نتایج جستجو برای: well logging

تعداد نتایج: 1529485  

2011
Leonardo Fialho Dolores Rexachs

Parallel applications running on large computers suffer from the absence of a reliable environment. Fault tolerance proposals, in general, rely on rollback-recovery strategies supported by checkpoint and/or message logging. There are well-defined models that address the optimum checkpoint interval for coordinated checkpointing. Nevertheless, there is a lack of models concerning uncoordinated ch...

Journal: :جنگل و فرآورده های چوب 0
فرشاد کیوان بهجو استادیار دانشگاه محقق اردبیلی باریس مجنونیان استاد دانشگاه تهران منوچهر نمیرانیان استاد دانشگاه تهران جهانگیر فقهی دانشیار دانشگاه تهران ارسطو سعید استادیار بازنشسته دانشگاه تهران

sustainable forest management in caspian forests of iran requires cost-benefit analysis in order to maintain the quality of timber stands during logging operations. this study was done with the aim of cost and gross revenue computations from current logging (net present value) in three adjacent compartments in district 2 of shafroud watershed. motion and time studies were carried out during fel...

Journal: :Concurrency and Computation: Practice and Experience 2010
Aurelien Bouteiller George Bosilca Jack J. Dongarra

Over the past decade the number of processors used in high performance computing has increased to hundreds of thousands. As a direct consequence, and while the computational power follows the trend, the mean time between failures (MTBF) has suffered and is now being counted in hours. In order to circumvent this limitation, a number of fault-tolerant algorithms as well as execution environments ...

2003
Bradley Chen Michael Perkowitz Scott Banachowski Richard S. Cox Steven Czerwinski Himanshu Raj Cristian Tapus Charles P. Wright Praveen Yalagandula Wanghong Yuan Nickolai Zeldovich Ben Zhao Yutao Zhong

Third, error logging and reporting is important. As an industry, we currently support very primitive logging with no mechanisms for root-cause analysis or correlation of failures. Error messages are often arcane or not useful, and “firstfailure” capture is impossible. This is evidenced by a common, though unrealistic, request from support center staff: “Turn logging on and recreate the failure....

Journal: :Annals OR 2015
Sanjay Dominik Jena Jean-François Cordeau Bernard Gendron

Harvesting plans for Canadian logging companies tend to cover wider territories than before. Long transportation distances for the workers involved in logging activities have thus become a significant issue. Often, cities or villages to accommodate the workers are far away. A common practice is thus to construct camps close to the logging regions, containing the complete infrastructure to host ...

2015
Nicola Arcilla Lars H. Holbech Sean O’Donnell

We investigated how legal logging history and recent illegal logging affected forest bird community structure in Ghana. Ghanaian forests belong to West Africa’s highly fragmented Upper Guinea rain forests, part of a global priority ‘‘biodiversity hotspot’’ under intense pressure from anthropogenic degradation. Between 1995 and 2010, officially-reported legal logging intensities increased up to ...

2013
Madan Das Gabriel Southern Jose Renau

Deterministic execution of parallel applications can be enforced by logging speculative memory accesses and restoring saved state in the event of a conflict. However, logging all accesses has a prohibitive overhead. We propose three techniques to reduce logging in an always-on transactional memory system. The first, Threaded Section Analysis, statically determines when only a single thread is r...

2013
Chandra Rao

The need for secure logging is well-understood by the security professionals, together with each researchers and practitioners. The flexibility to the accuracy verifies all (or some) log entries is very important to any application using secure logging techniques. During this paper, we start by examining progressive in secure logging and determine some issues inherent to systems supported trust...

Journal: :CoRR 2016
Mauro Conti Elia Dal Santo Riccardo Spolaor

In the past few years, the use of smartphones has increased exponentially, and so have the capabilities of such devices. Together with an increase in raw processing power, modern smartphones are equipped with a wide variety of sensors and expose an extensive set of API (Accessible Programming Interface). These capabilities allow us to extract a wide spectrum of data that ranges from information...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید