Log analysis

Xem 1-20 trên 41 kết quả Log analysis
  • This article describes GALATEAS LangLog, a system performing Search Log Analysis. LangLog illustrates how NLP technologies can be a powerful support tool for market research even when the source of information is a collection of queries each one consisting of few words. We push the standard Search Log Analysis forward taking into account the semantics of the queries. The main innovation of LangLog is the implementation of two highly customizable components that cluster and classify the queries in the log. ...

    pdf5p bunthai_1 06-05-2013 19 2   Download

  • Most firewalls can log events related to traffic that has been permitted or denied. Unfortunately, the sheer volume of data from even a moderately sized environment can quickly become unmanageable.

    pdf2p chutieuchuathieulam 23-07-2010 49 7   Download

  • Firewall Log Review and Analysis After the decision has been made to log events from your firewall, the next step is determining what you should be looking for in the logs and how you should properly perform log analysis

    pdf10p chutieuchuathieulam 23-07-2010 90 17   Download

  • The Project Gutenberg EBook of Number "e" (Natural Log) to Approximately 1 Million Places, by Robert Nemiroff and Jerry Bonnell This eBook is for the use of anyone anywhere at no cost and with almost no restrictions whatsoever. You may copy it, give it away or re-use it under the terms of the Project Gutenberg License included with this eBook or online at www.gutenberg.net Title: Number "e" (Natural Log) to Approximately 1 Million Places Author: Robert Nemiroff Jerry Bonnell

    pdf36p khangoc2393 26-09-2012 23 5   Download

  • It is not our goal, either, to demonstrate complete use cases for SALSA. For example, while we demonstrate one application of SALSA for failure diagnosis, we do not claim that this failure-diagnosis technique is com- plete nor perfect. It is merely illustrative of the types of useful analyses that SALSA can support. Finally, while we can support an online version of SALSA that would analyze log entries generated as the system executes, the goal of this paper is not to describe such an online log-analysis technique or its runtime over- heads.

    pdf8p nhacsihuytuan 06-04-2013 22 4   Download

  • Statistical methods require very large corpus with high quality. But building large and faultless annotated corpus is a very difficult job. This paper proposes an efficient m e t h o d to construct part-of-speech tagged corpus. A rulebased error correction m e t h o d is proposed to find and correct errors semi-automatically by user-defined rules. We also make use of user's correction log to reflect feedback. Experiments were carried out to show the efficiency of error correction process of this workbench. The result shows that about 63.2 % of tagging errors can be corrected. ...

    pdf5p bunrieu_1 18-04-2013 17 3   Download

  • Syntactic analysis of search queries is important for a variety of information-retrieval tasks; however, the lack of annotated data makes training query analysis models difficult. We propose a simple, efficient procedure in which part-of-speech tags are transferred from retrieval-result snippets to queries at training time.

    pdf5p nghetay_1 07-04-2013 15 1   Download

  • We present IlluMe, a software tool pack which creates a personalized ambient using the music and lighting. IlluMe includes an emotion analysis software, the small space ambient lighting, and a multimedia controller. The software analyzes emotional changes from instant message logs and corresponds the detected emotion to the best sound and light settings.

    pdf6p nghetay_1 07-04-2013 18 1   Download

  • Chapter 10 - Time-series analysis. This chapter introduces time series as a concept, and the basic autoregressive process makes it easy to see where the correlation of the error terms can be a problem; discuss the factors affecting the choice between a linear trend and a log-linear trend model for a time series incorporating a trend;....

    ppt27p allbymyself_10 03-03-2016 18 1   Download

  • When I Œrst started using OpenBSD sometime in 1999, it certainly wasn't because I wanted to write a book about it. All I needed was a stable server for my home network, something I could conŒgure and forget about. I tried all obvious suspects: FreeBSD, NetBSD, OpenBSD, and four or Œve different Linux distributions, My choice was OpenBSD, because it installed without problems, was easy to conŒgure, and did not have the infuriating problems with NFS that plagued me on Linux at that time.

    pdf323p tamhnd 13-04-2009 531 162   Download

  • Although the Standard & Poor's 500 is the most commonly used measure of the performance of the U. S. stock market, it is sometimes argued that, because this index is so heavily populated with high quality, large capitalization stocks, it may not be an appropriate benchmark with which to compare a mutual fund which may be invested in lower quality, smaller capitalization stocks. The obvious refutation: If one can obtain a higher return by investing in...

    pdf27p quaivatdo 18-11-2012 24 6   Download

  • These are the things we’re going to cover. In essence, we’re going to cover a series of tools and how they are logging the traffic they generate. If you work within a Computer Incident Response Team or as an Intrusion Detection analyst, it is very important to understand the logs you are working with. They are the key to solve the puzzle.

    pdf41p vuthuong 08-08-2009 79 5   Download

  • Tuyển tập báo cáo các nghiên cứu khoa học quốc tế ngành hóa học dành cho các bạn yêu hóa học tham khảo đề tài: Computer-aided diagnosis of renal obstruction: utility of log-linear modeling versus standard ROC and kappa analysis

    pdf8p dauphong12 08-02-2012 28 5   Download

  • The responses.properties and global.properties files are protected by access controls on the $VCLOUD _ HOME/etc folder and the files themselves. Do not change the permissions on the files or folder as it may either give too much access, reducing security, or restrict access too much, stopping the VMware vCloud Director software from working. In order for the access controls to properly work, physical and logical access to the VMware vCloud Director servers must be strictly limited to those with a need to log in and only with the minimal levels of access required.

    pdf0p cao_can 02-01-2013 23 4   Download

  • Reports on Computer Systems Technology The Information Technology Laboratory (ITL) at the National Institute of Standards and Technology (NIST) promotes the U.S. economy and public welfare by providing technical leadership for the nation’s measurement and standards infrastructure. ITL develops tests, test methods, reference data, proof of concept implementations, and technical analysis to advance the development and productive use of information technology.

    pdf0p canon90 25-03-2013 33 4   Download

  • Many studies of system logs treat them as sources of failure events. Log analysis of system errors typically involves classifying log messages based on the preset severity level of the reported error, and on tokens and their positions in the text of the message [14] [11]. More sophisticated analysis has included the study of the statistical properties of reported failure events to localize and predict faults [15] [11] [9] and mining pat- terns from multiple log events [8].

    pdf0p nhacsihuytuan 06-04-2013 30 4   Download

  • Widespread thermal anomalies in 1997–1998, due primarily to regional effects of the El Nin˜ o–Southern Oscillation and possibly augmented by global warming, caused severe coral bleaching worldwide. Corals in all habitats alongthe Belizean barrier reef bleached as a result of elevated sea temperatures in the summer and fall of 1998, and in fore-reef habitats of the outer barrier reef and offshore platforms they showed signs of recovery in 1999. In contrast, coral populations on reefs in the central shelf lagoon died off catastrophically.

    pdf13p giamdocamnhac 06-04-2013 17 3   Download

  • Despite its importance, prior work on event causality extraction in context in the NLP litera- ture is relatively sparse. In (Girju, 2003), the au- thor used noun-verb-noun lexico-syntactic patterns to learn that “mosquitoes cause malaria”, where the cause and effect mentions are nominals and not nec- essarily event evoking words. In (Sun et al., 2007), the authors focused on detecting causality between search query pairs in temporal query logs.

    pdf14p giamdocamnhac 06-04-2013 17 3   Download

  • First we must determine what is important. Do we need all log data from every critical system in order to perform security, response, and audit? Will we need all that data at lightning speed? (Most likely, we will not.) How much data can the network and collection tool actually handle under load? What is the threshold before networks bottleneck and/or the SIEM is rendered unusable, not unlike a denial of service (DOS)? These are variables that every organization must consider as they hold SIEM to standards that best suit their operational goals....

    pdf7p giamdocamnhac 06-04-2013 22 3   Download

  • Tuyển tập các báo cáo nghiên cứu về sinh học được đăng trên tạp chí lâm nghiệp đề tài:"Analysis of log shape and internal knots in twenty Maritime pine (Pinus pinaster Ait.) stems based on visual scanning and computer aided reconstruction"

    pdf8p toshiba4 20-09-2011 28 2   Download


Đồng bộ tài khoản