نتایج جستجو برای: based logging systems

تعداد نتایج: 3741169  

2010
George Bosilca Aurelien Bouteiller Thomas Hérault Pierre Lemarinier Jack J. Dongarra

With the number of computing elements spiraling to hundred of thousands in modern HPC systems, failures are common events. Few applications are nevertheless fault tolerant; most are in need for a seamless recovery framework. Among the automatic fault tolerant techniques proposed for MPI, message logging is preferable for its scalable recovery. The major challenge for message logging protocols i...

Journal: :Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies 2017

2001
Christopher W. Toms Mark R. Dubois John C. Bliss Robert B. Rummer

In a state with a very large, highly mechanized timber harvesting industry, animal-powered logging still occupies a niche in Alabama as a small-scale harvesting alternative. This article summarizes the results from a study that examined the extent of animal logging in Alabama. We investigated this topic by asking who is logging with animals, where are they working, what equipment are they using...

1992
Yi-Min Wang W. Kent Fuchs

Message-passing systems with communication protocol transparent to the applications typically require message logging to ensure consistency between checkpoints. This paper describes a periodic independent checkpointing scheme with optimistic logging to reduce performance degradation during normal execution while keeping the recovery cost acceptable. Both time and space overhead for message logg...

Journal: :Istrazivanja i projektovanja za privredu 2016

2015
Nicola Arcilla Lars H. Holbech Sean O’Donnell

We investigated how legal logging history and recent illegal logging affected forest bird community structure in Ghana. Ghanaian forests belong to West Africa’s highly fragmented Upper Guinea rain forests, part of a global priority ‘‘biodiversity hotspot’’ under intense pressure from anthropogenic degradation. Between 1995 and 2010, officially-reported legal logging intensities increased up to ...

2001
Taesoon Park Namyoon Woo Heon Y. Yeom

Some extended algorithms of checkpointing coordination and pessimistic logging schemes have been proposed for the fault tolerant mobile systems. However, not much attention has been paid for the optimistic logging scheme. The optimistic logging requires the less failure-free operation cost compared to the other logging schemes and the less failure recovery cost compared to the checkpointing sch...

2012
Jason Tyler King Laurie A. Williams

Introduction Both health information technology (HIT) and the payment card industry (PCI) involve the exchange and management of sensitive, protected information. Compared to the PCI, HIT could consider protected health information (PHI) more sensitive than PCI cardholder data. If cardholder data is breached in the PCI, payment card companies may then remove fraudulent charges from the customer...

2016
DANIEL DAWSON

Veda Systems Incorporated has recently completed the development of a completely open architecture, UNIX-based software environment for standard telemetry and more generic data acquisition applications. The new software environment operates on many state-ofthe-art high-end workstations and provides a workstation independent, multiuse platform for front-end system configuration, database managem...

2003
Ina Fourie

Over many years transaction log analysis (also called log analysis, log file analysis, or log tracking, and more lately web logging, web log file analysis, and web tracking) has been used to collect information on how information systems such as online library catalogues (OPACs), online and CD-ROM databases, and web-based products and systems are used. The first reports on such transaction logs...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید