Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 233,779,195 papers from all fields of science
Search
Sign In
Create Free Account
Data logger
Known as:
LogMessage
, Log
, Data logging
Expand
A data logger (also datalogger or data recorder) is an electronic device that records data over time or in relation to location either with a built…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
37 relations
Black box
Bus analyzer
Compact Cassette
Computer program
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2013
Highly Cited
2013
Determination of Formation Organic Carbon Content Using a New Neutron-Induced Gamma Ray Spectroscopy Service that Directly Measures Carbon
Jorge González
,
Richard E. Lewis
,
J. Hemingway
,
J. Grau
,
Erik Rylander
,
R. Schmitt
2013
Corpus ID: 44736810
Over the past few decades, many techniques have been developed for the log e valuation of organic-rich rocks (ORR). More recently…
Expand
2013
2013
An Efficient Partition Technique to reduce the Attack Detection Time with Web based Text and PDF files
A. Dubey
,
R. Gupta
,
G. Chandel
2013
Corpus ID: 10875209
In this paper we propose an efficient partition technique for web based files (jsp, html, php), text (word, text files) and PDF…
Expand
2012
2012
An Efficient Algorithm for Data Cleaning of Log File using File Extensions
Surbhi Anand
,
R. Aggarwal
2012
Corpus ID: 18042082
Wide Web is a monolithic repository of web pages that provides the Internet users with heaps of information. With the growth in…
Expand
2009
2009
Privacy Preserving Multiparty Multilevel DRM Architecture
Amit Sachan
,
S. Emmanuel
,
Amitabha Das
,
Mohan Kankanhalli
6th IEEE Consumer Communications and Networking…
2009
Corpus ID: 10292235
Traditional digital rights management (DRM) systems are only two party systems, involving the owner and consumers. However, for…
Expand
2008
2008
Radio Access Networks for UMTS: Principles and Practice
Chris Johnson
2008
Corpus ID: 59627552
This book provides a comprehensive description of Radio Access Networks for UMTS . The main content is based upon the release 6…
Expand
2007
2007
Investigating Computer Attacks Using Attack Trees
Nayot Poolsapassit
,
I. Ray
IFIP Int. Conf. Digital Forensics
2007
Corpus ID: 9087675
System log files contain valuable evidence pertaining to computer attacks. However, the log files are often massive, and much of…
Expand
Highly Cited
2004
Highly Cited
2004
Evaluation of Efficient Archival Storage Techniques
L. You
,
C. Karamanolis
IEEE Conference on Mass Storage Systems and…
2004
Corpus ID: 266269
The ever-increasing volume of archival data that need to be retained for long periods of time has motivated the design of low…
Expand
Review
2001
Review
2001
Computers in imaging and guided surgery
Leo Joskowicz
,
R. Taylor
Comput. Sci. Eng.
2001
Corpus ID: 21512549
The authors review the main technical issues in computer-integrated surgery (CIS) systems. They illustrate with examples of…
Expand
2000
2000
Watershed-based design of stormwater treatment facilities : model development and applications
T. Larm
2000
Corpus ID: 55125612
Watershed-based design of stormwater treatment facilities : model development and applications
1993
1993
Deriving Software Usage Patterns from Log Files
M. Guzdial
1993
Corpus ID: 59862550
Log files (discrete recordings of user actions during software use) offer the ability to collect human-computer interaction data…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE