نتایج جستجو برای: image logs

تعداد نتایج: 386447  

2009
Evelyn Sanchez Rachel Gallery James W. Dalling

Fallen tree trunks (‘nurse logs’) are important recruitment sites for trees in temperate forest, however nurse log use is seldom reported in tropical forests. We predicted that logs should be important for the regeneration of small-seeded tropical pioneer species because surface leaf litter and competition with established vegetation reduces the establishment success of these species from soil ...

2007
Judit Bar-Ilan

Academic researchers have very limited access to query logs of major web search engines. Studying and analyzing large-scale query logs is essential for advancing Web IR. We propose setting up review boards with clear rules for appropriate conduct, and allowing researchers access to logs within this framework.

Journal: :Data Knowl. Eng. 2006
Monique H. Jansen-Vullers Wil M. P. van der Aalst Michael Rosemann

Process mining is the extraction of a process model from system logs. These logs have to meet minimum requirements, i.e. each event should refer to a case and a task. Many system logs do not meet these requirements, and therefore it is not possible to use process mining for process optimization or delta analysis. This paper shows an alternative process mining procedure for logs containing data ...

2009
HELMUT LÜTKEPOHL FANG XU Fang Xu

For forecasting and economic analysis many variables are used in logarithms (logs). In time series analysis this transformation is often considered to stabilize the variance of a series. We investigate under which conditions taking logs is beneficial for forecasting. Forecasts based on the original series are compared to forecasts based on logs. It is found that it depends on the data generatio...

2016
Michael D. Ulyshen Susan V. Diehl Dragica Jeremic

Wood properties and microbial community characteristics were compared between loblolly pine (Pinus taeda L.) logs protected or unprotected from termites (Blattodea: Rhinotermitidae: Reticulitermes spp.) and other arthropods for two years in seasonally flooded and unflooded forests in the southeastern United States. Significant compositional differences were observed between treatments and betwe...

2006
Wil M.P. van der Aalst

Process mining techniques allow for the analysis of business processes based on event logs. For example, the audit trails of a workflow management system, the transaction logs of an enterprise resource planning system, and the electronic patient records in a hospital can be used to discover models describing processes, organizations, and products. Moreover, such event logs can also be used to c...

1998
H. HILDERBRAND

Absrract.-Log length exerted a critical influence in stabilizing large woody debris (LWD) pieces added as an experimental stream restoration technique. Logs longer than the average bank-full channel width (5.5 m) were significantly less likely to be displaced than logs shorter than this width. The longest log in stable log groups was significantly longer than the longest log in unstable groups....

2011
Hyoungnyoun Kim Ji-Hyung Park

This paper investigated the relationship between incrementally logged phone logs and self-reported survey data to derive regularity and predictability from mobile phone usage logs. First, we extracted information not from a single value such as location or call logs, but from multivariate contextual logs. Then we considered the changing pattern of the incrementally logged information over time....

Journal: :Inf. Sci. 2013
Montserrat Batet Arnau Erola David Sánchez Jordi Castellà-Roca

Query logs are of great interest for scientists and companies for research, statistical and commercial purposes. However, the availability of query logs for secondary uses raises privacy issues since they allow the identification and/or revelation of sensitive information about individual users. Hence, query anonymization is crucial to avoid identity disclosure. To enable the publication of pri...

1998
Luc Girardin Dominique Brodbeck

Analyzing and monitoring logs that portray system, user, and network activity is essential to meet the requirements of high security and optimal resource availability. While most systems now possess satisfactory logging facilities, the tools to monitor and interpret such event logs are still in their infancy. This paper describes an approach to relieve system and network administrators from man...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید