Filters








37,765 Hits in 8.8 sec

Automatic Practice Logging: Introduction, Dataset & Preliminary Study

R. Michael Winters, Siddharth Gururani, Alexander Lerch
2016 Zenodo  
CONCLUSION This paper has presented current efforts towards Automatic Practice Logging (APL) including an annotated dataset, and a preliminary approach to identification.  ...  PRELIMINARY STUDY Problem Formulation As discussed in Sect. 4, we separate the APL task for repertoire practice into two primary components: 1) recognition of which repertoire piece is being practiced  ... 
doi:10.5281/zenodo.1416223 fatcat:3ksscqtmvvgwjgwd7j62nkzov4

Automatic Zig-Zag sampling in practice [article]

Alice Corbella, Simon E F Spencer, Gareth O Roberts
2022 arXiv   pre-print
Nevertheless, practice has not caught up with the theory in this field, and the use of PDMPs to solve applied problems is not widespread.  ...  Lastly, we demonstrate that the super-efficiency property, i.e. the ability to draw one independent sample at a lesser cost than evaluating the likelihood of all the data, can be obtained in practice.  ...  The power of super-efficiency in this context has been demonstrated in practice on the analysis of a large dataset.  ... 
arXiv:2206.11410v2 fatcat:6mx4kfkzinam3fs2g2pcjfimsu

Efficient Online Log Parsing with Log Punctuations Signature

Shijie Zhang, Gang Wu
2021 Applied Sciences  
We evaluated LogPunk on 16 public datasets from the LogHub comparing with five other log parsers. LogPunk achieves the best parsing accuracy of 91.9%.  ...  In this paper, we propose LogPunk, an efficient online log parsing method. The core of LogPunk is a novel log signature method based on log punctuations and length features.  ...  Introduction Logging is the practice of recording events that provides information about the system running status and execution paths.  ... 
doi:10.3390/app112411974 fatcat:dq7lxnbpnvfw5pbgh5qju6vbqe

Timely-Automatic Procedure for Estimating the Endocardial Limits of the Left Ventricle Assessed Echocardiographically in Clinical Practice

Darian M. Onchis, Codruta Istin, Cristina Tudoran, Mariana Tudoran, Pedro Real
2020 Diagnostics  
The half-response spatial frequency bandwidth b in octaves of a Gabor filter is related to the ratio σ/λ: b = log 2 (σ/λ)π + log 2/2 (σ/λ)π − log 2/2 (7) σ λ = (1/π) log 2/2 2 b + 1 2 b − 1 . (8) The value  ...  Introduction In clinical cardiology, echocardiography has become nowadays one of the most employed diagnostic procedures [1, 2] .  ... 
doi:10.3390/diagnostics10010040 pmid:31941079 fatcat:oxbq2frp5rgwfaugnewf5w5xwu

Studying and detecting log-related issues

Mehran Hassani, Weiyi Shang, Emad Shihab, Nikolaos Tsantalis
2018 Empirical Software Engineering  
Studying and Detecting Log-related Issues Mehran Hassani Logs capture valuable information throughout the execution of software systems.  ...  In this paper, we first perform an empirical study on log-related issues in two large-scale, open-source software systems.  ...  They started with a preliminary empirical study on the use of log levels in the studied subject systems.  ... 
doi:10.1007/s10664-018-9603-z fatcat:sqajfkewl5do5hum27oz7ve7ui

Log-based software monitoring: a systematic mapping study [article]

Jeanderson Barros Cândido, Maurício Finavaro Aniche, Arie van Deursen
2021 arXiv   pre-print
log recommendation but further investigation is required to assess the usability of those tools in practice, (3) few studies approached efficient persistence of log data, and (4) there are open opportunities  ...  A holistic view of the research effort on logging practices and automated log analysis is key to provide directions and disseminate the state-of-the-art for technology transfer.  ...  They focused their analysis on studies addressing development practices of logging.  ... 
arXiv:1912.05878v4 fatcat:snoe2wu5k5f4hfdisor3d7w3mq

Log-based software monitoring: a systematic mapping study

Jeanderson Cândido, Maurício Aniche, Arie van Deursen
2021 PeerJ Computer Science  
log recommendation but further investigation is required to assess the usability of those tools in practice, (3) few studies approached efficient persistence of log data, and (4) there are open opportunities  ...  A holistic view of the research effort on logging practices and automated log analysis is key to provide directions and disseminate the state-of-the-art for technology transfer.  ...  They focused their analysis on studies addressing development practices of logging.  ... 
doi:10.7717/peerj-cs.489 pmid:34013028 pmcid:PMC8114802 fatcat:5bdwnmqhv5atrntvwo3wi4n3ey

Healthcare Event and Activity Logging

Carlos Torres, Jeffrey C. Fried, B. S. Manjunath
2018 IEEE Journal of Translational Engineering in Health and Medicine  
This paper introduces healthcare event and action logging (HEAL) which automatically and unobtrusively monitors and reports on events and activities that occur in a medical ICU room.  ...  INTRODUCTION Effective healthcare is at the core of national debate.  ...  , while maintaining the privacy of patients and staff. • Semantic healthcare logs that can be used to analyze the spread of pathogens and HAIs by physical contact. • A platform to evaluate best practices  ... 
doi:10.1109/jtehm.2018.2863386 pmid:30324035 pmcid:PMC6175513 fatcat:hu2aiht3ffhttesqtqwteiubee

Log-sum-exp neural networks and posynomial models for convex and log-log-convex data [article]

Giuseppe C. Calafiore, Stephane Gaubert, Corrado Possieri
2018 arXiv   pre-print
Under a suitable exponential transformation, the class of LSET functions maps to a family of generalized posynomials GPOST, which we similarly show to be universal approximators for log-log-convex functions  ...  Such a network represents a family of scaled log-sum exponential functions, here named LSET.  ...  INTRODUCTION A.  ... 
arXiv:1806.07850v2 fatcat:kkkrjxndnfcabiqs66h5i4ubvu

DATA MINING TECHNIQUES WITH WEB LOG: A REVIEW

Karuna Nidhi Pandagre
2017 International Journal of Advanced Research in Computer Science  
Web mining is the use of data mining techniques to automatically discover and extract information from web data, including web documents, hyperlinks between documents, usage logs of web sites, etc.  ...  INTRODUCTION With the introduction of World Wide Web, explosive growth of information has been observed along with the increase in internet commerce.  ...  Shipra and Pandey [10] explained in detail on the studies conducted as well as analysis of each web content mining techniques.  ... 
doi:10.26483/ijarcs.v8i7.4294 fatcat:yl3w2huh2nfpvbr6ou53mb2tne

Deep Log-Likelihood Ratio Quantization [article]

Marius Arvinte, Ahmed H. Tewfik, Sriram Vishwanath
2021 arXiv   pre-print
A deep autoencoder network is trained to compress, quantize and reconstruct the bit log-likelihood ratios corresponding to a single transmitted symbol.  ...  In this work, a deep learning-based method for log-likelihood ratio (LLR) lossy compression and quantization is proposed, with emphasis on a single-input single-output uncorrelated fading communication  ...  Since practical systems are often memory-limited, quantizing either channel observations or derived information, such as log-likelihood ratios, using as few bits as possible is of critical importance.  ... 
arXiv:1903.04656v3 fatcat:bhmyf7vorffh7np6zespycst5a

Tree Log Identity Matching using Convolutional Correlation Networks

Mikko Vihlman, Jakke Kulovesi, Arto Visala
2019 2019 Digital Image Computing: Techniques and Applications (DICTA)  
The best architecture identifies correctly 99% of the test logs in the spruce dataset and 97% of the test logs in the pine dataset.  ...  The performance of the network is evaluated with two large datasets, containing either spruce or pine logs.  ...  Teppo Salmi, and other parties of the LogID project for useful discussions and for providing the dataset of tree logs.  ... 
doi:10.1109/dicta47822.2019.8945865 dblp:conf/dicta/VihlmanKV19 fatcat:sa4e2nmmonb4zc7vjyd5cv64ru

A2Log: Attentive Augmented Log Anomaly Detection [article]

Thorsten Wittkopp, Alexander Acker, Sasho Nedelkoski, Jasmin Bogatinovski, Dominik Scheinert, Wu Fan, Odej Kao
2021 arXiv   pre-print
The method is evaluated on three publicly available datasets and one industry dataset. We show that our approach outperforms existing methods.  ...  As log lines record events during the execution of IT services, they are a primary source for diagnostics.  ...  Prior to that, we briefly introduce the necessary preliminaries.  ... 
arXiv:2109.09537v1 fatcat:pmr3tklqnfh5plemvtt6xpb5lu

Examining the stability of logging statements

Suhas Kabinna, Cor-Paul Bezemer, Weiyi Shang, Mark D. Syer, Ahmed E. Hassan
2017 Empirical Software Engineering  
The median number of days between the introduction of a logging statement and the first change to that statement is between 1 and 17 in our studied applications.  ...  We find that file ownership, developer experience, log density and SLOC are important metrics in our studied projects for determining the stability of logging statements in both our random forest classifiers  ...  Our preliminary study finds that 20-45% of the logging statements are changed at least once during their lifetime in the studied applications.  ... 
doi:10.1007/s10664-017-9518-0 fatcat:b76s4yncdjd7ndnuyjqi7ze7yu

Protocol Discovery from Imperfect Service Interaction Logs

H.R. Motahari-Nezhad, R. Saint-Paul, B. Benatallah, F. Casati
2007 2007 IEEE 23rd International Conference on Data Engineering  
In practice, conversation logs are imperfect for three reasons.  ...  Discovering Protocols from Imperfect Logs The protocol discovery approach we propose has two stages: i) analyzing the log to automatically estimate which conversations are noisy, and ii) deriving a protocol  ... 
doi:10.1109/icde.2007.369022 dblp:conf/icde/Motahari-NezhadSBC07 fatcat:lhpqyzvbyvhxre2awvxfjjiibm
« Previous Showing results 1 — 15 out of 37,765 results