The car scenario is very similar to the log analysis component of DB2 Recovery Expert. 这个汽车场景与DB2RecoveryExpert的日志分析组件非常类似。
Think of log analysis as similar to a "check diagnostics" reading in your car. 可以将日志分析想象为与汽车“检查诊断”读数类似的东西。
Other application areas include intrusion detection, web log analysis, database access patterns, and so on. 其他的应用领域还包括侵入检测、Web日志分析、数据库访问模式等等。
Now let's perform some basic log analysis tasks with the GC and Memory Visualizer. 现在让我们使用EVTK执行一些基本的日志分析任务。
Log analysis is the most popular tool for monitoring performance for checking response times and concurrency. 日志分析是最流行的性能监控工具,用于检查响应时间和并发性。
This article describes a use case scenario for the log analysis component of DB2 Recovery Expert. 本文描述了DB2RecoveryExpert的日志分析组件的一个用例场景。
Log analysis is a powerful component of DB2 Recovery Expert that helps you maintain high availability and complete control over data integrity. 日志分析是DB2RecoveryExpert的一个强大组件,可帮助您在保持数据完整性的情况下维护高可用性和完全控制。
Think of the car diagnostics check as log analysis: a way to check through all the different diagnostics the car keeps in order to figure out where the problem is. 此时可以将汽车诊断检查想象为日志分析:通过保留为车所做的所有不同诊断来找出问题所在的一种检查方法。
The logs are available as soon as one test scenario is complete and you need not wait for all scenarios to be completed for log analysis. 一旦测试场景完成您就可以得到日志了,您不需要等待所有的场景都完成以进行日志分析。
Santanghu basin by volcanic rocks of the corresponding log analysis of the characteristics of induction, the establishment of a volcanic lithology identification process. 通过对三塘湖盆地火山岩测井相应特征进行的分析归纳,建立了火山岩岩性识别流程。
Design and Implementation of Data Preprocessing in Web Log Analysis Web日志分析中数据预处理的设计与实现
The importance of designing and realizing a FTP log analysis system is stated clearly in this article from the angle of network security protection. 本文从网络安全防范的角度讲述了设计和实现一个FTP日志分析系统的重要性。
A Mixed Strategy Topic Crawler Based On Network Log Analysis 基于网络日志分析的混合策略主题爬虫
Based on the outcome of40-armed caliper log analysis, suggestions on casing failure well repairing has been put forward. 根据40臂井径测井资料解释成果,提出了对套损井检修建议。
The Study on Data Mining Algorithm and Application in Web Log Analysis 数据挖掘在Web日志分析中的应用
Sogou Query Log Analysis: Collaborative Recommendation or Personalized IR 搜索引擎日志分析:协同推荐还是个性化检索
Centralizing the implementation of security policies, log analysis and reporting is a good thing. 安全策略、日志分析与报告的中心化实现是个不错的主义。
A survey and prospect of log analysis based on clustering 基于聚类的日志分析技术综述与展望
This article provides a mixed strategy topic crawler which is based on network log analysis in order to adapt the dynamics and integrality of topic. 探讨了主题爬虫的一些关键问题,通过改进主题模型、链接分类模型的学习方法及链接分析方法来提高下载网页的主题相关度及质量。
Many web services of the library do not provide the function of log analysis and statistics. 图书馆有许多Web服务不提供日志分析和统计功能。
Data Synchronous Method Based on Snapshot Log Analysis 基于快照日志分析的数据同步方法
To enhance the flexibility and robustness of the log analysis, this paper introduces the concept of Dynamic Agent and Static Agent. 为了增强日志分析的灵活性,引入了动态Agent和静态Agent的概念。
User log analysis is important for both Web information retrieval technologies and commercial search engine algorithms. 用户行为分析是网络信息检索技术得以前进的重要基石,也是能够在商用搜索引擎中发挥重要作用的各种算法的基本出发点之一。
This paper presents an application of rough set theory for security log analysis of Linux systems. 叙述了利用粗糙集(RoughSet)理论实现的Linux系统安全日志分析方法。
First of all, based on log analysis and comparison of the acquisition approaches, we adopted Syslog-ng to obtain log data and temporary caching in the form of documents. 首先对日志采集技术进行分析和比较,采取了以Syslog-ng获取日志数据的方式和以文件形式的缓存。
By comparison with some products resembled at home and abroad, this paper describes the trends of the Log Analysis System and discusses the current problems in the log analysis system. 本文首先介绍了日志分析系统的基本概念,简要阐述了日志分析系统的重要性,并对国内外一些类似产品作了对比,分析了日志分析系统的发展趋势和目前的日志分析系统存在的问题。
How log analysis to extract useful information in a large number of log data and the inner relationship between the data information, is particularly important to analyze the intrusion. 如何对其进行日志分析,提取出大量日志数据中的有用信息和数据信息之间的内在关系对研究分析入侵行为尤为重要。
Therefore, Web log analysis is generated. Web日志分析便因此而产生。
Separate the log reader and log analysis module in the Update-Detector modules. Harmonize their communication protocols and task. 将更新检测器模块中日志读取模块与日志分析模块分开,协调好之间的通信协议,协调工作。