• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 161
Next 10 →

Online System Problem Detection by Mining Patterns of Console Logs

by Wei Xu, Ling Huang, O Fox, David Patterson, Michael Jordan
"... Abstract—We describe a novel application of using data mining and statistical learning methods to automatically monitor and detect abnormal execution traces from console logs in an online setting. Different from existing solutions, we use a two stage detection system. The first stage uses frequent p ..."
Abstract - Cited by 13 (2 self) - Add to MetaCart
Abstract—We describe a novel application of using data mining and statistical learning methods to automatically monitor and detect abnormal execution traces from console logs in an online setting. Different from existing solutions, we use a two stage detection system. The first stage uses frequent

Web log mining with adaptive support thresholds

by Jian-chih Ou - In Proceedings of 2005 International World Wide Web Conference , 2005
"... With the fast increase in Web activities, Web data mining has recently become an important research topic. However, most previous studies of mining path traversal patterns are based on the model of a uniform support threshold without taking into consideration such important factors as the length of ..."
Abstract - Cited by 1 (0 self) - Add to MetaCart
With the fast increase in Web activities, Web data mining has recently become an important research topic. However, most previous studies of mining path traversal patterns are based on the model of a uniform support threshold without taking into consideration such important factors as the length

Combining Data Warehousing and Data Mining Techniques for Web Log Analysis

by Torben Bach Pedersen, Jesper Thorhauge, Søren E. Jespersen , 2007
"... Enormous amounts of information about Web site user behavior are collected in Web server logs. However, this information is only useful if it can be queried and analyzed to provide high-level knowledge about user navigation patterns, a task that requires powerful techniques.This chapter presents a n ..."
Abstract - Add to MetaCart
number of approaches that combine data warehousing and data mining techniques in order to analyze Web logs. After introducing the well-known click and session data warehouse (DW) schemas, the chapter presents the subsession schema, which allows fast queries on sequences

FAST REAL TIME ANALYSIS OF WEB SERVER MASSIVE LOG FILES USING AN IMPROVED WEB MINING ARCHITECTURE

by Ramesh Rajamanickam, C. Kavitha
"... The web has played a vital role to detect the information and finding the reasons to organize a system. As the web sites were increased, the web log files also increased based on the web searching. Our challenge and the task are to reduce the log files and classify the best results to reach the task ..."
Abstract - Add to MetaCart
the task which we used. Aimed to overcome the deficiency of abundant data to web mining, the study proposed a path extraction using Euclidean Distance based algorithm with a sequential pattern clustering mining algorithm. First, we construct the Relational Information System using original data sets

RecB: Set Theory based Technique for Large Scale Pattern Mining in Web Logs

by Tanya Steen, Ray Lindsay, Enterprise Analytics
"... Web Analytics is a way of turning raw data into actionable in-formation. Large organisations own web based applications and connect to external databases which generate very large web log-files. It then becomes crucial to estimate how information sys-tems are accessed by staff, what their search pre ..."
Abstract - Add to MetaCart
on small benchmark datasets, so their performance on a large scale is hard to predict. This pa-per stresses the importance of data preprocessing and introduces an efficient method for mining patterns in large sized collections of web logs (of all types) based on classic set theory properties.

A Top-Down Algorithm for Mining Maximal Traversal Paths in Web Log Sessions

by M. Thilagu, R. Nadarajan, R. Jeevitha
"... Mining of frequent traversal paths in web logs is an application of sequence mining and useful with many applications that include web recommendation, caching, pre-fetching etc. Most of the existing algorithms follow a bottom-up approach to mine sequence patterns in a database. In this paper, a fast ..."
Abstract - Add to MetaCart
fast top-down algorithm is presented to discover maximal traversal paths which are contiguous sequences in web log session sequences. The algorithm avoids candidate sequence generation and searches only maximal potential patterns in the minimized search space during mining process. Experimental results

276 Conference on Data Mining | DMIN'06 | An efficient SOM-based pre-processing to improve the discovery of frequent patterns in alarm logs

by F. Fessant, F. Clérot
"... Abstract- We describe a pre-processing technique for mining a telecommunication alarm log for frequent temporal patterns. The method consists in extracting relevant subsets from the initial log with the aim of discovering frequent patterns more accurately. In a first step, the alarm types presenting ..."
Abstract - Add to MetaCart
Abstract- We describe a pre-processing technique for mining a telecommunication alarm log for frequent temporal patterns. The method consists in extracting relevant subsets from the initial log with the aim of discovering frequent patterns more accurately. In a first step, the alarm types

Pragmatic text mining: minimizing human effort to quantify many issues in call logs

by Evan Kirshenbaum, Jaap Suermondt, George Forman, George Forman - In Proc. of the 12 th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD , 2006
"... text mining, log processing, supervised machine learning, quantification, text classification, applications, pattern recognition We discuss our experiences in analyzing customer-support issues from the unstructured free-text fields of technical-support call logs. The identification of frequent issue ..."
Abstract - Cited by 6 (3 self) - Add to MetaCart
text mining, log processing, supervised machine learning, quantification, text classification, applications, pattern recognition We discuss our experiences in analyzing customer-support issues from the unstructured free-text fields of technical-support call logs. The identification of frequent

Pandian “A Novel Technique for Web Log mining with Better Data Cleaning and Transaction Identification

by J. Vellingiri, S. Chenthur P - Journal of Computer Science
"... Abstract: Problem statement: In the internet era web sites on the internet are useful source of information for almost every activity. So there is a rapid development of World Wide Web in its volume of traffic and the size and complexity of web sites. Web mining is the application of data mining, ar ..."
Abstract - Cited by 5 (0 self) - Add to MetaCart
, artificial intelligence, chart technology and so on to the web data and traces user’s visiting behaviors and extracts their interests using patterns. Because of its direct application in e-commerce, Web analytics, e-learning, information retrieval, web mining has become one of the important areas in computer

Fast Mining Maximal Sequential Patterns

by Nancy P. Lin, Wei-hua Hao, Hung-jen Chen, Hao-en Chueh, Chung-i Chang
"... Abstract:- Sequential patterns mining is now widely used in many areas, such as the analysis of e-Learning sequential patterns, web log analysis, customer buying behavior analysis and etc. In the discipline of data mining, runtime and search space are always the two major issues. In this paper, we h ..."
Abstract - Cited by 2 (0 self) - Add to MetaCart
Abstract:- Sequential patterns mining is now widely used in many areas, such as the analysis of e-Learning sequential patterns, web log analysis, customer buying behavior analysis and etc. In the discipline of data mining, runtime and search space are always the two major issues. In this paper, we
Next 10 →
Results 1 - 10 of 161
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University