Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 225,217,327 papers from all fields of science
Search
Sign In
Create Free Account
Copy-on-write
Known as:
Copy on write
, Cow (disambiguation)
, Implicit sharing
Copy-on-write (COW), sometimes referred to as implicit sharing or shadowing, is a resource management technique used in computer programming to…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
50 relations
Accent kernel
Allocate-on-flush
Backup
C++ string handling
Expand
Broader (1)
Computer data storage
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2016
2016
Mitigating Sync Amplification for Copy-on-write Virtual Disk
Qingshu Chen
,
Liang Liang
,
Yubin Xia
,
Haibo Chen
USENIX Conference on File and Storage…
2016
Corpus ID: 17154642
Copy-on-write virtual disks (e.g., qcow2 images) provide many useful features like snapshot, de-duplication, and full-disk…
Expand
2013
2013
On-Demand Snapshot: An Efficient Versioning File System for Phase-Change Memory
Eunji Lee
,
Jee-Eun Jang
,
Taeseok Kim
,
H. Bahn
IEEE Transactions on Knowledge and Data…
2013
Corpus ID: 17529148
Versioning file systems are widely used in modern computer systems as they provide system recovery and old data access functions…
Expand
2012
2012
Read/Write Book 2 : Une introduction aux humanités numériques
P. Mounier
2012
Corpus ID: 61123341
2011
2011
Automating Network and Service Configuration Using NETCONF and YANG
Stefan Wallin
,
Claes Wikström
LiSA
2011
Corpus ID: 16825578
Network providers are challenged by new requirements for fast and error-free service turn-up. Existing approaches to…
Expand
2009
2009
Telex: A Semantic Platform for Cooperative Application Development
Lamia Benmouffok
,
Jean-Michel Busca
,
J. Marquès
,
M. Shapiro
,
P. Sutra
,
G. Tsoukalas
2009
Corpus ID: 15037314
Developing write-sharing applications is challenging. Remote and offline data sharing are increasingly important. We propose a…
Expand
2009
2009
WCET Analysis of Multi-Level Set-Associative Data Caches
Benjamin Lesage
,
D. Hardy
,
I. Puaut
Worst-Case Execution Time Analysis
2009
Corpus ID: 14524091
Nowadays, the presence of cache hierarchies tends to be a common trend in processor architectures, even in hardware for real-time…
Expand
2008
2008
A Tamper Detection Method for RFID Tag Data
A. Yamamoto
,
S. Suzuki
,
H. Hada
,
J. Mitsugi
,
F. Teraoka
,
O. Nakamura
IEEE International Conference on RFID
2008
Corpus ID: 21414610
Recently, system designers, especially in the field of product life-cycle management system start considering use of user memory…
Expand
2002
2002
Runtime Service Composition via Logic-Based Program Synthesis
S. Lämmermann
2002
Corpus ID: 60385402
Dynamic composition of services from components at runtime can help to provide flexible service infrastructures, but requires…
Expand
2000
2000
Dialogical Drama with Puppets and Children's Creation of Sense.
M. Bredikyte
2000
Corpus ID: 140932413
Dialogical drama with puppets is a specific method of revealing basic cultural values for preschool children. For this study, an…
Expand
1992
1992
A performance evaluation of optimal hybrid cache coherency protocols
J. Veenstra
,
R. Fowler
ASPLOS V
1992
Corpus ID: 11615460
The caches within a multiprocessor typically use either a write-invalidate protocol or a write-update protocol to maintain…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE