Pascal and Francis Bibliographic Databases

Help

Search results

Your search

kw.\*:("Log file")

Filter

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Document Type [dt]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Publication Year[py]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Discipline (document) [di]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Language

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Author Country

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Results 1 to 25 of 772

  • Page / 31
Export

Selection :

  • and

Minería del uso de webs : Analisi y mineria web = Web usage data miningORTEGA, José-Luis; AGUILLO, Isidro F.El Profesional de la información. 2009, Vol 18, Num 1, pp 20-26, issn 1386-6710, 7 p.Article

Test execution logging-and visualisation techniquesDIN, George; ZANDER, Justyna; PIETSCH, Stephan et al.Software & systems engineering and their applications. 2004, pp 1.1-1.9, 3VolConference Paper

Advances and Challenges in Log AnalysisOLINER, Adam; GANAPATHI, Archana; WEI XU et al.Communications of the ACM. 2012, Vol 55, Num 2, pp 55-61, issn 0001-0782, 7 p.Article

Pull up a chair and stay awhile: Strategies to maximize site stickinessGUENTHER, Kim.Online (Weston, CT). 2004, Vol 28, Num 6, pp 55-57, issn 0146-5422, 3 p.Article

An experimental framework for comparative digital library evaluation : The logging schemeKLAS, Claus-Peter; FUHR, Norbert; JACOB, Elin et al.ACM/IEEE Joint Conference on Digital Libraries. 2006, pp 308-309, isbn 1-59593-354-9, 1Vol, 2 p.Conference Paper

Analyzing concerns of people using weblog articles and natural phenomenaMURAYAMA, Toshihiro; FUKUHARA, Tomohiro; NISHIDA, Toyoaki et al.Lecture notes in computer science. 2005, issn 0302-9743, isbn 3-540-28894-5, vol3, 855-860Conference Paper

Vendor best efforts and shared responsibilities: What your vendors know and don't share can be hazardous to their businessKEISER, Barbie E.Online (Weston, CT). 2002, Vol 26, Num 3, pp 43-49, issn 0146-5422, 6 p.Article

Application of relation analysis to a small Java softwareITKONEN, Jonne; HILLEBRAND, Minna; LAPPALAINEN, Vesa et al.European conference on software maintenance and reengineering. 2004, pp 233-239, isbn 0-7695-21078X, 1Vol, 7 p.Conference Paper

Prediction of navigation profiles in a distributed Internet environment through learning of graph distributionsKUKULENZ, Dirk.Lecture notes in computer science. 2002, Vol 2347, pp 233-241, issn 0302-9743, isbn 3-540-43737-1, 9 p.Conference Paper

Što (ne) znamo o našim virtualnim korisnicima = Things we do (not) know about our virtual usersSTOJANOVSKI, Jadranka.Vjesnik bibliotekara Hrvatske. 2002, Vol 45, Num 3-4, pp 143-154, issn 0507-1925, 12 p.Article

If You Build It Will They Come? The LAIRAH Study : Quantifying the Use of Online Resources in the Arts and Humanities through Statistical Analysis of User Log DataWARWICK, Claire; TERRAS, Melissa; HUNTINGTON, Paul et al.Literary and linguistic computing. 2008, Vol 23, Num 1, pp 85-102, issn 0268-1145, 18 p.Conference Paper

Combining Web Usage Mining and XML Mining in a Real Case StudyMICHELE FACCA, Federico.Lecture notes in computer science. 2007, Vol 4737, pp 21-40, issn 0302-9743, isbn 3-540-74950-0 978-3-540-74950-9, 1Vol, 20 p.Conference Paper

Continuous verification using multimodal biometricsSHENG ZHANG; JANAKIRAMAN, Rajkumar; SIM, Terence et al.Lecture notes in computer science. 2006, pp 562-570, issn 0302-9743, isbn 3-540-31111-4, 1Vol, 9 p.Conference Paper

An exploratory Web log study of multitaskingBUZIKASHVILI, Nikolai.International ACM SIGIR conference on research and development in information retrieval. 2006, pp 623-624, isbn 1-59593-369-7, 1Vol, 2 p.Conference Paper

Come closer : Encouraging collaborative behaviour in a multimedia environmentRANDELL, Cliff; ROWE, Anthony.Lecture notes in computer science. 2006, pp 281-289, issn 0302-9743, isbn 3-540-46304-6, 1Vol, 9 p.Conference Paper

Relational mountain (density) clustering method and web log analysisPAL, Kuhu; PAL, Nikhil R; KELLER, James M et al.International journal of intelligent systems. 2005, Vol 20, Num 3, pp 375-392, issn 0884-8173, 18 p.Article

A clustering model based on matrix approximation with applications to cluster system log filesTAO LI; WEI PENG.Lecture notes in computer science. 2005, pp 625-632, issn 0302-9743, isbn 3-540-29243-8, 1Vol, 8 p.Conference Paper

History repeats itself : Repeat queries in Yahoo's logsTEEVAN, Jaime; ADAR, Eytan; JONES, Rosie et al.International ACM SIGIR conference on research and development in information retrieval. 2006, pp 703-704, isbn 1-59593-369-7, 1Vol, 2 p.Conference Paper

Analyzing errors and referral pairs to characterize common problems and improve Web reliabilityMA, Li; TIAN, Jeff.Lecture notes in computer science. 2003, pp 314-323, issn 0302-9743, isbn 3-540-40522-4, 10 p.Conference Paper

A taxonomy of single Sign-On systemsPASHALIDIS, Andreas; MITCHELL, Chris J.Lecture notes in computer science. 2003, pp 249-264, issn 0302-9743, isbn 3-540-40515-1, 16 p.Conference Paper

Using Process Mining to Bridge the Gap between BI and BPMVAN DER AALST, Wil.Computer (Long Beach, CA). 2011, Vol 44, Num 12, pp 77-80, issn 0018-9162, 4 p.Article

Search engines that learn from implicit feedbackJOACHIMS, Thorsten; RADLINSKI, Filip.Computer (Long Beach, CA). 2007, Vol 40, Num 8, pp 34-40, issn 0018-9162, 7 p.Article

Message fragment based causal message loggingCI, Yi-Wei; ZHAN ZHANG; ZUO, De-Cheng et al.Journal of parallel and distributed computing (Print). 2009, Vol 69, Num 11, pp 915-921, issn 0743-7315, 7 p.Article

Modeling actions of PubMed users with n-gram language modelsLIN, Jimmy; WILBUR, W. John.Information retrieval (Boston). 2009, Vol 12, Num 4, pp 487-503, issn 1386-4564, 17 p.Article

Un décret alarmant pour le respect de la vie privée et des libertés individuelles = An alarming decree for the respect of individual privacy and individual freedomsHAAS, Gérard.Expertises des systèmes d'information. 2007, Num 315, pp 222-223, issn 0221-2102, 2 p.Article

  • Page / 31