نتایج جستجو برای: based logging systems

تعداد نتایج: 3741169  

2003
Soyeon Park Youngjae Kim Seung Ryoul Maeng

As software Distributed Shared Memory(DSM) systems become attractive on larger clusters, the focus of attention moves toward improving the reliability of systems. In this paper, we propose a lightweight logging scheme, called remote logging, and a recovery protocol for home-based DSM. Remote logging stores coherence-related data to the volatile memory of a remote node. The logging overhead can ...

Journal: :Physiological measurement 2001
R Anderson G M Lyons

This paper reviews the advancements made in ambulatory data logging used in the study of human subjects since the inception of the analogue tape based data logger in the 1960s. Research into the area of ambulatory monitoring has been rejuvenated due to the development of novel storage technologies during the 1990s. Data logging systems that were previously impractical due to lack of processing ...

Journal: :J. Web Eng. 2007
Andy Edmonds Ryen W. White Dan Morris Steven M. Drucker

One of the most critical driving forces in the evolution of interfaces on the Internet has been the logging built into common Web servers and the decade-long deployment of analytics based upon this data source. Page-view logging has slowly moved to callback systems using client-side scripting to capture more aspects of the user experience. With the rise of JavaScript-based client-side interacti...

2007
Taesoon Park Namyoon Woo Heon Y. Yeom

This paper presents an efficient scheme to implement the optimistic message logging and the asynchronous recovery for the mobile computing environment. Most of the coordinated checkpointing schemes may not be suitable for the mobile environment, since the unreliable mobile hosts and the fragile network connection may hinder any kind of coordination for checkpointing and recovery. In this paper,...

2007
Jun Rekimoto Takashi Miyaki Takaaki Ishizawa

Continuous logging of a person's geographical position is required for various " life-log " applications, such as memory aids, automatic blog generation, and life pattern analysis. GPS is one way of logging, but it is unable to track movements indoors, and hence cannot track people !G s ordinary activities. We propose a WiFi-based location detection technology for location logging. It detects a...

2015
Thomas P. Holmes

Concern regarding extensive damage to tropical forests resulting from logging increased dramatically after World War II when mechanized logging systems developed in industrialized countries were deployed in the tropics. As a consequence, tropical foresters began developing logging procedures that were more environmentally benign, and by the 1990s, these practices began to be described as “reduc...

رضایی , حمیدرضا, وارسته مرادی , حسین , پارسایی, فاطمه,

The species composition of a bird community is dependent upon many factors. Within any geographic area, vegetation structure may be the most important factor. The changes of bird community composition based on foraging behavior in relation to 3 different harvesting systems, including strip cutting, group selection logging, and single tree selection logging, was evaluated in a virgin area in thi...

2002
Tzi-cker Chiueh Lan Huang

Disk logging is a fundamental building block for faulttolerance system design because it captures a persistent snapshot of critical system state for subsequent recovery in the occurrence of failures. Logging typically is required to be synchronous to ensure absolute recoverability. Therefore speeding up synchronous disk write is critical to those fault tolerance systems that are based on disk l...

1998
Stefan Axelsson Ulf Lindqvist Ulf Gustafson Erland Jonsson

Off-line intrusion detection systems rely on logged data. However, the logging mechanism may be complicated and time-consuming and the amount of logged data tends to be very large. To counter these problems we suggest a very simple and cheap logging method, light-weight logging. It can be easily implemented on a Unix system, particularly on the Solaris operating system from Sun. It is based on ...

Journal: : 2021

Objective. Service-oriented architecture increases technical abilities for attacker to move laterally and maintain multiple pivot points inside of compromised environment. Microservice-based infrastructure brings more challenges security architect related internal event visibility monitoring. Properly implemented logging audit approach is a baseline operations incident management. The aim this ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید