نتایج جستجو برای: logging
تعداد نتایج: 8081 فیلتر نتایج به سال:
Message logging protocols are an integral part of a technique for implementing processes that can recover from crash failures. All message logging protocols require that, when recovery is complete, there be no orphan processes, which are surviving processes whose states are inconsistent with the recovered state of a crashed process. We give a precise speciication of the consistency property \no...
Automatic semantic annotation of video streams allows both to extract significant clips for production logging and to index video streams for posterity logging. Automatic annotation for production logging is particularly demanding, as it is applied to non-edited video streams and must rely only on visual information. Moreover, annotation must be computed in quasi real-time. In this paper, we pr...
We apply fluid-replacement logging in arsenic-contaminated regions of Bangladesh using a low-cost, down-well fluid conductivity logging tool to detect leaks in the cased section of wells. The fluid-conductivity tool is designed for the developing world: it is lightweight and easily transportable, operable by one person, and can be built for minimal cost. The fluid-replacement test identifies le...
Virtual-machine logging and replay enables system administrators to analyze intrusions more completely and with greater integrity than traditional system loggers. One challenge in these types of systems is the need to log a potentially large volume of network traffic. Cooperative ReVirt adds message-logging techniques to ReVirt to reduce the amount of network traffic that needs to be logged. Co...
One of the most critical driving forces in the evolution of interfaces on the Internet has been the logging built into common Web servers and the decade-long deployment of analytics based upon this data source. Page-view logging has slowly moved to callback systems using client-side scripting to capture more aspects of the user experience. With the rise of JavaScript-based client-side interacti...
The current proliferation of ubiquitous networking (e.g. WiFi, bluetooth) along with the high penetration of the pervasive devices (smart phones, tablets) have provided a substantial boost to life-logging; a framework for the every-day recording of sensitive and personal data of individuals. Life-logging systems usually consist of resource-constrained devices (sensors). Moreover, as for every e...
If logging is to be compatible with primate conservation, primate populations must be expected to recover from the disturbance and eventually return to their former densities. Surveys conducted over 28 years were used to quantify the long-term effects of both lowand high-intensity selective logging on the density of the five common primates in Kibale National Park, Uganda. The most dramatic exc...
We propose a low-overhead logging scheme for the distributed shared memory system based on the lazy release consistent memory model. In the proposed scheme, stable logging is performed when a lock grant causes an actual dependency relation between the processes, which significantly reduces the logging frequency. Also, instead of making a stable log of the accessed data items, a process logs sta...
This study focuses on the logging sector by analyzing timber harvesting margins in the southern United States between 1977 and 2001. The real growth rate of harvesting margins has been negative for pine pulpwood, while positive for pine sawtimber, hardwood pulpwood, and hardwood sawtimber. Harvesting margins for pulpwood are more stable over time and more integrated spatially when compared with...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید