A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2022; you can also visit the original URL.
The file type is application/pdf
.
Filters
Database-Less Extraction of Event Logs from Redo Logs
2021
Business Information Systems
This paper proposes a semi-automatic approach to extract an event log from redo logs alone. It does not require access to the database or knowledge of the databaseschema. ...
These techniques are applied on event logs, which need to be extracted from the organization's databases beforehand. ...
Therefore, this paper proposes database-less extraction of event logs from redo logs. ...
doi:10.52825/bis.v1i.66
fatcat:354y2e6vkrbndffdsdt5gz45ey
Connecting databases with process mining: a meta model and toolset
2018
Journal of Software and Systems Modeling
In addition, an extracted event log provides only a single view on the database. ...
Process mining techniques require event logs which, in many cases, are obtained from databases. Obtaining these event logs is not a trivial task and requires substantial domain knowledge. ...
-Events: this sector collects a set of events, obtained from any available source (database tables, redo logs, change records, system logs, etc.). ...
doi:10.1007/s10270-018-0664-7
fatcat:mo5gfylomzb6hdx3u4kiu5zp2m
Connecting Databases with Process Mining: A Meta Model and Toolset
[chapter]
2016
Lecture Notes in Business Information Processing
-Events: this sector collects a set of events, obtained from any available source (database tables, redo logs, change records, system logs, etc.). ...
The paper describes how to automatically obtain events from database systems that generate redo logs as a way to recover from failure. ...
His research interests include process mining, data extraction and transformation, data querying, automated event log building, and business process management. Hajo A. ...
doi:10.1007/978-3-319-39429-9_15
fatcat:74udkxf6kbeolallogxndrpjhi
Digital Evidence for Database Tamper Detection
2012
Journal of Information Security
Some of these storage structures, such as the datafiles, redo log files, and archived redo log files, hold actual user data; other structures, such as control files, maintain the state of the database ...
objects, and text-based alert and trace files contain logging information for both routine events and error conditions in the database. ...
Databases are excellent reporting mechanisms and LogMiner allows the analyst to use a database SQL interface to the redo logs of Oracle which are separate from the database itself. ...
doi:10.4236/jis.2012.32014
fatcat:yuj5aduldnbh3onrhjc3jyuv7u
An Optimized Method for Access of LOBs in Database Management Systems
2012
Advanced Engineering Forum
For changes in slave table data, it effectively prevents the redo log from being written into the LOB database, while diminishing the amount of changes being recording within the undo journal. ...
It attempts to use LOB slave table methods to optimize and advance the storage structures of large objects as well as optimize the redo and undo log mechanisms to increase LOB access efficiency. ...
Using this method ensures that data can be restored through the redo log in the event of a crash, and also ensures the integrity and consistency of system data. ...
doi:10.4028/www.scientific.net/aef.6-7.58
fatcat:qrqk5xn7wzfhbcdttc7tmbwplu
Extracting Event Data from Databases to Unleash Process Mining
[chapter]
2015
Management for Professionals
Starting from a class model and corresponding object models it is shown that events correspond to the creation, deletion, or modification of objects and relations. ...
Dozens (if not hundreds) of process-mining techniques are available and their value has been proven in many case studies. However, process mining stands or falls with the availability of event logs. ...
Acknowledgements This work was supported by the Basic Research Program of the National Research University Higher School of Economics (HSE) in Moscow. ...
doi:10.1007/978-3-319-14430-6_8
fatcat:3wg6qjjhfrg7zieuq677hl3iv4
Process discovery using in-database minimum self distance abstractions
2020
Proceedings of the 35th Annual ACM Symposium on Applied Computing
Furthermore, a work proposed in [6] utilized a database redo log as a means to extract events. ...
All of these work, however, only focus on event data extraction from databases, which we want to avoid. ...
doi:10.1145/3341105.3373846
dblp:conf/sac/SyamsiyahL20
fatcat:5ibvoda63na3tmzil7zj5vcn74
A Framework for Database Forensic Analysis
2012
Computer Science & Engineering An International Journal
In this research paper a framework is proposed for analyzing and reconstructing the activity of any unsuspicious behaviour within database. ...
Relational database uses auditing capabilities, which involves examination of information and operations for accuracy, legality and propriety to report risks and to make recommendations to promote sound-operating ...
It contains the collection of facts from the extracted log data/ system data. 5. ...
doi:10.5121/cseij.2012.2303
fatcat:yejl3naiqrb3hcp3tkthn2aq6y
A survey of graph-based algorithms for discovering business processes
2019
IJAIN (International Journal of Advances in Intelligent Informatics)
Those algorithms claimed that those have less time complexity because of the graph-database ability to store relationships. ...
Algorithms of process discovery help analysts to understand business processes and problems in a system by creating a process model based on a log of the system. ...
A pseudocode of constructing a graph-database based on the event log. ...
doi:10.26555/ijain.v5i2.296
fatcat:oe32uxdf7bhwhlwi7d6fczwahi
Fast-Start
2001
Proceedings of the 2001 ACM SIGMOD international conference on Management of data - SIGMOD '01
Availability requirements for database systems are more stringent than ever before with the widespread use of databases as the foundation for ebusiness. ...
This paper highlights Fast-Start TM Fault Recovery, an important availability feature in Oracle, designed to expedite recovery from unplanned outages. ...
Z and the tail of the log is equal to or less than LOG_CHECKPOINT_INTERVAL. ...
doi:10.1145/375663.375751
dblp:conf/sigmod/LahiriG01
fatcat:he7zmpmd7zgebclkgbb4tmyxpu
Fast-Start
2001
SIGMOD record
Availability requirements for database systems are more stringent than ever before with the widespread use of databases as the foundation for ebusiness. ...
This paper highlights Fast-Start TM Fault Recovery, an important availability feature in Oracle, designed to expedite recovery from unplanned outages. ...
Z and the tail of the log is equal to or less than LOG_CHECKPOINT_INTERVAL. ...
doi:10.1145/376284.375751
fatcat:ylhpgcvcpbggzdpbleotkjvdma
StarStar Models: Process Analysis on top of Databases
[article]
2018
arXiv
pre-print
The representation may be the entry point to apply advanced process mining techniques that work on classic event logs, as the model provides a simple way to retrieve a classic event log from a specified ...
This technique is able to show a multigraph representing activities inferred from database events, connected with edges that are annotated with frequency and performance information. ...
Some ways to retrieve events from databases are: -Using redo logs (see [11] ). ...
arXiv:1811.08143v1
fatcat:c2iyugtwmnexxdtaliejpzgkhi
Extracting Multiple Viewpoint Models from Relational Databases
[article]
2020
arXiv
pre-print
MVP models provide a holistic view on the process, but also allow for the extraction of classical event logs using different viewpoints. ...
We provide a toolchain allowing for the discovery of MVP models (annotated with performance and frequency information) from relational databases. ...
Some ways to retrieve events from databases are: -Using redo logs (see [29] ). ...
arXiv:2001.02562v1
fatcat:vw6lvflng5ezrjdvu45hbtzcgm
Hybrid Data Protection Framework to Enhance A2O Functionality in Production Database Virtualization
2020
International journal of recent technology and engineering
and accidental RS2F events. ...
The reliability of aDG Redo is flexible across not only standby databases but also primary sites running different operating system over diverse hardware platforms. ...
Redo logs are created for standby as per recommendation of Oracle. It is de facto standard redo log file are one less than the standby redo logs. ...
doi:10.35940/ijrte.f1203.038620
fatcat:5yl55irk2ff5pkjxo26vxztr2u
Improving efficiency for discovering business processes containing invisible tasks in non-free choice
2021
Journal of Big Data
Graph database gains highest storing computing time of batch event logs; however, this database obtains low storing computing time of streaming event logs. ...
The event log records sequences of activities, so the rules of $$\alpha ^{\$ }$$ α $ check the combination of invisible task within non-free choice. ...
The event log needs to be extracted from the database in the form of .csv. ...
doi:10.1186/s40537-021-00487-x
fatcat:z46gs5jxwrdwnlyyuwaypjdekm
« Previous
Showing results 1 — 15 out of 2,113 results