نتایج جستجو برای: logging data

تعداد نتایج: 2414588  

Journal: :Science 2006
D C Donato J B Fontaine J L Campbell W D Robinson J B Kauffman B E Law

We present data from a study of early conifer regeneration and fuel loads after the 2002 Biscuit Fire, Oregon, USA, with and without postfire logging. Natural conifer regeneration was abundant after the high-severity fire. Postfire logging reduced median regeneration density by 71%, significantly increased downed woody fuels, and thus increased short-term fire risk. Additional reduction of fuel...

2000
Jinsong Shen Yutaka Sasaki Keisuke Ushijima

There is low resistivity contrast between reservoir zone and host formation in geothermal fields, especially in areas where the technique of water injection is being carried out. Therefore, in low contrast area, permittivity can be one of the important reservoir indicators besides resistivity. In this study, one EM tomography method of reconstructing the resistivity and permittivity from electr...

Journal: :Journal of Petroleum Exploration and Production Technology 2016

2009
Ralf Bierig Jacek Gwizdka Michael J. Cole

This paper describes an experiment system framework that enables researchers to design and conduct task-based experiments for Interactive Information Retrieval (IIR). The primary focus is on multidimensional logging to obtain rich behavioral data from participants. We summarize initial experiences and highlight the benefits of multidimensional data logging within the system framework.

Journal: :Parallel Computing 2002
Taesoon Park Inseon Lee Heon Young Yeom

This paper presents a causal logging scheme for the lazy release consistent distributed shared memory systems. Causal logging is a very attractive approach to provide the fault tolerance for the distributed systems, since it eliminates the need of stable logging. However, since inter-process dependency must causally be transferred with the normal messages, the excessive message overhead has bee...

Journal: :Int. J. Web Service Res. 2010
Christoph Ringelstein Steffen Staab

Service-oriented systems facilitate business workflows to span multiple organizations (e.g., by means of Web services). As a side effect, data may be more easily transferred over organizational boundaries. Thus, privacy issues arise. At the same time, there are personal, business and legal requirements for protecting privacy and IPR and allowing customers to request information about how and by...

1996
Galen C. Hunt Michael L. Scott

We present a peer logging system for reducing performance overhead in fault-tolerant distributed shared memory systems. Our system provides fault-tolerant shared memory using individual checkpointing and rollback. Peer logging logs DSM modification messages to remote nodes instead of to local disks. We present results for implementations of our fault-tolerant technique using simulations of both...

2012
Jinho Ahn

Among a lot of rollback-recovery protocols developed for providing fault-tolerance for long-running distributed applications, sender-based message logging with checkpointing is one of the most lightweight fault-tolerance techniques to be capable of being applied in this field, significantly decreasing high failure-free overhead of synchronous logging by using message sender's volatile memory as...

2014
Matt Finer Clinton N. Jenkins Melissa A. Blue Sky Justin Pine

The Peruvian Amazon is an important arena in global efforts to promote sustainable logging in the tropics. Despite recent efforts to achieve sustainability, such as provisions in the US-Peru Trade Promotion Agreement, illegal logging continues to plague the region. We present evidence that Peru's legal logging concession system is enabling the widespread illegal logging via the regulatory docum...

2011
Masaya Sato Toshihiro Yamauchi

Logging information is necessary in order to understand a computer’s behavior. However, there is a possibility that attackers will delete logs to hide the evidence of their attacking and cheating. Moreover, various problems might cause the loss of logging information. In homeland security, the plans for counter terrorism are based on data. The reliability of the data is depends on that of data ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید