Artykuły w czasopismach na temat „Coded data storage”
Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych
Sprawdź 50 najlepszych artykułów w czasopismach naukowych na temat „Coded data storage”.
Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.
Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.
Przeglądaj artykuły w czasopismach z różnych dziedzin i twórz odpowiednie bibliografie.
Oggier, Frédérique, i Anwitaman Datta. "On Grid Quorums for Erasure Coded Data". Entropy 23, nr 2 (30.01.2021): 177. http://dx.doi.org/10.3390/e23020177.
Pełny tekst źródłaOjima, Masahiro, Atsushi Saito, Toshimitsu Kaku, Masaru Ito, Yoshito Tsunoda, Shinji Takayama i Yutaka Sugita. "Compact magnetooptical disk for coded data storage". Applied Optics 25, nr 4 (15.02.1986): 483. http://dx.doi.org/10.1364/ao.25.000483.
Pełny tekst źródłaDitlbacher, H., J. R. Krenn, B. Lamprecht, A. Leitner i F. R. Aussenegg. "Spectrally coded optical data storage by metal nanoparticles". Optics Letters 25, nr 8 (15.04.2000): 563. http://dx.doi.org/10.1364/ol.25.000563.
Pełny tekst źródłaDitlbacher, Harald, Joachim Rudolf Krenn, Bernhard Lamprecht, Alfred Leitner i Franz Rembert Aussenegg. "Metal Nanoparticles for Spectrally Coded Optical Data Storage". Optics and Photonics News 11, nr 12 (1.12.2000): 43. http://dx.doi.org/10.1364/opn.11.12.000043.
Pełny tekst źródłaOjima, M., Y. Tsunoda, T. Maeda, T. Kaku, A. Saito, S. Takayama i Y. Sugita. "Compact Magneto-Optical Disk for Coded Data Storage". IEEE Translation Journal on Magnetics in Japan 1, nr 6 (wrzesień 1985): 698–99. http://dx.doi.org/10.1109/tjmj.1985.4548917.
Pełny tekst źródłaLiu, Chengjian, Qiang Wang, Xiaowen Chu, Yiu-Wing Leung i Hai Liu. "ESetStore: An Erasure-Coded Storage System With Fast Data Recovery". IEEE Transactions on Parallel and Distributed Systems 31, nr 9 (1.09.2020): 2001–16. http://dx.doi.org/10.1109/tpds.2020.2983411.
Pełny tekst źródłaHuang, Jianzhong, Panping Zhou, Xiao Qin, Yanqun Wang i Changsheng Xie. "Optimizing Erasure-Coded Data Archival for Replica-Based Storage Clusters". Computer Journal 62, nr 2 (3.08.2018): 247–62. http://dx.doi.org/10.1093/comjnl/bxy079.
Pełny tekst źródłaXiang, Yu, Tian Lan, Vaneet Aggarwal i Yih-Farn R. Chen. "Joint Latency and Cost Optimization for Erasure-Coded Data Center Storage". IEEE/ACM Transactions on Networking 24, nr 4 (sierpień 2016): 2443–57. http://dx.doi.org/10.1109/tnet.2015.2466453.
Pełny tekst źródłaTajeddine, Razane, Oliver W. Gnilke i Salim El Rouayheb. "Private Information Retrieval From MDS Coded Data in Distributed Storage Systems". IEEE Transactions on Information Theory 64, nr 11 (listopad 2018): 7081–93. http://dx.doi.org/10.1109/tit.2018.2815607.
Pełny tekst źródłaXu, Liangliang, Min Lyu, Zhipeng Li, Yongkun Li i Yinlong Xu. "Deterministic Data Distribution for Efficient Recovery in Erasure-Coded Storage Systems". IEEE Transactions on Parallel and Distributed Systems 31, nr 10 (1.10.2020): 2248–62. http://dx.doi.org/10.1109/tpds.2020.2987837.
Pełny tekst źródłaSong, Haiyang, Jianan Li, Dakui Lin, Hongjie Liu, Yongkun Lin, Jianying Hao, Kun Wang, Xiao Lin i Xiaodi Tan. "Reducing the Crosstalk in Collinear Holographic Data Storage Systems Based on Random Position Orthogonal Phase-Coding Reference". Photonics 10, nr 10 (16.10.2023): 1160. http://dx.doi.org/10.3390/photonics10101160.
Pełny tekst źródłaGaeta, Rossano, i Marco Grangetto. "Malicious Node Identification in Coded Distributed Storage Systems under Pollution Attacks". ACM Transactions on Modeling and Performance Evaluation of Computing Systems 6, nr 3 (30.09.2021): 1–27. http://dx.doi.org/10.1145/3491062.
Pełny tekst źródłaOggier, Frédérique, i Anwitaman Datta. "On repairing erasure coded data in an active-passive mixed storage network". International Journal of Information and Coding Theory 3, nr 1 (2015): 58. http://dx.doi.org/10.1504/ijicot.2015.068697.
Pełny tekst źródłaBao, Han, Yijie Wang i Fangliang Xu. "Reducing network cost of data repair in erasure-coded cross-datacenter storage". Future Generation Computer Systems 102 (styczeń 2020): 494–506. http://dx.doi.org/10.1016/j.future.2019.08.027.
Pełny tekst źródłaXiao, Yifei, i Shijie Zhou. "Health Data Availability Protection: Delta-XOR-Relay Data Update in Erasure-Coded Cloud Storage Systems". Computer Modeling in Engineering & Sciences 135, nr 1 (2023): 169–85. http://dx.doi.org/10.32604/cmes.2022.021795.
Pełny tekst źródłaKrishnan, Prasad, Lakshmi Natarajan i V. Lalitha. "An Umbrella Converse for Data Exchange: Applied to Caching, Computing, and Shuffling". Entropy 23, nr 8 (30.07.2021): 985. http://dx.doi.org/10.3390/e23080985.
Pełny tekst źródłaShao, Bilin, Dan Song, Genqing Bian i Yu Zhao. "Rack Aware Data Placement for Network Consumption in Erasure-Coded Clustered Storage Systems". Information 9, nr 7 (21.06.2018): 150. http://dx.doi.org/10.3390/info9070150.
Pełny tekst źródłaShen, Zhirong, Jiwu Shu i Yingxun Fu. "Parity-Switched Data Placement: Optimizing Partial Stripe Writes in XOR-Coded Storage Systems". IEEE Transactions on Parallel and Distributed Systems 27, nr 11 (1.11.2016): 3311–22. http://dx.doi.org/10.1109/tpds.2016.2525770.
Pełny tekst źródłaLi, Xiaolu, Zuoru Yang, Jinhong Li, Runhui Li, Patrick P. C. Lee, Qun Huang i Yuchong Hu. "Repair Pipelining for Erasure-coded Storage: Algorithms and Evaluation". ACM Transactions on Storage 17, nr 2 (28.05.2021): 1–29. http://dx.doi.org/10.1145/3436890.
Pełny tekst źródłaHAMADANI, AMBREEN, NAZIR A. GANAI, SHAH F. FAROOQ i BASHARAT A. BHAT. "Big data management: from hard drives to DNA drives". Indian Journal of Animal Sciences 90, nr 2 (6.03.2020): 134–40. http://dx.doi.org/10.56093/ijans.v90i2.98761.
Pełny tekst źródłaZhang, Xingjun, Ningjing Liang, Yunfei Liu, Changjiang Zhang i Yang Li. "SA-RSR: a read-optimal data recovery strategy for XOR-coded distributed storage systems". Frontiers of Information Technology & Electronic Engineering 23, nr 6 (czerwiec 2022): 858–75. http://dx.doi.org/10.1631/fitee.2100242.
Pełny tekst źródłaShen, X. A., i R. Kachru. "Use of biphase-coded pulses for wideband data storage in time-domain optical memories". Applied Optics 32, nr 17 (10.06.1993): 3149. http://dx.doi.org/10.1364/ao.32.003149.
Pełny tekst źródłaHu, Yupeng, Qian Li, Wei Xie i Zhenyu Ye. "An Ant Colony Optimization Based Data Update Scheme for Distributed Erasure-Coded Storage Systems". IEEE Access 8 (2020): 118696–706. http://dx.doi.org/10.1109/access.2020.3004577.
Pełny tekst źródłaZhang, Shu Zhen, i Hai Long Song. "A Secret Sharing Algorithm Based on Regenerating Codes". Applied Mechanics and Materials 397-400 (wrzesień 2013): 2031–36. http://dx.doi.org/10.4028/www.scientific.net/amm.397-400.2031.
Pełny tekst źródłaSu, Yu, Shu Hong Wen i Jian Ping Chai. "Embedded System Based Television Data Collection and Return Technology". Applied Mechanics and Materials 48-49 (luty 2011): 496–501. http://dx.doi.org/10.4028/www.scientific.net/amm.48-49.496.
Pełny tekst źródłaPandit, Anubhav. "The Identical Data in Cloud Storage with ADJDUP Technique". December 2020 2, nr 4 (6.01.2021): 214–18. http://dx.doi.org/10.36548/jucct.2020.4.004.
Pełny tekst źródłaKim, Yongok, Gyuyeol Kong i Sooyong Choi. "Error Correcting Capable 2/4 Modulation Code Using Trellis Coded Modulation in Holographic Data Storage". Japanese Journal of Applied Physics 51, nr 8S2 (1.08.2012): 08JD08. http://dx.doi.org/10.7567/jjap.51.08jd08.
Pełny tekst źródłaKim, Yongok, Gyuyeol Kong i Sooyong Choi. "Error Correcting Capable 2/4 Modulation Code Using Trellis Coded Modulation in Holographic Data Storage". Japanese Journal of Applied Physics 51 (20.08.2012): 08JD08. http://dx.doi.org/10.1143/jjap.51.08jd08.
Pełny tekst źródłaPei, Xiaoqiang, Yijie Wang, Xingkong Ma i Fangliang Xu. "Efficient in-place update with grouped and pipelined data transmission in erasure-coded storage systems". Future Generation Computer Systems 69 (kwiecień 2017): 24–40. http://dx.doi.org/10.1016/j.future.2016.10.016.
Pełny tekst źródłaChen, Junqi, Yong Wang, Miao Ye, Qinghao Zhang i Wenlong Ke. "A Load-Aware Multistripe Concurrent Update Scheme in Erasure-Coded Storage System". Wireless Communications and Mobile Computing 2022 (19.05.2022): 1–15. http://dx.doi.org/10.1155/2022/5392474.
Pełny tekst źródłaMahalingam, Hemalatha, Padmapriya Velupillai Meikandan, Karuppuswamy Thenmozhi, Kawthar Mostafa Moria, Chandrasekaran Lakshmi, Nithya Chidambaram i Rengarajan Amirtharajan. "Neural Attractor-Based Adaptive Key Generator with DNA-Coded Security and Privacy Framework for Multimedia Data in Cloud Environments". Mathematics 11, nr 8 (7.04.2023): 1769. http://dx.doi.org/10.3390/math11081769.
Pełny tekst źródłaKhan, Imran Ullah, M. A. Ansari, S. Hasan Saeed i Kakul Khan. "Evaluation and Analysis of Rate Control Methods for H.264/AVC and MPEG-4 Video Codec". International Journal of Electrical and Computer Engineering (IJECE) 8, nr 2 (1.04.2018): 1273. http://dx.doi.org/10.11591/ijece.v8i2.pp1273-1280.
Pełny tekst źródłaKhan, Imran Ullah, M. A. Ansari, S. Hasan Saeed i Kakul Khan. "Evaluation and Analysis of Rate Control Methods for H.264/AVC and MPEG-4 Video Codec". International Journal of Electrical and Computer Engineering (IJECE) 8, nr 5 (1.10.2018): 2788. http://dx.doi.org/10.11591/ijece.v8i5.pp2788-2794.
Pełny tekst źródłaShen, Zhirong, Patrick P. C. Lee, Jiwu Shu i Wenzhong Guo. "Encoding-Aware Data Placement for Efficient Degraded Reads in XOR-Coded Storage Systems: Algorithms and Evaluation". IEEE Transactions on Parallel and Distributed Systems 29, nr 12 (1.12.2018): 2757–70. http://dx.doi.org/10.1109/tpds.2018.2842210.
Pełny tekst źródłaYao, Jing, i Qi Liang Du. "A Simple Data Acquisition Software for Serial Devices Based on Excel VBA and its Application in Rotary Kilns". Advanced Materials Research 591-593 (listopad 2012): 1638–44. http://dx.doi.org/10.4028/www.scientific.net/amr.591-593.1638.
Pełny tekst źródłaJagdish, Mukta, Amelec Viloria, Jesus Vargas, Omar Bonerge Pineda Lezama i David Ovallos-Gazabon. "Modeling software architecture design on data storage security in cloud computing environments". Journal of Intelligent & Fuzzy Systems 39, nr 6 (4.12.2020): 8557–64. http://dx.doi.org/10.3233/jifs-189172.
Pełny tekst źródłaZhou, Anan, Benshun Yi i Laigan Luo. "Tree-structured data placement scheme with cluster-aided top-down transmission in erasure-coded distributed storage systems". Computer Networks 204 (luty 2022): 108714. http://dx.doi.org/10.1016/j.comnet.2021.108714.
Pełny tekst źródłaGopinath, R., i B. G. Geetha. "An E-learning System Based on Secure Data Storage Services in Cloud Computing". International Journal of Information Technology and Web Engineering 8, nr 2 (kwiecień 2013): 1–17. http://dx.doi.org/10.4018/jitwe.2013040101.
Pełny tekst źródłaAlbina, Mayniar. "Perancangan Aplikasi Kompresi File Teks Menggunakan Algoritma Context Tree Weighting". Journal of Informatics Management and Information Technology 2, nr 3 (31.07.2022): 78–82. http://dx.doi.org/10.47065/jimat.v2i3.149.
Pełny tekst źródłaEllis, Katy, Chris Brew, George Patargias, Tim Adye, Rob Appleyard, Alastair Dewhurst i Ian Johnson. "XRootD and Object Store: A new paradigm". EPJ Web of Conferences 245 (2020): 04006. http://dx.doi.org/10.1051/epjconf/202024504006.
Pełny tekst źródłaCourtney, S. B., M. J. Tricard i R. W. Hendricks. "PC-Based Management and Analysis of X-Ray Residual Stress Data". Advances in X-ray Analysis 36 (1992): 535–41. http://dx.doi.org/10.1154/s0376030800019169.
Pełny tekst źródłaWei, Boan, Jianqin Zhang, Chaonan Hu i Zheng Wen. "A Clustering Visualization Method for Density Partitioning of Trajectory Big Data Based on Multi-Level Time Encoding". Applied Sciences 13, nr 19 (26.09.2023): 10714. http://dx.doi.org/10.3390/app131910714.
Pełny tekst źródłaYang, Jian Xi, i Li Wen Zhang. "Optimization of Sensor Placement in SHM Based on the Dual Coded Genetic Algorithm". Applied Mechanics and Materials 151 (styczeń 2012): 139–44. http://dx.doi.org/10.4028/www.scientific.net/amm.151.139.
Pełny tekst źródłaVijayalakshmi, V., i K. Sharmila. "Secure Data Transactions based on Hash Coded Starvation Blockchain Security using Padded Ring Signature-ECC for Network of Things". International Journal on Recent and Innovation Trends in Computing and Communication 11, nr 1 (6.02.2023): 53–61. http://dx.doi.org/10.17762/ijritcc.v11i1.5986.
Pełny tekst źródłaBalaji, K., i S. S. Manikandasaran. "Data Security and Deduplication Framework for Securing and Deduplicating Users’ Data in Public and Private Cloud Environment". Journal of Scientific Research 14, nr 1 (1.01.2022): 153–65. http://dx.doi.org/10.3329/jsr.v14i1.54063.
Pełny tekst źródłaKuang, Fengtian, Bo Mi, Yang Li, Yuan Weng i Shijie Wu. "Multiparty Homomorphic Machine Learning with Data Security and Model Preservation". Mathematical Problems in Engineering 2021 (11.01.2021): 1–11. http://dx.doi.org/10.1155/2021/6615839.
Pełny tekst źródłaWang, Nan, Yuan Zhang i Wei Ning. "Research on Compressive and Coding Algorithm of Bearing Vibration Signal in Wireless Transmission". Applied Mechanics and Materials 757 (kwiecień 2015): 195–99. http://dx.doi.org/10.4028/www.scientific.net/amm.757.195.
Pełny tekst źródłaVenable, Richard M. "Data Transmission Through the Telephone Network: Protocols, Pitfalls, and Some Examples". Journal of AOAC INTERNATIONAL 69, nr 5 (1.09.1986): 749–54. http://dx.doi.org/10.1093/jaoac/69.5.749.
Pełny tekst źródłaWojas, Gosia. "The Infallible and the Specter – Manifesting (artificial) subjectification in female sex robots". Matter: Journal of New Materialist Research 8 (31.07.2023): 41–53. http://dx.doi.org/10.1344/jnmr.v8.43452.
Pełny tekst źródłaArya, Mukesh Kumar, i Namit Gupta. "Adoptive Cloud Application in Semantic Web". International Journal of Advance Research and Innovation 2, nr 2 (2014): 48–51. http://dx.doi.org/10.51976/ijari.221407.
Pełny tekst źródła