نتایج جستجو برای: based logging systems
تعداد نتایج: 3741169 فیلتر نتایج به سال:
Sender-based message logging can considerably lower high failure-free overhead of receiver-based message logging resulting from synchronously logging each message into stable storage by using volatile memory of its sender as storage for logging. This beneficial feature can be obtained at the expense of extra communication costs required for allowing message senders to get receive sequence numbe...
Causal message logging is an efficient approach for tolerating failures of processes in distributed systems because it has the advantages of both pessimistic and optimistic message logging approach. However, traditional causal message logging protocols prevent live processes from executing continuously their computation and require some synchronous logging to the stable storage during recovery....
Shear and Compressional Wave Velocities along with other Petrophysical Logs, are considered as upmost important data for Hydrocarbon reservoirs characterization. Shear Wave Velocity (Vs) in Well Logging is commonly measured by some sort of Dipole Logging Tools, which are able to acquire Shear Waves as well as Compressional Waves such as Sonic Scanner, DSI (Dipole Shear Sonic imager) by Schlumbe...
At present, mud pulse transmission systems are widely used in downhole data transmission. But the systems are very low in transmission efficiency, only 5 10 bits/s, with very large anti-inter-symbol-interference (ISI). It cannot meet high requirements for high-speed transmission of modern logging system. The development of communication technology has laid some foundation for this requirement. ...
Enterprise Resource Planning (ERP) systems are widely used but notoriously difficult to learn and master. The authors propose that a database approach to representing the system’s tasks, interface components, and usage logs in conjunction with the ERP domain data can serve as a foundation for improving system usability. The framework the authors designed supports automatic logging of user-syste...
abstract type-ii fuzzy logic has shown its superiority over traditional fuzzy logic when dealing with uncertainty. type-ii fuzzy logic controllers are however newer and more promising approaches that have been recently applied to various fields due to their significant contribution especially when the noise (as an important instance of uncertainty) emerges. during the design of type- i fuz...
Manetho is a new transparent rollback recovery protocol for long running distributed computations It uses a novel combination of antecedence graph maintenance unco ordinated checkpointing and sender based message logging Manetho simultaneously achieves the advantages of pessimistic message logging namely limited rollback and fast output commit and the advantage of optimistic message logging nam...
In the existing Fault-Tolerant Software Distributed Shared Memory (FT-SDSM) with the message logging, the logs are used only to recover the failed nodes. In our previous work, we have implemented a lightweight logging protocol, called remote logging, on the SDSM for fault tolerance, which incurs low logging overhead with a fast network and a remote memory for back-up data. In this paper, we pro...
Most operating systems services generate log files that can be used for debugging and supervision. One important function of log files is logging security related or debug information, for example logging unsuccessful authentication or error logging. This paper shows how to implement an anomaly detection process of web server’s unexpected events using the the Apache web server’s logs and applyi...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید