Inhaltsverzeichnis
Auswahl der wissenschaftlichen Literatur zum Thema „Data restore“
Geben Sie eine Quelle nach APA, MLA, Chicago, Harvard und anderen Zitierweisen an
Machen Sie sich mit den Listen der aktuellen Artikel, Bücher, Dissertationen, Berichten und anderer wissenschaftlichen Quellen zum Thema "Data restore" bekannt.
Neben jedem Werk im Literaturverzeichnis ist die Option "Zur Bibliographie hinzufügen" verfügbar. Nutzen Sie sie, wird Ihre bibliographische Angabe des gewählten Werkes nach der nötigen Zitierweise (APA, MLA, Harvard, Chicago, Vancouver usw.) automatisch gestaltet.
Sie können auch den vollen Text der wissenschaftlichen Publikation im PDF-Format herunterladen und eine Online-Annotation der Arbeit lesen, wenn die relevanten Parameter in den Metadaten verfügbar sind.
Zeitschriftenartikel zum Thema "Data restore"
Lehmann, Christine. „Psychiatrist Urges Congress to Restore Consent Mandate For Genetic Data“. Psychiatric News 37, Nr. 20 (18.10.2002): 9–10. http://dx.doi.org/10.1176/pn.37.20.0009.
Der volle Inhalt der QuelleXia, Ruofan, Xiaoyan Yin, Javier Alonso Lopez, Fumio Machida und Kishor S. Trivedi. „Performance and Availability Modeling of ITSystems with Data Backup and Restore“. IEEE Transactions on Dependable and Secure Computing 11, Nr. 4 (Juli 2014): 375–89. http://dx.doi.org/10.1109/tdsc.2013.50.
Der volle Inhalt der QuelleLiu, Lianshan, Xiaoli Wang, Lingzhuang Meng, Gang Tian und Ting Wang. „Reversible Data Hiding in a Chaotic Encryption Domain Based on Odevity Verification“. International Journal of Digital Crime and Forensics 13, Nr. 6 (November 2021): 1–14. http://dx.doi.org/10.4018/ijdcf.20211101.oa9.
Der volle Inhalt der QuelleArrieta-Ibarra, Imanol, Leonard Goff, Diego Jiménez-Hernández, Jaron Lanier und E. Glen Weyl. „Should We Treat Data as Labor? Moving Beyond “Free”“. AEA Papers and Proceedings 108 (01.05.2018): 38–42. http://dx.doi.org/10.1257/pandp.20181003.
Der volle Inhalt der QuelleRosano, Andi, und Djadjat Sudaradjat. „Manajemen Backup Data untuk Penyelamatan Data Nasabah pada Sistem Informasi Perbankan (Studi Kasus : PT Bank XYZ)“. REMIK (Riset dan E-Jurnal Manajemen Informatika Komputer) 4, Nr. 2 (01.04.2020): 1. http://dx.doi.org/10.33395/remik.v4i2.10507.
Der volle Inhalt der QuelleSALVIATI, Leonardo, Evelyn HERNANDEZ-ROSA, Winsome F. WALKER, Sabrina SACCONI, Salvatore DiMAURO, Eric A. SCHON und Mercy M. DAVIDSON. „Copper supplementation restores cytochrome c oxidase activity in cultured cells from patients with SCO2 mutations“. Biochemical Journal 363, Nr. 2 (08.04.2002): 321–27. http://dx.doi.org/10.1042/bj3630321.
Der volle Inhalt der QuelleAdhiwibowo, Whisnumurti, M. Sani Suprayogi und Atmoko Nugroho. „PENGAMANAN DATA PADA APLIKASI SIJALU UNIVERSITAS SEMARANG DENGAN METODE REMOTE BACKUP & RESTORE“. Jurnal Pengembangan Rekayasa dan Teknologi 14, Nr. 1 (16.01.2019): 24. http://dx.doi.org/10.26623/jprt.v14i1.1217.
Der volle Inhalt der QuelleChen, Songmao, Abderrahim Halimi, Ximing Ren, Aongus McCarthy, Xiuqin Su, Stephen McLaughlin und Gerald S. Buller. „Learning Non-Local Spatial Correlations To Restore Sparse 3D Single-Photon Data“. IEEE Transactions on Image Processing 29 (2020): 3119–31. http://dx.doi.org/10.1109/tip.2019.2957918.
Der volle Inhalt der QuelleSkedsmo, Kristian. „Multiple Other-Initiations of Repair in Norwegian Sign Language“. Open Linguistics 6, Nr. 1 (13.12.2020): 532–66. http://dx.doi.org/10.1515/opli-2020-0030.
Der volle Inhalt der QuellePrice, Tristan, Nicola Brennan, Geoff Wong, Lyndsey Withers, Jennifer Cleland, Amanda Wanner, Thomas Gale, Linda Prescott-Clements, Julian Archer und Marie Bryce. „Remediation programmes for practising doctors to restore patient safety: the RESTORE realist review“. Health Services and Delivery Research 9, Nr. 11 (Mai 2021): 1–116. http://dx.doi.org/10.3310/hsdr09110.
Der volle Inhalt der QuelleDissertationen zum Thema "Data restore"
Kavánková, Iva. „Zálohování dat a datová úložiště“. Master's thesis, Vysoké učení technické v Brně. Fakulta podnikatelská, 2021. http://www.nusl.cz/ntk/nusl-444687.
Der volle Inhalt der QuelleStanković, Saša. „Monitor and manage system and application configuration files at kernel level in GNU/Linux“. Thesis, Högskolan Väst, Avdelningen för data-, elektro- och lantmäteriteknik, 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:hv:diva-8381.
Der volle Inhalt der QuelleDagfalk, Johanna, und Ellen Kyhle. „Listening in on Productivity : Applying the Four Key Metrics to measure productivity in a software development company“. Thesis, Uppsala universitet, Avdelningen för datalogi, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-440147.
Der volle Inhalt der QuelleYu, Wei, und 余韡. „Reverse Top-k search using random walk with restart“. Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2013. http://hdl.handle.net/10722/197515.
Der volle Inhalt der Quellepublished_or_final_version
Computer Science
Master
Master of Philosophy
Thornton, Victor. „DETERMINING TIDAL CHARACTERISTICS IN A RESTORED TIDAL WETLAND USING UNMANNED AERIAL VEHICLES AND DERIVED DATA“. VCU Scholars Compass, 2018. https://scholarscompass.vcu.edu/etd/5369.
Der volle Inhalt der QuelleSarabia, Vicente Jesús. „Estudio de la quimioluminiscencia medida por luminometría y su aplicación en la estimación de la data de los restos óseos“. Doctoral thesis, Universidad de Murcia, 2016. http://hdl.handle.net/10803/362935.
Der volle Inhalt der QuelleObjective: to demonstrate that chemiluminescence diminishes proportionately as post-mortem interval of bone remains increases when they come into contact with luminol, enabling this technique to be used to calculate the post-mortem interval of these remains for medico-legal interests. The basis is that bone remains show traces of haematin, which is present as an organic substance in the bone, but the concentration diminishes constantly after death. Given the high sensitivity of luminol in the presence of this molecule, it is possible to measure the intensity of the reaction in URL and so establish the date of death. Methodology: we used 102 samples of cortical bone dust belonging to long bones, in this case femurs, with a known date of death. The luminol used is that proposed by Weber, which comprises an oxidant (hydrogen peroxide), a reductant (luminol itself) and sodium carbonate, which alkalises the medium. The reagent (0.1 ml) is reacted with 30 mg of dust to produce, in the presence of a catalyst such as haematin, chemiluminescence, which can be measured with a luminometer (Fluostar Galaxy). This provides the results for each studied sample on a spreadsheet, which shows the chemiluminescence intensity every 5 seconds for 5 minutes. The obtained values are transferred to a statistical program, such as the SPSS 20.0, for treatment. Results: based on a bivariate correlation comparing the values of chemiluminescence as an independent variable with the known date, in this case the dependent variable, from the Pearson coefficient and the significance level, we can affirm that the intensity of chemiluminescence and the age are inversely proportional. A regression study was made using the same variables to establish th emost predictable variable, which was the chemiluminescence at 15 seconds. A curvilinear estimation indicated that the exponential model was the best fitting model, while a step by step discriminant study showed that the best results were obtained with the chemiluminescence variable at 20 seconds. The COR curves results confirm the usefulness of this technique to determine the date. This validity of this work is limited because other results already known in this field were not compared and because of the need to quantify Fe previous to the sample. However, it opens the way to studying in greater detail the kinetic analysis of the resulting curves for each sample. Conclusions We found a negative correlation between chemiluminescence measured by luminotremy and the age of bone remains, the chemiluminescence decreasing as the age increases. The mathematical model that best fits the relation between chemiluminescence and date is exponential. The chemiluminescence reading at 15 seconds (QL15s) is the best predictor of date, while the reading of chemiluminescence at 20 seconds (QL20s) has the best discriminant capacity (classification capacity) of all the times analyzed. The results of the study lead us to propose luminometry as a method for calculating the age of bone remains since it is a simple, low cost technique with an acceptable classification capacity.
Silva, Andre Gustavo Pereira da. „Uma abordagem dirigida por modelos para desenvolvimento de middlewares auto-adaptativos para transmiss?o de fluxo de dados baseado em restri??es de QoS“. Universidade Federal do Rio Grande do Norte, 2010. http://repositorio.ufrn.br:8080/jspui/handle/123456789/18011.
Der volle Inhalt der QuelleThe use of middleware technology in various types of systems, in order to abstract low-level details related to the distribution of application logic, is increasingly common. Among several systems that can be benefited from using these components, we highlight the distributed systems, where it is necessary to allow communications between software components located on different physical machines. An important issue related to the communication between distributed components is the provision of mechanisms for managing the quality of service. This work presents a metamodel for modeling middlewares based on components in order to provide to an application the abstraction of a communication between components involved in a data stream, regardless their location. Another feature of the metamodel is the possibility of self-adaptation related to the communication mechanism, either by updating the values of its configuration parameters, or by its replacement by another mechanism, in case of the restrictions of quality of service specified are not being guaranteed. In this respect, it is planned the monitoring of the communication state (application of techniques like feedback control loop), analyzing performance metrics related. The paradigm of Model Driven Development was used to generate the implementation of a middleware that will serve as proof of concept of the metamodel, and the configuration and reconfiguration policies related to the dynamic adaptation processes. In this sense was defined the metamodel associated to the process of a communication configuration. The MDD application also corresponds to the definition of the following transformations: the architectural model of the middleware in Java code, and the configuration model to XML
A utiliza??o da tecnologia de middleware em diversos tipos de sistemas, com a finalidade de abstrair detalhes de baixo n?vel relacionados com a distribui??o da l?gica da aplica??o, ? cada vez mais frequente. Dentre diversos sistemas que podem ser beneficiados com a utiliza??o desses componentes, podemos destacar os sistemas distribu?dos, onde ? necess?rio viabilizar a comunica??o entre componentes de software localizados em diferentes m?quinas f?sicas. Uma importante quest?o relacionada ? comunica??o entre componentes distribu?dos ? o fornecimento de mecanismos para gerenciamento da qualidade de servi?o. Este trabalho apresenta um metamodelo para modelagem de middlewares baseados em componentes que prov?em ? aplica??o a abstra??o da comunica??o entre componentes envolvidos em um fluxo de dados, independente da sua localiza??o. Outra caracter?stica do metamodelo ? a possibilidade de auto-adapta??o relacionada ao mecanismo de comunica??o utilizado, seja atrav?s da atualiza??o dos valores dos seus par?metros de configura??o, ou atrav?s da sua substitui??o por outro mecanismo, caso as restri??es de qualidade de servi?o especificadas n?o estejam sendo garantidas. Nesse prop?sito, ? previsto o monitoramento do estado da comunica??o (aplica??es de t?cnicas do tipo feedback control loop), analisando-se m?tricas de desempenho relacionadas. O paradigma de Desenvolvimento Dirigido por Modelos foi utilizado para gerar a implementa??o de um middleware que servir? como prova de conceito do metamodelo, e as pol?ticas de configura??o e reconfigura??o relacionadas com o processo de adapta??o din?mica; neste sentido, foi definido o metamodelo associado ao processo de configura??o de uma comunica??o. A aplica??o da t?cnica de MDD corresponde ainda ? defini??o das seguintes transforma??es: do modelo arquitetural do middleware para c?digo em linguagem Java, e do modelo de configura??o para c?digo XML
Bentria, Dounia. „Combining checkpointing and other resilience mechanisms for exascale systems“. Thesis, Lyon, École normale supérieure, 2014. http://www.theses.fr/2014ENSL0971/document.
Der volle Inhalt der QuelleIn this thesis, we are interested in scheduling and optimization problems in probabilistic contexts. The contributions of this thesis come in two parts. The first part is dedicated to the optimization of different fault-Tolerance mechanisms for very large scale machines that are subject to a probability of failure and the second part is devoted to the optimization of the expected sensor data acquisition cost when evaluating a query expressed as a tree of disjunctive Boolean operators applied to Boolean predicates. In the first chapter, we present the related work of the first part and then we introduce some new general results that are useful for resilience on exascale systems.In the second chapter, we study a unified model for several well-Known checkpoint/restart protocols. The proposed model is generic enough to encompass both extremes of the checkpoint/restart space, from coordinated approaches to a variety of uncoordinated checkpoint strategies. We propose a detailed analysis of several scenarios, including some of the most powerful currently available HPC platforms, as well as anticipated exascale designs.In the third, fourth, and fifth chapters, we study the combination of different fault tolerant mechanisms (replication, fault prediction and detection of silent errors) with the traditional checkpoint/restart mechanism. We evaluated several models using simulations. Our results show that these models are useful for a set of models of applications in the context of future exascale systems.In the second part of the thesis, we study the problem of minimizing the expected sensor data acquisition cost when evaluating a query expressed as a tree of disjunctive Boolean operators applied to Boolean predicates. The problem is to determine the order in which predicates should be evaluated so as to shortcut part of the query evaluation and minimize the expected cost.In the sixth chapter, we present the related work of the second part and in the seventh chapter, we study the problem for queries expressed as a disjunctive normal form. We consider the more general case where each data stream can appear in multiple predicates and we consider two models, the model where each predicate can access a single stream and the model where each predicate can access multiple streams
Ou, Ting-Wei, und 歐庭瑋. „A Data Temperature Restore Scheduling System with Container-based Virtualization for Cloud Applications“. Thesis, 2016. http://ndltd.ncl.edu.tw/handle/22809986435557630954.
Der volle Inhalt der Quelle國立中興大學
資訊科學與工程學系
104
As cloud computing grows in popularity, IDC reports that the amount of data in the Internet is doubling the rate of size growth every two years, and it will reach 44 zettabytes by 2020. IDC also noted that the downtime cost from infrastructure failures, data loss, and human error is $1 million per hour, which is tremendous loss for business. It shows the high availability and reliability are important for enterprises. Previous studies with high availability mostly adopted continuous data protection (CDP) to ensure that the data will not lost. However, they do not consider the data access frequency for users’ demands in cloud applications, resulting in higher overhead of backup operations. Recently, virtualization environment such as virtual machines (VM) prevails in cloud. Other studies considered the importance of system environment backup and proposed the backup-and-recovery scheme systems based on VMs. Nevertheless, it reduces the elasticity of system deployment. Therefore, this thesis proposes a data temperature restore scheduling with container-based virtualization (DTRS). The algorithm analyzes users’ demands according to the data access rate of cloud applications to enhance the effectiveness of recovery performance. In the experiment, this thesis uses the testing tools YCSB (Yahoo! Cloud Serving Benchmark), shows that DTRS can effectively shorten the mean time to recovery, and meets high availability requirement for cloud applications.
Wang, Zhi-ming, und 王志明. „Reversible Data Hiding Schemes for ABTC-EQ and AMBTC Restored Images“. Thesis, 2016. http://ndltd.ncl.edu.tw/handle/pb3e8n.
Der volle Inhalt der Quelle逢甲大學
資訊工程學系
104
Hiding a message in compression codes can reduce transmission costs and simultaneously make the transmission more secure. In this thesis, we propose two novel reversible data hiding schemes to hide the secret data into the block truncation code and its restored images, respectively. In the first method, we utilize adaptive block truncation coding based on edge-based quantization approach (ABTC-EQ) to compress the image and obtain its compression code. The characteristic not being used in ABTC-EQ and Zero-point Fixed Histogram Shifting (ZPF-HS) are then used to embed the secret data into the compression code. In the second method, we employ the Absolute Moment Block Truncation Coding (AMBTC) to obtain the restored images. Then, secret information is adaptively embedded into pixels of each AMBTC-restored block, except for the positions of two replaced quantization levels using quantization level difference (QLD) and interpolation technique. The performance of two proposed schemes are compared to previous image steganography methods. The experimental results show that our approachs outperforms referenced approaches.
Bücher zum Thema "Data restore"
Leber, Jody. Windows NT backup & restore. Beijing: O'Reilly, 1998.
Den vollen Inhalt der Quelle findenLeber, Jody. Windows NT backup & restore. Sebastopol, CA: O'Reilly, 1998.
Den vollen Inhalt der Quelle findenMiroslav, Klivansky, und Barto Michael, Hrsg. Backup and restore practices for Sun Enterprise servers. Palo Alto, CA: Sun Microsystems Press, 2000.
Den vollen Inhalt der Quelle findenOptimizing restore and recovery solutions with DB2 Recovery Expert for z/OS V2.1. [United States?]: IBM, International Technical Support Organization, 2008.
Den vollen Inhalt der Quelle findenhonouree, Hustinx P. J., Hrsg. Data protection anno 2014 : how to restore trust?: Contributions in honour of Peter Hustinx, European Data Protection Supervisor (2004-2014). Cambridge [England]: Intersentia, 2014.
Den vollen Inhalt der Quelle findenBlokdijk, Gerard. ITIL practitioner support and restore (IPSR) all-in-one help desk exam guide and certification work book: Define, implement, manage and review service support with service desk, incident management and problem management. [United States]: Gerard Blokdijk, 2008.
Den vollen Inhalt der Quelle findenHobson, Anthony. Lanterns that lit our world: How to identify, date, and restore old railroad, marine, fire, carriage, farm, and other lanterns. Spencertown, N.Y: Golden Hill Press, 1991.
Den vollen Inhalt der Quelle findenRedbooks, IBM. DB2 Recovery on VSE and Vm Using the Data Restore Feature. Ibm, 1997.
Den vollen Inhalt der Quelle findenBeard, Bradley. Beginning Backup and Restore for SQL Server: Data Loss Management and Prevention Techniques. Apress, 2018.
Den vollen Inhalt der Quelle findenLo, Meng-chen, Marie-France Marin, Alik S. Widge und Mohammed R. Milad. Device-Based Treatment for PTSD. Herausgegeben von Frederick J. Stoddard, David M. Benedek, Mohammed R. Milad und Robert J. Ursano. Oxford University Press, 2018. http://dx.doi.org/10.1093/med/9780190457136.003.0025.
Der volle Inhalt der QuelleBuchteile zum Thema "Data restore"
Finsel, Josef. „How Do I Back Up and Restore My Data?“ In The Handbook for Reluctant Database Administrators, 69–92. Berkeley, CA: Apress, 2001. http://dx.doi.org/10.1007/978-1-4302-1146-4_4.
Der volle Inhalt der QuelleRaineri, Paolo, und Francesco Molinari. „Innovation in Data Visualisation for Public Policy Making“. In The Data Shake, 47–59. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-63693-7_4.
Der volle Inhalt der QuelleSolanki, Manishkumar R. „SOLID: A Web System to Restore the Control of Users’ Personal Data“. In Advances in Intelligent Systems and Computing, 257–67. Singapore: Springer Singapore, 2020. http://dx.doi.org/10.1007/978-981-15-8289-9_24.
Der volle Inhalt der QuelleFujii, Tomohiro, und Masao Hirokawa. „A Data Concealing Technique with Random Noise Disturbance and a Restoring Technique for the Concealed Data by Stochastic Process Estimation“. In International Symposium on Mathematics, Quantum Theory, and Cryptography, 103–24. Singapore: Springer Singapore, 2020. http://dx.doi.org/10.1007/978-981-15-5191-8_11.
Der volle Inhalt der QuelleTing, I.-Hsien, Chris Kimble und Daniel Kudenko. „A Pattern Restore Method for Restoring Missing Patterns in Server Side Clickstream Data“. In Web Technologies Research and Development - APWeb 2005, 501–12. Berlin, Heidelberg: Springer Berlin Heidelberg, 2005. http://dx.doi.org/10.1007/978-3-540-31849-1_49.
Der volle Inhalt der QuelleBouden, D., und I. Lemahieu. „Use of Blind Deconvolution to Restore Eddy Current Data from Non-Destructive Testing of Defects in Welds“. In Review of Progress in Quantitative Nondestructive Evaluation, 743–50. Boston, MA: Springer US, 1999. http://dx.doi.org/10.1007/978-1-4615-4791-4_95.
Der volle Inhalt der QuelleSallin, Marc, Martin Kropp, Craig Anslow, James W. Quilty und Andreas Meier. „Measuring Software Delivery Performance Using the Four Key Metrics of DevOps“. In Lecture Notes in Business Information Processing, 103–19. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-78098-2_7.
Der volle Inhalt der QuelleSippu, Seppo, und Eljas Soisalon-Soininen. „Transaction Rollback and Restart Recovery“. In Data-Centric Systems and Applications, 65–99. Cham: Springer International Publishing, 2014. http://dx.doi.org/10.1007/978-3-319-12292-2_4.
Der volle Inhalt der QuelleYan, Yaowei, Dongsheng Luo, Jingchao Ni, Hongliang Fei, Wei Fan, Xiong Yu, John Yen und Xiang Zhang. „Local Graph Clustering by Multi-network Random Walk with Restart“. In Advances in Knowledge Discovery and Data Mining, 490–501. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-93040-4_39.
Der volle Inhalt der QuelleRajachandrasekar, Raghunath, Xiangyong Ouyang, Xavier Besseron, Vilobh Meshram und Dhabaleswar K. Panda. „Can Checkpoint/Restart Mechanisms Benefit from Hierarchical Data Staging?“ In Euro-Par 2011: Parallel Processing Workshops, 312–21. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-29740-3_35.
Der volle Inhalt der QuelleKonferenzberichte zum Thema "Data restore"
Cui, Jian, Gang Li, Pu Qi Zhou und Jia Qi Zhang. „Restore the Original data by Embedded data“. In 2019 IEEE 4th Advanced Information Technology, Electronic and Automation Control Conference (IAEAC). IEEE, 2019. http://dx.doi.org/10.1109/iaeac47372.2019.8997598.
Der volle Inhalt der QuelleHilprecht, Benjamin, und Carsten Binnig. „ReStore - Neural Data Completion for Relational Databases“. In SIGMOD/PODS '21: International Conference on Management of Data. New York, NY, USA: ACM, 2021. http://dx.doi.org/10.1145/3448016.3457264.
Der volle Inhalt der QuelleBardis, Nikolaos, Nikolaos Doukas und Oleksandr P. Markovskyi. „Effective method to restore data in distributed data storage systems“. In MILCOM 2015 - 2015 IEEE Military Communications Conference. IEEE, 2015. http://dx.doi.org/10.1109/milcom.2015.7357617.
Der volle Inhalt der QuelleWang, Long, Harigovind Ramasamy, Valentina Salapura, Robin Arnold, Xu Wang, Senthil Bakthavachalam, Phil Coulthard et al. „System Restore in a Multi-cloud Data Pipeline Platform“. In 2019 49th Annual IEEE/IFIP International Conference on Dependable Systems and Networks – Industry Track. IEEE, 2019. http://dx.doi.org/10.1109/dsn-industry.2019.00012.
Der volle Inhalt der QuelleBahls, Daniel, Benjamin Zapilko und Klaus Tochtermann. „A Data Restore Model for Reproducibility in Computational Statistics“. In the 13th International Conference. New York, New York, USA: ACM Press, 2013. http://dx.doi.org/10.1145/2494188.2494205.
Der volle Inhalt der QuelleShriwas, M. S., N. Gupta und A. Sinhal. „Efficient Method for Backup and Restore Data in Android“. In 2013 International Conference on Communication Systems and Network Technologies (CSNT 2013). IEEE, 2013. http://dx.doi.org/10.1109/csnt.2013.148.
Der volle Inhalt der QuelleYin, Xiaoyan, Javier Alonso, Fumio Machida, Ermeson C. Andrade und Kishor S. Trivedi. „Availability Modeling and Analysis for Data Backup and Restore Operations“. In 2012 IEEE 31st International Symposium on Reliable Distributed Systems (SRDS). IEEE, 2012. http://dx.doi.org/10.1109/srds.2012.9.
Der volle Inhalt der QuelleDagnaw, Girum, Wang Hua und Ke Zhou. „SSD Assisted Caching for Restore Optimization in Distributed Deduplication Environment“. In 2020 International Conference on High Performance Big Data and Intelligent Systems (HPBD&IS). IEEE, 2020. http://dx.doi.org/10.1109/hpbdis49115.2020.9130572.
Der volle Inhalt der QuelleZhu, Chunbiao, Yuanqi Chen, Yiwei Zhang, Shan Liu und Ge Li. „ResGAN: A Low-Level Image Processing Network to Restore Original Quality of JPEG Compressed Images“. In 2019 Data Compression Conference (DCC). IEEE, 2019. http://dx.doi.org/10.1109/dcc.2019.00128.
Der volle Inhalt der QuelleForbes, Florence, und Wojciech Pieczynski. „New trends in Markov models and related learning to restore data“. In 2009 IEEE International Workshop on Machine Learning for Signal Processing (MLSP). IEEE, 2009. http://dx.doi.org/10.1109/mlsp.2009.5306255.
Der volle Inhalt der QuelleBerichte der Organisationen zum Thema "Data restore"
Berkowitz, Jacob, Christine VanZomeren, Nia Hurst und Kristina Sebastian. An evaluation of soil phosphorus storage capacity (SPSC) at proposed wetland restoration locations in the western Lake Erie Basin. Engineer Research and Development Center (U.S.), September 2021. http://dx.doi.org/10.21079/11681/42108.
Der volle Inhalt der QuelleBedford, Philip, Alexis Long, Thomas Long, Erin Milliken, Lauren Thomas und Alexis Yelvington. Legal Mechanisms for Mitigating Flood Impacts in Texas Coastal Communities. Herausgegeben von Gabriel Eckstein. Texas A&M University School of Law Program in Natural Resources Systems, Mai 2019. http://dx.doi.org/10.37419/eenrs.mitigatingfloodimpactstx.
Der volle Inhalt der QuelleHalker Singh, Rashmi B., Juliana H. VanderPluym, Allison S. Morrow, Meritxell Urtecho, Tarek Nayfeh, Victor D. Torres Roldan, Magdoleen H. Farah et al. Acute Treatments for Episodic Migraine. Agency for Healthcare Research and Quality (AHRQ), Dezember 2020. http://dx.doi.org/10.23970/ahrqepccer239.
Der volle Inhalt der Quelle