Literatura científica selecionada sobre o tema "Logging"

Crie uma referência precisa em APA, MLA, Chicago, Harvard, e outros estilos

Selecione um tipo de fonte:

Consulte a lista de atuais artigos, livros, teses, anais de congressos e outras fontes científicas relevantes para o tema "Logging".

Ao lado de cada fonte na lista de referências, há um botão "Adicionar à bibliografia". Clique e geraremos automaticamente a citação bibliográfica do trabalho escolhido no estilo de citação de que você precisa: APA, MLA, Harvard, Chicago, Vancouver, etc.

Você também pode baixar o texto completo da publicação científica em formato .pdf e ler o resumo do trabalho online se estiver presente nos metadados.

Artigos de revistas sobre o assunto "Logging"

1

Zhiyou, Liu, Huo Jinghuan e Zhu Xiaogang. "The application of digital logging in exploration of Jiang Cang coalfield in Qinghai province". International Journal of Geology 1, n.º 1 (21 de julho de 2016): 44. http://dx.doi.org/10.26789/ijg.2016.006.

Texto completo da fonte
Resumo:
A lot of well logging on to Jiang Cang coalfield in the past work and achieved good results, but due to differ in age, instrumentation equipment and method were different. In order to understand the application effect of the equipment used in the area now and in order to provide the basis for the future working to choose the appropriate logging parameters and well logging interpretation, we chosed GJS - 1 b intelligent engineering logging system produced by Chongqing geological instrument factory in Jiang Cang mining area, we collected the data when cable were ascending, according to 《the requirements of the rules of coalfield geophysical logging》, JGS - 1 b instrument full hole resistivity logging velocity of 3 m/s, the sampling interval was 5 cm, acoustic logging measurement parameter for the acoustic time, adopt the device of single-emission and double-receiving, detectorsource space was 0.5 meters, 0.7 meters, the full hole velocity was 6 m/s, the sampling interval was 10 cm.In this paper, we introduce the application of multiple well logging method in coalfield geology through to the logging examples in Mu Li Jang Cang coalfield four field of qinghai province, the effect was remarkable
Estilos ABNT, Harvard, Vancouver, APA, etc.
2

Price, Blaine A., Avelie Stuart, Gul Calikli, Ciaran Mccormick, Vikram Mehta, Luke Hutton, Arosha K. Bandara, Mark Levine e Bashar Nuseibeh. "Logging you, Logging me". Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies 1, n.º 2 (30 de junho de 2017): 1–18. http://dx.doi.org/10.1145/3090087.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
3

Studwell, William E. "Logging on and Cata-Logging". Behavioral & Social Sciences Librarian 16, n.º 1 (22 de setembro de 1997): 69–71. http://dx.doi.org/10.1300/j103v16n01_06.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
4

de Silva, Amal P., e W. Keith Patterson. "Influence of Root Flooding Interval on Phytophthora Root Rot of Blueberry". HortScience 32, n.º 3 (junho de 1997): 468D—468. http://dx.doi.org/10.21273/hortsci.32.3.468d.

Texto completo da fonte
Resumo:
Phytophthora root rot is a severe disease on blueberry (Vaccinium corymbosum L.) in poorly drained soils. The objective of the study was to determine the frequency of water-logged conditions on disease severity of blueberry. Phytophthora cinnamomi was grown on rice hulls and incorporated into the soil at the rate of 10% v/v. Water logging conditions were inflicted for 48 hr on mulched and non–mulched blueberry plants at 1-, 2-, and 4-week intervals. Non-water logging conditions were used on both mulched and non-mulched control plants. There was a significant linear relationship between disease severity of shoots and roots and the frequency of water-logging conditions. Disease symptoms were low in control plants, but disease ratings were high in mulched and non-mulched plants that were treated with water-logging conditions every week. There was also a linear trend between shoot dry weight and root dry weight of plants with frequency of water logging. Higher dry weights were seen on control plants. There was a significantly higher shoot, root dry weight and number of leaves of mulched plants than non-mulched plants. The percentage of infection on roots were high with frequent water logging. The study revealed high disease incidence with frequent water loggings. However, growth of mulched blueberry plants were comparable in control plants and plants that were subjected to water logging at 4-week intervals.
Estilos ABNT, Harvard, Vancouver, APA, etc.
5

Lin, Jiunn-Cheng, Jun-Yen Lee e Wan-Yu Liu. "Risk Analysis of Regions with Suspicious Illegal Logging and Their Trade Flows". Sustainability 13, n.º 6 (23 de março de 2021): 3549. http://dx.doi.org/10.3390/su13063549.

Texto completo da fonte
Resumo:
To eradicate illegally harvested wood sources in its domestic market, it is critical to conduct risk assessments on wood sourcing in regions with illegal loggings. It is not reliable to use a single indicator to analyze suspicious illegal logging. This study integrates three key global indicators: CPI (Corruption Perceptions Index), HDI (Human Development Indicator), and WGI (The Worldwide Governance Indicators) by applying the entropy weight method to establish a new risk indicator to rank suspicious illegal logging regions. This study aims to establish better risk indicators by considering more factors to assess the risks of illegal logging and its trade flow more reliably. By analyzing roundwood production, Myanmar, Congo, and Nigeria are rated high-risk. Countries such as the U.S., Germany, Canada, and Finland are rated low-risk.
Estilos ABNT, Harvard, Vancouver, APA, etc.
6

Nurhadiyanto, Lucky. "ALUR PELACAKAN PEMBALAKAN LIAR (ILLEGAL LOGGING) MELALUI PENDEKATAN PENCUCIAN UANG". SISI LAIN REALITA 1, n.º 2 (11 de dezembro de 2016): 33–46. http://dx.doi.org/10.25299/sisilainrealita.2016.vol1(2).1385.

Texto completo da fonte
Resumo:
Illegal logging is a part of crime against environment, which has a massive impact on the economy, social, cultural, and ecological. Ironically, majority of the illegal logging’s perpetrators are dominated by “the field criminal”. On the other side, intellectual actors who can control the activities never touch by the law. The money laundering concept can give a new approach to detect the leader actor. The author use follow the money viewpoint, which includes placement, layering, and integration. Qualitative data collection methods is used with in-depth interviews, systematic observation of the behavior, and document analysis. The result is a new paradigm in investigating illegal logging no longer focused on the field actors, but potentially tracking the intellectual actors behind illegal logging.
Estilos ABNT, Harvard, Vancouver, APA, etc.
7

Solt, John. "Treacherous Logging". Voice of Intellectual Man- An International Journal 9, n.º 2 (2019): 151. http://dx.doi.org/10.5958/2319-4308.2019.00025.2.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
8

Mueller, H. Gustav. "Data logging". Hearing Journal 60, n.º 10 (outubro de 2007): 19. http://dx.doi.org/10.1097/01.hj.0000295442.16133.d7.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
9

Brown, Alastair. "Selective logging". Nature Climate Change 2, n.º 1 (20 de dezembro de 2011): 23. http://dx.doi.org/10.1038/nclimate1361.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
10

Jones, S., SM Gatford, T. Do e S. Walker. "Transaction logging". Journal of Documentation 53, n.º 1 (março de 1997): 35–50. http://dx.doi.org/10.1108/eum0000000007189.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.

Teses / dissertações sobre o assunto "Logging"

1

Karlsson, Tobias, e Andreas Pettersson. "Software keystroke logging : Automatisering av skydd mot software keystroke logging". Thesis, Linnéuniversitetet, Institutionen för datavetenskap, fysik och matematik, DFM, 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-19618.

Texto completo da fonte
Resumo:
This piece of work develops a solution that automates protection against software keystroke loggers. Keystroke loggers can be used illegally to register a user's keystrokes and in that way acquire sensitive information. The solution was tested on two different networks and the efficiency was measured. The network represents an enterprise network that uses the operating system Windows along with the directory service Active Directory. A script was developed to solve the automation matter. The script automatically executed the required programs that were needed to clean the network completely from keystroke loggers we had implemented and it took less than one minute to run.
Detta arbete utvecklar en lösning som automatiserar skydd mot mjukvarukeyloggers. Keystroke loggers kan användas illegalt för att registrera en användares knappnedtryckningar och på så vis komma över känslig information. Lösningen testkörs på två olika nätverk och effektiviteten mäts. Nätverket representerar ett företagsnätverk som använder operativsystemet Windows med katalogtjänsten Active Directory. Ett skript utvecklades för att lösa automatiseringsfrågan. Skriptet exekverade automatiskt de program som behövdes för att rensa nätverket helt från de keystroke loggers vi implementerat och det tog mindre än en minut att köra.
Estilos ABNT, Harvard, Vancouver, APA, etc.
2

Sluss, Richard Gordon. "Managerial and operational characteristics of "safety successful" logging contractors". Thesis, This resource online, 1992. http://scholar.lib.vt.edu/theses/available/etd-09122009-040333/.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
3

Loving, Easton. "Components of logging costs". Thesis, This resource online, 1991. http://scholar.lib.vt.edu/theses/available/etd-10222009-124937/.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
4

Sklar, Howard Fred. "Nuclear magnetic resonance logging". Thesis, Massachusetts Institute of Technology, 1997. http://hdl.handle.net/1721.1/10503.

Texto completo da fonte
Resumo:
Thesis (M.S.)--Massachusetts Institute of Technology, Dept. of Earth, Atmospheric, and Planetary Sciences, 1997.
Includes bibliographical references (leaves 119-121).
by Howard Fred Sklar.
M.S.
Estilos ABNT, Harvard, Vancouver, APA, etc.
5

Mendelson, J. D. (James D. ). "Petroleum source rock logging". Thesis, Massachusetts Institute of Technology, 1985. http://hdl.handle.net/1721.1/15126.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
6

Miyata, Edwin S. "An investigation of the monocable system for cable yarding of small, low-value trees on steep, difficult sites /". Thesis, Connect to this title online; UW restricted, 1991. http://hdl.handle.net/1773/7061.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
7

Brodbeck, Arnold M. "Timber industry consolidation and the need for scale appropriate harvesting mechanisms in Alabama's black belt". Auburn, Ala., 2005. http://repo.lib.auburn.edu/2005%20Summer/master's/BRODBECK_ARNOLD_5.pdf.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
8

Pulls, Tobias. "Preserving Privacy in Transparency Logging". Doctoral thesis, Karlstads universitet, Institutionen för matematik och datavetenskap, 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:kau:diva-35918.

Texto completo da fonte
Resumo:
The subject of this dissertation is the construction of privacy-enhancing technologies (PETs) for transparency logging, a technology at the intersection of privacy, transparency, and accountability. Transparency logging facilitates the transportation of data from service providers to users of services and is therefore a key enabler for ex-post transparency-enhancing tools (TETs). Ex-post transparency provides information to users about how their personal data have been processed by service providers, and is a prerequisite for accountability: you cannot hold a controller accountable for what is unknown. We present three generations of PETs for transparency logging to which we contributed. We start with early work that defined the setting as a foundation and build upon it to increase both the privacy protections and the utility of the data sent through transparency logging. Our contributions include the first provably secure privacy-preserving transparency logging scheme and a forward-secure append-only persistent authenticated data structure tailored to the transparency logging setting. Applications of our work range from notifications and deriving data disclosures for the Data Track tool (an ex-post TET) to secure evidence storage.
The subject of this dissertation is the construction of privacy-enhancing technologies (PETs) for transparency logging, a technology at the intersection of privacy, transparency, and accountability. Transparency logging facilitates the transportation of data from service providers to users of services and is therefore a key enabler for ex-post transparency-enhancing tools (TETs). Ex-post transparency provides information to users about how their personal data have been processed by service providers, and is a prerequisite for accountability: you cannot hold a controller accountable for what is unknown. We present three generations of PETs for transparency logging to which we contributed. We start with early work that defined the setting as a foundation and build upon it to increase both the privacy protections and the utility of the data sent through transparency logging. Our contributions include the first provably secure privacy-preserving transparency logging scheme and a forward-secure append-only persistent authenticated data structure tailored to the transparency logging setting. Applications of our work range from notifications and deriving data disclosures for the Data Track tool (an ex-post TET) to secure evidence storage.
Estilos ABNT, Harvard, Vancouver, APA, etc.
9

Jun, Ho Huh Jun Ho. "Trustworthy logging for virtual organisations". Thesis, University of Oxford, 2010. http://ora.ox.ac.uk/objects/uuid:7266bcda-a82b-4b4f-9ec5-d46f8f3573a0.

Texto completo da fonte
Resumo:
In order to securely monitor user or system activities and detect malicious attempts across a distributed system, provision of trustworthy audit and logging services is necessary. Existing audit-based monitoring services, however, are often prone to compromise due to the lack of guarantees of log integrity, confidentiality, and availability. This thesis presents several use cases where these properties are essential, conducts a threat analysis on these use cases, and identifies key security requirements from the threats and their risks. Then, this thesis proposes a log generation and reconciliation infrastructure in which the requirements are satisfied and threats are mitigated. Applications usually expose a weak link in the way logs are generated and protected. In the proposed logging system, important application events are involuntarily recorded through a trustworthy logging component operating inside a privileged virtual machine. Virtual machine isolation makes it infeasible for applications to bypass the logging component. Trusted Computing attestation allows users to verify the logging properties of remote systems, and ensure that the collected logs are trustworthy. Despite ongoing research in the area of usable security for distributed systems, there remains a `trust gap' between the users' requirements and current technological capabilities. To bridge this `trust gap', this thesis also proposes two different types of distributed systems, one applicable for a computational system and the other for a distributed data system. Central to these systems is the configuration resolver which maintains a list of trustworthy participants available in the virtual organisation. Users submit their jobs to the configuration resolver, knowing that their jobs will be dispatched to trustworthy participants and executed in protected environments. As a form of evaluation, this thesis suggests how these ideas could be integrated with existing systems, and highlights the potential security enhancements.
Estilos ABNT, Harvard, Vancouver, APA, etc.
10

Banchs, Rafael Enrique. "Time harmonic field electric logging /". Digital version accessible at:, 1998. http://wwwlib.umi.com/cr/utexas/main.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.

Livros sobre o assunto "Logging"

1

(Firm), Robertson Geologging. Borehole logging. Deganwy: Robertson Geologging, 1997.

Encontre o texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
2

Society of Petroleum Engineers of AIME., ed. Production logging. Richardson, TX: Society of Petroleum Engineers, 1985.

Encontre o texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
3

1927-, Keller George Vernon, ed. Induction logging. Amsterdam: Elsevier, 1989.

Encontre o texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
4

L, Campbell Frank, ed. Well logging II: Electric and acoustic logging. New York: Henry L. Doherty Memorial Fund of AIME, Society of Petroleum Engineers, 1986.

Encontre o texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
5

Chin, Wilson C. Electromagnetic Well Logging. Hoboken, NJ, USA: John Wiley & Sons, Inc., 2014. http://dx.doi.org/10.1002/9781118835074.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
6

Sainson, Stéphane. Electromagnetic Seabed Logging. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-45355-2.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
7

Koshak, George. Koshak Brothers logging. Friendship, Wis: New Past Press, 1998.

Encontre o texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
8

Elias. Reduced impact logging. Bogor: IPB Press, 2002.

Encontre o texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
9

Society of Petroleum Engineers (U.S.), ed. Openhole well logging. Richardson, TX: Society of Petroleum Engineers, 1986.

Encontre o texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
10

Martin, Mary L. Logging long ago. Atglen, PA: Schiffer Pub., 2006.

Encontre o texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.

Capítulos de livros sobre o assunto "Logging"

1

Plattner, Hasso. "Logging". In Lehrbuch In-Memory Data Management, 191–99. Wiesbaden: Springer Fachmedien Wiesbaden, 2013. http://dx.doi.org/10.1007/978-3-658-03213-5_28.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
2

Schwenkler, Thomas. "Logging". In Sicheres Netzwerkmanagement, 151–67. Berlin, Heidelberg: Springer Berlin Heidelberg, 2006. http://dx.doi.org/10.1007/3-540-31287-0_5.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
3

Plattner, Hasso. "Logging". In A Course in In-Memory Data Management, 185–92. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-36524-9_28.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
4

Edwards, Elsy. "Logging". In Issues & Arguments, 210–18. London: Macmillan Education UK, 1989. http://dx.doi.org/10.1007/978-1-349-11090-2_35.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
5

Noble, Elizabeth. "Logging". In Pro T-SQL 2019, 345–60. Berkeley, CA: Apress, 2020. http://dx.doi.org/10.1007/978-1-4842-5590-2_14.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
6

Schwichtenberg, Holger. "Logging". In Modern Data Access with Entity Framework Core, 275–85. Berkeley, CA: Apress, 2018. http://dx.doi.org/10.1007/978-1-4842-3552-2_12.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
7

Putrady, Ecky. "Logging". In Practical Web Development with Haskell, 69–83. Berkeley, CA: Apress, 2018. http://dx.doi.org/10.1007/978-1-4842-3739-7_4.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
8

O’Leary, Mike. "Logging". In Cyber Operations, 283–309. Berkeley, CA: Apress, 2015. http://dx.doi.org/10.1007/978-1-4842-0457-3_8.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
9

Plattner, Hasso. "Logging". In A Course in In-Memory Data Management, 197–205. Berlin, Heidelberg: Springer Berlin Heidelberg, 2014. http://dx.doi.org/10.1007/978-3-642-55270-0_29.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
10

Duft, Markus. "Logging". In Eclipse TEA Revealed, 45–51. Berkeley, CA: Apress, 2018. http://dx.doi.org/10.1007/978-1-4842-4093-9_4.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.

Trabalhos de conferências sobre o assunto "Logging"

1

Bogatinovski, Jasmin, e Odej Kao. "Auto-Logging: AI-centred Logging Instrumentation". In 2023 IEEE/ACM 45th International Conference on Software Engineering: New Ideas and Emerging Results (ICSE-NIER). IEEE, 2023. http://dx.doi.org/10.1109/icse-nier58687.2023.00023.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
2

Lovell, M. A., P. Harvey e J. Lofts. "Geochemical Logging". In 3rd International Congress of the Brazilian Geophysical Society. European Association of Geoscientists & Engineers, 1993. http://dx.doi.org/10.3997/2214-4609-pdb.324.964.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
3

Yao, Chang, Divyakant Agrawal, Gang Chen, Beng Chin Ooi e Sai Wu. "Adaptive Logging". In SIGMOD/PODS'16: International Conference on Management of Data. New York, NY, USA: ACM, 2016. http://dx.doi.org/10.1145/2882903.2915208.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
4

Gemmell, Jim. "Life-logging, thing-logging and the internet of things". In the 2014 workshop. New York, New York, USA: ACM Press, 2014. http://dx.doi.org/10.1145/2611264.2611276.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
5

Sueda, Koh, Henry Been-Lirn Duh e Jun Rekimot. "Social life logging". In the 10th asia pacific conference. New York, New York, USA: ACM Press, 2012. http://dx.doi.org/10.1145/2350046.2350058.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
6

Kabinna, Suhas, Cor-Paul Bezemer, Weiyi Shang e Ahmed E. Hassan. "Logging library migrations". In ICSE '16: 38th International Conference on Software Engineering. New York, NY, USA: ACM, 2016. http://dx.doi.org/10.1145/2901739.2901769.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
7

Ferraro, Sara, Alice Meniconi, Sara Gianguzza e Giulia Pistolesi. "TWINY emotional logging". In the 2014 ACM International Symposium. New York, New York, USA: ACM Press, 2014. http://dx.doi.org/10.1145/2641248.2641275.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
8

Bonnie, Ron J. M., Ridvan Akkurt, Hilal Al-Waheed, Charles M. Bradford, Ramsin Y. Eyvazzdeh, E. Craig Phillips, Prabhakar Aadireddy e Ehab Negm. "Wireline T1 Logging". In SPE Annual Technical Conference and Exhibition. Society of Petroleum Engineers, 2003. http://dx.doi.org/10.2118/84483-ms.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
9

Zitnik, Tomislav, e Zoran Bosic. "Operations Wisdom Logging". In 2022 45th Jubilee International Convention on Information, Communication and Electronic Technology (MIPRO). IEEE, 2022. http://dx.doi.org/10.23919/mipro55190.2022.9803373.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
10

Kim, Yi-Reun, Kyu-Young Whang e Il-Yeol Song. "Page-differential logging". In the 2010 international conference. New York, New York, USA: ACM Press, 2010. http://dx.doi.org/10.1145/1807167.1807208.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.

Relatórios de organizações sobre o assunto "Logging"

1

Douma, M., J. A. Hunter e R. L. Good. Borehole geophysical logging. Natural Resources Canada/ESS/Scientific and Technical Publishing Services, 1999. http://dx.doi.org/10.4095/210371.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
2

Hunter, J. A., P. J. Kurfurst, S. M. Birk, R. A. Burns e R L Good. Borehole Geophysical Logging. Natural Resources Canada/ESS/Scientific and Technical Publishing Services, 1991. http://dx.doi.org/10.4095/132225.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
3

Douma, M. Borehole geophysical logging. Natural Resources Canada/ESS/Scientific and Technical Publishing Services, 1997. http://dx.doi.org/10.4095/299325.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
4

Levy, G. M., e J. D. McNeill. Transient electromagnetic borehole logging. Natural Resources Canada/ESS/Scientific and Technical Publishing Services, 1986. http://dx.doi.org/10.4095/123605.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
5

Anderson, David W. EE-3A Logging Report. Office of Scientific and Technical Information (OSTI), dezembro de 1993. http://dx.doi.org/10.2172/1248147.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
6

Anderson, David W. Addendum to Logging Report. Office of Scientific and Technical Information (OSTI), novembro de 1995. http://dx.doi.org/10.2172/1248155.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
7

Schreck, M., e A. H. Quatmann-Hense. Multi-Sensor Core Logging. Natural Resources Canada/ESS/Scientific and Technical Publishing Services, 2015. http://dx.doi.org/10.4095/295971.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
8

Morgan, Todd A., Timothy P. Spoelma, Charles E. Keegan, Alfred L. Chase e Michael T. Thompson. Montana Logging Utilization, 2002. Ft. Collins, CO: U.S. Department of Agriculture, Forest Service, Rocky Mountain Research Station, 2005. http://dx.doi.org/10.2737/rmrs-rp-52.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
9

Webster, B. Time domain IP borehole logging. Natural Resources Canada/ESS/Scientific and Technical Publishing Services, 1986. http://dx.doi.org/10.4095/123609.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
10

Henfling, J. A., e R. A. Normann. Precision pressure/temperature logging tool. Office of Scientific and Technical Information (OSTI), janeiro de 1998. http://dx.doi.org/10.2172/645495.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
Oferecemos descontos em todos os planos premium para autores cujas obras estão incluídas em seleções literárias temáticas. Contate-nos para obter um código promocional único!

Vá para a bibliografia