Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 230,684,223 papers from all fields of science
Search
Sign In
Create Free Account
Backup
Known as:
Backup tape
, Back-up
, Bak
Expand
In information technology, a backup, or the process of backing up, refers to the copying and archiving of computer data so it may be used to restore…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
50 relations
Backup-to-disk
Berkeley DB
Bitser (software)
Boot sector
Expand
Broader (1)
Data security
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2008
2008
Modeling, Control and Protection of Low-Voltage DC Microgrids
D. Salomonsson
2008
Corpus ID: 20383049
Current trends in electric power consumption indicate an increasing use of dc in end-user equipment, such as computers and other…
Expand
2008
2008
Comparing the fog effects on hybrid network using optical wireless and GHz links
F. Nadeem
,
B. Flecker
,
E. Leitgeb
,
M. S. Khan
,
M. S. Awan
,
T. Javornik
International Symposium on Communication Systems…
2008
Corpus ID: 14424701
Optical wireless link provides high bandwidth solution to the last mile access bottleneck. However, an appreciable high…
Expand
Highly Cited
2006
Highly Cited
2006
Inferring Trust Relationships in Web-Based Social Networks
J. Golbeck
,
J. Hendler
2006
Corpus ID: 14114214
The growth of web-based social networking and the properties of those networks have created great potential for producing…
Expand
Highly Cited
2006
Highly Cited
2006
Recovery Policies for Enhancing Web Services Reliability
A. Erradi
,
P. Maheshwari
,
V. Tosic
IEEE International Conference on Web Services…
2006
Corpus ID: 1049373
Web services are gaining acceptance as a standards-based approach for integrating loosely coupled services often distributed over…
Expand
Highly Cited
2004
Highly Cited
2004
LS-SCTP: a bandwidth aggregation technique for stream control transmission protocol
A. A. E. Al
,
T. Saadawi
,
Myung J. Lee
Computer Communications
2004
Corpus ID: 17717042
Review
1999
Review
1999
Reproductive health and the condom dilemma: identifying situational barriers to HIV protection in South Africa
E. Preston-whyte
1999
Corpus ID: 40385751
This chapter explores common social and cultural barriers to condom use, and in general to adopting protective behaviour against…
Expand
Highly Cited
1995
Highly Cited
1995
Offsetting surface boundaries and 3-axis gouge-free surface machining
K. Tang
,
Charles C. Cheng
,
Yakove Dayan
Comput. Aided Des.
1995
Corpus ID: 15822415
Review
1988
Review
1988
Power quality site surveys: facts, fiction, and fallacies
François Martzloff
1988
Corpus ID: 3094074
Site surveys are generally initiated to evaluate the quality of the power available at a specific location with the aim of…
Expand
Highly Cited
1987
Highly Cited
1987
ABYSS: ATrusted Architecture for Software Protection
Steve R. White
,
L. Comerford
IEEE Symposium on Security and Privacy
1987
Corpus ID: 11898158
ABYSS (A Basic Yorktown Security System) is an architecture for the trusted execution of application software. It supports a…
Expand
Highly Cited
1974
Highly Cited
1974
Direct solution of large systems of linear equations
E. Wilson
,
K. Bathe
,
William P. Doherty
1974
Corpus ID: 62162213
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE
or Only Accept Required