Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 219,937,496 papers from all fields of science
Search
Sign In
Create Free Account
Backup
Known as:
Backup tape
, Back-up
, Bak
Expand
In information technology, a backup, or the process of backing up, refers to the copying and archiving of computer data so it may be used to restore…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
50 relations
Backup-to-disk
Berkeley DB
Bitser (software)
Boot sector
Expand
Broader (1)
Data security
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2017
Highly Cited
2017
iGen: Why Today's Super-Connected Kids Are Growing Up Less Rebellious, More Tolerant, Less Happy--and Completely Unprepared for Adulthood--and What That Means for the Rest of Us
J. Twenge
2017
Corpus ID: 149719156
Small Group Discussion Split into groups and discuss the positions presented in the book (see handout). Answer the following…
Expand
Highly Cited
2013
Highly Cited
2013
Enhancing the Dispatchability of Variable Wind Generation by Coordination With Pumped-Storage Hydro Units in Stochastic Power Systems
M. Khodayar
,
M. Shahidehpour
,
Lei Wu
IEEE Transactions on Power Systems
2013
Corpus ID: 38494877
The ever-increasing penetration of variable wind energy in power systems affects the hourly dispatch of thermal power generation…
Expand
Highly Cited
2009
Highly Cited
2009
A Nonisolated Bidirectional ZVS-PWM Active Clamped DC–DC Converter
P. Das
,
B. Laan
,
S. Mousavi
,
G. Moschopoulos
IEEE transactions on power electronics
2009
Corpus ID: 41829112
Power electronic converter systems for applications such as telecom, automotive, and space can have dc voltage buses that are…
Expand
Highly Cited
2006
Highly Cited
2006
A Case Against Currently Used Hash Functions in RFID Protocols
Martin Feldhofer
,
Christian Rechberger
OTM Workshops
2006
Corpus ID: 18559233
Designers of RFID security protocols can choose between a wide variety of cryptographic algorithms However, when implementing…
Expand
Highly Cited
2005
Highly Cited
2005
Power budgeting of a multiple-input buck-boost converter
N. Benavides
,
Patrick L. Chapman
IEEE transactions on power electronics
2005
Corpus ID: 22966259
The use of a multiple-input buck-boost converter for budgeting power between different energy sources is discussed. It is shown…
Expand
Highly Cited
2004
Highly Cited
2004
LS-SCTP: a bandwidth aggregation technique for stream control transmission protocol
A. A. E. Al
,
T. Saadawi
,
Myung J. Lee
Computer Communications
2004
Corpus ID: 17717042
Highly Cited
2003
Highly Cited
2003
Long-term forecasting of Internet backbone traffic: observations and initial models
K. Papagiannaki
,
N. Taft
,
Zhi-Li Zhang
,
C. Diot
IEEE INFOCOM . Twenty-second Annual Joint…
2003
Corpus ID: 9335089
We introduce a methodology to predict when and where link additions/upgrades have to take place in an IP backbone network. Using…
Expand
Highly Cited
2000
Highly Cited
2000
MiddleMan: A Video Caching Proxy Server
Soam Acharya
,
B. Smith
2000
Corpus ID: 10616961
This paper describes MiddleMan, a collection of cooperating proxy servers connected by a local area network (LAN). MiddleMan…
Expand
Review
1999
Review
1999
Medium access control protocols for multimedia traffic in wireless networks
I. Akyildiz
,
J. Mcnair
,
L. Martorell
,
Ramón Puigjaner
,
Y. Yesha
IEEE Network
1999
Corpus ID: 14811855
This article presents a survey on medium access control protocols for multimedia traffic in wireless networks. A basic overview…
Expand
Highly Cited
1997
Highly Cited
1997
Plans as Situated Action: An Activity Theory Approach to Workflow Systems
J. Bardram
European Conference on Computer Supported…
1997
Corpus ID: 7953991
Within the community of CSCW the notion and nature of workflow systems as prescriptions of human work has been debated and…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE