نتایج جستجو برای: logging

تعداد نتایج: 8081  

2014
Gemma Rutten Andreas Ensslin Andreas Hemp Markus Fischer

The montane forests of Mount Kilimanjaro in Tanzania have been subjected to a long history of selective logging. However, since 1984 logging of indigenous trees is prohibited. Today, these forests allow us to evaluate the long-term effects of selective logging. We mapped the height and diameter at breast height (DBH) of all trees >10 cm DBH on 10 sites of 0.25 ha. Five sites represent non-logge...

2016
Camille Piponiot Antoine Cabon Laurent Descroix Aurélie Dourdain Lucas Mazzei Benjamin Ouliac Ervan Rutishauser Plinio Sist Bruno Hérault

BACKGROUND Managed forests are a major component of tropical landscapes. Production forests as designated by national forest services cover up to 400 million ha, i.e. half of the forested area in the humid tropics. Forest management thus plays a major role in the global carbon budget, but with a lack of unified method to estimate carbon fluxes from tropical managed forests. In this study we pro...

2007
Dennis B. Sasse DENNIS B. SASSE CRAIG LINDLEY LENNART NACKE Dennis Sasse

Conducting psychophysiological experiments that measure how players experience digital games not only allows investigating the effects digital games have on players, it also gives game developers a tool to validate game design. In order to develop digital games rapidly that can be used as stimuli in psychophysiological experiments, a coherent and flexible development environment is required. A ...

1993
David B. Johnson

Existing rollback-recovery methods using consistent checkpointing may cause high overhead for applications that frequently send output to the “outside world,” since a new consistent checkpoint must be written before the output can be committed, whereas existing methods using optimistic message logging may cause large delays in committing output, since processes may buffer received messages arbi...

1998
Marco Boscolo Jeffrey R. Vincent

Most tropical forests are government-owned, with timber being harvested under concession agreements awarded to private logging companies. Those agreements tend to be short-term harvesting licenses lasting no more than one to a few years. In the absence of regulation, loggers can be expected to ignore the negative environmental impacts of logging, as they derive little or no financial gain from ...

Journal: :Concurrency and Computation: Practice and Experience 2013
Aurelien Bouteiller Thomas Hérault George Bosilca Jack J. Dongarra

With our current expectation for the exascale systems, composed of hundred of thousands of many-core nodes, the mean time between failures will become small, even under the most optimistic assumptions. One of the most scalable checkpoint restart techniques, the message logging approach, is the most challenged when the number of cores per node increases because of the high overhead of saving the...

Journal: :IEICE Transactions 2013
Takashi Ishio Hiroki Wakisaka Yuki Manabe Katsuro Inoue

Logging the execution process of a program is a popular activity for practical program understanding. However, understanding the behavior of a program from a complete execution trace is difficult because a system may generate a substantial number of runtime events. To focus on a small subset of runtime events, a dynamic object process graph (DOPG) has been proposed. Although a DOPG can potentia...

2003
Sergei Kojarski David H. Lorenz

Normally, Aspect-Oriented Programming (AOP) is used for plugging and not for unplugging. Aspects (concerns) are weaved into a system, thus providing a modularized way to add crosscutting features to a base program. For example, given a base program without logging and given a logging aspect, the AOP weaver produces from the untangled code an executable with the desired crosscutting logging beha...

2013
Ruby Jain Akanksha Meshram

A hybrid model of packet marking and logging for the IP trace back for the node that wants to attack any node in the network. The main idea is to detect the DOS attacks in the network by employing the IP of the attacker node. Packet logging scheme used to record packet state information in a router log, for reconstruct the attack path and get the attack source. Pre shared key exchange applied b...

2014
Min Feng Farzad Khorasani Rajiv Gupta Laxmi N. Bhuyan

Previous deterministic replay systems reduce the runtime overhead by either relying on hardware support or by relaxing the determinism requirements for replay. We propose LightPlay that fulfills stricter determinism requirements with low overhead without requiring hardware or OS support. LightPlay guarantees that the memory state after each instruction instance in a replay run is the same as in...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید