The more information in the log, the more powerful the data mining you can achieve.
日志中的信息越多,您所能实现数据挖掘就越强有力。
Can also be used to log messages for audit or for subsequent data mining.
还可以用于将消息记入日志,以供审核和后续数据挖掘之用。
If you enable content tracing for a process, a data flow, or a mining flow, UIMA logs of level CONFIG and above are routed to the InfoSphere Warehousing log.
如果您对流程、数据流或挖掘流启用内容跟踪,那么CONFIG级别和该级别以上的UIMA日志将路由到InfoSphereWarehousing日志。
However, as the amount of the log audit date is too large, we can apply data mining technology into security mode rule extraction.
但由于这些日志审计数据量非常庞大,因此采用数据挖掘技术从中进行安全模式规则的提取。
The beginning of workflow mining is to collect and format the workflow log.
工作流挖掘的起点是收集和处理工作流日志。
During the recent years, with the rapid development of Web data mining, how to find useful information in search engine log query has become an important research direction.
近年来,随着网络数据挖掘技术的迅猛发展,如何从搜索引擎查询日志中找到有用的信息成为一个重要的研究方向。
This System is the first personality information system using TRIP system's query log for web mining at home.
本系统是国内第一个针对TRIP系统的文献日志进行挖掘的个性化信息服务系统。
An incremental mining technique is proposed in order to solve the problem of frequent updating of moving log database and mine the user mobility patterns.
该文主要对移动日志数据库不断更新的问题,提出了增量挖掘的方法,挖掘用户的移动模式。
Query log is a record of query behavior by a great quantity of users, it can Fred the related word list through mining the relation between query and query log, thus to realize the query extension.
用户查询日志是大量用户长期查询行为的记录,通过挖掘用户查询与用户日志之间的联系,构建相关词表,从而实现查询扩展。
Web log mining was introduced, and the application of it to electronic commerce analyzed, to direct organizing and reallocateiori resources of electronic commerce sites.
首先介绍日志挖掘,然后分析了日志挖掘在电子商务领域的应用,从而指导电子商务网站资源的组织和分配。
Workflow mining is a technique that reconstructs process model on the basis of workflow log. This method is used to identify roles, so that the role identification can be as objective as possible.
工作流挖掘技术是从工作流日志重构流程模型的方法,可以作为识别角色的方法,以尽量减少主观性的影响。
By extracting information from workflow traces, such as system log data, workflow mining aims to discover the actual behavior of a workflow process.
工作流挖掘抽取系统日志信息,挖掘流程的真实运作模型。
This paper studies the mechanism of mining web log, proposes a method of mining user browsing patterns, at last it presents a effective algorithms of mining traversal path patterns.
提出了通过访问路径挖掘来分析用户测览模式的方法,并实现了一种有效的访问路径模式挖掘算法。
Data mining techniques can deal with a great deal of data from log audit and network, and get intrusion mode.
数据发掘要领可以处理赏罚复杂的日记审计和收集数据,并能更快地提取入侵模式。
In the system, we get the hidden information by on-line or off-line analyzing the data in user log. According to the result of data mining, the performance of system is Evaluated.
并且对用户日志数据通过离线或在线的方式进行分析,得到用户的培训效果,以此分析评价系统性能。
So the article presents the new architecture of Enterprise Security Management Center based on log mining which is distributed and supports multi-protocol. It is extensible, reusable and migratory.
为此,本文对企业安全管理方法和机制进行了研究,提出了一种新型的、分布式的、支持多种协议的企业安全管理框架,即基于日志挖掘的企业安全管理中心。
Web log data mining algorithm phase.
挖掘算法阶段。
Web log data mining algorithm phase.
挖掘算法阶段。
应用推荐