Mining and Modeling Database User Access Patterns
暂无分享,去创建一个
[1] Xiangji Huang,et al. A Distance-Based Algorithm for Clustering Database User Sessions , 2005, ISMIS.
[2] Xiangji Huang,et al. A Machine Learning Approach to Identifying Database Sessions Using Unlabeled Data , 2005, DaWaK.
[3] Surajit Chaudhuri,et al. Primitives for Workload Summarization and Implications for SQL , 2003, VLDB.
[4] Alan Jay Smith,et al. Characteristics of production database workloads and the TPC benchmarks , 2001, IBM Syst. J..
[5] Philip S. Yu,et al. Characterization of database access pattern for analytic prediction of buffer hit probability , 2005, The VLDB Journal.
[6] Philip S. Yu,et al. Performance Analysis of Affinity Clustering on Transaction Processing Coupling Architecture , 1994, IEEE Trans. Knowl. Data Eng..
[7] Philip S. Yu,et al. On Workload Characterization of Relational Database Environments , 1992, IEEE Trans. Software Eng..
[8] Carsten Sapia,et al. PROMISE: Predicting Query Behavior to Enable Predictive Caching Strategies for OLAP Systems , 2000, DaWaK.
[9] Frederick Jelinek,et al. Statistical methods for speech recognition , 1997 .
[10] Qingsong Yao,et al. Using User Access Patterns for Semantic Query Caching , 2003, DEXA.
[11] Xiangji Huang,et al. Applying language modeling to session identification from database trace logs , 2006, Knowledge and Information Systems.