Academic literature on the topic 'Logging'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Logging.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Logging"
Zhiyou, Liu, Huo Jinghuan, and Zhu Xiaogang. "The application of digital logging in exploration of Jiang Cang coalfield in Qinghai province." International Journal of Geology 1, no. 1 (July 21, 2016): 44. http://dx.doi.org/10.26789/ijg.2016.006.
Full textPrice, Blaine A., Avelie Stuart, Gul Calikli, Ciaran Mccormick, Vikram Mehta, Luke Hutton, Arosha K. Bandara, Mark Levine, and Bashar Nuseibeh. "Logging you, Logging me." Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies 1, no. 2 (June 30, 2017): 1–18. http://dx.doi.org/10.1145/3090087.
Full textStudwell, William E. "Logging on and Cata-Logging." Behavioral & Social Sciences Librarian 16, no. 1 (September 22, 1997): 69–71. http://dx.doi.org/10.1300/j103v16n01_06.
Full textde Silva, Amal P., and W. Keith Patterson. "Influence of Root Flooding Interval on Phytophthora Root Rot of Blueberry." HortScience 32, no. 3 (June 1997): 468D—468. http://dx.doi.org/10.21273/hortsci.32.3.468d.
Full textLin, Jiunn-Cheng, Jun-Yen Lee, and Wan-Yu Liu. "Risk Analysis of Regions with Suspicious Illegal Logging and Their Trade Flows." Sustainability 13, no. 6 (March 23, 2021): 3549. http://dx.doi.org/10.3390/su13063549.
Full textNurhadiyanto, Lucky. "ALUR PELACAKAN PEMBALAKAN LIAR (ILLEGAL LOGGING) MELALUI PENDEKATAN PENCUCIAN UANG." SISI LAIN REALITA 1, no. 2 (December 11, 2016): 33–46. http://dx.doi.org/10.25299/sisilainrealita.2016.vol1(2).1385.
Full textSolt, John. "Treacherous Logging." Voice of Intellectual Man- An International Journal 9, no. 2 (2019): 151. http://dx.doi.org/10.5958/2319-4308.2019.00025.2.
Full textMueller, H. Gustav. "Data logging." Hearing Journal 60, no. 10 (October 2007): 19. http://dx.doi.org/10.1097/01.hj.0000295442.16133.d7.
Full textBrown, Alastair. "Selective logging." Nature Climate Change 2, no. 1 (December 20, 2011): 23. http://dx.doi.org/10.1038/nclimate1361.
Full textJones, S., SM Gatford, T. Do, and S. Walker. "Transaction logging." Journal of Documentation 53, no. 1 (March 1997): 35–50. http://dx.doi.org/10.1108/eum0000000007189.
Full textDissertations / Theses on the topic "Logging"
Karlsson, Tobias, and Andreas Pettersson. "Software keystroke logging : Automatisering av skydd mot software keystroke logging." Thesis, Linnéuniversitetet, Institutionen för datavetenskap, fysik och matematik, DFM, 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-19618.
Full textDetta arbete utvecklar en lösning som automatiserar skydd mot mjukvarukeyloggers. Keystroke loggers kan användas illegalt för att registrera en användares knappnedtryckningar och på så vis komma över känslig information. Lösningen testkörs på två olika nätverk och effektiviteten mäts. Nätverket representerar ett företagsnätverk som använder operativsystemet Windows med katalogtjänsten Active Directory. Ett skript utvecklades för att lösa automatiseringsfrågan. Skriptet exekverade automatiskt de program som behövdes för att rensa nätverket helt från de keystroke loggers vi implementerat och det tog mindre än en minut att köra.
Sluss, Richard Gordon. "Managerial and operational characteristics of "safety successful" logging contractors." Thesis, This resource online, 1992. http://scholar.lib.vt.edu/theses/available/etd-09122009-040333/.
Full textLoving, Easton. "Components of logging costs." Thesis, This resource online, 1991. http://scholar.lib.vt.edu/theses/available/etd-10222009-124937/.
Full textSklar, Howard Fred. "Nuclear magnetic resonance logging." Thesis, Massachusetts Institute of Technology, 1997. http://hdl.handle.net/1721.1/10503.
Full textIncludes bibliographical references (leaves 119-121).
by Howard Fred Sklar.
M.S.
Mendelson, J. D. (James D. ). "Petroleum source rock logging." Thesis, Massachusetts Institute of Technology, 1985. http://hdl.handle.net/1721.1/15126.
Full textMiyata, Edwin S. "An investigation of the monocable system for cable yarding of small, low-value trees on steep, difficult sites /." Thesis, Connect to this title online; UW restricted, 1991. http://hdl.handle.net/1773/7061.
Full textBrodbeck, Arnold M. "Timber industry consolidation and the need for scale appropriate harvesting mechanisms in Alabama's black belt." Auburn, Ala., 2005. http://repo.lib.auburn.edu/2005%20Summer/master's/BRODBECK_ARNOLD_5.pdf.
Full textPulls, Tobias. "Preserving Privacy in Transparency Logging." Doctoral thesis, Karlstads universitet, Institutionen för matematik och datavetenskap, 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:kau:diva-35918.
Full textThe subject of this dissertation is the construction of privacy-enhancing technologies (PETs) for transparency logging, a technology at the intersection of privacy, transparency, and accountability. Transparency logging facilitates the transportation of data from service providers to users of services and is therefore a key enabler for ex-post transparency-enhancing tools (TETs). Ex-post transparency provides information to users about how their personal data have been processed by service providers, and is a prerequisite for accountability: you cannot hold a controller accountable for what is unknown. We present three generations of PETs for transparency logging to which we contributed. We start with early work that defined the setting as a foundation and build upon it to increase both the privacy protections and the utility of the data sent through transparency logging. Our contributions include the first provably secure privacy-preserving transparency logging scheme and a forward-secure append-only persistent authenticated data structure tailored to the transparency logging setting. Applications of our work range from notifications and deriving data disclosures for the Data Track tool (an ex-post TET) to secure evidence storage.
Jun, Ho Huh Jun Ho. "Trustworthy logging for virtual organisations." Thesis, University of Oxford, 2010. http://ora.ox.ac.uk/objects/uuid:7266bcda-a82b-4b4f-9ec5-d46f8f3573a0.
Full textBanchs, Rafael Enrique. "Time harmonic field electric logging /." Digital version accessible at:, 1998. http://wwwlib.umi.com/cr/utexas/main.
Full textBooks on the topic "Logging"
(Firm), Robertson Geologging. Borehole logging. Deganwy: Robertson Geologging, 1997.
Find full textSociety of Petroleum Engineers of AIME., ed. Production logging. Richardson, TX: Society of Petroleum Engineers, 1985.
Find full text1927-, Keller George Vernon, ed. Induction logging. Amsterdam: Elsevier, 1989.
Find full textL, Campbell Frank, ed. Well logging II: Electric and acoustic logging. New York: Henry L. Doherty Memorial Fund of AIME, Society of Petroleum Engineers, 1986.
Find full textChin, Wilson C. Electromagnetic Well Logging. Hoboken, NJ, USA: John Wiley & Sons, Inc., 2014. http://dx.doi.org/10.1002/9781118835074.
Full textSainson, Stéphane. Electromagnetic Seabed Logging. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-45355-2.
Full textKoshak, George. Koshak Brothers logging. Friendship, Wis: New Past Press, 1998.
Find full textElias. Reduced impact logging. Bogor: IPB Press, 2002.
Find full textSociety of Petroleum Engineers (U.S.), ed. Openhole well logging. Richardson, TX: Society of Petroleum Engineers, 1986.
Find full textMartin, Mary L. Logging long ago. Atglen, PA: Schiffer Pub., 2006.
Find full textBook chapters on the topic "Logging"
Plattner, Hasso. "Logging." In Lehrbuch In-Memory Data Management, 191–99. Wiesbaden: Springer Fachmedien Wiesbaden, 2013. http://dx.doi.org/10.1007/978-3-658-03213-5_28.
Full textSchwenkler, Thomas. "Logging." In Sicheres Netzwerkmanagement, 151–67. Berlin, Heidelberg: Springer Berlin Heidelberg, 2006. http://dx.doi.org/10.1007/3-540-31287-0_5.
Full textPlattner, Hasso. "Logging." In A Course in In-Memory Data Management, 185–92. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-36524-9_28.
Full textEdwards, Elsy. "Logging." In Issues & Arguments, 210–18. London: Macmillan Education UK, 1989. http://dx.doi.org/10.1007/978-1-349-11090-2_35.
Full textNoble, Elizabeth. "Logging." In Pro T-SQL 2019, 345–60. Berkeley, CA: Apress, 2020. http://dx.doi.org/10.1007/978-1-4842-5590-2_14.
Full textSchwichtenberg, Holger. "Logging." In Modern Data Access with Entity Framework Core, 275–85. Berkeley, CA: Apress, 2018. http://dx.doi.org/10.1007/978-1-4842-3552-2_12.
Full textPutrady, Ecky. "Logging." In Practical Web Development with Haskell, 69–83. Berkeley, CA: Apress, 2018. http://dx.doi.org/10.1007/978-1-4842-3739-7_4.
Full textO’Leary, Mike. "Logging." In Cyber Operations, 283–309. Berkeley, CA: Apress, 2015. http://dx.doi.org/10.1007/978-1-4842-0457-3_8.
Full textPlattner, Hasso. "Logging." In A Course in In-Memory Data Management, 197–205. Berlin, Heidelberg: Springer Berlin Heidelberg, 2014. http://dx.doi.org/10.1007/978-3-642-55270-0_29.
Full textDuft, Markus. "Logging." In Eclipse TEA Revealed, 45–51. Berkeley, CA: Apress, 2018. http://dx.doi.org/10.1007/978-1-4842-4093-9_4.
Full textConference papers on the topic "Logging"
Bogatinovski, Jasmin, and Odej Kao. "Auto-Logging: AI-centred Logging Instrumentation." In 2023 IEEE/ACM 45th International Conference on Software Engineering: New Ideas and Emerging Results (ICSE-NIER). IEEE, 2023. http://dx.doi.org/10.1109/icse-nier58687.2023.00023.
Full textLovell, M. A., P. Harvey, and J. Lofts. "Geochemical Logging." In 3rd International Congress of the Brazilian Geophysical Society. European Association of Geoscientists & Engineers, 1993. http://dx.doi.org/10.3997/2214-4609-pdb.324.964.
Full textYao, Chang, Divyakant Agrawal, Gang Chen, Beng Chin Ooi, and Sai Wu. "Adaptive Logging." In SIGMOD/PODS'16: International Conference on Management of Data. New York, NY, USA: ACM, 2016. http://dx.doi.org/10.1145/2882903.2915208.
Full textGemmell, Jim. "Life-logging, thing-logging and the internet of things." In the 2014 workshop. New York, New York, USA: ACM Press, 2014. http://dx.doi.org/10.1145/2611264.2611276.
Full textSueda, Koh, Henry Been-Lirn Duh, and Jun Rekimot. "Social life logging." In the 10th asia pacific conference. New York, New York, USA: ACM Press, 2012. http://dx.doi.org/10.1145/2350046.2350058.
Full textKabinna, Suhas, Cor-Paul Bezemer, Weiyi Shang, and Ahmed E. Hassan. "Logging library migrations." In ICSE '16: 38th International Conference on Software Engineering. New York, NY, USA: ACM, 2016. http://dx.doi.org/10.1145/2901739.2901769.
Full textFerraro, Sara, Alice Meniconi, Sara Gianguzza, and Giulia Pistolesi. "TWINY emotional logging." In the 2014 ACM International Symposium. New York, New York, USA: ACM Press, 2014. http://dx.doi.org/10.1145/2641248.2641275.
Full textBonnie, Ron J. M., Ridvan Akkurt, Hilal Al-Waheed, Charles M. Bradford, Ramsin Y. Eyvazzdeh, E. Craig Phillips, Prabhakar Aadireddy, and Ehab Negm. "Wireline T1 Logging." In SPE Annual Technical Conference and Exhibition. Society of Petroleum Engineers, 2003. http://dx.doi.org/10.2118/84483-ms.
Full textZitnik, Tomislav, and Zoran Bosic. "Operations Wisdom Logging." In 2022 45th Jubilee International Convention on Information, Communication and Electronic Technology (MIPRO). IEEE, 2022. http://dx.doi.org/10.23919/mipro55190.2022.9803373.
Full textKim, Yi-Reun, Kyu-Young Whang, and Il-Yeol Song. "Page-differential logging." In the 2010 international conference. New York, New York, USA: ACM Press, 2010. http://dx.doi.org/10.1145/1807167.1807208.
Full textReports on the topic "Logging"
Douma, M., J. A. Hunter, and R. L. Good. Borehole geophysical logging. Natural Resources Canada/ESS/Scientific and Technical Publishing Services, 1999. http://dx.doi.org/10.4095/210371.
Full textHunter, J. A., P. J. Kurfurst, S. M. Birk, R. A. Burns, and R L Good. Borehole Geophysical Logging. Natural Resources Canada/ESS/Scientific and Technical Publishing Services, 1991. http://dx.doi.org/10.4095/132225.
Full textDouma, M. Borehole geophysical logging. Natural Resources Canada/ESS/Scientific and Technical Publishing Services, 1997. http://dx.doi.org/10.4095/299325.
Full textLevy, G. M., and J. D. McNeill. Transient electromagnetic borehole logging. Natural Resources Canada/ESS/Scientific and Technical Publishing Services, 1986. http://dx.doi.org/10.4095/123605.
Full textAnderson, David W. EE-3A Logging Report. Office of Scientific and Technical Information (OSTI), December 1993. http://dx.doi.org/10.2172/1248147.
Full textAnderson, David W. Addendum to Logging Report. Office of Scientific and Technical Information (OSTI), November 1995. http://dx.doi.org/10.2172/1248155.
Full textSchreck, M., and A. H. Quatmann-Hense. Multi-Sensor Core Logging. Natural Resources Canada/ESS/Scientific and Technical Publishing Services, 2015. http://dx.doi.org/10.4095/295971.
Full textMorgan, Todd A., Timothy P. Spoelma, Charles E. Keegan, Alfred L. Chase, and Michael T. Thompson. Montana Logging Utilization, 2002. Ft. Collins, CO: U.S. Department of Agriculture, Forest Service, Rocky Mountain Research Station, 2005. http://dx.doi.org/10.2737/rmrs-rp-52.
Full textWebster, B. Time domain IP borehole logging. Natural Resources Canada/ESS/Scientific and Technical Publishing Services, 1986. http://dx.doi.org/10.4095/123609.
Full textHenfling, J. A., and R. A. Normann. Precision pressure/temperature logging tool. Office of Scientific and Technical Information (OSTI), January 1998. http://dx.doi.org/10.2172/645495.
Full text