International audienceIn our rapidly evolving society, every corporation is trying to improve its competitiveness by refactoring and improving some - if not all - of its industrial software infrastructure. This goes from mainframe applications that actually handle the company’s profit generating material, to the internal desktop applications used to manage these application servers. These applications often have extended activity logging features that notify the administrators of every event encounter at runtime. Unfortunately, the standalone nature of the event logging sources renders the correlation of log event infrastructure prone to “continuous queries”. This paper describes an approach that “adapts and employs continues queries” for ...
The focus of the research described in this paper is on the nature of the event information provided...
Event log processing and analysis play a key role in applica-tions ranging from security management,...
Process discovery algorithms aim to capture process orchestration models from event logs. These algo...
International audienceIn our rapidly evolving society, every corporation is trying to improve its co...
International audienceIn our rapidly evolving societies, every corporate is trying toimprove its com...
Abstract—This paper presents a methodology and a system, named LogMaster, for mining correlations of...
Complex Event Processing (CEP) is the method of choice for the observation of system states and situ...
Today's fault management is characterized by inefficient event management. The events delivered...
Event correlation plays a crucial role in network management systems, helping to reduce the amount o...
Log analysis is an important way to keep track of computers and networks. The use of automated anal-...
Abstract: Business process execution generates great amounts of information on process results and i...
Abstract—Due to the availability of virtualization technolo-gies and related cloud infrastructures, ...
peer-reviewedWe present an approach and implementation for run-time correlation of large volumes of...
Event correlation is a cornerstone for process discovery over event logs crossing multiple data sour...
The volume of data related to business process execution is increasing significantly in the enterpri...
The focus of the research described in this paper is on the nature of the event information provided...
Event log processing and analysis play a key role in applica-tions ranging from security management,...
Process discovery algorithms aim to capture process orchestration models from event logs. These algo...
International audienceIn our rapidly evolving society, every corporation is trying to improve its co...
International audienceIn our rapidly evolving societies, every corporate is trying toimprove its com...
Abstract—This paper presents a methodology and a system, named LogMaster, for mining correlations of...
Complex Event Processing (CEP) is the method of choice for the observation of system states and situ...
Today's fault management is characterized by inefficient event management. The events delivered...
Event correlation plays a crucial role in network management systems, helping to reduce the amount o...
Log analysis is an important way to keep track of computers and networks. The use of automated anal-...
Abstract: Business process execution generates great amounts of information on process results and i...
Abstract—Due to the availability of virtualization technolo-gies and related cloud infrastructures, ...
peer-reviewedWe present an approach and implementation for run-time correlation of large volumes of...
Event correlation is a cornerstone for process discovery over event logs crossing multiple data sour...
The volume of data related to business process execution is increasing significantly in the enterpri...
The focus of the research described in this paper is on the nature of the event information provided...
Event log processing and analysis play a key role in applica-tions ranging from security management,...
Process discovery algorithms aim to capture process orchestration models from event logs. These algo...