• No results found

event logs

An Alignment Method for Multi attributes Event Logs

An Alignment Method for Multi attributes Event Logs

... Alignment is an important part in process mining. And many methods are proposed to discuss how to align a process model and its event logs. But it is coarse in process alignment when each activity has only ...

6

Extracting Windows event logs using memory forensics

Extracting Windows event logs using memory forensics

... the event logs and the information that they ...Windows event logs in the more recent releases (Windows Vista, Windows 7 and Windows 8), will alleviate the burden of having to rely on software ...

35

Towards the Development of Intelligent Agent for Novice C/C++ Programmers through Affective Analysis of Event Logs

Towards the Development of Intelligent Agent for Novice C/C++ Programmers through Affective Analysis of Event Logs

... Students Affect and Behavior using High and Low Fidelity Replay..[r] ...

8

Enhancement in process mining : guideline for process owner and process analyst

Enhancement in process mining : guideline for process owner and process analyst

... existing logs and facilitating process model ...and event log into model fragments and sub-logs, then selectively repair the ...the event log. In a case where the recorded event ...

88

Robust Process Discovery with Artificial Negative Events

Robust Process Discovery with Artificial Negative Events

... plete event logs and the inclusion of prior ...incomplete event logs that diminishes the effects of concurrent and recurrent behavior on the generation of artificial negative ...negative ...

36

SECRET DATA HIDING BY OPTIMIZING GENERAL SMOOTHNESS DIFFERENCE EXPANSION BASED 
METHOD

SECRET DATA HIDING BY OPTIMIZING GENERAL SMOOTHNESS DIFFERENCE EXPANSION BASED METHOD

... [8]. Event logs may store additional information about events, such as the resource (person or device) executing or initiating the activity, the timestamp of the event, or data elements recorded with ...

8

Business process discovery through conversation log analysis in pluralist and coercive problem contexts

Business process discovery through conversation log analysis in pluralist and coercive problem contexts

... to event logs which could then be used for process ...structured logs), or for the part of the business processes that are being executed using simple email ...system logs: ...

223

A SURVEY ON FAILURE PREDICTION METHODS

A SURVEY ON FAILURE PREDICTION METHODS

... Liang et al. [19] predict failures of IBM’s BlueGene/L from event logs containing reliability, availability and serviceability data. They use temporal and spatial compression. Temporal compression includes ...

5

A NEW SOFT SET BASED PRUNING ALGORITHM FOR ENSEMBLE METHOD

A NEW SOFT SET BASED PRUNING ALGORITHM FOR ENSEMBLE METHOD

... from event data[3] readily available in current information ...extract event logs from data sources (e.g., databases, business logs, audit trails, ...etc.). Event logs mainly ...

6

Process mining in programming game logs to differentiate between skill levels

Process mining in programming game logs to differentiate between skill levels

... Many people play games, they do it to relax or to experi- ence the euphoria when they beat something ’impossible’. Some games, however, are made for you to test your skill in a certain profession. They have difficulty ...

7

PharmApps: An Integrated Compound Management
System for Tracking Compound Replicating and Usage
in High Throughput Screens

PharmApps: An Integrated Compound Management System for Tracking Compound Replicating and Usage in High Throughput Screens

... the event logs, there is a real-time, accurate and reliable way of knowing how and when the dispensing was done as well as the equipment used (see Application module 3 in Materials and Methods ...

11

Hardening Windows, 2nd Ed  pdf

Hardening Windows, 2nd Ed pdf

... Chapter 11: Security Auditing and Event Logs The key auditing strategies for this chapter for Windows 2000, XP, and Server 2003 users are as follows: • Logon and logoff events, which can[r] ...

217

EMBEDDING RАPIDMINER MODELS IN JAVA CODE

EMBEDDING RАPIDMINER MODELS IN JAVA CODE

... are event logs, while the supporting input are reference process ...models. Event logs would be processed in process discovery, which results in the real process ...

8

Network Administrator Street Smarts   A Real World Guide to CompTIA Network+ Skills pdf

Network Administrator Street Smarts A Real World Guide to CompTIA Network+ Skills pdf

... Task 4.9: Using a Protocol Analyzer Scenario Scope of Task Procedure Criteria for Completion Task 4.10: Displaying Computer Event Logs Scenario Scope of Task Procedure Criteria for Compl[r] ...

362

Process Modelling from Insurance Event Log

Process Modelling from Insurance Event Log

... Discovery: Traditionally, process mining has been focusing on discovery i.e., deriving information about the organization context, and execution properties from enactment logs. An example of a technique addressing ...

5

WINDOWS SYSINTERNALS ADMINISTRATOR'S REFERENCE pdf

WINDOWS SYSINTERNALS ADMINISTRATOR'S REFERENCE pdf

... Windows Attachment Execution Service, alternate data stream, 8–9 Windows desktop objects, 318–319 Windows event logs, displaying records, 192–196 Windows Explorer, autostart entries, 155[r] ...

497

Systematically recognizing potential process-related threats in SCBDA

Systematically recognizing potential process-related threats in SCBDA

... SCBDA event logs provide a complete high-level view on the industrial process that is continuous over time and captures information about user activities, system changes in the field as well as system ...

7

Detecting Complex Control Flow Constructs for Choosing Process Discovery Techniques

Detecting Complex Control Flow Constructs for Choosing Process Discovery Techniques

... Abstract— Process models are the analytical illustration of an organization’s activity. They are very primordial to map out the current business process of an organization, build a baseline of process enhancement and ...

5

An approach to business process simulation using mined probabilistic models

An approach to business process simulation using mined probabilistic models

... from event logs has not been researched ...discrete event simulation model [16], but the discovered simulation models do not include complex data and ...

20

Apress Pro Windows Small Business Server 2003 Jul 2006 HAPPY NEW YEAR pdf

Apress Pro Windows Small Business Server 2003 Jul 2006 HAPPY NEW YEAR pdf

... diagnosing system problems using the source, event ID and error category, 407–408 diagnosing system problems with Task Manager, 413 event types recordable in Windows event logs, 401 exam[r] ...

479

Show all 7650 documents...

Related subjects