Academic literature on the topic 'Logging'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Logging.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Logging"

1

Zhiyou, Liu, Huo Jinghuan, and Zhu Xiaogang. "The application of digital logging in exploration of Jiang Cang coalfield in Qinghai province." International Journal of Geology 1, no. 1 (July 21, 2016): 44. http://dx.doi.org/10.26789/ijg.2016.006.

Full text
Abstract:
A lot of well logging on to Jiang Cang coalfield in the past work and achieved good results, but due to differ in age, instrumentation equipment and method were different. In order to understand the application effect of the equipment used in the area now and in order to provide the basis for the future working to choose the appropriate logging parameters and well logging interpretation, we chosed GJS - 1 b intelligent engineering logging system produced by Chongqing geological instrument factory in Jiang Cang mining area, we collected the data when cable were ascending, according to 《the requirements of the rules of coalfield geophysical logging》, JGS - 1 b instrument full hole resistivity logging velocity of 3 m/s, the sampling interval was 5 cm, acoustic logging measurement parameter for the acoustic time, adopt the device of single-emission and double-receiving, detectorsource space was 0.5 meters, 0.7 meters, the full hole velocity was 6 m/s, the sampling interval was 10 cm.In this paper, we introduce the application of multiple well logging method in coalfield geology through to the logging examples in Mu Li Jang Cang coalfield four field of qinghai province, the effect was remarkable
APA, Harvard, Vancouver, ISO, and other styles
2

Price, Blaine A., Avelie Stuart, Gul Calikli, Ciaran Mccormick, Vikram Mehta, Luke Hutton, Arosha K. Bandara, Mark Levine, and Bashar Nuseibeh. "Logging you, Logging me." Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies 1, no. 2 (June 30, 2017): 1–18. http://dx.doi.org/10.1145/3090087.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Studwell, William E. "Logging on and Cata-Logging." Behavioral & Social Sciences Librarian 16, no. 1 (September 22, 1997): 69–71. http://dx.doi.org/10.1300/j103v16n01_06.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

de Silva, Amal P., and W. Keith Patterson. "Influence of Root Flooding Interval on Phytophthora Root Rot of Blueberry." HortScience 32, no. 3 (June 1997): 468D—468. http://dx.doi.org/10.21273/hortsci.32.3.468d.

Full text
Abstract:
Phytophthora root rot is a severe disease on blueberry (Vaccinium corymbosum L.) in poorly drained soils. The objective of the study was to determine the frequency of water-logged conditions on disease severity of blueberry. Phytophthora cinnamomi was grown on rice hulls and incorporated into the soil at the rate of 10% v/v. Water logging conditions were inflicted for 48 hr on mulched and non–mulched blueberry plants at 1-, 2-, and 4-week intervals. Non-water logging conditions were used on both mulched and non-mulched control plants. There was a significant linear relationship between disease severity of shoots and roots and the frequency of water-logging conditions. Disease symptoms were low in control plants, but disease ratings were high in mulched and non-mulched plants that were treated with water-logging conditions every week. There was also a linear trend between shoot dry weight and root dry weight of plants with frequency of water logging. Higher dry weights were seen on control plants. There was a significantly higher shoot, root dry weight and number of leaves of mulched plants than non-mulched plants. The percentage of infection on roots were high with frequent water logging. The study revealed high disease incidence with frequent water loggings. However, growth of mulched blueberry plants were comparable in control plants and plants that were subjected to water logging at 4-week intervals.
APA, Harvard, Vancouver, ISO, and other styles
5

Lin, Jiunn-Cheng, Jun-Yen Lee, and Wan-Yu Liu. "Risk Analysis of Regions with Suspicious Illegal Logging and Their Trade Flows." Sustainability 13, no. 6 (March 23, 2021): 3549. http://dx.doi.org/10.3390/su13063549.

Full text
Abstract:
To eradicate illegally harvested wood sources in its domestic market, it is critical to conduct risk assessments on wood sourcing in regions with illegal loggings. It is not reliable to use a single indicator to analyze suspicious illegal logging. This study integrates three key global indicators: CPI (Corruption Perceptions Index), HDI (Human Development Indicator), and WGI (The Worldwide Governance Indicators) by applying the entropy weight method to establish a new risk indicator to rank suspicious illegal logging regions. This study aims to establish better risk indicators by considering more factors to assess the risks of illegal logging and its trade flow more reliably. By analyzing roundwood production, Myanmar, Congo, and Nigeria are rated high-risk. Countries such as the U.S., Germany, Canada, and Finland are rated low-risk.
APA, Harvard, Vancouver, ISO, and other styles
6

Nurhadiyanto, Lucky. "ALUR PELACAKAN PEMBALAKAN LIAR (ILLEGAL LOGGING) MELALUI PENDEKATAN PENCUCIAN UANG." SISI LAIN REALITA 1, no. 2 (December 11, 2016): 33–46. http://dx.doi.org/10.25299/sisilainrealita.2016.vol1(2).1385.

Full text
Abstract:
Illegal logging is a part of crime against environment, which has a massive impact on the economy, social, cultural, and ecological. Ironically, majority of the illegal logging’s perpetrators are dominated by “the field criminal”. On the other side, intellectual actors who can control the activities never touch by the law. The money laundering concept can give a new approach to detect the leader actor. The author use follow the money viewpoint, which includes placement, layering, and integration. Qualitative data collection methods is used with in-depth interviews, systematic observation of the behavior, and document analysis. The result is a new paradigm in investigating illegal logging no longer focused on the field actors, but potentially tracking the intellectual actors behind illegal logging.
APA, Harvard, Vancouver, ISO, and other styles
7

Solt, John. "Treacherous Logging." Voice of Intellectual Man- An International Journal 9, no. 2 (2019): 151. http://dx.doi.org/10.5958/2319-4308.2019.00025.2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Mueller, H. Gustav. "Data logging." Hearing Journal 60, no. 10 (October 2007): 19. http://dx.doi.org/10.1097/01.hj.0000295442.16133.d7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Brown, Alastair. "Selective logging." Nature Climate Change 2, no. 1 (December 20, 2011): 23. http://dx.doi.org/10.1038/nclimate1361.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Jones, S., SM Gatford, T. Do, and S. Walker. "Transaction logging." Journal of Documentation 53, no. 1 (March 1997): 35–50. http://dx.doi.org/10.1108/eum0000000007189.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Dissertations / Theses on the topic "Logging"

1

Karlsson, Tobias, and Andreas Pettersson. "Software keystroke logging : Automatisering av skydd mot software keystroke logging." Thesis, Linnéuniversitetet, Institutionen för datavetenskap, fysik och matematik, DFM, 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-19618.

Full text
Abstract:
This piece of work develops a solution that automates protection against software keystroke loggers. Keystroke loggers can be used illegally to register a user's keystrokes and in that way acquire sensitive information. The solution was tested on two different networks and the efficiency was measured. The network represents an enterprise network that uses the operating system Windows along with the directory service Active Directory. A script was developed to solve the automation matter. The script automatically executed the required programs that were needed to clean the network completely from keystroke loggers we had implemented and it took less than one minute to run.
Detta arbete utvecklar en lösning som automatiserar skydd mot mjukvarukeyloggers. Keystroke loggers kan användas illegalt för att registrera en användares knappnedtryckningar och på så vis komma över känslig information. Lösningen testkörs på två olika nätverk och effektiviteten mäts. Nätverket representerar ett företagsnätverk som använder operativsystemet Windows med katalogtjänsten Active Directory. Ett skript utvecklades för att lösa automatiseringsfrågan. Skriptet exekverade automatiskt de program som behövdes för att rensa nätverket helt från de keystroke loggers vi implementerat och det tog mindre än en minut att köra.
APA, Harvard, Vancouver, ISO, and other styles
2

Sluss, Richard Gordon. "Managerial and operational characteristics of "safety successful" logging contractors." Thesis, This resource online, 1992. http://scholar.lib.vt.edu/theses/available/etd-09122009-040333/.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Loving, Easton. "Components of logging costs." Thesis, This resource online, 1991. http://scholar.lib.vt.edu/theses/available/etd-10222009-124937/.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Sklar, Howard Fred. "Nuclear magnetic resonance logging." Thesis, Massachusetts Institute of Technology, 1997. http://hdl.handle.net/1721.1/10503.

Full text
Abstract:
Thesis (M.S.)--Massachusetts Institute of Technology, Dept. of Earth, Atmospheric, and Planetary Sciences, 1997.
Includes bibliographical references (leaves 119-121).
by Howard Fred Sklar.
M.S.
APA, Harvard, Vancouver, ISO, and other styles
5

Mendelson, J. D. (James D. ). "Petroleum source rock logging." Thesis, Massachusetts Institute of Technology, 1985. http://hdl.handle.net/1721.1/15126.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Miyata, Edwin S. "An investigation of the monocable system for cable yarding of small, low-value trees on steep, difficult sites /." Thesis, Connect to this title online; UW restricted, 1991. http://hdl.handle.net/1773/7061.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Brodbeck, Arnold M. "Timber industry consolidation and the need for scale appropriate harvesting mechanisms in Alabama's black belt." Auburn, Ala., 2005. http://repo.lib.auburn.edu/2005%20Summer/master's/BRODBECK_ARNOLD_5.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Pulls, Tobias. "Preserving Privacy in Transparency Logging." Doctoral thesis, Karlstads universitet, Institutionen för matematik och datavetenskap, 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:kau:diva-35918.

Full text
Abstract:
The subject of this dissertation is the construction of privacy-enhancing technologies (PETs) for transparency logging, a technology at the intersection of privacy, transparency, and accountability. Transparency logging facilitates the transportation of data from service providers to users of services and is therefore a key enabler for ex-post transparency-enhancing tools (TETs). Ex-post transparency provides information to users about how their personal data have been processed by service providers, and is a prerequisite for accountability: you cannot hold a controller accountable for what is unknown. We present three generations of PETs for transparency logging to which we contributed. We start with early work that defined the setting as a foundation and build upon it to increase both the privacy protections and the utility of the data sent through transparency logging. Our contributions include the first provably secure privacy-preserving transparency logging scheme and a forward-secure append-only persistent authenticated data structure tailored to the transparency logging setting. Applications of our work range from notifications and deriving data disclosures for the Data Track tool (an ex-post TET) to secure evidence storage.
The subject of this dissertation is the construction of privacy-enhancing technologies (PETs) for transparency logging, a technology at the intersection of privacy, transparency, and accountability. Transparency logging facilitates the transportation of data from service providers to users of services and is therefore a key enabler for ex-post transparency-enhancing tools (TETs). Ex-post transparency provides information to users about how their personal data have been processed by service providers, and is a prerequisite for accountability: you cannot hold a controller accountable for what is unknown. We present three generations of PETs for transparency logging to which we contributed. We start with early work that defined the setting as a foundation and build upon it to increase both the privacy protections and the utility of the data sent through transparency logging. Our contributions include the first provably secure privacy-preserving transparency logging scheme and a forward-secure append-only persistent authenticated data structure tailored to the transparency logging setting. Applications of our work range from notifications and deriving data disclosures for the Data Track tool (an ex-post TET) to secure evidence storage.
APA, Harvard, Vancouver, ISO, and other styles
9

Jun, Ho Huh Jun Ho. "Trustworthy logging for virtual organisations." Thesis, University of Oxford, 2010. http://ora.ox.ac.uk/objects/uuid:7266bcda-a82b-4b4f-9ec5-d46f8f3573a0.

Full text
Abstract:
In order to securely monitor user or system activities and detect malicious attempts across a distributed system, provision of trustworthy audit and logging services is necessary. Existing audit-based monitoring services, however, are often prone to compromise due to the lack of guarantees of log integrity, confidentiality, and availability. This thesis presents several use cases where these properties are essential, conducts a threat analysis on these use cases, and identifies key security requirements from the threats and their risks. Then, this thesis proposes a log generation and reconciliation infrastructure in which the requirements are satisfied and threats are mitigated. Applications usually expose a weak link in the way logs are generated and protected. In the proposed logging system, important application events are involuntarily recorded through a trustworthy logging component operating inside a privileged virtual machine. Virtual machine isolation makes it infeasible for applications to bypass the logging component. Trusted Computing attestation allows users to verify the logging properties of remote systems, and ensure that the collected logs are trustworthy. Despite ongoing research in the area of usable security for distributed systems, there remains a `trust gap' between the users' requirements and current technological capabilities. To bridge this `trust gap', this thesis also proposes two different types of distributed systems, one applicable for a computational system and the other for a distributed data system. Central to these systems is the configuration resolver which maintains a list of trustworthy participants available in the virtual organisation. Users submit their jobs to the configuration resolver, knowing that their jobs will be dispatched to trustworthy participants and executed in protected environments. As a form of evaluation, this thesis suggests how these ideas could be integrated with existing systems, and highlights the potential security enhancements.
APA, Harvard, Vancouver, ISO, and other styles
10

Banchs, Rafael Enrique. "Time harmonic field electric logging /." Digital version accessible at:, 1998. http://wwwlib.umi.com/cr/utexas/main.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "Logging"

1

(Firm), Robertson Geologging. Borehole logging. Deganwy: Robertson Geologging, 1997.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Society of Petroleum Engineers of AIME., ed. Production logging. Richardson, TX: Society of Petroleum Engineers, 1985.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

1927-, Keller George Vernon, ed. Induction logging. Amsterdam: Elsevier, 1989.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

L, Campbell Frank, ed. Well logging II: Electric and acoustic logging. New York: Henry L. Doherty Memorial Fund of AIME, Society of Petroleum Engineers, 1986.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Chin, Wilson C. Electromagnetic Well Logging. Hoboken, NJ, USA: John Wiley & Sons, Inc., 2014. http://dx.doi.org/10.1002/9781118835074.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Sainson, Stéphane. Electromagnetic Seabed Logging. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-45355-2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Koshak, George. Koshak Brothers logging. Friendship, Wis: New Past Press, 1998.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Elias. Reduced impact logging. Bogor: IPB Press, 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Society of Petroleum Engineers (U.S.), ed. Openhole well logging. Richardson, TX: Society of Petroleum Engineers, 1986.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Martin, Mary L. Logging long ago. Atglen, PA: Schiffer Pub., 2006.

Find full text
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Logging"

1

Plattner, Hasso. "Logging." In Lehrbuch In-Memory Data Management, 191–99. Wiesbaden: Springer Fachmedien Wiesbaden, 2013. http://dx.doi.org/10.1007/978-3-658-03213-5_28.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Schwenkler, Thomas. "Logging." In Sicheres Netzwerkmanagement, 151–67. Berlin, Heidelberg: Springer Berlin Heidelberg, 2006. http://dx.doi.org/10.1007/3-540-31287-0_5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Plattner, Hasso. "Logging." In A Course in In-Memory Data Management, 185–92. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-36524-9_28.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Edwards, Elsy. "Logging." In Issues & Arguments, 210–18. London: Macmillan Education UK, 1989. http://dx.doi.org/10.1007/978-1-349-11090-2_35.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Noble, Elizabeth. "Logging." In Pro T-SQL 2019, 345–60. Berkeley, CA: Apress, 2020. http://dx.doi.org/10.1007/978-1-4842-5590-2_14.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Schwichtenberg, Holger. "Logging." In Modern Data Access with Entity Framework Core, 275–85. Berkeley, CA: Apress, 2018. http://dx.doi.org/10.1007/978-1-4842-3552-2_12.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Putrady, Ecky. "Logging." In Practical Web Development with Haskell, 69–83. Berkeley, CA: Apress, 2018. http://dx.doi.org/10.1007/978-1-4842-3739-7_4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

O’Leary, Mike. "Logging." In Cyber Operations, 283–309. Berkeley, CA: Apress, 2015. http://dx.doi.org/10.1007/978-1-4842-0457-3_8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Plattner, Hasso. "Logging." In A Course in In-Memory Data Management, 197–205. Berlin, Heidelberg: Springer Berlin Heidelberg, 2014. http://dx.doi.org/10.1007/978-3-642-55270-0_29.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Duft, Markus. "Logging." In Eclipse TEA Revealed, 45–51. Berkeley, CA: Apress, 2018. http://dx.doi.org/10.1007/978-1-4842-4093-9_4.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Logging"

1

Bogatinovski, Jasmin, and Odej Kao. "Auto-Logging: AI-centred Logging Instrumentation." In 2023 IEEE/ACM 45th International Conference on Software Engineering: New Ideas and Emerging Results (ICSE-NIER). IEEE, 2023. http://dx.doi.org/10.1109/icse-nier58687.2023.00023.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Lovell, M. A., P. Harvey, and J. Lofts. "Geochemical Logging." In 3rd International Congress of the Brazilian Geophysical Society. European Association of Geoscientists & Engineers, 1993. http://dx.doi.org/10.3997/2214-4609-pdb.324.964.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Yao, Chang, Divyakant Agrawal, Gang Chen, Beng Chin Ooi, and Sai Wu. "Adaptive Logging." In SIGMOD/PODS'16: International Conference on Management of Data. New York, NY, USA: ACM, 2016. http://dx.doi.org/10.1145/2882903.2915208.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Gemmell, Jim. "Life-logging, thing-logging and the internet of things." In the 2014 workshop. New York, New York, USA: ACM Press, 2014. http://dx.doi.org/10.1145/2611264.2611276.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Sueda, Koh, Henry Been-Lirn Duh, and Jun Rekimot. "Social life logging." In the 10th asia pacific conference. New York, New York, USA: ACM Press, 2012. http://dx.doi.org/10.1145/2350046.2350058.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Kabinna, Suhas, Cor-Paul Bezemer, Weiyi Shang, and Ahmed E. Hassan. "Logging library migrations." In ICSE '16: 38th International Conference on Software Engineering. New York, NY, USA: ACM, 2016. http://dx.doi.org/10.1145/2901739.2901769.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Ferraro, Sara, Alice Meniconi, Sara Gianguzza, and Giulia Pistolesi. "TWINY emotional logging." In the 2014 ACM International Symposium. New York, New York, USA: ACM Press, 2014. http://dx.doi.org/10.1145/2641248.2641275.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Bonnie, Ron J. M., Ridvan Akkurt, Hilal Al-Waheed, Charles M. Bradford, Ramsin Y. Eyvazzdeh, E. Craig Phillips, Prabhakar Aadireddy, and Ehab Negm. "Wireline T1 Logging." In SPE Annual Technical Conference and Exhibition. Society of Petroleum Engineers, 2003. http://dx.doi.org/10.2118/84483-ms.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Zitnik, Tomislav, and Zoran Bosic. "Operations Wisdom Logging." In 2022 45th Jubilee International Convention on Information, Communication and Electronic Technology (MIPRO). IEEE, 2022. http://dx.doi.org/10.23919/mipro55190.2022.9803373.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Kim, Yi-Reun, Kyu-Young Whang, and Il-Yeol Song. "Page-differential logging." In the 2010 international conference. New York, New York, USA: ACM Press, 2010. http://dx.doi.org/10.1145/1807167.1807208.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Logging"

1

Douma, M., J. A. Hunter, and R. L. Good. Borehole geophysical logging. Natural Resources Canada/ESS/Scientific and Technical Publishing Services, 1999. http://dx.doi.org/10.4095/210371.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Hunter, J. A., P. J. Kurfurst, S. M. Birk, R. A. Burns, and R L Good. Borehole Geophysical Logging. Natural Resources Canada/ESS/Scientific and Technical Publishing Services, 1991. http://dx.doi.org/10.4095/132225.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Douma, M. Borehole geophysical logging. Natural Resources Canada/ESS/Scientific and Technical Publishing Services, 1997. http://dx.doi.org/10.4095/299325.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Levy, G. M., and J. D. McNeill. Transient electromagnetic borehole logging. Natural Resources Canada/ESS/Scientific and Technical Publishing Services, 1986. http://dx.doi.org/10.4095/123605.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Anderson, David W. EE-3A Logging Report. Office of Scientific and Technical Information (OSTI), December 1993. http://dx.doi.org/10.2172/1248147.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Anderson, David W. Addendum to Logging Report. Office of Scientific and Technical Information (OSTI), November 1995. http://dx.doi.org/10.2172/1248155.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Schreck, M., and A. H. Quatmann-Hense. Multi-Sensor Core Logging. Natural Resources Canada/ESS/Scientific and Technical Publishing Services, 2015. http://dx.doi.org/10.4095/295971.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Morgan, Todd A., Timothy P. Spoelma, Charles E. Keegan, Alfred L. Chase, and Michael T. Thompson. Montana Logging Utilization, 2002. Ft. Collins, CO: U.S. Department of Agriculture, Forest Service, Rocky Mountain Research Station, 2005. http://dx.doi.org/10.2737/rmrs-rp-52.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Webster, B. Time domain IP borehole logging. Natural Resources Canada/ESS/Scientific and Technical Publishing Services, 1986. http://dx.doi.org/10.4095/123609.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Henfling, J. A., and R. A. Normann. Precision pressure/temperature logging tool. Office of Scientific and Technical Information (OSTI), January 1998. http://dx.doi.org/10.2172/645495.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography