نتایج جستجو برای: magnetic logging

تعداد نتایج: 346510  

2010
Thomas Ropars Christine Morin

Message logging is an attractive solution to provide fault tolerance for message passing applications because it is more scalable than coordinated checkpointing. Sender-based message logging is a well known optimization that allows to save messages payload in the sender memory and so only the events corresponding to message receptions have to be logged reliably using an event logger. In existin...

2002
Hideyuki KAWASHIMA Motomichi TOYAMA Yuichiro ANZAI

The sensor database system to which new sensor data frequently arrive should provide fresh data to its clients. Toward this end, fast sensor data insertion to the database is essential. The bottleneck of the conventional sensor data insertion is disk logging that writes a log record to disk before accessing buffer pool in memory. The purpose of this paper is to show fast sensor data insertion u...

2004
E. F. BENFIELD J. R. WEBSTER J. L. TANK J. J. HUTCHENS

The watershed of Big Hurricane Branch, Coweeta Hydrologic Laboratory, North Carolina, USA, was logged in 1976. We measured breakdown rates of experimental leaf packs in this second-order stream prior to logging, during logging, soon after logging, and 3 additional tunes since then. Leaf breakdown was slow just after logging, apparently due to leaf burial by sediments. Thereafter, leaf breakdown...

1996
Galen C. Hunt Michael L. Scott

We present a peer logging system for reducing performance overhead in fault-tolerant distributed shared memory systems. Our system provides fault-tolerant shared memory using individual checkpointing and rollback. Peer logging logs DSM modification messages to remote nodes instead of to local disks. We present results for implementations of our fault-tolerant technique using simulations of both...

1989
J. IL Vanclay

VANCI-AY'J.IL 1989. Modelling selection harvesting in tropical rain forests. Long term yield estimates for natural forests require a harvesting model to enable future yields to be estimated reliably. The model should predict the felled stems, the proportion of these which are merchantable, and any damage to the residual stand. Regression analyses was used to develop a model of current logging p...

2013
Sven Reißmann Dustin Frisch Sebastian Rieger

Logging-Informationen von Systemen und Diensten nehmen in ihrem Umfang durch den Detaillierungsgrad komplexer Anwendungen, aber auch durch die zunehmende Anzahl von verwendeten Systemen (etwa aufgrund der vermehrten schnellen Bereitstellung von virtuellen Maschinen z.B. in Cloud Umgebungen) immer weiter zu. Um die zeitnahe Auswertung und Reaktion auf relevante Logging-Informationen zu gewährlei...

2012
Jinho Ahn

Among a lot of rollback-recovery protocols developed for providing fault-tolerance for long-running distributed applications, sender-based message logging with checkpointing is one of the most lightweight fault-tolerance techniques to be capable of being applied in this field, significantly decreasing high failure-free overhead of synchronous logging by using message sender's volatile memory as...

1995
Uresh Vahalia Cary G. Gray Dennis Ting

Over the last few years, there have been several efforts to use logging to improve performance, reliability, and recovery times of file systems. The two major techniques are metadata logging, where the log records metadata changes and is a supplement to the on-disk file system, and log-structured file systems, whose log is their only on-disk representation. When the file system is mainly or who...

2007
Jun Rekimoto Takashi Miyaki Takaaki Ishizawa

Continuous logging of a person's geographical position is required for various " life-log " applications, such as memory aids, automatic blog generation, and life pattern analysis. GPS is one way of logging, but it is unable to track movements indoors, and hence cannot track people !G s ordinary activities. We propose a WiFi-based location detection technology for location logging. It detects a...

2007
Taesoon Park Namyoon Woo Heon Y. Yeom

This paper presents an efficient scheme to implement the optimistic message logging and the asynchronous recovery for the mobile computing environment. Most of the coordinated checkpointing schemes may not be suitable for the mobile environment, since the unreliable mobile hosts and the fragile network connection may hinder any kind of coordination for checkpointing and recovery. In this paper,...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید