Logs and Antilogs

نویسندگان

چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Logs ?

Web access logs, usually stored in relational databases, are commonly used for various data mining and data analysis tasks. The tasks typically consist in searching the web access logs for event sequences that support a given sequential pattern. For large data volumes, this type of searching is extremely time consuming and is not well optimized by traditional indexing techniques. In this paper ...

متن کامل

On trees and logs

In this paper we critically examine the main workhorse model in asset pricing theory, the Lucas (1978) tree model (LT-Model), extended to include heterogeneous agents and multiple goods, and contrast it to the benchmark model in ...nancial equilibrium theory, the real assets model (RA-Model). Households in the LT-Model trade goods together with claims to Lucas trees (exogenous stochastic divide...

متن کامل

- lem troubleshooting and system logs

Arkady Kanevsky is a senior research engineer at NetApp Advanced Technology Group. Arkady has done extensive research on RDMA technology, storage resiliency, scalable storage systems, and parallel and distributed computing. He received a Ph.D. in computer science from the University of Illinois in 1987. He was a faculty member at Dartmouth College and Texas A&M University prior to joining the i...

متن کامل

Auditing with Incomplete Logs

The protection of sensitive information is of utmost importance for organizations. The complexity and dynamism of modern businesses are forcing a re-think of traditional protection mechanisms. In particular, a priori policy enforcement mechanisms are often complemented with auditing mechanisms that rely on an a posteriori analysis of logs recording users’ activities to prove conformity to polic...

متن کامل

Exploring Application Logs

This paper deals with the problem of analyzing application event logs in relevance to dependability evaluation. We present the significance of application logs as a valuable source of information on operational profiles, anomalies and errors. They can enhance classical approaches based on monitoring system logs and performance variables. Keywords; event monitoring, operational profiles, anomalies

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Nature

سال: 1921

ISSN: 0028-0836,1476-4687

DOI: 10.1038/107300c0