Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 228,397,759 papers from all fields of science
Search
Sign In
Create Free Account
Data deduplication
Known as:
Deduplication
, De-duplication
, Duplication
Expand
In computing, data deduplication is a specialized data compression technique for eliminating duplicate copies of repeating data. Related and somewhat…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
49 relations
Amazon Elastic Compute Cloud (EC2)
Backup
BackupPC
Cloud storage
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2017
2017
Secure Data Deduplication with Dynamic Ownership Management in Cloud Storage
Junbeom Hur
,
Dongyoung Koo
,
Young-joo Shin
,
Kyungtae Kang
IEEE International Conference on Data Engineering
2017
Corpus ID: 63821207
In cloud services, deduplication technology is commonly used to reduce the space and bandwidth requirements of services by…
Expand
2016
2016
Code Randomization: Haven’t We Solved This Problem Yet?
Stephen Crane
,
Andrei Homescu
,
Per Larsen
IEEE Cybersecurity Development
2016
Corpus ID: 16757491
Two decades since the idea of using software diversity for security was put forward, ASLR is the only technique to see widespread…
Expand
Highly Cited
2012
Highly Cited
2012
Dynamic load balancing mechanism based on cloud storage
T. Wu
,
Wei-Tsong Lee
,
Yu-San Lin
,
Yih-Sin Lin
,
Hung-Lin Chan
,
Jhih-Siang Huang
Computing, Communications and Applications…
2012
Corpus ID: 15336075
Due to extensive coverage and domains of cloud computing-based architecture, most users saves and access highly similar data…
Expand
Review
2010
Review
2010
Data Deduplication Techniques
Shuping Ji
2010
Corpus ID: 63432108
Data deduplication technologies can be divided into two categories: a) identical data detection techniques, and b) similar data…
Expand
Highly Cited
2007
Highly Cited
2007
Robust Detection of Region-Duplication Forgery in Digital Image
Luo Wei
2007
Corpus ID: 64412289
Region duplication forgery,in which a part of a digital image is copied and then pasted to another portion of the same image in…
Expand
Review
2006
Review
2006
Backup & Recovery
W. C. Preston
2006
Corpus ID: 86629619
Packed with practical, freely available backup and recovery solutions for Unix, Linux, Windows, and Mac OS X systems -- as well…
Expand
2005
2005
Ghost Process: a Sound Basis to Implement Process Duplication, Migration and Checkpoint/Restart in Linux Clusters
Geoffroy R. Vallée
,
Renaud Lottiaux
,
D. Margery
,
C. Morin
International Symposium on Parallel and…
2005
Corpus ID: 1486811
Process management mechanisms (process duplication, migration and checkpoint/restart) are very useful for high performance and…
Expand
Highly Cited
2001
Highly Cited
2001
Color And The Duplication Assumption
E. Myin
Synthese
2001
Corpus ID: 11025126
Susan Hurley has attacked the 'Duplication Assumption', the assumption thatcreatures with exactly the same internal states could…
Expand
1971
1971
A computer based record system for Pisum
M. W. Johnson
,
B. Snoad
,
D. Davies
Euphytica
1971
Corpus ID: 41889815
SummaryA computer based system is described for the storage and retrieval of information regarding the identification, origin…
Expand
1953
1953
Duplication of the entire colon, bladder, and urethra.
Ravitch Mm
,
Scott Ww
1953
Corpus ID: 77424014
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE