Gotowa bibliografia na temat „LOGO (Computer system)”
Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych
Zobacz listy aktualnych artykułów, książek, rozpraw, streszczeń i innych źródeł naukowych na temat „LOGO (Computer system)”.
Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.
Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.
Artykuły w czasopismach na temat "LOGO (Computer system)"
Aqaileh, Tharaa, i Faisal Alkhateeb. "Automatic Jordanian License Plate Detection and Recognition System Using Deep Learning Techniques". Journal of Imaging 9, nr 10 (28.09.2023): 201. http://dx.doi.org/10.3390/jimaging9100201.
Pełny tekst źródłaWatson, J. Allen, Garrett Lange i Vickie M. Brinkley. "Logo Mastery and Spatial Problem-Solving by Young Children: Effects of Logo Language Training, Route-Strategy Training, and Learning Styles on Immediate Learning and Transfer". Journal of Educational Computing Research 8, nr 4 (listopad 1992): 521–40. http://dx.doi.org/10.2190/lflp-9t72-l1nd-y6b3.
Pełny tekst źródłaHasan, N., N. Awang i F. N. Jamrus. "An Application of SURF Algorithm on JAKIM’s Halal Logo Detection". global journal al thaqafah SI, nr 1 (23.07.2023): 18–26. http://dx.doi.org/10.7187/gjatsi072023-2.
Pełny tekst źródłaTian, Nannan, Yuan Liu i Ziruo Sun. "JN-Logo: A Logo Database for Aesthetic Visual Analysis". Electronics 11, nr 19 (9.10.2022): 3248. http://dx.doi.org/10.3390/electronics11193248.
Pełny tekst źródłaYang, Zhi. "Dynamic Logo Design System of Network Media Art Based on Convolutional Neural Network". Mobile Information Systems 2022 (31.05.2022): 1–10. http://dx.doi.org/10.1155/2022/3247229.
Pełny tekst źródłaSystems, Mobile Information. "Retracted: Dynamic Logo Design System of Network Media Art Based on Convolutional Neural Network". Mobile Information Systems 2023 (6.12.2023): 1. http://dx.doi.org/10.1155/2023/9761536.
Pełny tekst źródłaHu, Tian, i Wenbin Gong. "Urban Landscape Information Atlas and Model System Based on Remote Sensing Images". Mobile Information Systems 2021 (3.07.2021): 1–7. http://dx.doi.org/10.1155/2021/9613102.
Pełny tekst źródłaHuang, Yue, Ruiwen Wu, Ye Sun, Wei Wang i Xinghao Ding. "Vehicle Logo Recognition System Based on Convolutional Neural Networks With a Pretraining Strategy". IEEE Transactions on Intelligent Transportation Systems 16, nr 4 (sierpień 2015): 1951–60. http://dx.doi.org/10.1109/tits.2014.2387069.
Pełny tekst źródłaCahyono, Teguh, Nur Chasanah i Teguh Khairmyanto. "Design and Development of Web based E-Commerce Application for Logo Sales “Tokologo” Using Codeigniter". Webology 18, SI05 (30.10.2021): 368–82. http://dx.doi.org/10.14704/web/v18si05/web18234.
Pełny tekst źródłaSujini, G. Naga. "Automatic Logo Detection with Deep Region-based Convolutional Networks". International Journal for Research in Applied Science and Engineering Technology 10, nr 6 (30.06.2022): 3267–74. http://dx.doi.org/10.22214/ijraset.2022.44611.
Pełny tekst źródłaRozprawy doktorskie na temat "LOGO (Computer system)"
Finnighan, Grant Adam. "Computer image based scaling of logs". Thesis, University of British Columbia, 1987. http://hdl.handle.net/2429/26698.
Pełny tekst źródłaApplied Science, Faculty of
Electrical and Computer Engineering, Department of
Graduate
Qiu, Tongqing. "Understanding a large-scale IPTV network via system logs". Diss., Georgia Institute of Technology, 2011. http://hdl.handle.net/1853/41228.
Pełny tekst źródłaKatebi, Ataur Rahim. "Supporting snapshots in a log-based file system". [Gainesville, Fla.] : University of Florida, 2004. http://purl.fcla.edu/fcla/etd/UFE0008900.
Pełny tekst źródłaMagnusson, Jesper. "Monitoring malicious PowerShell usage through log analysis". Thesis, Luleå tekniska universitet, Datavetenskap, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-75152.
Pełny tekst źródłaZhu, Lilin. "Logserver monitor for managing log messages of applications". CSUSB ScholarWorks, 2002. https://scholarworks.lib.csusb.edu/etd-project/2054.
Pełny tekst źródłaMichel, Hannes. "Visualizing audit log events at the Swedish Police Authority to facilitate its use in the judicial system". Thesis, Luleå tekniska universitet, Digitala tjänster och system, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-75244.
Pełny tekst źródłaHejderup, Jacob. "Multipla loggar för ökad programförståelse : Hur multipla loggar kan bidra till programutveckling och programförståelse". Thesis, Tekniska Högskolan, Högskolan i Jönköping, JTH, Datateknik och informatik, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:hj:diva-39390.
Pełny tekst źródłaTo develop or maintain a piece of code requires a certain level of comprehension of the developed or maintained software itself. To achieve this goal the developer uses a set of different tools. This report will focus on two types of debug tools: single trace and multiple traces. The purpose of the study is to examine how multiple traces can contribute to an improved program comprehension. The study was carried out through experiments and interviews. The experiment consisted of 10 typical comprehension tasks in a development context. Eclipse and Trace Compass were used to display the logs. Eclipse is a development environment that shows the source code. Trace Compass is a tool for inspecting traces. After the experiment, an interview was carried out with the subjects of the experiment. The results of this study indicated that multiple traces could have an advantage over a single trace when the task is to understand the interactions between code components in a software system. One of the limitations of the study was due to the limited number of subjects taken part in the study and cannot be used to draw a more general conclusion.
Barrett, Scott M. "A Computer Simulation Model for Predicting the Impacts of Log Truck Turn-Time on Timber Harvesting System Productivity". Thesis, Virginia Tech, 2001. http://hdl.handle.net/10919/31170.
Pełny tekst źródłaMaster of Science
Goel, Prateek. "Integrated system for subsurface exploration data collection and borehole log generation". Thesis, Georgia Institute of Technology, 2002. http://hdl.handle.net/1853/20967.
Pełny tekst źródłaMa, Hongyan. "User-system coordination in unified probabilistic retrieval exploiting search logs to construct common ground /". Diss., Restricted to subscribing institutions, 2008. http://proquest.umi.com/pqdweb?did=1581426061&sid=1&Fmt=2&clientId=1564&RQT=309&VName=PQD.
Pełny tekst źródłaKsiążki na temat "LOGO (Computer system)"
Abelson, Harold. Logo for the Macintosh: An introduction through Object Logo. Cambridge, Mass: Paradigm Software, 1992.
Znajdź pełny tekst źródłaO'Shea, T. Understanding logo. Oxford: Blackwell Scientific, 1985.
Znajdź pełny tekst źródłaGraune, Uwe. LOGO!: Practical training. Erlangen: Publicis, 2009.
Znajdź pełny tekst źródłaHal, Eden, i Fischer Gerhard, red. Interactive problem solving using LOGO. Hillsdale, N.J: L. Erlbaum Associates, 1991.
Znajdź pełny tekst źródła1974-, Wang Lizhe, i Chen Dan 1973-, red. Logo recognition: Theory and practice. Boca Raton, Fla: CRC Press, 2011.
Znajdź pełny tekst źródłaRedbooks, IBM. IBM E(Logo)Server Certification Study Guide - Pseries Aix System Support. Ibm, 2001.
Znajdź pełny tekst źródłaAbelson, Harold. Logo for the Macintosh: An Introduction through Object Logo. The MIT Press, 1993.
Znajdź pełny tekst źródłaAbelson, Harold. Logo for the Macintosh: An Introduction Through Object Logo With the Student Edition of Object Logo. Intl Society for Technology in, 1992.
Znajdź pełny tekst źródłaTurtles, Termites, and Traffic Jams: Explorations in Massively Parallel Microworlds (Complex Adaptive Systems). The MIT Press, 1997.
Znajdź pełny tekst źródłaAbelson, Harold. Logo for the Macintosh: Software Edition: An Introduction through Object Logo. The MIT Press, 1993.
Znajdź pełny tekst źródłaCzęści książek na temat "LOGO (Computer system)"
Tekbulut, Tuğrul, Ayhan İnal i Betül Doğanay. "LAPIS – LOGO Agile Process Improvement System". W Communications in Computer and Information Science, 131–44. Cham: Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-19860-6_11.
Pełny tekst źródłaNguyen, Phong Hoang, Tien Ba Dinh i Thang Ba Dinh. "Local Logo Recognition System for Mobile Devices". W Lecture Notes in Computer Science, 558–73. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-39640-3_41.
Pełny tekst źródłaLiu, Jian, i Yuan-jun Lv. "The Application of LOGO! in Control System of a Transmission and Sorting Mechanism". W Communications in Computer and Information Science, 231–36. Berlin, Heidelberg: Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-18129-0_37.
Pełny tekst źródłaSkopik, Florian, Markus Wurzenberger i Max Landauer. "Detecting Unknown Cyber Security Attacks Through System Behavior Analysis". W Cybersecurity of Digital Service Chains, 103–19. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-04036-8_5.
Pełny tekst źródłaZhou, Wei, Jianfeng Zhan, Dan Meng i Zhihong Zhang. "Online Event Correlations Analysis in System Logs of Large-Scale Cluster Systems". W Lecture Notes in Computer Science, 262–76. Berlin, Heidelberg: Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-15672-4_23.
Pełny tekst źródłaRudakov, Kirill, Andrey Novikov, Anton Sitnikov, Eugeny Tsymbalov i Alexey Zverev. "Building an Adaptive Logs Classification System: Industrial Report". W Communications in Computer and Information Science, 182–94. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-71472-7_15.
Pełny tekst źródłaHe, Likun, Binbin Tang, Min Zhu, Binbin Lu i Weidong Huang. "NetflowVis: A Temporal Visualization System for Netflow Logs Analysis". W Lecture Notes in Computer Science, 202–9. Cham: Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-46771-9_27.
Pełny tekst źródłaKłos, Mateusz, i Imed El Fray. "Securing Event Logs with Blockchain for IoT". W Computer Information Systems and Industrial Management, 77–87. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-47679-3_7.
Pełny tekst źródłaLi, Jian, i Jian Cao. "System Problem Detection by Mining Process Model from Console Logs". W Lecture Notes in Computer Science, 140–44. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-68210-5_16.
Pełny tekst źródłaPimenta, Avelino Palma, Jair Minoro Abe i Cristina Corrêa de Oliveira. "An Analyzer of Computer Network Logs Based on Paraconsistent Logic". W Advances in Production Management Systems: Innovative Production Management Towards Sustainable Growth, 620–27. Cham: Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-22759-7_71.
Pełny tekst źródłaStreszczenia konferencji na temat "LOGO (Computer system)"
Pornpanomchai, Chomtip, Passakorn Boonsripornchai, Pimchanok Puttong i Chonnipa Rattananirundorn. "Logo recognition system". W 2015 International Computer Science and Engineering Conference (ICSEC). IEEE, 2015. http://dx.doi.org/10.1109/icsec.2015.7401394.
Pełny tekst źródłaBhattacharya, Tathagata, Vivek Tanniru i Sai Teja Veeramalla. "Online Fake Logo Detection System". W 2023 Congress in Computer Science, Computer Engineering, & Applied Computing (CSCE). IEEE, 2023. http://dx.doi.org/10.1109/csce60160.2023.00380.
Pełny tekst źródłaToyoshima, Yuki, Yasuhiro Hayashi i Yasushi Kiyoki. "A Sign-Logo Image Search & Combination System by Analyzing Color and Shape Features". W Computer Graphics and Imaging. Calgary,AB,Canada: ACTAPRESS, 2013. http://dx.doi.org/10.2316/p.2013.798-051.
Pełny tekst źródłaLee, Tsung-Ping. "More Efficient Solving Calibration Issues by Automated and Semi-Automated Calibration Systems". W NCSL International Workshop & Symposium. NCSL International, 2018. http://dx.doi.org/10.51843/wsproceedings.2018.41.
Pełny tekst źródłaNitsuwat, Supot, i J. Srisomphun. "Security in CAI Materials by Embedding Digital Watermarks". W 2003 Informing Science + IT Education Conference. Informing Science Institute, 2003. http://dx.doi.org/10.28945/2626.
Pełny tekst źródłaMeng, Weibin, Ying Liu, Yichen Zhu, Shenglin Zhang, Dan Pei, Yuqing Liu, Yihao Chen i in. "LogAnomaly: Unsupervised Detection of Sequential and Quantitative Anomalies in Unstructured Logs". W Twenty-Eighth International Joint Conference on Artificial Intelligence {IJCAI-19}. California: International Joint Conferences on Artificial Intelligence Organization, 2019. http://dx.doi.org/10.24963/ijcai.2019/658.
Pełny tekst źródłaZhao, Chentong, Jinpeng Xiang, Lixin Zhao, Aimin Yu, Lijun Cai i Jiangang Ma. "EntityParser: A Log Analytics Parser for Identifying Entities from System Logs". W 2024 27th International Conference on Computer Supported Cooperative Work in Design (CSCWD). IEEE, 2024. http://dx.doi.org/10.1109/cscwd61410.2024.10580792.
Pełny tekst źródłaLi, Haoming, i Yuguo Li. "LogSpy: System Log Anomaly Detection for Distributed Systems". W 2020 International Conference on Artificial Intelligence and Computer Engineering (ICAICE). IEEE, 2020. http://dx.doi.org/10.1109/icaice51518.2020.00073.
Pełny tekst źródłaInojosa da Silva Filho, Reginaldo, i Ana Paula Rozeno Rodrigues. "Toward in Loco Cancer Therapy by Biomolecular Computer". W 2019 8th Brazilian Conference on Intelligent Systems (BRACIS). IEEE, 2019. http://dx.doi.org/10.1109/bracis.2019.00099.
Pełny tekst źródłaRusyn, Volodymyr, Mykola Albota, Igor Dmytrenko i Yurii Oleksiuk. "COMPUTER MODELLING OF THE THREEDIMENSIONAL NEW CHAOTIC SYSTEM USING LABVIEW". W EDUCATION AND SCIENCE OF TODAY: INTERSECTORAL ISSUES AND DEVELOPMENT OF SCIENCES. European Scientific Platform, 2024. http://dx.doi.org/10.36074/logos-29.03.2024.065.
Pełny tekst źródła