Auswahl der wissenschaftlichen Literatur zum Thema „Logging“

Geben Sie eine Quelle nach APA, MLA, Chicago, Harvard und anderen Zitierweisen an

Wählen Sie eine Art der Quelle aus:

Machen Sie sich mit den Listen der aktuellen Artikel, Bücher, Dissertationen, Berichten und anderer wissenschaftlichen Quellen zum Thema "Logging" bekannt.

Neben jedem Werk im Literaturverzeichnis ist die Option "Zur Bibliographie hinzufügen" verfügbar. Nutzen Sie sie, wird Ihre bibliographische Angabe des gewählten Werkes nach der nötigen Zitierweise (APA, MLA, Harvard, Chicago, Vancouver usw.) automatisch gestaltet.

Sie können auch den vollen Text der wissenschaftlichen Publikation im PDF-Format herunterladen und eine Online-Annotation der Arbeit lesen, wenn die relevanten Parameter in den Metadaten verfügbar sind.

Zeitschriftenartikel zum Thema "Logging"

1

Zhiyou, Liu, Huo Jinghuan und Zhu Xiaogang. „The application of digital logging in exploration of Jiang Cang coalfield in Qinghai province“. International Journal of Geology 1, Nr. 1 (21.07.2016): 44. http://dx.doi.org/10.26789/ijg.2016.006.

Der volle Inhalt der Quelle
Annotation:
A lot of well logging on to Jiang Cang coalfield in the past work and achieved good results, but due to differ in age, instrumentation equipment and method were different. In order to understand the application effect of the equipment used in the area now and in order to provide the basis for the future working to choose the appropriate logging parameters and well logging interpretation, we chosed GJS - 1 b intelligent engineering logging system produced by Chongqing geological instrument factory in Jiang Cang mining area, we collected the data when cable were ascending, according to 《the requirements of the rules of coalfield geophysical logging》, JGS - 1 b instrument full hole resistivity logging velocity of 3 m/s, the sampling interval was 5 cm, acoustic logging measurement parameter for the acoustic time, adopt the device of single-emission and double-receiving, detectorsource space was 0.5 meters, 0.7 meters, the full hole velocity was 6 m/s, the sampling interval was 10 cm.In this paper, we introduce the application of multiple well logging method in coalfield geology through to the logging examples in Mu Li Jang Cang coalfield four field of qinghai province, the effect was remarkable
APA, Harvard, Vancouver, ISO und andere Zitierweisen
2

Price, Blaine A., Avelie Stuart, Gul Calikli, Ciaran Mccormick, Vikram Mehta, Luke Hutton, Arosha K. Bandara, Mark Levine und Bashar Nuseibeh. „Logging you, Logging me“. Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies 1, Nr. 2 (30.06.2017): 1–18. http://dx.doi.org/10.1145/3090087.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
3

Studwell, William E. „Logging on and Cata-Logging“. Behavioral & Social Sciences Librarian 16, Nr. 1 (22.09.1997): 69–71. http://dx.doi.org/10.1300/j103v16n01_06.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
4

de Silva, Amal P., und W. Keith Patterson. „Influence of Root Flooding Interval on Phytophthora Root Rot of Blueberry“. HortScience 32, Nr. 3 (Juni 1997): 468D—468. http://dx.doi.org/10.21273/hortsci.32.3.468d.

Der volle Inhalt der Quelle
Annotation:
Phytophthora root rot is a severe disease on blueberry (Vaccinium corymbosum L.) in poorly drained soils. The objective of the study was to determine the frequency of water-logged conditions on disease severity of blueberry. Phytophthora cinnamomi was grown on rice hulls and incorporated into the soil at the rate of 10% v/v. Water logging conditions were inflicted for 48 hr on mulched and non–mulched blueberry plants at 1-, 2-, and 4-week intervals. Non-water logging conditions were used on both mulched and non-mulched control plants. There was a significant linear relationship between disease severity of shoots and roots and the frequency of water-logging conditions. Disease symptoms were low in control plants, but disease ratings were high in mulched and non-mulched plants that were treated with water-logging conditions every week. There was also a linear trend between shoot dry weight and root dry weight of plants with frequency of water logging. Higher dry weights were seen on control plants. There was a significantly higher shoot, root dry weight and number of leaves of mulched plants than non-mulched plants. The percentage of infection on roots were high with frequent water logging. The study revealed high disease incidence with frequent water loggings. However, growth of mulched blueberry plants were comparable in control plants and plants that were subjected to water logging at 4-week intervals.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
5

Lin, Jiunn-Cheng, Jun-Yen Lee und Wan-Yu Liu. „Risk Analysis of Regions with Suspicious Illegal Logging and Their Trade Flows“. Sustainability 13, Nr. 6 (23.03.2021): 3549. http://dx.doi.org/10.3390/su13063549.

Der volle Inhalt der Quelle
Annotation:
To eradicate illegally harvested wood sources in its domestic market, it is critical to conduct risk assessments on wood sourcing in regions with illegal loggings. It is not reliable to use a single indicator to analyze suspicious illegal logging. This study integrates three key global indicators: CPI (Corruption Perceptions Index), HDI (Human Development Indicator), and WGI (The Worldwide Governance Indicators) by applying the entropy weight method to establish a new risk indicator to rank suspicious illegal logging regions. This study aims to establish better risk indicators by considering more factors to assess the risks of illegal logging and its trade flow more reliably. By analyzing roundwood production, Myanmar, Congo, and Nigeria are rated high-risk. Countries such as the U.S., Germany, Canada, and Finland are rated low-risk.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
6

Nurhadiyanto, Lucky. „ALUR PELACAKAN PEMBALAKAN LIAR (ILLEGAL LOGGING) MELALUI PENDEKATAN PENCUCIAN UANG“. SISI LAIN REALITA 1, Nr. 2 (11.12.2016): 33–46. http://dx.doi.org/10.25299/sisilainrealita.2016.vol1(2).1385.

Der volle Inhalt der Quelle
Annotation:
Illegal logging is a part of crime against environment, which has a massive impact on the economy, social, cultural, and ecological. Ironically, majority of the illegal logging’s perpetrators are dominated by “the field criminal”. On the other side, intellectual actors who can control the activities never touch by the law. The money laundering concept can give a new approach to detect the leader actor. The author use follow the money viewpoint, which includes placement, layering, and integration. Qualitative data collection methods is used with in-depth interviews, systematic observation of the behavior, and document analysis. The result is a new paradigm in investigating illegal logging no longer focused on the field actors, but potentially tracking the intellectual actors behind illegal logging.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
7

Solt, John. „Treacherous Logging“. Voice of Intellectual Man- An International Journal 9, Nr. 2 (2019): 151. http://dx.doi.org/10.5958/2319-4308.2019.00025.2.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
8

Mueller, H. Gustav. „Data logging“. Hearing Journal 60, Nr. 10 (Oktober 2007): 19. http://dx.doi.org/10.1097/01.hj.0000295442.16133.d7.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
9

Brown, Alastair. „Selective logging“. Nature Climate Change 2, Nr. 1 (20.12.2011): 23. http://dx.doi.org/10.1038/nclimate1361.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
10

Jones, S., SM Gatford, T. Do und S. Walker. „Transaction logging“. Journal of Documentation 53, Nr. 1 (März 1997): 35–50. http://dx.doi.org/10.1108/eum0000000007189.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen

Dissertationen zum Thema "Logging"

1

Karlsson, Tobias, und Andreas Pettersson. „Software keystroke logging : Automatisering av skydd mot software keystroke logging“. Thesis, Linnéuniversitetet, Institutionen för datavetenskap, fysik och matematik, DFM, 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-19618.

Der volle Inhalt der Quelle
Annotation:
This piece of work develops a solution that automates protection against software keystroke loggers. Keystroke loggers can be used illegally to register a user's keystrokes and in that way acquire sensitive information. The solution was tested on two different networks and the efficiency was measured. The network represents an enterprise network that uses the operating system Windows along with the directory service Active Directory. A script was developed to solve the automation matter. The script automatically executed the required programs that were needed to clean the network completely from keystroke loggers we had implemented and it took less than one minute to run.
Detta arbete utvecklar en lösning som automatiserar skydd mot mjukvarukeyloggers. Keystroke loggers kan användas illegalt för att registrera en användares knappnedtryckningar och på så vis komma över känslig information. Lösningen testkörs på två olika nätverk och effektiviteten mäts. Nätverket representerar ett företagsnätverk som använder operativsystemet Windows med katalogtjänsten Active Directory. Ett skript utvecklades för att lösa automatiseringsfrågan. Skriptet exekverade automatiskt de program som behövdes för att rensa nätverket helt från de keystroke loggers vi implementerat och det tog mindre än en minut att köra.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
2

Sluss, Richard Gordon. „Managerial and operational characteristics of "safety successful" logging contractors“. Thesis, This resource online, 1992. http://scholar.lib.vt.edu/theses/available/etd-09122009-040333/.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
3

Loving, Easton. „Components of logging costs“. Thesis, This resource online, 1991. http://scholar.lib.vt.edu/theses/available/etd-10222009-124937/.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
4

Sklar, Howard Fred. „Nuclear magnetic resonance logging“. Thesis, Massachusetts Institute of Technology, 1997. http://hdl.handle.net/1721.1/10503.

Der volle Inhalt der Quelle
Annotation:
Thesis (M.S.)--Massachusetts Institute of Technology, Dept. of Earth, Atmospheric, and Planetary Sciences, 1997.
Includes bibliographical references (leaves 119-121).
by Howard Fred Sklar.
M.S.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
5

Mendelson, J. D. (James D. ). „Petroleum source rock logging“. Thesis, Massachusetts Institute of Technology, 1985. http://hdl.handle.net/1721.1/15126.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
6

Miyata, Edwin S. „An investigation of the monocable system for cable yarding of small, low-value trees on steep, difficult sites /“. Thesis, Connect to this title online; UW restricted, 1991. http://hdl.handle.net/1773/7061.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
7

Brodbeck, Arnold M. „Timber industry consolidation and the need for scale appropriate harvesting mechanisms in Alabama's black belt“. Auburn, Ala., 2005. http://repo.lib.auburn.edu/2005%20Summer/master's/BRODBECK_ARNOLD_5.pdf.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
8

Pulls, Tobias. „Preserving Privacy in Transparency Logging“. Doctoral thesis, Karlstads universitet, Institutionen för matematik och datavetenskap, 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:kau:diva-35918.

Der volle Inhalt der Quelle
Annotation:
The subject of this dissertation is the construction of privacy-enhancing technologies (PETs) for transparency logging, a technology at the intersection of privacy, transparency, and accountability. Transparency logging facilitates the transportation of data from service providers to users of services and is therefore a key enabler for ex-post transparency-enhancing tools (TETs). Ex-post transparency provides information to users about how their personal data have been processed by service providers, and is a prerequisite for accountability: you cannot hold a controller accountable for what is unknown. We present three generations of PETs for transparency logging to which we contributed. We start with early work that defined the setting as a foundation and build upon it to increase both the privacy protections and the utility of the data sent through transparency logging. Our contributions include the first provably secure privacy-preserving transparency logging scheme and a forward-secure append-only persistent authenticated data structure tailored to the transparency logging setting. Applications of our work range from notifications and deriving data disclosures for the Data Track tool (an ex-post TET) to secure evidence storage.
The subject of this dissertation is the construction of privacy-enhancing technologies (PETs) for transparency logging, a technology at the intersection of privacy, transparency, and accountability. Transparency logging facilitates the transportation of data from service providers to users of services and is therefore a key enabler for ex-post transparency-enhancing tools (TETs). Ex-post transparency provides information to users about how their personal data have been processed by service providers, and is a prerequisite for accountability: you cannot hold a controller accountable for what is unknown. We present three generations of PETs for transparency logging to which we contributed. We start with early work that defined the setting as a foundation and build upon it to increase both the privacy protections and the utility of the data sent through transparency logging. Our contributions include the first provably secure privacy-preserving transparency logging scheme and a forward-secure append-only persistent authenticated data structure tailored to the transparency logging setting. Applications of our work range from notifications and deriving data disclosures for the Data Track tool (an ex-post TET) to secure evidence storage.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
9

Jun, Ho Huh Jun Ho. „Trustworthy logging for virtual organisations“. Thesis, University of Oxford, 2010. http://ora.ox.ac.uk/objects/uuid:7266bcda-a82b-4b4f-9ec5-d46f8f3573a0.

Der volle Inhalt der Quelle
Annotation:
In order to securely monitor user or system activities and detect malicious attempts across a distributed system, provision of trustworthy audit and logging services is necessary. Existing audit-based monitoring services, however, are often prone to compromise due to the lack of guarantees of log integrity, confidentiality, and availability. This thesis presents several use cases where these properties are essential, conducts a threat analysis on these use cases, and identifies key security requirements from the threats and their risks. Then, this thesis proposes a log generation and reconciliation infrastructure in which the requirements are satisfied and threats are mitigated. Applications usually expose a weak link in the way logs are generated and protected. In the proposed logging system, important application events are involuntarily recorded through a trustworthy logging component operating inside a privileged virtual machine. Virtual machine isolation makes it infeasible for applications to bypass the logging component. Trusted Computing attestation allows users to verify the logging properties of remote systems, and ensure that the collected logs are trustworthy. Despite ongoing research in the area of usable security for distributed systems, there remains a `trust gap' between the users' requirements and current technological capabilities. To bridge this `trust gap', this thesis also proposes two different types of distributed systems, one applicable for a computational system and the other for a distributed data system. Central to these systems is the configuration resolver which maintains a list of trustworthy participants available in the virtual organisation. Users submit their jobs to the configuration resolver, knowing that their jobs will be dispatched to trustworthy participants and executed in protected environments. As a form of evaluation, this thesis suggests how these ideas could be integrated with existing systems, and highlights the potential security enhancements.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
10

Banchs, Rafael Enrique. „Time harmonic field electric logging /“. Digital version accessible at:, 1998. http://wwwlib.umi.com/cr/utexas/main.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen

Bücher zum Thema "Logging"

1

(Firm), Robertson Geologging. Borehole logging. Deganwy: Robertson Geologging, 1997.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
2

Society of Petroleum Engineers of AIME., Hrsg. Production logging. Richardson, TX: Society of Petroleum Engineers, 1985.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
3

1927-, Keller George Vernon, Hrsg. Induction logging. Amsterdam: Elsevier, 1989.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
4

L, Campbell Frank, Hrsg. Well logging II: Electric and acoustic logging. New York: Henry L. Doherty Memorial Fund of AIME, Society of Petroleum Engineers, 1986.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
5

Chin, Wilson C. Electromagnetic Well Logging. Hoboken, NJ, USA: John Wiley & Sons, Inc., 2014. http://dx.doi.org/10.1002/9781118835074.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
6

Sainson, Stéphane. Electromagnetic Seabed Logging. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-45355-2.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
7

Koshak, George. Koshak Brothers logging. Friendship, Wis: New Past Press, 1998.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
8

Elias. Reduced impact logging. Bogor: IPB Press, 2002.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
9

Society of Petroleum Engineers (U.S.), Hrsg. Openhole well logging. Richardson, TX: Society of Petroleum Engineers, 1986.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
10

Martin, Mary L. Logging long ago. Atglen, PA: Schiffer Pub., 2006.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen

Buchteile zum Thema "Logging"

1

Plattner, Hasso. „Logging“. In Lehrbuch In-Memory Data Management, 191–99. Wiesbaden: Springer Fachmedien Wiesbaden, 2013. http://dx.doi.org/10.1007/978-3-658-03213-5_28.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
2

Schwenkler, Thomas. „Logging“. In Sicheres Netzwerkmanagement, 151–67. Berlin, Heidelberg: Springer Berlin Heidelberg, 2006. http://dx.doi.org/10.1007/3-540-31287-0_5.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
3

Plattner, Hasso. „Logging“. In A Course in In-Memory Data Management, 185–92. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-36524-9_28.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
4

Edwards, Elsy. „Logging“. In Issues & Arguments, 210–18. London: Macmillan Education UK, 1989. http://dx.doi.org/10.1007/978-1-349-11090-2_35.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
5

Noble, Elizabeth. „Logging“. In Pro T-SQL 2019, 345–60. Berkeley, CA: Apress, 2020. http://dx.doi.org/10.1007/978-1-4842-5590-2_14.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
6

Schwichtenberg, Holger. „Logging“. In Modern Data Access with Entity Framework Core, 275–85. Berkeley, CA: Apress, 2018. http://dx.doi.org/10.1007/978-1-4842-3552-2_12.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
7

Putrady, Ecky. „Logging“. In Practical Web Development with Haskell, 69–83. Berkeley, CA: Apress, 2018. http://dx.doi.org/10.1007/978-1-4842-3739-7_4.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
8

O’Leary, Mike. „Logging“. In Cyber Operations, 283–309. Berkeley, CA: Apress, 2015. http://dx.doi.org/10.1007/978-1-4842-0457-3_8.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
9

Plattner, Hasso. „Logging“. In A Course in In-Memory Data Management, 197–205. Berlin, Heidelberg: Springer Berlin Heidelberg, 2014. http://dx.doi.org/10.1007/978-3-642-55270-0_29.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
10

Duft, Markus. „Logging“. In Eclipse TEA Revealed, 45–51. Berkeley, CA: Apress, 2018. http://dx.doi.org/10.1007/978-1-4842-4093-9_4.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen

Konferenzberichte zum Thema "Logging"

1

Bogatinovski, Jasmin, und Odej Kao. „Auto-Logging: AI-centred Logging Instrumentation“. In 2023 IEEE/ACM 45th International Conference on Software Engineering: New Ideas and Emerging Results (ICSE-NIER). IEEE, 2023. http://dx.doi.org/10.1109/icse-nier58687.2023.00023.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
2

Lovell, M. A., P. Harvey und J. Lofts. „Geochemical Logging“. In 3rd International Congress of the Brazilian Geophysical Society. European Association of Geoscientists & Engineers, 1993. http://dx.doi.org/10.3997/2214-4609-pdb.324.964.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
3

Yao, Chang, Divyakant Agrawal, Gang Chen, Beng Chin Ooi und Sai Wu. „Adaptive Logging“. In SIGMOD/PODS'16: International Conference on Management of Data. New York, NY, USA: ACM, 2016. http://dx.doi.org/10.1145/2882903.2915208.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
4

Gemmell, Jim. „Life-logging, thing-logging and the internet of things“. In the 2014 workshop. New York, New York, USA: ACM Press, 2014. http://dx.doi.org/10.1145/2611264.2611276.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
5

Sueda, Koh, Henry Been-Lirn Duh und Jun Rekimot. „Social life logging“. In the 10th asia pacific conference. New York, New York, USA: ACM Press, 2012. http://dx.doi.org/10.1145/2350046.2350058.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
6

Kabinna, Suhas, Cor-Paul Bezemer, Weiyi Shang und Ahmed E. Hassan. „Logging library migrations“. In ICSE '16: 38th International Conference on Software Engineering. New York, NY, USA: ACM, 2016. http://dx.doi.org/10.1145/2901739.2901769.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
7

Ferraro, Sara, Alice Meniconi, Sara Gianguzza und Giulia Pistolesi. „TWINY emotional logging“. In the 2014 ACM International Symposium. New York, New York, USA: ACM Press, 2014. http://dx.doi.org/10.1145/2641248.2641275.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
8

Bonnie, Ron J. M., Ridvan Akkurt, Hilal Al-Waheed, Charles M. Bradford, Ramsin Y. Eyvazzdeh, E. Craig Phillips, Prabhakar Aadireddy und Ehab Negm. „Wireline T1 Logging“. In SPE Annual Technical Conference and Exhibition. Society of Petroleum Engineers, 2003. http://dx.doi.org/10.2118/84483-ms.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
9

Zitnik, Tomislav, und Zoran Bosic. „Operations Wisdom Logging“. In 2022 45th Jubilee International Convention on Information, Communication and Electronic Technology (MIPRO). IEEE, 2022. http://dx.doi.org/10.23919/mipro55190.2022.9803373.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
10

Kim, Yi-Reun, Kyu-Young Whang und Il-Yeol Song. „Page-differential logging“. In the 2010 international conference. New York, New York, USA: ACM Press, 2010. http://dx.doi.org/10.1145/1807167.1807208.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen

Berichte der Organisationen zum Thema "Logging"

1

Douma, M., J. A. Hunter und R. L. Good. Borehole geophysical logging. Natural Resources Canada/ESS/Scientific and Technical Publishing Services, 1999. http://dx.doi.org/10.4095/210371.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
2

Hunter, J. A., P. J. Kurfurst, S. M. Birk, R. A. Burns und R L Good. Borehole Geophysical Logging. Natural Resources Canada/ESS/Scientific and Technical Publishing Services, 1991. http://dx.doi.org/10.4095/132225.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
3

Douma, M. Borehole geophysical logging. Natural Resources Canada/ESS/Scientific and Technical Publishing Services, 1997. http://dx.doi.org/10.4095/299325.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
4

Levy, G. M., und J. D. McNeill. Transient electromagnetic borehole logging. Natural Resources Canada/ESS/Scientific and Technical Publishing Services, 1986. http://dx.doi.org/10.4095/123605.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
5

Anderson, David W. EE-3A Logging Report. Office of Scientific and Technical Information (OSTI), Dezember 1993. http://dx.doi.org/10.2172/1248147.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
6

Anderson, David W. Addendum to Logging Report. Office of Scientific and Technical Information (OSTI), November 1995. http://dx.doi.org/10.2172/1248155.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
7

Schreck, M., und A. H. Quatmann-Hense. Multi-Sensor Core Logging. Natural Resources Canada/ESS/Scientific and Technical Publishing Services, 2015. http://dx.doi.org/10.4095/295971.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
8

Morgan, Todd A., Timothy P. Spoelma, Charles E. Keegan, Alfred L. Chase und Michael T. Thompson. Montana Logging Utilization, 2002. Ft. Collins, CO: U.S. Department of Agriculture, Forest Service, Rocky Mountain Research Station, 2005. http://dx.doi.org/10.2737/rmrs-rp-52.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
9

Webster, B. Time domain IP borehole logging. Natural Resources Canada/ESS/Scientific and Technical Publishing Services, 1986. http://dx.doi.org/10.4095/123609.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
10

Henfling, J. A., und R. A. Normann. Precision pressure/temperature logging tool. Office of Scientific and Technical Information (OSTI), Januar 1998. http://dx.doi.org/10.2172/645495.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
Wir bieten Rabatte auf alle Premium-Pläne für Autoren, deren Werke in thematische Literatursammlungen aufgenommen wurden. Kontaktieren Sie uns, um einen einzigartigen Promo-Code zu erhalten!

Zur Bibliographie