In the Linux system,we use squid software forproxy server and then set related access strategy to check up access log to achieve network management.
在Linux系统中,应用Squid软件,实现代理服务,并设置相应的访问策略、查看访问日志,实现网络管理。
Avoid logfile overflow by using daily log queue technology ; Cope with repulsion problem of data logging and data sending.
使用日志队列技术「避免日志溢出;实现了日志和日志发送程序互斥的访问日志数据。
Abnormal click analysis in Web User Access Logs
面向用户互联网访问日志的异常点击分析
Prevent local guests group from accessing application log
限制本地来宾组访问应用程序日志
Research on User Access Pattern Based on Web Log Mining;
基于Web日志挖掘的用户访问模式研究
Mining User Traversal Patterns Based on Web Log;
基于Web日志的用户访问模式挖掘
Web Data Mining for Path Traversal Patterns;
Web日志挖掘中的用户访问模式识别
The Research of User Traversal Sequential Patterns Based on Web Log
基于Web日志的用户访问序列模式研究
Research of User Access Prediction Based on Web Log Mining
基于web日志挖掘的用户访问预测研究
Analysis of users browsing interest based on web log
基于Web日志挖掘的客户访问兴趣分析
Visited pages are stored in log files on the firewall.
访问的网页将存储在防火墙的日志文件中。
Research on the Algorithm for Mining Continuous Frequent Access Patterns from Web Logs;
Web日志中连续频繁访问路径挖掘算法研究
The Research of Mining User Traversal Patterns Based on Web Log;
基于Web日志的用户访问模式挖掘的研究
Research on the Algorithm for Mining Access Patterns from Web Logs;
从万维网日志中挖掘访问序列模式的算法研究
Data Preprocessing in Web Log Mining Based on User Access Tree
基于用户访问树的Web日志挖掘数据预处理
Extraction and Analysis of Users' Visit Paths Based on Web Log
基于Web日志的用户访问路径提取与分析
An Analysis System of User Access Behaviors Based on the Web Logs
一个基于Web日志的用户访问数据分析系统
Evaluation of access patterns from log Ontology with DL-safe rules
结合DL-safe规则的评估日志本体访问模式
Log file name {0} is invalid, or user does not have enough permission to create or access this file.
日志文件名称 {0} 无效,或者用户没有足够的权限创建或访问此文件。
CopyRight © 2020-2024 优校网[www.youxiaow.com]版权所有 All Rights Reserved. ICP备案号:浙ICP备2024058711号