Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 234,290,066 papers from all fields of science
Search
Sign In
Create Free Account
Backup
Known as:
Backup tape
, Back-up
, Bak
Expand
In information technology, a backup, or the process of backing up, refers to the copying and archiving of computer data so it may be used to restore…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
50 relations
Backup-to-disk
Berkeley DB
Bitser (software)
Boot sector
Expand
Broader (1)
Data security
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2013
2013
Unsupervised detection of nonlinearity in motion using weighted average of non-extensive entropies
Seba Susan
,
M. Hanmandlu
Signal, Image and Video Processing
2013
Corpus ID: 35810784
Motion estimation and motion analysis have an important role to play for detecting abnormal motion in surveillance videos. In…
Expand
Review
2009
Review
2009
Managing Customer Relationships in Service Organizations
Balaram Adhikari
,
Bibhav Adhikari
2009
Corpus ID: 166291264
Presently, many managers regard Customer Relationship Management (CRM) as a database application or software solution and try to…
Expand
2009
2009
A Safety-Case Approach For Certifying Adaptive Systems
J. Rushby
2009
Corpus ID: 10334504
Adaptive systems—those that can change their behavior at runtime—pose new challenges for certification, and particularly for…
Expand
2002
2002
Protection with Multi-Segments ( PROMISE ) in Networks with Shared Risk Link Groups ( SRLG ) ∗
Dahai Xu
,
Yizhi Xiong
,
C. Qiao
2002
Corpus ID: 13570425
Shared Risk Link Group (SRLG) has been widely recognized as an important concept in survivable optical networks. The issues of…
Expand
1999
1999
Inferring link-level performance from end-to-end multicast measurements
R. Cáceres
,
N. Duffield
,
S. Moon
,
D. Towsley
1999
Corpus ID: 14266314
We present MBone experiments that validate an end-to-end measurement technique we call MINC, for Multicast Inference of Network…
Expand
1998
1998
The first operation of control system at the SPring-8 storage ring
R. Tanaka
,
T. Fukui
,
+4 authors
A. Yamashita
1998
Corpus ID: 17762050
The control system based on the standard model of the UNIX and VMEbus system has successfully performed accelerator operation…
Expand
1997
1997
Backbench debate within the Conservative Party and its influence on British foreign policy, 1948-57
Sandra D. Onslow
1997
Corpus ID: 154698729
Acknowledgements - Abbreviations - Introduction - Conservative Attitudes to European Integration - The Conservative Party and…
Expand
1994
1994
Leadership in the Post-Hierarchical Library
Richard T. Sweeney
Library Trends
1994
Corpus ID: 18755675
THEPOST-HIERARCHICAL LIBRARY IS A flattened organization, unlimited by the traditional hierarchy, antibureaucratic, with…
Expand
Highly Cited
1987
Highly Cited
1987
ABYSS: ATrusted Architecture for Software Protection
Steve R. White
,
L. Comerford
IEEE Symposium on Security and Privacy
1987
Corpus ID: 11898158
ABYSS (A Basic Yorktown Security System) is an architecture for the trusted execution of application software. It supports a…
Expand
1977
1977
A Summary of the PSI Program Synthesis System
C. Green
International Joint Conference on Artificial…
1977
Corpus ID: 26263841
This paper describes the current status of the PSI program synthesis system. It allows program specification dialogues using…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE