نتایج جستجو برای: 3 logs p

تعداد نتایج: 2762761  

2017
Liangda Li Hongbo Deng Anlei Dong Yi Chang Ricardo A. Baeza-Yates Hongyuan Zha

Contextual data plays an important role in modeling search engine users’ behaviors on both query auto-completion (QAC) log and normal query (click) log. User’s recent search history on each log has been widely studied individually as the context to benefit the modeling of users’ behaviors on that log. However, there is no existing work that explores or incorporates both logs together for contex...

2008
Kathy Carlstead John Seidensticker Robert Baldwin

The high incidence of Stereotypie behaviors in zoo bears (van Keulen-Kromhout: International Zoo Yearbook 18:177-186, 1978) suggests that the environment of these animals lacks essential stimuli for guiding normal behavior. Three experiments investigated ways in which bear husbandry procedures can be altered to promote normal behavior. In experiments 1 and 2, honey-filled logs were given to a s...

1999
Brian D. Davison

Replaying or simulation using web traffic logs are common methods of evaluating proxy caches. Request traces are also used to characterize typical web workloads. Unfortunately, most common, publicly available request logs have serious deficiencies because of what is omitted from the logs. In this paper we enumerate a number of these deficiencies and examine the benefits of more complete logs. A...

2002
SHAHAB D. MOHAGHEGH S. MOHAGHEGH

Magnetic resonance imaging (MRI) logs are well logs that use nuclear magnetic resonance to accurately measure free fluid, irreducible water (MBVI), and effective porosity (MPHI). Permeability is then calculated using a mathematical function that incorporates these measured properties. This paper describes the methodology developed to generate synthetic magnetic resonance imaging logs using data...

Journal: :Nuclear Physics B - Proceedings Supplements 1999

Journal: :journal of advances in computer research 0
samaneh ghasemi department of computer engineering, sari branch, islamic azad university, sari, iran zeinab ghorbani lakterashani department of computer engineering, sari branch, islamic azad university, sari, iran

process mining includes the automated discovery of petri nets from event logs. these event logs are the starting point for various discovery and analysis techniques of the process.  in this paper process model is developed using colored petri nets (cpns) and the supporting software package cpn tools. the restaurant process model is represented for the analysis using a combination of process min...

Journal: :geopersia 2015
iman zahmatkesh ghasem aghli ruhangiz mohammadian

fractures are considered as one of the important structures in fractured reservoirs due to their effect on fluid currents and reservoirparameters such as porosity and permeability. fracture parameters can only be directly calculated with core and image logs. cores haveserious limitations, so image logs are the best method. the aim of this study is the systematic fractures analysis of the asmari...

2008
RALPH W. HOWARD

Enviton. Entomol. 11: 1290-1293 (1982) A census of 24 1-ha plots indicated .an average abundance per ha of 4.42 colonies of Reticulitermes flavipes (Kollar) and 2.38 colonies of R. virginicus (Banks). Nearest neighbor analysis indicated the mean distance between colonies of R. f2avipes to be 22.48 m, between colonies of R. virginicus to be 26.19 m, and between colonies, irrespective of species,...

2015
Yuquan Wang Lijie Wen Zhiqiang Yan Bo Sun Jianmin Wang

Massive event logs are produced in information systems, which record executions of business processes in organizations. Various techniques are proposed to discover process models reflecting real-life behaviors from these logs. However, the discovered models are mostly in Petri nets rather than BPMN models, the current industrial process modeling standard. Conforti et al. and Weber et al. propos...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید