{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T22:22:13Z","timestamp":1743114133671,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":16,"publisher":"Springer Singapore","isbn-type":[{"type":"print","value":"9789814585170"},{"type":"electronic","value":"9789814585187"}],"license":[{"start":{"date-parts":[[2013,12,15]],"date-time":"2013-12-15T00:00:00Z","timestamp":1387065600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2013,12,15]],"date-time":"2013-12-15T00:00:00Z","timestamp":1387065600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-981-4585-18-7_1","type":"book-chapter","created":{"date-parts":[[2013,12,14]],"date-time":"2013-12-14T06:28:37Z","timestamp":1387002517000},"page":"3-11","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["A Log File Analysis Technique Using Binary-Based Approach"],"prefix":"10.1007","author":[{"given":"Sallam Osman","family":"Fageeri","sequence":"first","affiliation":[]},{"given":"Rohiza","family":"Ahmad","sequence":"additional","affiliation":[]},{"given":"Baharum","family":"Baharum","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2013,12,15]]},"reference":[{"key":"1_CR1","doi-asserted-by":"crossref","unstructured":"Nagappan, M., Robinson, B.: Creating Operational Profiles of Software Systems by Transforming their Log Files to Directed Cyclic Graphs. In: Proceedings of the 6th International Workshop on Traceability in Emerging Forms of Software Engineering, pp. 54\u201357. ACM, New York, NY, USA (2011).","DOI":"10.1145\/1987856.1987869"},{"key":"1_CR2","doi-asserted-by":"crossref","unstructured":"Fronza, G.I., Sillitti, A.: Failure Prediction based on Log Files using Random Indexing and Support Vector Machines. Journal of System and Software, Elsevier B.V. (2012).","DOI":"10.1016\/j.jss.2012.06.025"},{"key":"1_CR3","doi-asserted-by":"crossref","unstructured":"Gao, L., Zhang, Z., Towsley, D.: Catching and Selective Catching: Efficient Latency Reduction Techniques for Delivering Continuous Multimedia Streams. In: Proc. 1999 ACM Multimedia Conf, pp. 203\u2013206. ACM, NY, USA (1999).","DOI":"10.1145\/319463.319603"},{"key":"1_CR4","doi-asserted-by":"crossref","unstructured":"Jeswani, D., Gupta, M., De, P., Malani, A., Bellur, U.: Minimizing Latency in Serving Requests through Differential Template Caching in a Cloud. In: Proc. 2012 IEEE Fifth International Conference on Cloud Computing, pp. 269\u2013276. IEEE (2012).","DOI":"10.1109\/CLOUD.2012.17"},{"key":"1_CR5","doi-asserted-by":"crossref","unstructured":"Sharifi, A., Kultursay, E., Kandemir, M., Das, C.R.: Addressing End-to-End Memory Access Latency in NoC-Based Multicores. In: Proc. MICRO \u201812 Proceedings of the 2012 45th Annual IEEE\/ACM International Symposium on Microarchitecture, pp. 294\u2013304. IEEE Computer Society\u00a0Washington DC, USA (2012).","DOI":"10.1109\/MICRO.2012.35"},{"key":"1_CR6","doi-asserted-by":"crossref","unstructured":"Murayama, D., Oota, N., Suzuki, K-I., Yoshimoto, N.: Low-Latency Dynamic Bandwidth Allocation for 100\u00a0km Long-Reach EPONs. Journal of Optical Communications and Networking, vol. 5, no. 1, p. 48 (2012).","DOI":"10.1364\/JOCN.5.000048"},{"key":"1_CR7","unstructured":"Yu, X.: A Novel Approach to Mining Access Patterns. In: Proc. 3rd International Conference on Awareness Science and Technology (iCAST), pp.350-355. IEEE, (2011)."},{"key":"1_CR8","unstructured":"Agrawal, R.: Fast Algorithms for Mining Association Rules. In: Proc. 20th Int. Conf. Very Large Data Bases (VLDB), vol. 1215, pp. 1\u201332 (1994)."},{"key":"1_CR9","unstructured":"Wahab, M. H. A., Mohd, M. N. H., Hanafi, H. F., & Mohsin, M. F. M. : Data Pre-processing on Web Server Logs for Generalized Association Rules Mining Algorithm. World Academy of Science, Engineering and Technology, vol. 48 (2008)."},{"key":"1_CR10","unstructured":"Suneetha, K. R.: Identifying User Behavior by Analyzing Web Server Access Log File. IJCSNS International Journal of Computer Science and Network Security, vol. 9, no. 4, pp. 327\u2013332 (2009)."},{"key":"1_CR11","unstructured":"Stermsek, G., Strembeck, M., Neumann, G.: A User Profile Derivation Approach based on Log-File Analysis. In: Proc. of IKE, pp. 258\u2013264 (2007)."},{"key":"1_CR12","doi-asserted-by":"crossref","unstructured":"Ilayaraja, M.: Mining Medical Data to Identify Frequent Diseases using Apriori Algorithm. In: Proceedings of the 2013 International Conference on Pattern Recognition, Informatics and Mobile Engineering, pp. 194\u2013199. IEEE (2013).","DOI":"10.1109\/ICPRIME.2013.6496471"},{"key":"1_CR13","unstructured":"Singh, J., Ram, H.: Improving Efficiency of Apriori Algorithm Using Transaction Reduction. International Journal of Scientific and Research Publications, vol. 3, no. 1, pp. 1\u20134. (2013)."},{"key":"1_CR14","doi-asserted-by":"crossref","unstructured":"Luan, R., Sun, S., Zhang, J., Yu, F., Zhang, Q.: A Dynamic Improved Apriori Algorithm and its Experiments in Web Log Mining. In: 2012 9th International Conference on Fuzzy Systems and Knowledge Discovery, pp. 1261\u20131264. IEEE (2012).","DOI":"10.1109\/FSKD.2012.6234032"},{"key":"1_CR15","unstructured":"Mishra, R.: Discovery of Frequent Patterns from Web Log Data by using FP-Growth algorithm for Web Usage Mining. International Journal of Advanced Research in Computer Science and Software Engineering, vol. 2, no. 9, pp. 311\u2013318. IJARCSSE, India (2012)."},{"key":"1_CR16","doi-asserted-by":"crossref","unstructured":"Vyas, Z.V., Ganatra, A.P., Kosta, Y.P., Bhesadadia, C.K.: Modified RAAT (Reduced Apriori Algorithm Using Tag) for Efficiency Improvement with EP(Emerging Patterns) and JEP(Jumping EP). In: Proc. 2010 International Conference on Advances in Computer Engineering, pp. 238\u2013240. IEEE (2010).","DOI":"10.1109\/ACE.2010.92"}],"container-title":["Lecture Notes in Electrical Engineering","Proceedings of the First International Conference on Advanced Data and Information Engineering (DaEng-2013)"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-4585-18-7_1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,19]],"date-time":"2023-02-19T21:16:01Z","timestamp":1676841361000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-4585-18-7_1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,12,15]]},"ISBN":["9789814585170","9789814585187"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-981-4585-18-7_1","relation":{},"ISSN":["1876-1100","1876-1119"],"issn-type":[{"type":"print","value":"1876-1100"},{"type":"electronic","value":"1876-1119"}],"subject":[],"published":{"date-parts":[[2013,12,15]]},"assertion":[{"value":"15 December 2013","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}