共 50 条
- [42] Mining Business Process Stages from Event Logs [J]. ADVANCED INFORMATION SYSTEMS ENGINEERING (CAISE 2017), 2017, 10253 : 577 - 594
- [43] Mining Business Process Activities from Email Logs [J]. 2017 IEEE 1ST INTERNATIONAL CONFERENCE ON COGNITIVE COMPUTING (ICCC 2017), 2017, : 112 - 119
- [44] Large Scale Anomaly Detection in Data Center Logs and Metrics [J]. ECSA 2018: PROCEEDINGS OF THE 12TH EUROPEAN CONFERENCE ON SOFTWARE ARCHITECTURE: COMPANION PROCEEDINGS, 2018,
- [48] How to Configure Masked Event Anomaly Detection on Software Logs? [J]. 2022 IEEE INTERNATIONAL CONFERENCE ON SOFTWARE MAINTENANCE AND EVOLUTION (ICSME 2022), 2022, : 414 - 418
- [49] Memetic Algorithms for Mining Change Logs in Process Choreographies [J]. SERVICE-ORIENTED COMPUTING, ICSOC 2014, 2014, 8831 : 47 - 62
- [50] Anomaly Detection on System Generated Logs-A Survey Study [J]. MOBILE COMPUTING AND SUSTAINABLE INFORMATICS, 2022, 68 : 779 - 793