نتایج جستجو برای: well logging
تعداد نتایج: 1529485 فیلتر نتایج به سال:
Parallel applications running on large computers suffer from the absence of a reliable environment. Fault tolerance proposals, in general, rely on rollback-recovery strategies supported by checkpoint and/or message logging. There are well-defined models that address the optimum checkpoint interval for coordinated checkpointing. Nevertheless, there is a lack of models concerning uncoordinated ch...
sustainable forest management in caspian forests of iran requires cost-benefit analysis in order to maintain the quality of timber stands during logging operations. this study was done with the aim of cost and gross revenue computations from current logging (net present value) in three adjacent compartments in district 2 of shafroud watershed. motion and time studies were carried out during fel...
Over the past decade the number of processors used in high performance computing has increased to hundreds of thousands. As a direct consequence, and while the computational power follows the trend, the mean time between failures (MTBF) has suffered and is now being counted in hours. In order to circumvent this limitation, a number of fault-tolerant algorithms as well as execution environments ...
Third, error logging and reporting is important. As an industry, we currently support very primitive logging with no mechanisms for root-cause analysis or correlation of failures. Error messages are often arcane or not useful, and “firstfailure” capture is impossible. This is evidenced by a common, though unrealistic, request from support center staff: “Turn logging on and recreate the failure....
Harvesting plans for Canadian logging companies tend to cover wider territories than before. Long transportation distances for the workers involved in logging activities have thus become a significant issue. Often, cities or villages to accommodate the workers are far away. A common practice is thus to construct camps close to the logging regions, containing the complete infrastructure to host ...
We investigated how legal logging history and recent illegal logging affected forest bird community structure in Ghana. Ghanaian forests belong to West Africa’s highly fragmented Upper Guinea rain forests, part of a global priority ‘‘biodiversity hotspot’’ under intense pressure from anthropogenic degradation. Between 1995 and 2010, officially-reported legal logging intensities increased up to ...
Deterministic execution of parallel applications can be enforced by logging speculative memory accesses and restoring saved state in the event of a conflict. However, logging all accesses has a prohibitive overhead. We propose three techniques to reduce logging in an always-on transactional memory system. The first, Threaded Section Analysis, statically determines when only a single thread is r...
The need for secure logging is well-understood by the security professionals, together with each researchers and practitioners. The flexibility to the accuracy verifies all (or some) log entries is very important to any application using secure logging techniques. During this paper, we start by examining progressive in secure logging and determine some issues inherent to systems supported trust...
In the past few years, the use of smartphones has increased exponentially, and so have the capabilities of such devices. Together with an increase in raw processing power, modern smartphones are equipped with a wide variety of sensors and expose an extensive set of API (Accessible Programming Interface). These capabilities allow us to extract a wide spectrum of data that ranges from information...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید