Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 234,791,940 papers from all fields of science
Search
Sign In
Create Free Account
Backup
Known as:
Backup tape
, Back-up
, Bak
Expand
In information technology, a backup, or the process of backing up, refers to the copying and archiving of computer data so it may be used to restore…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
50 relations
Backup-to-disk
Berkeley DB
Bitser (software)
Boot sector
Expand
Broader (1)
Data security
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2013
2013
Unsupervised detection of nonlinearity in motion using weighted average of non-extensive entropies
Seba Susan
,
M. Hanmandlu
Signal, Image and Video Processing
2013
Corpus ID: 35810784
Motion estimation and motion analysis have an important role to play for detecting abnormal motion in surveillance videos. In…
Expand
Review
2009
Review
2009
Managing Customer Relationships in Service Organizations
Balaram Adhikari
,
Bibhav Adhikari
2009
Corpus ID: 166291264
Presently, many managers regard Customer Relationship Management (CRM) as a database application or software solution and try to…
Expand
2009
2009
A Safety-Case Approach For Certifying Adaptive Systems
J. Rushby
2009
Corpus ID: 10334504
Adaptive systems—those that can change their behavior at runtime—pose new challenges for certification, and particularly for…
Expand
Review
2001
Review
2001
The Irish pollan, Coregonus autumnalis: options for its conservation
Chris Harrod
,
David Griffiths
,
T. McCarthy
,
R. Rosell
2001
Corpus ID: 49523253
The ecology of four relict Irish populations of pollan (Coregonus autumnalis) is compared with that of the species elsewhere, and…
Expand
1999
1999
Inferring link-level performance from end-to-end multicast measurements
R. Cáceres
,
N. Duffield
,
S. Moon
,
D. Towsley
1999
Corpus ID: 14266314
We present MBone experiments that validate an end-to-end measurement technique we call MINC, for Multicast Inference of Network…
Expand
1998
1998
The first operation of control system at the SPring-8 storage ring
R. Tanaka
,
T. Fukui
,
+4 authors
A. Yamashita
1998
Corpus ID: 17762050
The control system based on the standard model of the UNIX and VMEbus system has successfully performed accelerator operation…
Expand
1997
1997
Backbench debate within the Conservative Party and its influence on British foreign policy, 1948-57
Sandra D. Onslow
1997
Corpus ID: 154698729
Acknowledgements - Abbreviations - Introduction - Conservative Attitudes to European Integration - The Conservative Party and…
Expand
1994
1994
Leadership in the Post-Hierarchical Library
Richard T. Sweeney
Library Trends
1994
Corpus ID: 18755675
THEPOST-HIERARCHICAL LIBRARY IS A flattened organization, unlimited by the traditional hierarchy, antibureaucratic, with…
Expand
Highly Cited
1987
Highly Cited
1987
ABYSS: ATrusted Architecture for Software Protection
Steve R. White
,
L. Comerford
IEEE Symposium on Security and Privacy
1987
Corpus ID: 11898158
ABYSS (A Basic Yorktown Security System) is an architecture for the trusted execution of application software. It supports a…
Expand
1977
1977
A Summary of the PSI Program Synthesis System
C. Green
International Joint Conference on Artificial…
1977
Corpus ID: 26263841
This paper describes the current status of the PSI program synthesis system. It allows program specification dialogues using…
Expand