Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 231,271,185 papers from all fields of science
Search
Sign In
Create Free Account
Backup
Known as:
Backup tape
, Back-up
, Bak
Expand
In information technology, a backup, or the process of backing up, refers to the copying and archiving of computer data so it may be used to restore…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
50 relations
Backup-to-disk
Berkeley DB
Bitser (software)
Boot sector
Expand
Broader (1)
Data security
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2013
Highly Cited
2013
Centralised utility system planning for a Total Site Heat Integration network
P. Y. Liew
,
S. R. Alwi
,
P. Varbanov
,
Z. Manan
,
J. Klemeš
Computers and Chemical Engineering
2013
Corpus ID: 45116794
Highly Cited
2012
Highly Cited
2012
Dynamic load balancing mechanism based on cloud storage
T. Wu
,
Wei-Tsong Lee
,
Yu-San Lin
,
Yih-Sin Lin
,
Hung-Lin Chan
,
Jhih-Siang Huang
Computing, Communications and Applications…
2012
Corpus ID: 15336075
Due to extensive coverage and domains of cloud computing-based architecture, most users saves and access highly similar data…
Expand
Highly Cited
2006
Highly Cited
2006
Inferring Trust Relationships in Web-Based Social Networks
J. Golbeck
,
J. Hendler
2006
Corpus ID: 14114214
The growth of web-based social networking and the properties of those networks have created great potential for producing…
Expand
Highly Cited
2006
Highly Cited
2006
Recovery Policies for Enhancing Web Services Reliability
A. Erradi
,
P. Maheshwari
,
V. Tosic
IEEE International Conference on Web Services…
2006
Corpus ID: 1049373
Web services are gaining acceptance as a standards-based approach for integrating loosely coupled services often distributed over…
Expand
Highly Cited
2004
Highly Cited
2004
Reliability assessment of a restructured power system considering the reserve agreements
Peng Wang
,
R. Billinton
IEEE Transactions on Power Systems
2004
Corpus ID: 122973
This paper presents a technique to evaluate the customer load point reliability in a deregulated power system considering…
Expand
Review
1999
Review
1999
Reproductive health and the condom dilemma: identifying situational barriers to HIV protection in South Africa
E. Preston-whyte
1999
Corpus ID: 40385751
This chapter explores common social and cultural barriers to condom use, and in general to adopting protective behaviour against…
Expand
Review
1988
Review
1988
Power quality site surveys: facts, fiction, and fallacies
François Martzloff
1988
Corpus ID: 3094074
Site surveys are generally initiated to evaluate the quality of the power available at a specific location with the aim of…
Expand
Highly Cited
1987
Highly Cited
1987
ABYSS: ATrusted Architecture for Software Protection
Steve R. White
,
L. Comerford
IEEE Symposium on Security and Privacy
1987
Corpus ID: 11898158
ABYSS (A Basic Yorktown Security System) is an architecture for the trusted execution of application software. It supports a…
Expand
1981
1981
Protection System Modelling in a Probabilistic Assessment of Transient Stability
P. Kuruganty
,
R. Billinton
IEEE Transactions on Power Apparatus and Systems
1981
Corpus ID: 23336756
The application of probability methods in the evaluation of power system transient stability has been demonstrated in recent…
Expand
Highly Cited
1974
Highly Cited
1974
Direct solution of large systems of linear equations
E. Wilson
,
K. Bathe
,
William P. Doherty
1974
Corpus ID: 62162213
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE
or Only Accept Required