Catching Errors With Trajectory Log Files

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Monitoring daily MLC positional errors using trajectory log files and EPID measurements for IMRT and VMAT deliveries.

This work investigated the differences between multileaf collimator (MLC) positioning accuracy determined using either log files or electronic portal imaging devices (EPID) and then assessed the possibility of reducing patient specific quality control (QC) via phantom-less methodologies. In-house software was developed, and validated, to track MLC positional accuracy with the rotational and sta...

متن کامل

Towards Hippocratic Log Files

The World Wide Web (WWW) is fast becoming the central location for goods, services and information. The very factors that make the Internet such a powerful medium combine to make the Internet a treasure trove of personal information regarding individual Web users. This has lead to internet users voicing concerns over the loss and violation of privacy. Inspired by the Hippocratic Oath, Agrawal, ...

متن کامل

Pseudonymizing Unix Log Files

Unix systems in many cases record personal data in log files. We present tools that help in practice to retrofit privacy protection into existing Unix audit systems. Our tools are based on an approach to pseudonymizing Unix log files while balancing user requirements for anonymity and the service provider’s requirements for accountability. By pseudonymizing identifying data in log files the ass...

متن کامل

Remotely Monitoring IIS Log Files

Web server log files are a very valuable source of forensic data for intrusion detection and overall network monitoring. Nevertheless, they are hard to integrate in a central system, especially in a real-time log monitoring infrastructure. In this document, we focus on Microsoft’s Internet Information Server (IIS) log files and how to forward them to a central log repository. We describe the in...

متن کامل

Formal Analysis of Log Files

Runtime verification as a field faces several challenges. One key challenge is how to keep the overheads associated with its application low. This is especially important in real-time critical embedded applications, where memory and CPU resources are limited. Another challenge is that of devising expressive and yet user-friendly specification languages that can attract software engineers. In th...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: International Journal of Radiation Oncology*Biology*Physics

سال: 2015

ISSN: 0360-3016

DOI: 10.1016/j.ijrobp.2015.07.1827