Gotowa bibliografia na temat „Logging”

Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych

Wybierz rodzaj źródła:

Zobacz listy aktualnych artykułów, książek, rozpraw, streszczeń i innych źródeł naukowych na temat „Logging”.

Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.

Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.

Artykuły w czasopismach na temat "Logging"

1

Price, Blaine A., Avelie Stuart, Gul Calikli, Ciaran Mccormick, Vikram Mehta, Luke Hutton, Arosha K. Bandara, Mark Levine i Bashar Nuseibeh. "Logging you, Logging me". Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies 1, nr 2 (30.06.2017): 1–18. http://dx.doi.org/10.1145/3090087.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
2

Zhiyou, Liu, Huo Jinghuan i Zhu Xiaogang. "The application of digital logging in exploration of Jiang Cang coalfield in Qinghai province". International Journal of Geology 1, nr 1 (21.07.2016): 44. http://dx.doi.org/10.26789/ijg.2016.006.

Pełny tekst źródła
Streszczenie:
A lot of well logging on to Jiang Cang coalfield in the past work and achieved good results, but due to differ in age, instrumentation equipment and method were different. In order to understand the application effect of the equipment used in the area now and in order to provide the basis for the future working to choose the appropriate logging parameters and well logging interpretation, we chosed GJS - 1 b intelligent engineering logging system produced by Chongqing geological instrument factory in Jiang Cang mining area, we collected the data when cable were ascending, according to 《the requirements of the rules of coalfield geophysical logging》, JGS - 1 b instrument full hole resistivity logging velocity of 3 m/s, the sampling interval was 5 cm, acoustic logging measurement parameter for the acoustic time, adopt the device of single-emission and double-receiving, detectorsource space was 0.5 meters, 0.7 meters, the full hole velocity was 6 m/s, the sampling interval was 10 cm.In this paper, we introduce the application of multiple well logging method in coalfield geology through to the logging examples in Mu Li Jang Cang coalfield four field of qinghai province, the effect was remarkable
Style APA, Harvard, Vancouver, ISO itp.
3

Studwell, William E. "Logging on and Cata-Logging". Behavioral & Social Sciences Librarian 16, nr 1 (22.09.1997): 69–71. http://dx.doi.org/10.1300/j103v16n01_06.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
4

de Silva, Amal P., i W. Keith Patterson. "Influence of Root Flooding Interval on Phytophthora Root Rot of Blueberry". HortScience 32, nr 3 (czerwiec 1997): 468D—468. http://dx.doi.org/10.21273/hortsci.32.3.468d.

Pełny tekst źródła
Streszczenie:
Phytophthora root rot is a severe disease on blueberry (Vaccinium corymbosum L.) in poorly drained soils. The objective of the study was to determine the frequency of water-logged conditions on disease severity of blueberry. Phytophthora cinnamomi was grown on rice hulls and incorporated into the soil at the rate of 10% v/v. Water logging conditions were inflicted for 48 hr on mulched and non–mulched blueberry plants at 1-, 2-, and 4-week intervals. Non-water logging conditions were used on both mulched and non-mulched control plants. There was a significant linear relationship between disease severity of shoots and roots and the frequency of water-logging conditions. Disease symptoms were low in control plants, but disease ratings were high in mulched and non-mulched plants that were treated with water-logging conditions every week. There was also a linear trend between shoot dry weight and root dry weight of plants with frequency of water logging. Higher dry weights were seen on control plants. There was a significantly higher shoot, root dry weight and number of leaves of mulched plants than non-mulched plants. The percentage of infection on roots were high with frequent water logging. The study revealed high disease incidence with frequent water loggings. However, growth of mulched blueberry plants were comparable in control plants and plants that were subjected to water logging at 4-week intervals.
Style APA, Harvard, Vancouver, ISO itp.
5

Lin, Jiunn-Cheng, Jun-Yen Lee i Wan-Yu Liu. "Risk Analysis of Regions with Suspicious Illegal Logging and Their Trade Flows". Sustainability 13, nr 6 (23.03.2021): 3549. http://dx.doi.org/10.3390/su13063549.

Pełny tekst źródła
Streszczenie:
To eradicate illegally harvested wood sources in its domestic market, it is critical to conduct risk assessments on wood sourcing in regions with illegal loggings. It is not reliable to use a single indicator to analyze suspicious illegal logging. This study integrates three key global indicators: CPI (Corruption Perceptions Index), HDI (Human Development Indicator), and WGI (The Worldwide Governance Indicators) by applying the entropy weight method to establish a new risk indicator to rank suspicious illegal logging regions. This study aims to establish better risk indicators by considering more factors to assess the risks of illegal logging and its trade flow more reliably. By analyzing roundwood production, Myanmar, Congo, and Nigeria are rated high-risk. Countries such as the U.S., Germany, Canada, and Finland are rated low-risk.
Style APA, Harvard, Vancouver, ISO itp.
6

Solt, John. "Treacherous Logging". Voice of Intellectual Man- An International Journal 9, nr 2 (2019): 151. http://dx.doi.org/10.5958/2319-4308.2019.00025.2.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
7

Mueller, H. Gustav. "Data logging". Hearing Journal 60, nr 10 (październik 2007): 19. http://dx.doi.org/10.1097/01.hj.0000295442.16133.d7.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
8

Brown, Alastair. "Selective logging". Nature Climate Change 2, nr 1 (20.12.2011): 23. http://dx.doi.org/10.1038/nclimate1361.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
9

Jones, S., SM Gatford, T. Do i S. Walker. "Transaction logging". Journal of Documentation 53, nr 1 (marzec 1997): 35–50. http://dx.doi.org/10.1108/eum0000000007189.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
10

Fehlmann, Gaëlle, i Andrew J. King. "Bio-logging". Current Biology 26, nr 18 (wrzesień 2016): R830—R831. http://dx.doi.org/10.1016/j.cub.2016.05.033.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.

Rozprawy doktorskie na temat "Logging"

1

Karlsson, Tobias, i Andreas Pettersson. "Software keystroke logging : Automatisering av skydd mot software keystroke logging". Thesis, Linnéuniversitetet, Institutionen för datavetenskap, fysik och matematik, DFM, 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-19618.

Pełny tekst źródła
Streszczenie:
This piece of work develops a solution that automates protection against software keystroke loggers. Keystroke loggers can be used illegally to register a user's keystrokes and in that way acquire sensitive information. The solution was tested on two different networks and the efficiency was measured. The network represents an enterprise network that uses the operating system Windows along with the directory service Active Directory. A script was developed to solve the automation matter. The script automatically executed the required programs that were needed to clean the network completely from keystroke loggers we had implemented and it took less than one minute to run.
Detta arbete utvecklar en lösning som automatiserar skydd mot mjukvarukeyloggers. Keystroke loggers kan användas illegalt för att registrera en användares knappnedtryckningar och på så vis komma över känslig information. Lösningen testkörs på två olika nätverk och effektiviteten mäts. Nätverket representerar ett företagsnätverk som använder operativsystemet Windows med katalogtjänsten Active Directory. Ett skript utvecklades för att lösa automatiseringsfrågan. Skriptet exekverade automatiskt de program som behövdes för att rensa nätverket helt från de keystroke loggers vi implementerat och det tog mindre än en minut att köra.
Style APA, Harvard, Vancouver, ISO itp.
2

Sluss, Richard Gordon. "Managerial and operational characteristics of "safety successful" logging contractors". Thesis, This resource online, 1992. http://scholar.lib.vt.edu/theses/available/etd-09122009-040333/.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
3

Loving, Easton. "Components of logging costs". Thesis, This resource online, 1991. http://scholar.lib.vt.edu/theses/available/etd-10222009-124937/.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
4

Sklar, Howard Fred. "Nuclear magnetic resonance logging". Thesis, Massachusetts Institute of Technology, 1997. http://hdl.handle.net/1721.1/10503.

Pełny tekst źródła
Streszczenie:
Thesis (M.S.)--Massachusetts Institute of Technology, Dept. of Earth, Atmospheric, and Planetary Sciences, 1997.
Includes bibliographical references (leaves 119-121).
by Howard Fred Sklar.
M.S.
Style APA, Harvard, Vancouver, ISO itp.
5

Mendelson, J. D. (James D. ). "Petroleum source rock logging". Thesis, Massachusetts Institute of Technology, 1985. http://hdl.handle.net/1721.1/15126.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
6

Miyata, Edwin S. "An investigation of the monocable system for cable yarding of small, low-value trees on steep, difficult sites /". Thesis, Connect to this title online; UW restricted, 1991. http://hdl.handle.net/1773/7061.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
7

Pulls, Tobias. "Preserving Privacy in Transparency Logging". Doctoral thesis, Karlstads universitet, Institutionen för matematik och datavetenskap, 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:kau:diva-35918.

Pełny tekst źródła
Streszczenie:
The subject of this dissertation is the construction of privacy-enhancing technologies (PETs) for transparency logging, a technology at the intersection of privacy, transparency, and accountability. Transparency logging facilitates the transportation of data from service providers to users of services and is therefore a key enabler for ex-post transparency-enhancing tools (TETs). Ex-post transparency provides information to users about how their personal data have been processed by service providers, and is a prerequisite for accountability: you cannot hold a controller accountable for what is unknown. We present three generations of PETs for transparency logging to which we contributed. We start with early work that defined the setting as a foundation and build upon it to increase both the privacy protections and the utility of the data sent through transparency logging. Our contributions include the first provably secure privacy-preserving transparency logging scheme and a forward-secure append-only persistent authenticated data structure tailored to the transparency logging setting. Applications of our work range from notifications and deriving data disclosures for the Data Track tool (an ex-post TET) to secure evidence storage.
The subject of this dissertation is the construction of privacy-enhancing technologies (PETs) for transparency logging, a technology at the intersection of privacy, transparency, and accountability. Transparency logging facilitates the transportation of data from service providers to users of services and is therefore a key enabler for ex-post transparency-enhancing tools (TETs). Ex-post transparency provides information to users about how their personal data have been processed by service providers, and is a prerequisite for accountability: you cannot hold a controller accountable for what is unknown. We present three generations of PETs for transparency logging to which we contributed. We start with early work that defined the setting as a foundation and build upon it to increase both the privacy protections and the utility of the data sent through transparency logging. Our contributions include the first provably secure privacy-preserving transparency logging scheme and a forward-secure append-only persistent authenticated data structure tailored to the transparency logging setting. Applications of our work range from notifications and deriving data disclosures for the Data Track tool (an ex-post TET) to secure evidence storage.
Style APA, Harvard, Vancouver, ISO itp.
8

Jun, Ho Huh Jun Ho. "Trustworthy logging for virtual organisations". Thesis, University of Oxford, 2010. http://ora.ox.ac.uk/objects/uuid:7266bcda-a82b-4b4f-9ec5-d46f8f3573a0.

Pełny tekst źródła
Streszczenie:
In order to securely monitor user or system activities and detect malicious attempts across a distributed system, provision of trustworthy audit and logging services is necessary. Existing audit-based monitoring services, however, are often prone to compromise due to the lack of guarantees of log integrity, confidentiality, and availability. This thesis presents several use cases where these properties are essential, conducts a threat analysis on these use cases, and identifies key security requirements from the threats and their risks. Then, this thesis proposes a log generation and reconciliation infrastructure in which the requirements are satisfied and threats are mitigated. Applications usually expose a weak link in the way logs are generated and protected. In the proposed logging system, important application events are involuntarily recorded through a trustworthy logging component operating inside a privileged virtual machine. Virtual machine isolation makes it infeasible for applications to bypass the logging component. Trusted Computing attestation allows users to verify the logging properties of remote systems, and ensure that the collected logs are trustworthy. Despite ongoing research in the area of usable security for distributed systems, there remains a `trust gap' between the users' requirements and current technological capabilities. To bridge this `trust gap', this thesis also proposes two different types of distributed systems, one applicable for a computational system and the other for a distributed data system. Central to these systems is the configuration resolver which maintains a list of trustworthy participants available in the virtual organisation. Users submit their jobs to the configuration resolver, knowing that their jobs will be dispatched to trustworthy participants and executed in protected environments. As a form of evaluation, this thesis suggests how these ideas could be integrated with existing systems, and highlights the potential security enhancements.
Style APA, Harvard, Vancouver, ISO itp.
9

Banchs, Rafael Enrique. "Time harmonic field electric logging /". Digital version accessible at:, 1998. http://wwwlib.umi.com/cr/utexas/main.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
10

Brodbeck, Arnold M. "Timber industry consolidation and the need for scale appropriate harvesting mechanisms in Alabama's black belt". Auburn, Ala., 2005. http://repo.lib.auburn.edu/2005%20Summer/master's/BRODBECK_ARNOLD_5.pdf.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.

Książki na temat "Logging"

1

Jorden, James R. Well logging II: Electric and acoustic logging. New York: Henry L. Doherty Memorial Fund of AIME, Society of Petroleum Engineers, 1986.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
2

(Firm), Robertson Geologging. Borehole logging. Deganwy: Robertson Geologging, 1997.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
3

Society of Petroleum Engineers of AIME., red. Production logging. Richardson, TX: Society of Petroleum Engineers, 1985.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
4

Kaufman, Alexander A. Induction logging. Amsterdam: Elsevier, 1989.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
5

Strickland, Dan. Algonquin Logging Museum: Logging history in Algonquin Provincial Park. Wyd. 2. Whitney, Ont: Friends of Algonquin Park in cooperation with Ontario Parks, 2008.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
6

Strickland, Dan. Algonquin Logging Museum: Logging history in Algonquin Provincial Park. Whitney, Ont: Friends of Algonquin Park, 1996.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
7

Chin, Wilson C. Electromagnetic Well Logging. Hoboken, NJ, USA: John Wiley & Sons, Inc., 2014. http://dx.doi.org/10.1002/9781118835074.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
8

Sainson, Stéphane. Electromagnetic Seabed Logging. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-45355-2.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
9

Koshak, George. Koshak Brothers logging. Friendship, Wis: New Past Press, 1998.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
10

Elias. Reduced impact logging. Bogor: IPB Press, 2002.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.

Części książek na temat "Logging"

1

Plattner, Hasso. "Logging". W Lehrbuch In-Memory Data Management, 191–99. Wiesbaden: Springer Fachmedien Wiesbaden, 2013. http://dx.doi.org/10.1007/978-3-658-03213-5_28.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
2

Schwenkler, Thomas. "Logging". W Sicheres Netzwerkmanagement, 151–67. Berlin, Heidelberg: Springer Berlin Heidelberg, 2006. http://dx.doi.org/10.1007/3-540-31287-0_5.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
3

Plattner, Hasso. "Logging". W A Course in In-Memory Data Management, 185–92. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-36524-9_28.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
4

Edwards, Elsy. "Logging". W Issues & Arguments, 210–18. London: Macmillan Education UK, 1989. http://dx.doi.org/10.1007/978-1-349-11090-2_35.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
5

Noble, Elizabeth. "Logging". W Pro T-SQL 2019, 345–60. Berkeley, CA: Apress, 2020. http://dx.doi.org/10.1007/978-1-4842-5590-2_14.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
6

Schwichtenberg, Holger. "Logging". W Modern Data Access with Entity Framework Core, 275–85. Berkeley, CA: Apress, 2018. http://dx.doi.org/10.1007/978-1-4842-3552-2_12.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
7

Putrady, Ecky. "Logging". W Practical Web Development with Haskell, 69–83. Berkeley, CA: Apress, 2018. http://dx.doi.org/10.1007/978-1-4842-3739-7_4.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
8

O’Leary, Mike. "Logging". W Cyber Operations, 283–309. Berkeley, CA: Apress, 2015. http://dx.doi.org/10.1007/978-1-4842-0457-3_8.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
9

Plattner, Hasso. "Logging". W A Course in In-Memory Data Management, 197–205. Berlin, Heidelberg: Springer Berlin Heidelberg, 2014. http://dx.doi.org/10.1007/978-3-642-55270-0_29.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
10

Duft, Markus. "Logging". W Eclipse TEA Revealed, 45–51. Berkeley, CA: Apress, 2018. http://dx.doi.org/10.1007/978-1-4842-4093-9_4.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.

Streszczenia konferencji na temat "Logging"

1

Lovell, M. A., P. Harvey i J. Lofts. "Geochemical Logging". W 3rd International Congress of the Brazilian Geophysical Society. European Association of Geoscientists & Engineers, 1993. http://dx.doi.org/10.3997/2214-4609-pdb.324.964.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
2

Yao, Chang, Divyakant Agrawal, Gang Chen, Beng Chin Ooi i Sai Wu. "Adaptive Logging". W SIGMOD/PODS'16: International Conference on Management of Data. New York, NY, USA: ACM, 2016. http://dx.doi.org/10.1145/2882903.2915208.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
3

Gemmell, Jim. "Life-logging, thing-logging and the internet of things". W the 2014 workshop. New York, New York, USA: ACM Press, 2014. http://dx.doi.org/10.1145/2611264.2611276.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
4

Sueda, Koh, Henry Been-Lirn Duh i Jun Rekimot. "Social life logging". W the 10th asia pacific conference. New York, New York, USA: ACM Press, 2012. http://dx.doi.org/10.1145/2350046.2350058.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
5

Kabinna, Suhas, Cor-Paul Bezemer, Weiyi Shang i Ahmed E. Hassan. "Logging library migrations". W ICSE '16: 38th International Conference on Software Engineering. New York, NY, USA: ACM, 2016. http://dx.doi.org/10.1145/2901739.2901769.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
6

Ferraro, Sara, Alice Meniconi, Sara Gianguzza i Giulia Pistolesi. "TWINY emotional logging". W the 2014 ACM International Symposium. New York, New York, USA: ACM Press, 2014. http://dx.doi.org/10.1145/2641248.2641275.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
7

Bonnie, Ron J. M., Ridvan Akkurt, Hilal Al-Waheed, Charles M. Bradford, Ramsin Y. Eyvazzdeh, E. Craig Phillips, Prabhakar Aadireddy i Ehab Negm. "Wireline T1 Logging". W SPE Annual Technical Conference and Exhibition. Society of Petroleum Engineers, 2003. http://dx.doi.org/10.2118/84483-ms.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
8

Zitnik, Tomislav, i Zoran Bosic. "Operations Wisdom Logging". W 2022 45th Jubilee International Convention on Information, Communication and Electronic Technology (MIPRO). IEEE, 2022. http://dx.doi.org/10.23919/mipro55190.2022.9803373.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
9

Kim, Yi-Reun, Kyu-Young Whang i Il-Yeol Song. "Page-differential logging". W the 2010 international conference. New York, New York, USA: ACM Press, 2010. http://dx.doi.org/10.1145/1807167.1807208.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
10

Tao, Yufei, Ke Yi, Cheng Sheng, Jian Pei i Feifei Li. "Logging every footstep". W the 2010 international conference. New York, New York, USA: ACM Press, 2010. http://dx.doi.org/10.1145/1807167.1807237.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.

Raporty organizacyjne na temat "Logging"

1

Douma, M., J. A. Hunter i R. L. Good. Borehole geophysical logging. Natural Resources Canada/ESS/Scientific and Technical Publishing Services, 1999. http://dx.doi.org/10.4095/210371.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
2

Hunter, J. A., P. J. Kurfurst, S. M. Birk, R. A. Burns i R L Good. Borehole Geophysical Logging. Natural Resources Canada/ESS/Scientific and Technical Publishing Services, 1991. http://dx.doi.org/10.4095/132225.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
3

Douma, M. Borehole geophysical logging. Natural Resources Canada/ESS/Scientific and Technical Publishing Services, 1997. http://dx.doi.org/10.4095/299325.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
4

Levy, G. M., i J. D. McNeill. Transient electromagnetic borehole logging. Natural Resources Canada/ESS/Scientific and Technical Publishing Services, 1986. http://dx.doi.org/10.4095/123605.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
5

Anderson, David W. EE-3A Logging Report. Office of Scientific and Technical Information (OSTI), grudzień 1993. http://dx.doi.org/10.2172/1248147.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
6

Anderson, David W. Addendum to Logging Report. Office of Scientific and Technical Information (OSTI), listopad 1995. http://dx.doi.org/10.2172/1248155.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
7

Schreck, M., i A. H. Quatmann-Hense. Multi-Sensor Core Logging. Natural Resources Canada/ESS/Scientific and Technical Publishing Services, 2015. http://dx.doi.org/10.4095/295971.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
8

Morgan, Todd A., Timothy P. Spoelma, Charles E. Keegan, Alfred L. Chase i Michael T. Thompson. Montana Logging Utilization, 2002. Ft. Collins, CO: U.S. Department of Agriculture, Forest Service, Rocky Mountain Research Station, 2005. http://dx.doi.org/10.2737/rmrs-rp-52.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
9

Webster, B. Time domain IP borehole logging. Natural Resources Canada/ESS/Scientific and Technical Publishing Services, 1986. http://dx.doi.org/10.4095/123609.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
10

Henfling, J. A., i R. A. Normann. Precision pressure/temperature logging tool. Office of Scientific and Technical Information (OSTI), styczeń 1998. http://dx.doi.org/10.2172/645495.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
Oferujemy zniżki na wszystkie plany premium dla autorów, których prace zostały uwzględnione w tematycznych zestawieniach literatury. Skontaktuj się z nami, aby uzyskać unikalny kod promocyjny!

Do bibliografii