415 papers:
- SIGMOD-2015-BernsteinDDP #concurrent #database #optimisation
- Optimizing Optimistic Concurrency Control for Tree-Structured, Log-Structured Databases (PAB, SD, BD, MP), pp. 1295–1309.
- SIGMOD-2015-MoffittSAM #collaboration #data access
- Collaborative Access Control in WebdamLog (VZM, JS, SA, GM), pp. 197–211.
- VLDB-2015-WangKSPZNRKS
- Building a Replicated Logging System with Apache Kafka (GW, JK, SS, KP, MZ, NN, JR, JK, JS), pp. 1654–1665.
- SANER-2015-CaiS15a #analysis #dependence #fine-grained #named
- TRACERJD: Generic trace-based dynamic dependence analysis with fine-grained logging (HC, RAS), pp. 489–493.
- CHI-2015-FourneyWH
- Exploring Time-Dependent Concerns about Pregnancy and Childbirth from Search Logs (AF, RWW, EH), pp. 737–746.
- CHI-2015-LeeCN #process #visualisation
- Patina Engraver: Visualizing Activity Logs as Patina in Fashionable Trackers (MHL, SC, TJN), pp. 1173–1182.
- CSCW-2015-WieseMHZ #quote
- “You Never Call, You Never Write”: Call and SMS Logs Do Not Always Indicate Tie Strength (JW, JKM, JIH, JZ), pp. 765–774.
- DUXU-DD-2015-FilhoPV15b #automation #mobile #testing #usability
- Emotions Logging in Automated Usability Tests for Mobile Devices (JFF, WP, TV), pp. 428–435.
- HIMI-IKC-2015-NakashimaMHOWP #nondeterminism
- Kick Extraction for Reducing Uncertainty in RoboCup Logs (TN, SM, JH, OO, PW, MP), pp. 622–633.
- HIMI-IKD-2015-YoshinoO #using
- Proposal of a Data Presentation Technique Using Four-Frame Cartoon Expression for a LifeLog System (TY, IO), pp. 235–246.
- CAiSE-2015-TsuchiyaWFOM #configuration management #feedback #interactive #requirements #traceability #using
- Interactive Recovery of Requirements Traceability Links Using User Feedback and Configuration Management Logs (RT, HW, YF, KO, RM), pp. 247–262.
- ICML-2015-DjolongaK #modelling #scalability
- Scalable Variational Inference in Log-supermodular Models (JD, AK), pp. 1804–1813.
- ICML-2015-HanMS #probability #scalability
- Large-scale log-determinant computation through stochastic Chebyshev expansions (IH, DM, JS), pp. 908–917.
- ICML-2015-HuangWSLC #classification #image #learning #metric #set #symmetry
- Log-Euclidean Metric Learning on Symmetric Positive Definite Manifold with Application to Image Set Classification (ZH, RW, SS, XL, XC), pp. 720–729.
- ICML-2015-SwaminathanJ #feedback #learning
- Counterfactual Risk Minimization: Learning from Logged Bandit Feedback (AS, TJ), pp. 814–823.
- KDD-2015-PengKLC #approximate #clustering #rank #using
- Subspace Clustering Using Log-determinant Rank Approximation (CP, ZK, HL, QC), pp. 925–934.
- SIGIR-2015-Baeza-Yates #incremental #query
- Incremental Sampling of Query Logs (RABY), pp. 1093–1096.
- SAC-2015-BraunPPJ #adaptation #named #web
- LogSec: adaptive protection for the wild wild web (BB, KP, JP, MJ), pp. 2149–2156.
- SAC-2015-PintoMCS #process #using
- Using event logs and the Ψ-theory to analyse business processes (PLP, CM, AC, MMdS), pp. 1195–1202.
- ESEC-FSE-2015-BusanyM #analysis #behaviour #statistics
- Behavioral log analysis with statistical guarantees (NB, SM), pp. 898–901.
- ICSE-v1-2015-ZhuHFZLZ #developer #learning
- Learning to Log: Helping Developers Make Informed Logging Decisions (JZ, PH, QF, HZ, MRL, DZ), pp. 415–425.
- ICSE-v2-2015-PecchiaCCC #assessment #development #industrial #process
- Industry Practices and Event Logging: Assessment of a Critical Software Development Process (AP, MC, GC, DC), pp. 169–178.
- SOSP-2015-MatveevSFM #concurrent #lightweight #named #programming
- Read-log-update: a lightweight synchronization mechanism for concurrent programming (AM, NS, PF, PM), pp. 168–183.
- TAP-2015-GrinchteinCP #analysis #constraints #optimisation #protocol
- A Constraint Optimisation Model for Analysis of Telecommunication Protocol Logs (OG, MC, JP), pp. 137–154.
- DATE-2014-BalckGP #generative #modelling #protocol #testing #using
- Model-based protocol log generation for testing a telecommunication test harness using CLP (KB, OG, JP), pp. 1–4.
- VLDB-2014-WangJ #memory management #scalability
- Scalable Logging through Emerging Non-Volatile Memory (TW, RJ), pp. 865–876.
- VLDB-2014-WangMO #lightweight
- Lightweight Indexing of Observational Data in Log-Structured Storage (SW, DM, BCO), pp. 529–540.
- VLDB-2014-XuCC #clustering #graph #named
- LogGP: A Log-based Dynamic Graph Partitioning Method (NX, LC, BC), pp. 1917–1928.
- VLDB-2015-HuangSQ14 #transaction
- NVRAM-aware Logging in Transaction Systems (JH, KS, MKQ), pp. 389–400.
- ICSME-2014-ShangNHJ #comprehension #development #using
- Understanding Log Lines Using Development Knowledge (WS, MN, AEH, ZMJ), pp. 21–30.
- MSR-2014-KhodabandelouHDS #modelling #process
- Unsupervised discovery of intentional process models from event logs (GK, CH, RD, CS), pp. 282–291.
- STOC-2014-Goodrich #algorithm #sorting
- Zig-zag sort: a simple deterministic data-oblivious sorting algorithm running in O(n log n) time (MTG), pp. 684–693.
- ICALP-v1-2014-GavinskyL #reduction
- En Route to the Log-Rank Conjecture: New Reductions and Equivalent Formulations (DG, SL), pp. 514–524.
- FM-2014-ButinM #analysis
- Log Analysis for Data Protection Accountability (DB, DLM), pp. 163–178.
- HCI-TMT-2014-SantanaB #personalisation
- Log-Based Personalization Tool as an Assistive Technology (VFdS, MCCB), pp. 433–444.
- HIMI-AS-2014-KoyamaYKT #named
- ChoiceLog: Life Log System Based on Choices for Supporting Decision-Making (JK, KY, IK, YT), pp. 172–183.
- CAiSE-2014-ChanYGM #development #execution #mining #process
- Mining Event Logs to Assist the Development of Executable Process Variants (NNC, KY, WG, JM), pp. 548–563.
- CAiSE-2014-FolinoGP #low level #mining #modelling #multi #predict #process
- Mining Predictive Process Models out of Low-level Multidimensional Logs (FF, MG, LP), pp. 533–547.
- CAiSE-2014-KalamatianosK #independence #reduction #streaming
- Schema Independent Reduction of Streaming Log Data (TK, KK), pp. 394–408.
- CAiSE-2014-PikaWFHLA #behaviour #framework #using
- An Extensible Framework for Analysing Resource Behaviour Using Event Logs (AP, MTW, CJF, AHMtH, ML, WMPvdA), pp. 564–579.
- CIKM-2014-SpirinHDKB #analysis #facebook #graph #network #online #people #query #scalability #social
- People Search within an Online Social Network: Large Scale Analysis of Facebook Graph Search Query Logs (NVS, JH, MD, KGK, MB), pp. 1009–1018.
- CIKM-2014-TuLLH #ad hoc #documentation #information retrieval
- Log-Bilinear Document Language Model for Ad-hoc Information Retrieval (XT, JL, BL, TH), pp. 1895–1898.
- CIKM-2014-VermaY #query
- Entity Oriented Task Extraction from Query Logs (MV, EY), pp. 1975–1978.
- CIKM-2014-YeLQPM #generative
- A Generative Model for Generating Relevance Labels from Human Judgments and Click-Logs (XY, JL, ZQ, BP, DM), pp. 1907–1910.
- ECIR-2014-YangPSS #case study #e-commerce #query #scalability #using
- A Study of Query Term Deletion Using Large-Scale E-commerce Search Logs (BY, NP, GS, NS), pp. 235–246.
- ICPR-2014-SamantaC #classification #using
- Indian Classical Dance Classification on Manifold Using Jensen-Bregman LogDet Divergence (SS, BC), pp. 4507–4512.
- ICPR-2014-ZhangWL #using #video
- Video Text Extraction Using the Fusion of Color Gradient and Log-Gabor Filter (ZZ, WW, KL), pp. 2938–2943.
- KDD-2014-SiposFMW #maintenance #predict
- Log-based predictive maintenance (RS, DF, FM, ZW), pp. 1867–1876.
- KDD-2014-TagamiHTOTT
- Filling context-ad vocabulary gaps with click logs (YT, TH, YT, SO, KT, AT), pp. 1955–1964.
- RecSys-2014-Zhang #recommendation
- Browser-oriented universal cross-site recommendation and explanation based on user browsing logs (YZ), pp. 433–436.
- SIGIR-2014-AlonsoS #crowdsourcing #query
- Building a query log via crowdsourcing (OA, MS), pp. 939–942.
- SIGIR-2014-MorenoDC #clustering #query #web
- Query log driven web search results clustering (JGM, GD, GC), pp. 777–786.
- SIGIR-2014-UstaAVOU #analysis #education #how #learning #student
- How k-12 students search for learning?: analysis of an educational search engine log (AU, ISA, IBV, RO, ÖU), pp. 1151–1154.
- ECOOP-2014-LeeKZ #concurrent #execution #multi
- Infrastructure-Free Logging and Replay of Concurrent Execution on Multiple Cores (KHL, DK, XZ), pp. 232–256.
- SAC-2014-UnoI #music #named #recommendation
- MALL: a life log based music recommendation system and portable music player (AU, TI), pp. 939–944.
- ICSE-2014-BeschastnikhBEK #behaviour #concurrent #modelling
- Inferring models of concurrent systems from logs of their behavior with CSight (IB, YB, MDE, AK), pp. 468–479.
- PPoPP-2014-LeeKZ #concurrent #execution #multi
- Infrastructure-free logging and replay of concurrent execution on multiple cores (KHL, DK, XZ), pp. 371–372.
- SMT-2014-CarlssonGP #analysis #constraints #programming #protocol
- Protocol Log Analysis with Constraint Programming (MC, OG, JP), pp. 17–26.
- ICDAR-2013-KimuraHUIOK
- The Reading-Life Log — Technologies to Recognize Texts That We Read (TK, RH, SU, MI, SO, KK), pp. 91–95.
- SIGMOD-2013-ChristensenL #adaptation
- Adaptive log compression for massive log data (RC, FL), pp. 1283–1284.
- FASE-2013-LeoniDG #branch #execution #process
- Discovering Branching Conditions from Business Process Execution Logs (MdL, MD, LGB), pp. 114–129.
- ICSM-2013-LarssonH #debugging #mining
- Mining Telecom System Logs to Facilitate Debugging Tasks (AL, AHL), pp. 536–539.
- ICSM-2013-SyerJNHNF #execution #performance
- Leveraging Performance Counters and Execution Logs to Diagnose Memory-Related Performance Issues (MDS, ZMJ, MN, AEH, MNN, PF), pp. 110–119.
- MSR-2013-FuLLDZX #analysis #behaviour #comprehension
- Contextual analysis of program logs for understanding system behaviors (QF, JGL, QL, RD, DZ, TX), pp. 397–400.
- DLT-J-2012-GeffertP13
- Unary Coded NP-Complete Languages in Aspace(log log n) (VG, DP), p. 1167–?.
- ICALP-v1-2013-GlasserNRSW #polynomial #reduction #set
- Autoreducibility of Complete Sets for Log-Space and Polynomial-Time Reductions (CG, DTN, CR, ALS, MW), pp. 473–484.
- SEFM-2013-CristiaRF #framework #generative #testing
- {log} as a Test Case Generator for the Test Template Framework (MC, GR, CSF), pp. 229–243.
- CHI-2013-BentleyT #behaviour #mobile #power of
- The power of mobile notifications to increase wellbeing logging behavior (FB, KT), pp. 1095–1098.
- HIMI-LCCB-2013-WatabeMH #process
- Application to Help Learn the Process of Transforming Mathematical Expressions with a Focus on Study Logs (TW, YM, YH), pp. 157–164.
- CAiSE-2013-PikaAFHW #process #profiling
- Profiling Event Logs to Configure Risk Indicators for Process Delays (AP, WMPvdA, CJF, AHMtH, MTW), pp. 465–481.
- ICEIS-v3-2013-FerreiraFSCRPO #analysis #interactive #search-based
- Log Analysis of Human Computer Interactions Regarding Break The Glass Accesses to Genetic Reports (AMF, PF, CSP, RJCC, PPR, AdCP, VO), pp. 46–53.
- ICEIS-v3-2013-LucasXB #enterprise #realtime #visualisation
- Visualizing ERP Usage Logs in Real Time (WTL, JX, TB), pp. 83–90.
- CIKM-2013-QianSYZL #mining #query
- Dynamic query intent mining from a search log stream (YnQ, TS, JY, QZ, CL), pp. 1205–1208.
- ECIR-2013-CarpinetoR #concept #graph #query #semantics
- Semantic Search Log k-Anonymization with Generalized k-Cores of Query Concept Graph (CC, GR), pp. 110–121.
- ECIR-2013-SaadK #adaptation #intranet #navigation
- Exploiting Click Logs for Adaptive Intranet Navigation (SZS, UK), pp. 792–795.
- SAC-2013-FangYK #database
- MLC-flash-friendly logging and recovery for databases (HWF, MYY, TWK), pp. 1541–1546.
- SAC-2013-HayashiIN #recommendation #visual notation
- A visual analytics tool for system logs adopting variable recommendation and feature-based filtering (AH, TI, SN), pp. 996–998.
- SAC-2013-Perez-PalacinCM #named #predict #trade-off
- log2cloud: log-based prediction of cost-performance trade-offs for cloud deployments (DPP, RC, JM), pp. 397–404.
- ICSE-2013-King #forensics
- Measuring the forensic-ability of audit logs for nonrepudiation (JK), pp. 1419–1422.
- LCTES-2013-GuanWWCS #named
- BLog: block-level log-block management for NAND flash memorystorage systems (YG, GW, YW, RC, ZS), pp. 111–120.
- LCTES-2013-WangLWS #hybrid #memory management #named #reduction
- FTL2: a hybrid flash translation layer with logging for write reduction in flash memory (TW, DL, YW, ZS), pp. 91–100.
- SOSP-2013-BalakrishnanMWWPWDRZZ #data type #distributed #named
- Tango: distributed data structures over a shared log (MB, DM, TW, MW, VP, MW, JDD, SR, TZ, AZ), pp. 325–340.
- CASE-2012-HoSY #data mining #mining #modelling
- Data Mining of Life Log for Developing a User model-based Service Application (YH, ESS, TY), pp. 757–760.
- SIGMOD-2012-SearsR #named
- bLSM: a general purpose log structured merge tree (RS, RR), pp. 217–228.
- VLDB-2012-LeeLLLR #data analysis #framework #twitter
- The Unified Logging Infrastructure for Data Analytics at Twitter (GL, JL, CL, AL, DVR), pp. 1771–1780.
- VLDB-2012-MorishimaSMAF #crowdsourcing #declarative #framework #named
- CyLog/Crowd4U: A Declarative Platform for Complex Data-centric Crowdsourcing (AM, NS, TM, HA, SF), pp. 1918–1921.
- VLDB-2012-TaliusDDK #fault #query #transaction
- Transaction Log Based Application Error Recovery and Point In-Time Query (TT, RD, AD, HK), pp. 1781–1789.
- VLDB-2012-VoWACO #database #in the cloud #named #scalability
- LogBase: A Scalable Log-structured Database System in the Cloud (HTV, SW, DA, GC, BCO), pp. 1004–1015.
- STOC-2012-KhotPV #preprocessor #problem
- 2log1-ε n hardness for the closest vector problem with preprocessing (SK, PP, NKV), pp. 277–288.
- DLT-2012-GeffertP
- Unary Coded NP-Complete Languages in ASPACE (log log n) (VG, DP), pp. 166–177.
- IFM-2012-SchunselaarMS #declarative #modelling
- Patterns for a Log-Based Strengthening of Declarative Compliance Models (DMMS, FMM, NS), pp. 327–342.
- CAiSE-2012-BrouckeWBV #generative #process
- Improved Artificial Negative Event Generation to Enhance Process Event Logs (SKLMvB, JDW, BB, JV), pp. 254–269.
- CAiSE-2012-LyIMR #data transformation #mining #process #semantics
- Data Transformation and Semantic Log Purging for Process Mining (LTL, CI, JM, SRM), pp. 238–253.
- CAiSE-2012-MaggiBA #declarative #modelling #performance #process
- Efficient Discovery of Understandable Declarative Process Models from Event Logs (FMM, RPJCB, WMPvdA), pp. 270–285.
- ICEIS-J-2012-BabaianL12a #automation #interface
- Composing Interface Demonstrations Automatically from Usage Logs (TB, WTL), pp. 376–392.
- CIKM-2012-MahajanRTM #algorithm #named #recommendation
- LogUCB: an explore-exploit algorithm for comments recommendation (DKM, RR, CT, AM), pp. 6–15.
- CIKM-2012-WustBRBKP #database #enterprise #in memory #performance
- Efficient logging for enterprise workloads on column-oriented in-memory databases (JW, JHB, FR, SB, JK, HP), pp. 2085–2089.
- ECIR-2012-LvZ #modelling #normalisation
- A Log-Logistic Model-Based Interpretation of TF Normalization of BM25 (YL, CZ), pp. 244–255.
- ICPR-2012-BagdanovBLM #detection #multi
- Multi-pose face detection for accurate face logging (ADB, ADB, GL, IM), pp. 2448–2451.
- ICPR-2012-LiW #encoding #matrix #recognition #using
- Iris recognition using ordinal encoding of Log-Euclidean covariance matrices (PL, GW), pp. 2420–2423.
- SIGIR-2012-AdeyanjuSAKRF #adaptation #concept #query #recommendation
- Adaptation of the concept hierarchy model with search logs for query recommendation on intranets (IAA, DS, MDA, UK, ANDR, MF), pp. 5–14.
- SIGIR-2012-ChinS #analysis
- Survival analysis of click logs (SCC, WNS), pp. 1149–1150.
- SIGIR-2012-HuQLJPZ #mining #query #topic
- Mining query subtopics from search log data (YH, YnQ, HL, DJ, JP, QZ), pp. 305–314.
- SIGIR-2012-WhiteH #persistent
- Studies of the onset and persistence of medical concerns in search logs (RWW, EH), pp. 265–274.
- RE-2012-MendizabalSS #approach #elicitation #performance #requirements
- Log-based approach for performance requirements elicitation and prioritization (OMM, MS, RS), pp. 297–302.
- SAC-2012-MakanjuZML #clustering #composition #detection #identification
- Spatio-temporal decomposition, clustering and identification for alert detection in system logs (AM, ANZH, EEM, ML), pp. 621–628.
- SAC-2012-MenezesOV #abstraction #composition #coordination #pervasive
- Dynamic composition of coordination abstractions for pervasive systems: the case of LogOp (RM, AO, MV), pp. 1557–1559.
- SAC-2012-Perez-CastilloGPW #repository
- Integrating event logs into KDM repositories (RPC, IGRdG, MP, BW), pp. 1095–1102.
- ICSE-2012-Elyasov #testing
- Log-based testing (AE), pp. 1591–1594.
- ICSE-2012-Shang #developer #using
- Bridging the divide between software developers and operators using logs (WS), pp. 1583–1586.
- ICSE-2012-YuanPZ #open source
- Characterizing logging practices in open-source software (DY, SP, YZ), pp. 102–112.
- OSDI-2012-YuanPHLLTZS
- Be Conservative: Enhancing Failure Diagnosis with Proactive Logging (DY, SP, PH, YL, MMJL, XT, YZ, SS), pp. 293–306.
- ICLP-2012-NovelliVPD #architecture #named
- LOG-IDEAH: ASP for Architectonic Asset Preservation (VN, MDV, JAP, DD), pp. 393–403.
- ICST-2012-MizanF #analysis #automation #performance
- Automated Performance Model Construction through Event Log Analysis (AM, GF), pp. 636–641.
- ICST-2012-TonellaMNJLH #approximate #execution #modelling
- Finding the Optimal Balance between Over and Under Approximation of Models Inferred from Execution Logs (PT, AM, DCN, YJ, KL, MH), pp. 21–30.
- ICTSS-2012-Havelund #analysis
- Requirements-Driven Log Analysis (Extended Abstract) (KH), pp. 1–4.
- DAC-2011-ChangS #approach
- Plugging versus logging: a new approach to write buffer management for solid-state disks (LPC, YCS), pp. 23–28.
- ICDAR-2011-ForcherADGR #semantics #towards
- Semantic Logging: Towards Explanation-Aware DAS (BF, SA, AD, MG, TRB), pp. 1140–1144.
- SIGMOD-2011-ElmeleegyEL #generative #query
- Leveraging query logs for schema mapping generation in U-MAP (HE, AKE, JL), pp. 121–132.
- SIGMOD-2011-PoundPT #approach #mining #web
- Facet discovery for structured web search: a query-log mining approach (JP, SP, PT), pp. 169–180.
- VLDB-2011-KimLMPH #named
- IPL-P: In-Page Logging with PCRAM (KK, SWL, BM, CP, JYH), pp. 1363–1366.
- PLDI-2011-LeeZSZ #generative #towards
- Toward generating reducible replay logs (KHL, YZ, NS, XZ), pp. 246–257.
- STOC-2011-ValiantV
- Estimating the unseen: an n/log(n)-sample estimator for entropy and support size, shown optimal via new CLTs (GV, PV), pp. 685–694.
- LATA-2011-LisitsaPS #automaton
- Planarity of Knots, Register Automata and LogSpace Computability (AL, IP, RS), pp. 366–377.
- ICFP-2011-ShiversT #composition #functional
- Modular rollback through control logging: a pair of twin functional pearls (OS, AJT), pp. 58–68.
- CHI-2011-FourneyMT #analysis #interactive #query #usability
- Characterizing the usability of interactive applications through query log analysis (AF, RM, MAT), pp. 1817–1826.
- HCD-2011-IharaKY #simulation
- Human Affordance as Life-Log for Environmental Simulations (MI, MK, TY), pp. 235–242.
- HIMI-v2-2011-EitokuMMYMA #information management #quote
- “Life Portal”: An Information Access Scheme Based on Life Logs (SE, MM, RM, TY, SyM, MA), pp. 11–20.
- IDGD-2011-OginoKIK #behaviour #comprehension
- Smart Store Understanding Consumer’s Preference through Behavior Logs (AO, TK, YI, TK), pp. 385–392.
- ICEIS-v3-2011-JuniorNI #bibliography #execution #identification #legacy #source code
- Survey and Proposal of a Method for Business Rules Identification in Legacy Systems Source Code and Execution Logs (WARJ, GSdN, CI), pp. 207–213.
- CIKM-2011-BingLW #query #social #topic #using
- Using query log and social tagging to refine queries based on latent topics (LB, WL, TLW), pp. 583–592.
- CIKM-2011-CuiLYJJHGCD #framework #multi #random
- Multi-view random walk framework for search task discovery from click-through log (JC, HL, JY, LJ, RJ, JH, YG, ZC, XD), pp. 135–140.
- CIKM-2011-GaoXHCH #named #transaction
- PCMLogging: reducing transaction logging overhead with PCM (SG, JX, BH, BC, HH), pp. 2401–2404.
- CIKM-2011-GurajadaK #maintenance #online
- Index tuning for query-log based on-line index maintenance (SG, PSK), pp. 1997–2000.
- CIKM-2011-MaLL #using
- Selecting related terms in query-logs using two-stage SimRank (YM, HL, YL), pp. 1969–1972.
- CIKM-2011-OzertemVL #set #using
- Suggestion set utility maximization using session logs (UO, EV, LL), pp. 105–114.
- CIKM-2011-TangLP #generative #named
- LogSig: generating system events from raw textual logs (LT, TL, CSP), pp. 785–794.
- CIKM-2011-YanGC #higher-order #learning #query #recommendation
- Context-aware query recommendation by learning high-order relation in query logs (XY, JG, XC), pp. 2073–2076.
- ECIR-2011-AlbakourKNKSFR #evaluation #named #query #using
- AutoEval: An Evaluation Methodology for Evaluating Query Suggestions Using Query Logs (MDA, UK, NN, YK, DS, MF, ANDR), pp. 605–610.
- ECIR-2011-ArampatzisED
- Enhancing Deniability against Query-Logs (AA, PSE, GD), pp. 117–128.
- ECIR-2011-NunzioLM #analysis #multi
- Multilingual Log Analysis: LogCLEF (GMDN, JL, TM), pp. 675–678.
- KDIR-2011-OzakiE #difference #empirical #estimation
- Estimation of Implicit user Influence from Proxy Logs — An Empirical Study on the Effects of Time Difference and Popularity (TO, ME), pp. 250–255.
- KDIR-2011-SethCRSB #analysis #query #similarity
- A Tale of Two (Similar) Cities — Inferring City Similarity through Geo-spatial Query Log Analysis (RS, MC, DR, DS, SB), pp. 179–189.
- KEOD-2011-PinchukINDBP #analysis #distributed #semantics #visual notation
- Augmenting Semantics to Distributed Agents Logs — Enabling Graphical After Action Analysis of Federated Agents Logs (RP, SI, TN, TD, CB, GP), pp. 232–241.
- SEKE-2011-FronzaSSV #predict #using
- Failure Prediction based on Log Files Using the Cox Proportional Hazard Model (IF, AS, GS, JV), pp. 456–461.
- SIGIR-2011-BerberichKLZ #ranking
- Improving local search ranking through external logs (KB, ACK, DL, PZ), pp. 785–794.
- SIGIR-2011-BhatiaMM #query
- Query suggestions in the absence of query logs (SB, DM, PM), pp. 795–804.
- SIGIR-2011-ElsweilerHH #behaviour #comprehension #email #interactive
- Understanding re-finding behavior in naturalistic email interaction logs (DE, MH, MH), pp. 35–44.
- SIGIR-2011-FangSSKM #analysis #query
- Analysis of an expert search query log (YF, NS, LS, JK, APM), pp. 1189–1190.
- SIGIR-2011-FeildAG #distributed #named
- CrowdLogging: distributed, private, and anonymous search logging (HAF, JA, JG), pp. 375–384.
- SIGIR-2011-InagakiBCM #mobile #using #web
- Enhancing mobile search using web search log data (YI, JB, YC, MM), pp. 1201–1202.
- SIGIR-2011-JiangPL #mining #web
- Enhancing web search by mining search and browse logs (DJ, JP, HL), pp. 1295–1296.
- SIGIR-2011-WeerkampBKMBR #analysis #people
- People searching for people: analysis of a people search engine log (WW, RB, BK, EM, KB, MdR), pp. 45–54.
- OOPSLA-2011-AdamsKMMCD #polynomial
- Flow-sensitive type recovery in linear-log time (MDA, AWK, JM, MM, AC, RKD), pp. 483–498.
- PADL-2011-MantadelisPJVB #ad hoc #mobile #network
- Analysing a Publish/Subscribe System for Mobile Ad Hoc Networks with ProbLog (TM, KP, GJ, YV, YB), pp. 34–37.
- SAC-2011-GomiI #analysis
- A personal photograph browser for life log analysis based on location, time, and person (AG, TI), pp. 1245–1251.
- SAC-2011-JinKKHM #fine-grained
- Sector log: fine-grained storage management for solid state drives (SJ, JHK, JK, JH, SM), pp. 360–367.
- SAC-2011-KadriE #mining #nondeterminism #sequence #web
- Mining uncertain web log sequences with access history probabilities (OK, CIE), pp. 1059–1060.
- SAC-2011-KontogiannisWM #clustering #comprehension #reduction #runtime
- Event clustering for log reduction and run time system understanding (KK, AW, SM), pp. 191–192.
- SAC-2011-MakanjuZM #retrieval #using
- Storage and retrieval of system log events using a structured schema based on message type transformation (AM, ANZH, EEM), pp. 528–533.
- SAC-2011-Marty #forensics
- Cloud application logging for forensics (RM), pp. 178–184.
- ESEC-FSE-2011-BeschastnikhABE #behaviour #modelling #named
- Synoptic: studying logged behavior with inferred models (IB, JA, YB, MDE), pp. 448–451.
- ASPLOS-2011-VeeraraghavanLWOCFN #named
- DoublePlay: parallelizing sequential logging and replay (KV, DL, BW, JO, PMC, JF, SN), pp. 15–26.
- ASPLOS-2011-YuanZPZS
- Improving software diagnosability via log enhancement (DY, JZ, SP, YZ, SS), pp. 3–14.
- HPCA-2011-CarreteroVARMG #hardware #process #using
- Hardware/software-based diagnosis of load-store queues using expandable activity logs (JC, XV, JA, TR, MM, AG), pp. 321–331.
- DAC-2010-GaoYWY #analysis #correlation #estimation #performance #statistics
- Efficient tail estimation for massive correlated log-normal sums: with applications in statistical leakage analysis (MG, ZY, YW, ZY), pp. 475–480.
- DATE-2010-SheaSC #identifier #performance
- Scoped identifiers for efficient bit aligned logging (RS, MBS, YC), pp. 1450–1455.
- SIGMOD-2010-BlanasPERST #algorithm #comparison #pipes and filters
- A comparison of join algorithms for log processing in MaPreduce (SB, JMP, VE, JR, EJS, YT), pp. 975–986.
- SIGMOD-2010-KimWS #approach #independence #memory management #performance
- Page-differential logging: an efficient and DBMS-independent approach for storing data into flash memory (YRK, KYW, IYS), pp. 363–374.
- SIGMOD-2010-TaoYSPL #summary
- Logging every footstep: quantile summaries for the entire history (YT, KY, CS, JP, FL), pp. 639–650.
- VLDB-2010-JohnsonPSAA #approach #named #scalability
- Aether: A Scalable Approach to Logging (RJ, IP, RS, MA, AA), pp. 681–692.
- VLDB-2010-KimJW #adaptation #mobile
- Adaptive Logging for Mobile Device (YSK, HJ, KGW), pp. 1481–1492.
- ICSM-2010-ZawawyKM #analysis
- Log filtering and interpretation for root cause analysis (HZ, KK, JM), pp. 1–5.
- MSR-2010-NagappanV #mining
- Abstracting log lines to log event types for mining software system logs (MN, MAV), pp. 114–117.
- STOC-2010-BhaskaraCCFV #approximate #detection
- Detecting high log-densities: an O(n1/4) approximation for densest k-subgraph (AB, MC, EC, UF, AV), pp. 201–210.
- STOC-2010-GoelKK #graph
- Perfect matchings in o(n log n) time in regular bipartite graphs (AG, MK, SK), pp. 39–46.
- SEFM-2010-MetayerMP #architecture #design
- Designing Log Architectures for Legal Evidence (DLM, EM, MLP), pp. 156–165.
- CHI-2010-FlorLJPKC #case study #mobile #process
- The case of the disappearing Ox: a field study of mobile activity and context logging (GdlF, PL, MJ, JP, RK, AC), pp. 473–482.
- CHI-2010-KarkkainenVV #case study #mobile #process
- I don’t mind being logged, but want to remain in control: a field study of mobile activity and context logging (TK, TV, KVVM), pp. 163–172.
- CIKM-2010-BurghardtBGC #question
- Search-log anonymization and advertisement: are they mutually exclusive? (TB, KB, AG, CC), pp. 1269–1272.
- CIKM-2010-CarmanCHB #modelling #personalisation #query #topic #towards #using
- Towards query log based personalization using topic models (MJC, FC, MH, MB), pp. 1849–1852.
- CIKM-2010-KotovKDC #profiling #query #ranking #web
- Temporal query log profiling to improve web search ranking (AK, PK, LD, YC), pp. 1149–1158.
- ECIR-2010-GoharianFYM #peer-to-peer #query #using
- Enriching Peer-to-Peer File Descriptors Using Association Rules on Query Logs (NG, OF, WGY, JM), pp. 636–639.
- ICML-2010-XuHFPJ #detection #mining #problem #scalability
- Detecting Large-Scale System Problems by Mining Console Logs (WX, LH, AF, DAP, MIJ), pp. 37–46.
- KDD-2010-AgarwalAKK #modelling #multi #scalability
- Estimating rates of rare events with multiple hierarchies through scalable log-linear models (DA, RA, RK, NK), pp. 213–222.
- KDIR-2010-VeilumuthuR
- Aggregation of Implicit Feedbacks from Search Engine Log Files (AV, PR), pp. 269–274.
- SEKE-2010-Nehmer #approach #consistency #exception
- A Log-Assisted Approach Enforcing Consistency in the Presence of Exceptions (NN), pp. 757–764.
- SIGIR-2010-Huggett #n-gram #named
- Agro-Gator: digesting experts, logs, and N-grams (MH), p. 706.
- SIGIR-2010-JiangPL #challenge #information retrieval #mining #web
- Search and browse log mining for web information retrieval: challenges, methods, and applications (DJ, JP, HL), p. 912.
- SIGIR-2010-TorresHS #analysis #information retrieval #query
- Query log analysis in the context of information retrieval for children (SDT, DH, PS), pp. 847–848.
- SIGIR-2010-WangLC #bound #detection #query
- Intent boundary detection in search query logs (CJW, KHYL, HHC), pp. 749–750.
- SIGIR-2010-WhiteH #web
- Assessing the scenic route: measuring the value of search trails in web logs (RWW, JH), pp. 587–594.
- ICSE-2010-Nagappan #analysis #execution
- Analysis of execution log files (MN), pp. 409–412.
- ASPLOS-2010-VlachosGKCFGM #monitoring #named #online #parallel #thread
- ParaLog: enabling and accelerating online parallel monitoring of multithreaded applications (EV, MLG, MAK, SC, BF, PBG, TCM), pp. 271–284.
- ASPLOS-2010-YuanMXTZP #fault #named #runtime
- SherLog: error diagnosis by connecting clues from run-time logs (DY, HM, WX, LT, YZ, SP), pp. 143–154.
- HPDC-2010-HoeflerSL #named #scalability #simulation
- LogGOPSim: simulating large-scale applications in the LogGOPS model (TH, TS, AL), pp. 597–604.
- CASE-2009-VeilumuthuR #clustering #query
- Intent based clustering of search engine query log (AV, PR), pp. 647–652.
- DAC-2009-LiuYKC #algorithm
- An O(n log n) path-based obstacle-avoiding algorithm for rectilinear Steiner tree construction (CHL, SYY, SYK, YHC), pp. 314–319.
- SIGMOD-2009-Chen #named #performance
- FlashLogging: exploiting flash devices for synchronous logging performance (SC), pp. 73–86.
- SIGMOD-2009-JiangYCC #ad hoc #detection #named #query
- AIDE: ad-hoc intents detection engine over query logs (YJ, HTY, KCCC, YSC), pp. 1091–1094.
- VLDB-2009-SearsB #revisited
- Segment-based recovery: Write ahead logging revisited (RS, EAB), pp. 490–501.
- MSR-2009-BajracharyaL #code search #mining #topic
- Mining search topics from a code search engine usage log (SKB, CVL), pp. 111–120.
- MSR-2009-Kuhn #automation #component #evolution #source code #using #word
- Automatic labeling of software components and their evolution using log-likelihood ratio of word frequencies in source code (AK), pp. 175–178.
- HCD-2009-JarrettQRAS #analysis #development #metric #testing #usability #using #web
- Using Measurements from Usability Testing, Search Log Analysis and Web Traffic Analysis to Inform Development of a Complex Web Site Used for Complex Tasks (CJ, WQ, IR, SA, VS), pp. 729–738.
- HCI-AUII-2009-ImamuraOK #analysis #behaviour #modelling #ubiquitous
- Modeling Personal Preferences on Commodities by Behavior Log Analysis with Ubiquitous Sensing (NI, AO, TK), pp. 294–303.
- ICEIS-ISAS-2009-Petrusel #mining #modelling #process #workflow
- Mining and Modeling Decision Workflows from DSS User Activity Logs (RP), pp. 144–149.
- CIKM-2009-ClinchantG #constraints #information retrieval #word
- Retrieval constraints and word frequency distributions: a log-logistic model for IR (SC, ÉG), pp. 1975–1978.
- CIKM-2009-HongHVAA #effectiveness #query
- Effective anonymization of query logs (YH, XH, JV, NRA, VA), pp. 1465–1468.
- CIKM-2009-HuangE #query #web
- Analyzing and evaluating query reformulation strategies in web search logs (JH, ENE), pp. 77–86.
- CIKM-2009-MeijWR #modelling #normalisation #query
- A query model based on normalized log-likelihood (EM, WW, MdR), pp. 1903–1906.
- CIKM-2009-NaLM
- Dynamic in-page logging for flash-aware B-tree index (GJN, SWL, BM), pp. 1485–1488.
- CIKM-2009-WangTSZ #effectiveness
- Beyond hyperlinks: organizing information footprints in search logs to support effective browsing (XW, BT, AS, CZ), pp. 1237–1246.
- ECIR-2009-OrlandoS #mining #query
- Mining Query Logs (SO, FS), pp. 814–817.
- ICML-2009-QiTZCZ #learning #metric #performance
- An efficient sparse metric learning in high-dimensional space via l1-penalized log-determinant regularization (GJQ, JT, ZJZ, TSC, HJZ), pp. 841–848.
- KDD-2009-Kumar #challenge #mining #web
- Mining web logs: applications and challenges (RK), pp. 3–4.
- KDD-2009-MakanjuZM #clustering #using
- Clustering event logs using iterative partitioning (AM, ANZH, EEM), pp. 1255–1264.
- KDD-2009-ZhouJPL #data-driven #framework
- OLAP on search logs: an infrastructure supporting data-driven applications in search engines (BZ, DJ, JP, HL), pp. 1395–1404.
- KDIR-2009-SaneifarBLPR #mining
- Mining for Relevant Terms from Log Files (HS, SB, AL, PP, MR), pp. 77–84.
- SIGIR-2009-CarmanBGC #comparison #query #statistics
- A statistical comparison of tag and query logs (MJC, MB, RG, FC), pp. 123–130.
- SIGIR-2009-SakaiN #analysis #query #wiki
- Serendipitous search via wikipedia: a query log analysis (TS, KN), pp. 780–781.
- SAC-2009-ChoudhuriG #embedded #named #nondeterminism
- FlashBox: a system for logging non-deterministic events in deployed embedded systems (SC, TG), pp. 1676–1682.
- SAC-2009-KingLS #network #taxonomy
- A taxonomy and adversarial model for attacks against network log anonymization (JK, KL, AJS), pp. 1286–1293.
- SOSP-2009-XuHFPJ #detection #mining #problem #scalability
- Detecting large-scale system problems by mining console logs (WX, LH, AF, DAP, MIJ), pp. 117–132.
- DocEng-2008-GormishWPH #approach #distributed #documentation #flexibility #metadata #security
- Document logs: a distributed approach to metadata for better security and flexibility (MJG, GW, KWP, PH), pp. 119–122.
- VLDB-2008-Bar-YossefG #mining #query
- Mining search engine query logs via suggestion sampling (ZBY, MG), pp. 54–65.
- VLDB-2008-NezhadBSCA #process
- Process spaceship: discovering and exploring process views from event logs in data spaces (HRMN, BB, RSP, FC, PA), pp. 1412–1415.
- VLDB-2008-SearsCB #named #replication
- Rose: compressed, log-structured replication (RS, MC, EAB), pp. 526–537.
- VLDB-2008-TliliDPVAMCL
- P2P logging and timestamping for reconciliation (MT, WKD, EP, PV, RA, PM, GC, SL), pp. 1420–1423.
- STOC-2008-FakcharoenpholL #algorithm #approximate #problem
- An o(log2 k)-approximation algorithm for the k-vertex connected spanning subgraph problem (JF, BL), pp. 153–158.
- CHI-2008-HayesGAT #behaviour #named
- CareLog: a selective archiving tool for behavior management in schools (GRH, LMG, GDA, KNT), pp. 685–694.
- CAiSE-2008-SerrourGKB #correlation #interactive #protocol
- Message Correlation and Business Protocol Discovery in Service Interaction Logs (BS, DPG, HK, BB), pp. 405–419.
- ICEIS-AIDSS-2008-BezerraW #algorithm #detection #process
- Anomaly Detection Algorithms in Business Process Logs (FdLB, JW), pp. 11–18.
- CIKM-2008-ByrdNTPCGV #automation
- Semi-automated logging of contact center telephone calls (RJB, MSN, WT, YP, KSFC, SCG, KV), pp. 133–142.
- CIKM-2008-JonesK #automation #query #segmentation #topic
- Beyond the session timeout: automatic hierarchical segmentation of search topics in query logs (RJ, KLK), pp. 699–708.
- CIKM-2008-WangZ #effectiveness #mining #query
- Mining term association patterns from search logs for effective query reformulation (XW, CZ), pp. 479–488.
- ICPR-2008-GuZ #metric #similarity
- A similarity measure under Log-Euclidean metric for stereo matching (QG, JZ), pp. 1–4.
- ICPR-2008-JinLH #learning #prototype
- Prototype learning with margin-based conditional log-likelihood loss (XJ, CLL, XH), pp. 1–4.
- ICPR-2008-PalanderB #geometry
- Epipolar geometry and log-polar transform in wide baseline stereo matching (KP, SSB), pp. 1–4.
- SIGIR-2008-HuCBLCY #mining #query #web
- Web query translation via web log mining (RH, WC, PB, YL, ZC, QY), pp. 749–750.
- SAC-2008-BezerraW #algorithm #detection #process
- Anomaly detection algorithms in logs of process aware systems (FdLB, JW), pp. 951–952.
- ICLP-2008-AnhRD #implementation #using
- An Implementation of Extended P-Log Using XASP (HTA, CDPKR, CVD), pp. 739–743.
- ICLP-2008-KimmigCRDR #execution #on the #performance #source code
- On the Efficient Execution of ProbLog Programs (AK, VSC, RR, BD, LDR), pp. 175–189.
- ICLP-2008-MuggletonST #bias #declarative #logic programming #named #using
- TopLog: ILP Using a Logic Program Declarative Bias (SM, JCAS, ATN), pp. 687–692.
- ICLP-2008-Santos #bias #declarative #logic programming #named #using
- TopLog: ILP Using a Logic Program Declarative Bias (JCAS), pp. 818–819.
- ICST-2008-KodreZR #approach #statistics #testing
- Statistical Sampling Based Approach to Alleviate Log Replay Testing (RK, HZ, DJR), pp. 533–536.
- IJCAR-2008-FurbachGHP #named
- LogAnswer — A Deduction-Based Question Answering System (System Description) (UF, IG, HH, BP), pp. 139–146.
- SIGMOD-2007-0002SL #middleware
- Log-based recovery for middleware servers (RW, BS, DBL), pp. 425–436.
- SIGMOD-2007-LeeM #approach #design
- Design of flash-based DBMS: an in-page logging approach (SWL, BM), pp. 55–66.
- CHI-2007-SellenFAHRW #case study #memory management #using
- Do life-logging technologies support memory for the past?: an experimental study using sensecam (AS, AF, MA, SH, CR, KRW), pp. 81–90.
- HCI-IDU-2007-FujiokaTKO #coordination #detection #problem #usability
- Tool for Detecting Webpage Usability Problems from Mouse Click Coordinate Logs (RF, RT, YK, HO), pp. 438–445.
- HCI-IPT-2007-KimRB #smarttech
- Wearable Healthcare Gadget for Life-Log Service Based on WPAN (SHK, DWR, CB), pp. 837–844.
- CIKM-2007-JonesKPT #privacy #query #quote #what
- “I know what you did last summer”: query logs and user privacy (RJ, RK, BP, AT), pp. 909–914.
- ICML-2007-AndrewG #modelling #scalability
- Scalable training of L1-regularized log-linear models (GA, JG), pp. 33–40.
- ICML-2007-GlobersonKCC #algorithm #predict
- Exponentiated gradient algorithms for log-linear structured prediction (AG, TK, XC, MC), pp. 305–312.
- KDD-2007-Baeza-YatesT #query #semantics
- Extracting semantic relations from query logs (RABY, AT), pp. 76–85.
- SIGIR-2007-GaoNNZHWH #query #using
- Cross-lingual query suggestion using query logs of different languages (WG, CN, JYN, MZ, JH, KFW, HWH), pp. 463–470.
- SIGIR-2007-TeevanAJP #query
- Information re-retrieval: repeat queries in Yahoo’s logs (JT, EA, RJ, MASP), pp. 151–158.
- SIGIR-2007-WangZ #web
- Learn from web search logs to organize search results (XW, CZ), pp. 87–94.
- SIGIR-2007-WhiteCC #pseudo #query #refinement
- Comparing query logs and pseudo-relevance feedbackfor web-search query refinement (RWW, CLAC, SC), pp. 831–832.
- SAC-2007-ChiangH #adaptation #file system #performance
- Improving the performance of log-structured file systems with adaptive block rearrangement (MLC, JSH), pp. 1136–1140.
- SAC-2007-DingZ #web
- Log-based indexing to improve web site search (C(D, JZ), pp. 829–833.
- HPCA-2007-YenBMMVHSW #hardware #memory management #named #transaction
- LogTM-SE: Decoupling Hardware Transactional Memory from Caches (LY, JB, MRM, KEM, HV, MDH, MMS, DAW), pp. 261–272.
- HPDC-2007-ImranRLL #coordination #grid #mobile
- A proxy-based uncoordinated checkpointing scheme with pessimistic message logging for mobile grid systems (NI, IR, YKL, SL), pp. 237–238.
- DAC-2006-LiLP #analysis #power management #statistics
- Projection-based statistical analysis of full-chip leakage power with non-log-normal distributions (XL, JL, LTP), pp. 103–108.
- VLDB-2006-SteinleAGL #dependence #generative #mining #novel
- Mapping Moving Landscapes by Mining Mountains of Logs: Novel Techniques for Dependency Model Generation (MS, KA, SG, CL), pp. 1093–1102.
- MSR-2006-GermanRS #comprehension #using
- Using evolutionary annotations from change logs to enhance program comprehension (DMG, PCR, MADS), pp. 159–162.
- WCRE-2006-GanesanMKY #aspect-oriented #case study #product line #source code
- Discovering Organizational Aspects from the Source Code History Log during the Product Line Planning Phase — A Case Study (DG, DM, JK, KY), pp. 211–220.
- STOC-2006-Ben-OrPV
- Byzantine agreement in the full-information model in O(log n) rounds (MBO, EP, VV), pp. 179–186.
- EDOC-2006-OgasawaraTY #execution #modelling #process
- Estimating Structures of Business Process Models from Execution Logs (SO, KT, TY), pp. 106–115.
- CIKM-2006-ZhuangC #query #ranking #using
- Re-ranking search results using query logs (ZZ, SC), pp. 860–861.
- ECIR-2006-WangVR #collaboration
- A User-Item Relevance Model for Log-Based Collaborative Filtering (JW, APdV, MJTR), pp. 37–48.
- ICPR-v2-2006-Mancas-ThillouG #using
- Character Segmentation-by-Recognition Using Log-Gabor Filters (CMT, BG), pp. 901–904.
- ICPR-v3-2006-BalciAF
- Subpixel Alignment of MRI Data Under Cartesian and Log-Polar Sampling (MB, MA, HF), pp. 607–610.
- ICPR-v4-2006-YaoLYZL06a #algorithm #recognition #using
- Iris Recognition Algorithm Using Modified Log-Gabor Filters (PY, JL, XY, ZZ, BL), pp. 461–464.
- KDD-2006-FormanKS #mining
- Pragmatic text mining: minimizing human effort to quantify many issues in call logs (GF, EK, JS), pp. 852–861.
- KDD-2006-WedigM #analysis #personalisation #query #scalability
- A large-scale analysis of query logs for assessing personalization opportunities (SW, OM), pp. 742–747.
- KR-2006-Rosati #datalog #integration #logic
- DL+log: Tight Integration of Description Logics and Disjunctive Datalog (RR), pp. 68–78.
- SEKE-2006-GaaloulG #analysis #mining #statistics #workflow
- A Workflow Mining Tool based on Logs Statistical Analysis (WG, CG), pp. 595–600.
- SIGIR-2006-BlunsomKC #classification #modelling
- Question classification with log-linear models (PB, KK, JRC), pp. 615–616.
- SIGIR-2006-Buzikashvili #multi #web
- An exploratory web log study of multitasking (NB), pp. 623–624.
- SIGIR-2006-ParikhK #feedback #named #query #using
- Unity: relevance feedback using user query logs (JP, SK), pp. 689–690.
- SIGIR-2006-TeevanAJP #query
- History repeats itself: repeat queries in Yahoo’s logs (JT, EA, RJ, MASP), pp. 703–704.
- SAC-2006-WuKC #file system #memory management #performance
- Efficient initialization and crash recovery for log-based file systems over flash memory (CHW, TWK, LPC), pp. 896–900.
- HPCA-2006-MooreBMHW #memory management #named #transaction
- LogTM: log-based transactional memory (KEM, JB, MJM, MDH, DAW), pp. 254–265.
- ICLP-2006-RuckhausKPG #approach #datalog #owl
- Integrating Datalog with OWL: Exploring the AL-log Approach (ER, VK, BP, BCG), pp. 455–456.
- STOC-2005-AgarwalCMM #algorithm #approximate #problem
- O(sqrt(log n)) approximation algorithms for min UnCut, min 2CNF deletion, and directed cut problems (AA, MC, KM, YM), pp. 573–581.
- STOC-2005-Ajtai #representation
- Representing hard lattices with O(n log n) bits (MA), pp. 94–103.
- STOC-2005-Ben-SassonS #complexity #query
- Simple PCPs with poly-log rate and query complexity (EBS, MS), pp. 266–275.
- STOC-2005-Reingold
- Undirected ST-connectivity in log-space (OR), pp. 376–385.
- STOC-2005-Trifonov #algorithm
- An O(log n log log n) space algorithm for undirected st-connectivity (VT), pp. 626–633.
- CIKM-2005-ZhaoBG05a #named #web
- WAM-Miner: in the search of web access motifs from historical web log data (QZ, SSB, LG), pp. 421–428.
- KDD-2005-LiLMP #framework #mining
- An integrated framework on mining logs files for computing system management (TL, FL, SM, WP), pp. 776–781.
- MLDM-2005-HalveyKS #clustering #internet #navigation #predict #using
- Birds of a Feather Surf Together: Using Clustering Methods to Improve Navigation Prediction from Internet Log Files (MH, MTK, BS), pp. 174–183.
- SEKE-2005-WangM #behaviour #web
- Recovering Individual Accessing Behaviour from Web Logs (LW, CM), pp. 590–595.
- CSL-2005-Perron #proving
- A Propositional Proof System for Log Space (SP), pp. 509–524.
- VLDB-2004-SnodgrassYC #detection
- Tamper Detection in Audit Logs (RTS, S(Y, CSC), pp. 504–515.
- STOC-2004-ChuzhoyGHKKN #approximate #symmetry
- Asymmetric k-center is log* n-hard to approximate (JC, SG, EH, SK, GK, JN), pp. 21–27.
- ICALP-2004-FlumGW #bound #nondeterminism #parametricity
- Bounded Fixed-Parameter Tractability and log2n Nondeterministic Bits (JF, MG, MW), pp. 555–567.
- ICALP-2004-FuW #algorithm
- A 2O(n1-(1/d)log n) Time Algorithm for d-Dimensional Protein Folding in the HP-Model (BF, WW), pp. 630–644.
- CIKM-2004-SrinivasanADZ #analysis #grammarware #web
- Grammar-based task analysis of web logs (SS, AA, PMD, VZ), pp. 244–245.
- ICPR-v1-2004-KeysersN #analysis #linear #modelling
- Linear Discriminant Analysis and Discriminative Log-linear Modeling (DK, HN), pp. 156–159.
- ICPR-v2-2004-KimBC #image
- Hough Transform in Log-Polar Image Including Foveal and Peripheral Information (JSK, YSB, SIC), pp. 60–63.
- ICPR-v4-2004-SchindlerB #geometry #image
- The Epipolar Geometry of the Log-Polar Image Plane (KS, HB), pp. 40–43.
- SIGIR-2004-BeitzelJCGF #analysis #query #scalability #topic #web
- Hourly analysis of a very large topically categorized web query log (SMB, ECJ, AC, DAG, OF), pp. 321–328.
- VLDB-2003-LiuLBHTS #database #multi #transaction
- Capturing Global Transactions from Multiple Recovery Log Files in a Partitioned Database System (CL, BGL, SB, EH, TCT, JS), pp. 987–996.
- STOC-2003-BobkovT
- Modified log-sobolev inequalities, mixing and hypercontractivity (SB, PT), pp. 287–296.
- ICEIS-v4-2003-PierozziGAC #analysis #towards #web
- Towards Web Site User’s Profile: Log File Analysis (IPJ, EGG, MdCFA, CAdC), pp. 395–398.
- KDD-2003-WuBY #modelling #multi
- Screening and interpreting multi-item associations based on log-linear modeling (XW, DB, YY), pp. 276–285.
- SIGIR-2003-Anick #feedback #refinement #using #web
- Using terminological feedback for web search refinement: a log-based study (PGA), pp. 88–95.
- SAC-2003-RagothamanP #assessment #hybrid #segmentation
- Hybrid Log Segmentation for Assured Damage Assessment (PR, BP), pp. 522–527.
- DocEng-2002-WongL #multi #query #xml
- Managing and querying multi-version XML data with update logging (RKW, NL), pp. 74–81.
- VLDB-2002-OhuraTPK #internet #mining #query #using #web
- Experiments on Query Expansion for Internet Yellow Page Services Using Web Log Mining (YO, KT, IP, MK), pp. 1008–1018.
- STOC-2002-Han #linear #sorting
- Deterministic sorting in O(nlog log n) time and linear space (YH), pp. 602–608.
- CIAA-2002-Korner #automaton #finite #on the
- On Minimizing Cover Automata for Finite Languages in O(n log n) Time (HK), pp. 117–127.
- ICALP-2002-BrodalLOP #problem #statistics #string
- Solving the String Statistics Problem in Time O(n log n) (GSB, RBL, AÖ, CNSP), pp. 728–739.
- ICPR-v2-2002-YeungB #analysis #mobile #towards
- Towards Log-Polar Fixation for Mobile Robots — Analysis of Corner Tracking on the Log-Polar Camera (AY, NB), pp. 300–303.
- ICPR-v3-2002-AndreuR #image #industrial
- Enhancement of Annual Rings on Industrial CT Images of Logs (JPA, AR), pp. 261–264.
- ICPR-v3-2002-HontaniSKA #feature model #image #symmetry
- Vibratory Image Feature Extraction Based on Local Log-Polar Symmetry (HH, JS, AK, SA), pp. 839–842.
- ICPR-v4-2002-TraverP #estimation #image #segmentation #using
- Motion Estimation and Figure-Ground Segmentation Using Log-Polar Images (VJT, FP), pp. 166–169.
- OSDI-2002-DunlapKCBC #analysis #named
- ReVirt: Enabling Intrusion Analysis Through Virtual-Machine Logging and Replay (GWD, STK, SC, MAB, PMC), pp. 211–224.
- STOC-2001-CanettiKPR #black box #concurrent
- Black-box concurrent zero-knowledge requires Ω(log n) rounds (RC, JK, EP, AR), pp. 570–579.
- KDD-2001-YangZL #mining #modelling #predict #web
- Mining web logs for prediction models in WWW caching and prefetching (QY, HHZ, ITYL), pp. 473–478.
- SIGIR-2001-MillerRS #algorithm #matrix #using
- Modifications of Kleinberg’s HITS Algorithm Using Matrix Exponentiation and WebLog Records (JCM, GR, FS), pp. 444–445.
- SAC-2001-BosschereJ #coordination
- Synchronous coordination in the Log coordination model (KDB, JMJ), pp. 151–158.
- PPoPP-2001-InoFH #analysis #named #parallel
- LogGPS: a parallel computational model for synchronization analysis (FI, NF, KH), pp. 133–142.
- SIGMOD-2000-Lomet #logic #online #using
- High Speed On-line Backup When Using Logical Log Operations (DBL), pp. 34–45.
- ITiCSE-2000-Chang #analysis #concept #learning #web
- Discovering learning patterns from Web logs by concept transformation analysis (poster session) (CKC), pp. 186–187.
- CIKM-2000-Norvag #case study #comparative #database
- A Comparative Study of Log-Only and In-Place Update Based Temporal Object Database Systems (KN), pp. 496–503.
- ICML-2000-Khardon #learning
- Learning Horn Expressions with LogAn-H (RK), pp. 471–478.
- ICPR-v1-2000-BerensF
- Log-Opponent Chromaticity Coding of Color Space (JB, GDF), pp. 1206–1211.
- KDD-2000-BeefermanB #clustering #query
- Agglomerative clustering of a search engine query log (DB, ALB), pp. 407–416.
- SIGIR-2000-ChuangPLC #interactive #web
- Auto-construction of a live thesaurus from search term logs for interactive Web search (SLC, HTP, WHL, LFC), pp. 334–336.
- SAC-2000-BarbosaC #coordination
- A Coordination Language for Collective Agent Based Systems: GroupLog (FB, JCC), pp. 189–195.
- SAC-2000-PandaT #dependence #information management
- Data Dependency Based Logging for Defensive Information Warfare (BP, ST), pp. 361–365.
- SAC-2000-ParkY #distributed #lightweight #memory management
- A Lightweight Casual Logging Scheme for Recoverable Distributed Shared Memory (TP, HYY), pp. 661–666.
- SAC-2000-SrinivasaS #behaviour #transaction
- Discerning Behavioral Properties by Analyzing Transaction Logs (SS, MS), pp. 281–282.
- ICSE-2000-AndrewsZ #analysis
- Broad-spectrum studies of log file analysis (JHA, YZ), pp. 105–114.
- SIGMOD-1999-LometT #logic
- Logical Logging to Extend Recovery to New Domains (DBL, MRT), pp. 73–84.
- VLDB-1999-Campbell #architecture #sql
- The New Locking, Logging, and Recovery Architecture of Microsoft SQL Server 7.0 (DC), p. 249.
- CHI-1999-CohenWP #interface #multi #named #video
- Logjam: A Tangible Multi-Person Interface for Video Logging (JC, MW, PP), pp. 128–135.
- HCI-EI-1999-Harel #automation #usability #validation
- Automatic Operation Logging and Usability Validation (AH), pp. 1128–1133.
- SIGIR-1999-LimaP #query #recognition
- Phrase Recognition and Expansion for Short, Precision-Biased Queries Based on a Query Log (EFdL, JOP), pp. 145–152.
- OSDI-1999-WangAP #file system #programmable
- Virtual Log Based File Systems for a Programmable Disk (RYW, TEA, DAP), pp. 29–43.
- PPoPP-1999-Sundaram-StukelV #analysis #predict #using
- Predictive Analysis of a Wavefront Application using LogGP (DSS, MKV), pp. 141–150.
- ASE-1998-Andrews #analysis #testing #tool support #using
- Testing using Log File Analysis: Tools, Methods, and Issues (JHA), p. 157–?.
- VLDB-1998-MuthOPW #data access #design #implementation #performance
- Design, Implementation, and Performance of the LHAM Log-Structured History Data Access Method (PM, PEO, AP, GW), pp. 452–463.
- ICPR-1998-AhrnsN #realtime #similarity #using
- Real-time monocular fixation control using the log-polar transformation and a confidence-based similarity measure (IA, HN), pp. 310–315.
- HPDC-1998-Al-TawilM #quantifier
- LogGP Quantified: The Case for MPI (KAT, CAM), pp. 366–367.
- STOC-1997-ColeH #pattern matching #random #set
- Tree Pattern Matching and Subset Matching in Randomized O(n log3m) Time (RC, RH), pp. 66–75.
- STOC-1997-OstrovskyR #algorithm
- Universal O(Congestion + Dilation + log1+epsilonN) Local Control Packet Switching Algorithms (RO, YR), pp. 644–653.
- HPDC-1997-NetzerX #distributed #game studies #source code
- Replaying Distributed Programs without Message Logging (RHBN, YX), pp. 137–147.
- SOSP-1997-NeefeWRCA #adaptation #file system #performance
- Improving the Performance of Log-Structured File Systems with Adaptive Methods (JMN, DSR, AMC, RYW, TEA), pp. 238–251.
- CADE-1997-EhrensbergerZ #logic #named
- DiaLog: A System for Dialogue Logic (JE, CZ), pp. 446–460.
- CAV-1997-Klarlund #algorithm #online #refinement
- An n log n Algorithm for Online BDD Refinement (NK), pp. 107–118.
- CAV-1997-LindenstraussSS #logic programming #named #query #source code #termination
- TermiLog: A System for Checking Termination of Queries to Logic Programs (NL, YS, AS), pp. 444–447.
- STOC-1996-Ma #fault tolerance #network #sorting
- An O(n log n)-Size Fault-Tolerant Sorting Network (Extended Abstract) (YM), pp. 266–275.
- CIKM-1996-AndrewsLSS #database #implementation #on the #programming language
- On Implementing SchemaLog — A Database Programming Language (AA, NS, LVSL, INS), pp. 309–316.
- ICPR-1996-CapurroPS #image
- Vergence and tracking fusing log-polar images (CC, FP, GS), pp. 740–744.
- ICDAR-v1-1995-GuerfaliP #generative #modelling
- The Delta LogNormal theory for the generation and modeling of cursive characters (WG, RP), pp. 495–498.
- STOC-1995-GoldmannH
- Monotone circuits for connectivity have depth (log n)2-o(1) (Extended Abstract) (MG, JH), pp. 569–574.
- STOC-1995-KushilevitzOR #communication #polynomial
- Log-space polynomial end-to-end communication (EK, RO, AR), pp. 559–568.
- ICALP-1995-NikoletseasRSY #graph #memory management #probability
- Stochastic Graphs Have Short Memory: Fully Dynamic Connectivity in Poly-Log Expected Time (SEN, JHR, PGS, MY), pp. 159–170.
- HPDC-1995-Menon #array #comparison #performance
- A Performance Comparison of RAID-5 and Log-Structured Arrays (JM0), pp. 167–178.
- SOSP-1995-CheritonD #memory management
- Logged Virtual Memory (DRC, KJD), pp. 26–39.
- ICLP-1995-SagonasW #execution #implementation #performance #prolog
- Efficient Execution of HiLog in WAM-based Prolog Implementations (KFS, DSW), pp. 349–363.
- STOC-1994-GargH #algorithm #approximate #problem
- An O(log k) approximation algorithm for the k minimum spanning tree problem in the plane (NG, DSH), pp. 432–438.
- CHI-1994-WeberP94a #named #realtime #video
- Marquee: a tool for real-time video logging (KW, AP), pp. 58–64.
- CIKM-1994-KeenD #named
- XEL: Extended Ephemeral Logging for Log Storage Management (JSK, WJD), pp. 312–321.
- ILPS-1994-SagonasW #compilation #prolog
- A Portable Compiler for Integrating HiLog into Prolog Systems (KFS, DSW), p. 682.
- SIGMOD-1993-KeenD #evaluation #performance
- Performance Evaluation of Ephemeral Logging (JSK, WJD), pp. 187–196.
- VLDB-1993-HoskingBM #comparative #evaluation #performance #persistent #programming language
- Update Logging for Persistent Programming Languages: A Comparative Performance Evaluation (ALH, EWB, JEBM), pp. 429–440.
- ICALP-1993-AnderssonM
- Dynamic Interpolation Search in o(log log n) Time (AA, CM), pp. 15–27.
- PLILP-1993-BugliesiN #implementation #named
- SelfLog: Language and Implementation (MB, GN), pp. 412–413.
- PPoPP-1993-CullerKPSSSSE #named #parallel #towards
- LogP: Towards a Realistic Model of Parallel Computation (DEC, RMK, DAP, AS, KES, EES, RS, TvE), pp. 1–12.
- ICLP-1993-Smith #logic programming #multi #named
- MultiLog: Data Or-Parallel Logic Programming (DAS), pp. 314–331.
- ILPS-1993-Paterson-JonesW
- Extending the WAM for HiLog (RPJ, PTW), p. 654.
- SIGMOD-1992-JhingranK #analysis #database #protocol #using
- Analysis of Recovery in a Database System Using a Write-Ahead Log Protocol (AJ, PK), pp. 175–184.
- SIGMOD-1992-MohanL #concurrent #named #performance #using
- ARIES/IM: An Efficient and High Concurrency Index Management Method Using Write-Ahead Logging (CM, FEL), pp. 371–380.
- STOC-1992-AjtaiM #algorithm #linear #programming
- A Deterministic Poly(log log N)-Time N-Processor Algorithm for Linear Programming in Fixed Dimension (MA, NM), pp. 327–338.
- ASPLOS-1992-BurrowsJLM #file system #online
- On-Line Data Compression in a Log-Structured File System (MB, CJ, BWL, TM), pp. 2–9.
- PODS-1991-Ross91a #on the
- On Negation in HiLog (KAR), pp. 206–215.
- STOC-1991-ApplegateK #integration
- Sampling and Integration of Near Log-Concave functions (DA, RK), pp. 156–163.
- PLILP-1991-Gloess #logic #order
- U-Log, An Ordered Sorted Logic with Typed Attributes (PYG), pp. 275–286.
- SOSP-1991-RosenblumO #design #file system #implementation
- The Design and Implementation of a Log-Structured File System (MR, JKO), pp. 1–15.
- ICLP-1991-DovierOPR #finite #logic programming #programming language #set
- {log}: A Logic Programming Language with Finite Sets (AD, EGO, EP, GR), pp. 111–124.
- PODS-1990-ConsensM #named #recursion #visual notation
- GraphLog: a Visual Formalism for Real Life Recursion (MPC, AOM), pp. 404–416.
- SIGMOD-1990-ConsensM #query #visual notation
- The G+/GraphLog Visual Query System (MPC, AOM), p. 388.
- STOC-1990-SchriftS
- The Discrete Log is Very Discreet (AWS, AS), pp. 405–415.
- HT-1989-ConsensM #hypermedia #query
- Expressing Structural Hypertext Queries in GraphLog (MPC, AOM), pp. 269–292.
- VLDB-1989-RothermelM #named #transaction
- ARIES/NT: A Recovery Method Based on Write-Ahead Logging for Nested Transactions (KR, CM), pp. 337–346.
- STOC-1989-Upfal
- An O(log N) Deterministic Packet Routing Scheme (Preliminary Version) (EU), pp. 241–250.
- FPCA-1989-RufW #functional #logic #nondeterminism #programming #unification
- Nondeterminism and Unification in LogScheme: Integrating Logic and Functional Programming (ER, DW), pp. 327–339.
- NACLP-1989-ChenKW #first-order #higher-order #logic programming #named #semantics
- HiLog: A First-Order Semantics for Higher-Order Logic Programming Constructs (WC, MK, DSW), pp. 1090–1114.
- RTA-1989-Snyder #algorithm #equation #generative #performance #set
- Efficient Ground Completion: An O(n log n) Algorithm for Generating Reduced Sets of Ground Rewrite Rules Equivalent to a Set of Ground Equations E (WS), pp. 419–433.
- SIGMOD-1987-DanielsST #distributed #transaction
- Distributed Logging for Transaction Processing (DSD, AZS, DST), pp. 82–96.
- VLDB-1987-KahlerR #database
- Extending Logging for Database Snapshot Refresh (BK, OR), pp. 389–398.
- VLDB-1987-Moss #transaction
- Log-Based Recovery for Nested Transactions (JEBM), pp. 427–432.
- SOSP-1987-FinlaysonC
- Log Files: An Extended File Service Exploiting Write-Once Storage (RSF, DRC), pp. 139–148.
- SOSP-1987-Hagmann #commit #file system #using
- Reimplementing the Cedar File System Using Logging and Group Commit (RBH), pp. 155–162.
- STOC-1986-AjtaiKSS #parallel
- Deterministic Selection in O(log log N) Parallel Time (MA, JK, WLS, ES), pp. 188–195.
- STOC-1986-LuekerMR #difference #linear #programming
- Linear Programming with Two Variables per Inequality in Poly-Log Time (Preliminary Version) (GSL, NM, VR), pp. 196–205.
- STOC-1984-BilardiP #network #sorting
- A Minimum Area VLSI Network for O(log n) Time Sorting (GB, FPP), pp. 64–70.
- STOC-1984-Willard #protocol
- Log-Logarithmic Protocols for Resolving Ethernet and Semaphore Conflicts (Preliminary Report) (DEW), pp. 512–521.
- SIGIR-1984-Tolle #analysis #evaluation #information management #monitoring #transaction
- Monitoring and Evaluation of Information Systems Via Transaction Log Analysis (JT), pp. 247–258.
- PODS-1983-PetersonS #protocol
- LOG Write-Ahead Protocols and IMS/VS Logging (RJP, JPS), pp. 216–243.
- STOC-1983-AjtaiKS #network #sorting
- An O(n log n) Sorting Network (MA, JK, ES), pp. 1–9.
- STOC-1983-LongW #how #question
- How Discreet is the Discrete Log? (DLL, AW), pp. 413–420.
- SIGIR-1983-Tolle #analysis #online #transaction
- Transactional Log Analysis: Online Catalogs (JT), pp. 147–160.
- DAC-1981-Lauther #algorithm
- An O (N log N) algorithm for Boolean mask operations (UL), pp. 555–562.
- ICALP-1981-Reif #network
- Minimum S-T Cut of a Planar Undirected Network in O(n log²(n)) Time (JHR), pp. 56–67.
- STOC-1980-Bloniarz #algorithm
- A Shortest-Path Algorithm with Expected Time O(n^2 log n log ^* n) (PAB), pp. 378–384.
- VLDB-1979-Reuter #database
- Minimizing the I/O-Operations for Undo-Logging in Database Systems (AR0), pp. 164–172.
- STOC-1979-Cook #polynomial
- Deterministic CFL’s Are Accepted Simultaneously in Polynomial Time and Log Squared Space (SAC), pp. 338–345.
- STOC-1978-Miller #morphism #on the
- On the n^log n Isomorphism Technique: A Preliminary Report (GLM), pp. 51–58.
- STOC-1977-YaoAR #bound #problem
- An Ω(n² log n) Lower Bound to the Shortest Paths Problem (ACCY, DA, RLR), pp. 11–17.