نتایج جستجو برای: image logs
تعداد نتایج: 386447 فیلتر نتایج به سال:
Much of the research in software engineering focuses on understanding the dynamic nature of software systems. Such research typically uses automated instrumentation or profiling techniques on the code. In this thesis, we examine logs as another source of dynamic information. Such information is generated from statements inserted into the code during development to draw the attention of system o...
Decaying wood is related to nutrient cycling through its role as either a sink or source of nutrients. However, at micro scales, what is the effect of decaying logs on the physical, chemical, and biotic characteristics of the soil underneath? We took samples from a 0 to 5 cm depth under and a 50 cm distance away from decaying logs (Dacryodes excelsa and Swietenia macrophylla) at 2 stages of dec...
Access logs may offer service providers a lot of information about specific users. Depending on the type offers, operator is capable obtaining user’s IP, location, communication habits, device and so on. In this paper, we analyze sample instant messenger that operating for certain period time. our sandbox, gathered enough data to correlate user habits with their localization, even contacts. We ...
Contextual data plays an important role in modeling search engine users’ behaviors on both query auto-completion (QAC) log and normal query (click) log. User’s recent search history on each log has been widely studied individually as the context to benefit the modeling of users’ behaviors on that log. However, there is no existing work that explores or incorporates both logs together for contex...
Replaying or simulation using web traffic logs are common methods of evaluating proxy caches. Request traces are also used to characterize typical web workloads. Unfortunately, most common, publicly available request logs have serious deficiencies because of what is omitted from the logs. In this paper we enumerate a number of these deficiencies and examine the benefits of more complete logs. A...
Magnetic resonance imaging (MRI) logs are well logs that use nuclear magnetic resonance to accurately measure free fluid, irreducible water (MBVI), and effective porosity (MPHI). Permeability is then calculated using a mathematical function that incorporates these measured properties. This paper describes the methodology developed to generate synthetic magnetic resonance imaging logs using data...
process mining includes the automated discovery of petri nets from event logs. these event logs are the starting point for various discovery and analysis techniques of the process. in this paper process model is developed using colored petri nets (cpns) and the supporting software package cpn tools. the restaurant process model is represented for the analysis using a combination of process min...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید