File System (MB, CJ, BWL, TM), pp. 2–9.
PODS-1991-Ross91a #on the- On Negation in HiLog (KAR), pp. 206–215.
STOC-1991-ApplegateK #integration- Sampling and Integration of Near Log-Concave functions (DA, RK), pp. 156–163.
PLILP-1991-Gloess #logic #order- U-Log, An Ordered Sorted Logic with Typed Attributes (PYG), pp. 275–286.
SOSP-1991-RosenblumO #design #file system #implementation- The Design and Implementation of a Log-Structured File System (MR, JKO), pp. 1–15.
ICLP-1991-DovierOPR #finite #logic programming #programming language #set- {log}: A Logic Programming Language with Finite Sets (AD, EGO, EP, GR), pp. 111–124.
PODS-1990-ConsensM #named #recursion #visual notation- GraphLog: a Visual Formalism for Real Life Recursion (MPC, AOM), pp. 404–416.
SIGMOD-1990-ConsensM #query #visual notation- The G+/GraphLog Visual Query System (MPC, AOM), p. 388.
STOC-1990-SchriftS- The Discrete Log is Very Discreet (AWS, AS), pp. 405–415.
HT-1989-ConsensM #hypermedia #query- Expressing Structural Hypertext Queries in GraphLog (MPC, AOM), pp. 269–292.
VLDB-1989-RothermelM #named #transaction- ARIES/NT: A Recovery Method Based on Write-Ahead Logging for Nested Transactions (KR, CM), pp. 337–346.
STOC-1989-Upfal- An O(log N) Deterministic Packet Routing Scheme (Preliminary Version) (EU), pp. 241–250.
FPCA-1989-RufW #functional #logic #nondeterminism #programming #unification- Nondeterminism and Unification in LogScheme: Integrating Logic and Functional Programming (ER, DW), pp. 327–339.
NACLP-1989-ChenKW #first-order #higher-order #logic programming #named #semantics- HiLog: A First-Order Semantics for Higher-Order Logic Programming Constructs (WC, MK, DSW), pp. 1090–1114.
RTA-1989-Snyder #algorithm #equation #generative #performance #set- Efficient Ground Completion: An O(n log n) Algorithm for Generating Reduced Sets of Ground Rewrite Rules Equivalent to a Set of Ground Equations E (WS), pp. 419–433.
SIGMOD-1987-DanielsST #distributed #transaction- Distributed Logging for Transaction Processing (DSD, AZS, DST), pp. 82–96.
VLDB-1987-KahlerR #database- Extending Logging for Database Snapshot Refresh (BK, OR), pp. 389–398.
VLDB-1987-Moss #transaction- Log-Based Recovery for Nested Transactions (JEBM), pp. 427–432.
SOSP-1987-FinlaysonC- Log Files: An Extended File Service Exploiting Write-Once Storage (RSF, DRC), pp. 139–148.
SOSP-1987-Hagmann #commit #file system #using- Reimplementing the Cedar File System Using Logging and Group Commit (RBH), pp. 155–162.
STOC-1986-AjtaiKSS #parallel- Deterministic Selection in O(log log N) Parallel Time (MA, JK, WLS, ES), pp. 188–195.
STOC-1986-LuekerMR #difference #linear #programming- Linear Programming with Two Variables per Inequality in Poly-Log Time (Preliminary Version) (GSL, NM, VR), pp. 196–205.
STOC-1984-BilardiP #network #sorting- A Minimum Area VLSI Network for O(log n) Time Sorting (GB, FPP), pp. 64–70.
STOC-1984-Willard #protocol- Log-Logarithmic Protocols for Resolving Ethernet and Semaphore Conflicts (Preliminary Report) (DEW), pp. 512–521.
SIGIR-1984-Tolle #analysis #evaluation #information management #monitoring #transaction- Monitoring and Evaluation of Information Systems Via Transaction Log Analysis (JT), pp. 247–258.
PODS-1983-PetersonS #protocol- LOG Write-Ahead Protocols and IMS/VS Logging (RJP, JPS), pp. 216–243.
STOC-1983-AjtaiKS #network #sorting- An O(n log n) Sorting Network (MA, JK, ES), pp. 1–9.
STOC-1983-LongW #how #question- How Discreet is the Discrete Log? (DLL, AW), pp. 413–420.
SIGIR-1983-Tolle #analysis #online #transaction- Transactional Log Analysis: Online Catalogs (JT), pp. 147–160.
DAC-1981-Lauther #algorithm- An O (N log N) algorithm for Boolean mask operations (UL), pp. 555–562.
ICALP-1981-Reif #network- Minimum S-T Cut of a Planar Undirected Network in O(n log²(n)) Time (JHR), pp. 56–67.
STOC-1980-Bloniarz #algorithm- A Shortest-Path Algorithm with Expected Time O(n^2 log n log ^* n) (PAB), pp. 378–384.
VLDB-1979-Reuter #database- Minimizing the I/O-Operations for Undo-Logging in Database Systems (AR0), pp. 164–172.
STOC-1979-Cook #polynomial- Deterministic CFL’s Are Accepted Simultaneously in Polynomial Time and Log Squared Space (SAC), pp. 338–345.
STOC-1978-Miller #morphism #on the- On the n^log n Isomorphism Technique: A Preliminary Report (GLM), pp. 51–58.
STOC-1977-YaoAR #bound #problem- An Ω(n² log n) Lower Bound to the Shortest Paths Problem (ACCY, DA, RLR), pp. 11–17.