نتایج جستجو برای: based logging systems
تعداد نتایج: 3741169 فیلتر نتایج به سال:
With the number of computing elements spiraling to hundred of thousands in modern HPC systems, failures are common events. Few applications are nevertheless fault tolerant; most are in need for a seamless recovery framework. Among the automatic fault tolerant techniques proposed for MPI, message logging is preferable for its scalable recovery. The major challenge for message logging protocols i...
In a state with a very large, highly mechanized timber harvesting industry, animal-powered logging still occupies a niche in Alabama as a small-scale harvesting alternative. This article summarizes the results from a study that examined the extent of animal logging in Alabama. We investigated this topic by asking who is logging with animals, where are they working, what equipment are they using...
Message-passing systems with communication protocol transparent to the applications typically require message logging to ensure consistency between checkpoints. This paper describes a periodic independent checkpointing scheme with optimistic logging to reduce performance degradation during normal execution while keeping the recovery cost acceptable. Both time and space overhead for message logg...
We investigated how legal logging history and recent illegal logging affected forest bird community structure in Ghana. Ghanaian forests belong to West Africa’s highly fragmented Upper Guinea rain forests, part of a global priority ‘‘biodiversity hotspot’’ under intense pressure from anthropogenic degradation. Between 1995 and 2010, officially-reported legal logging intensities increased up to ...
Some extended algorithms of checkpointing coordination and pessimistic logging schemes have been proposed for the fault tolerant mobile systems. However, not much attention has been paid for the optimistic logging scheme. The optimistic logging requires the less failure-free operation cost compared to the other logging schemes and the less failure recovery cost compared to the checkpointing sch...
Introduction Both health information technology (HIT) and the payment card industry (PCI) involve the exchange and management of sensitive, protected information. Compared to the PCI, HIT could consider protected health information (PHI) more sensitive than PCI cardholder data. If cardholder data is breached in the PCI, payment card companies may then remove fraudulent charges from the customer...
Veda Systems Incorporated has recently completed the development of a completely open architecture, UNIX-based software environment for standard telemetry and more generic data acquisition applications. The new software environment operates on many state-ofthe-art high-end workstations and provides a workstation independent, multiuse platform for front-end system configuration, database managem...
Over many years transaction log analysis (also called log analysis, log file analysis, or log tracking, and more lately web logging, web log file analysis, and web tracking) has been used to collect information on how information systems such as online library catalogues (OPACs), online and CD-ROM databases, and web-based products and systems are used. The first reports on such transaction logs...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید