Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 219,937,502 papers from all fields of science
Search
Sign In
Create Free Account
Glossary of backup terms
Known as:
Glossary of backups
The subject of computer backups is rife with jargon and highly specialized terminology. This page is a glossary of backup terms that aims to clarify…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
18 relations
Backup
Backup rotation scheme
Backup site
Backup software
Expand
Broader (1)
Data security
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2018
2018
DISASTER RECOVERY STRATEGY MENGGUNAKAN SOFTWARE BACULA DENGAN METODE FULL BACKUP-RESTORE
Eliza Adira Handrini
,
M. T. Kurniawan
,
Adityas Widjajarto
2018
Corpus ID: 196192220
Data merupakan sekumpulan informasi mengenai suatu hal yang dapat dijadikan sebagai aset karena dapat menjadi sumber keuntungan…
Expand
2018
2018
Distributed Energy Transaction Pattern and Block Chain Based Architecture Design
Hu Yan
,
B. Huang
,
Bowen Hong
2018
Corpus ID: 67160164
Along with the market reform, marketization transaction of distributed energy will have very broad prospects in the future. Block…
Expand
2017
2017
Hail to the Thief: Protecting data from mobile ransomware with ransomsafedroid
Sileshi Demesie Yalew
,
Gerald Q. Maguire
,
Seif Haridi
,
M. Correia
IEEE International Symposium on Network Computing…
2017
Corpus ID: 28592422
The growing popularity of Android and the increasing amount of sensitive data stored in mobile devices have lead to the…
Expand
2017
2017
Primary-Backup Controller Mapping for Byzantine Fault Tolerance in Software Defined Networks
Purnima Murali Mohan
,
Tram Truong Huu
,
G. Mohan
Global Communications Conference
2017
Corpus ID: 19926633
Security in Software Defined Networks (SDNs) has been a major concern for its deployment. Byzantine threats in SDNs are more…
Expand
Highly Cited
2016
Highly Cited
2016
Multi-Path Link Embedding for Survivability in Virtual Networks
Md Mashrur Alam Khan
,
Nashid Shahriar
,
Reaz Ahmed
,
R. Boutaba
IEEE Transactions on Network and Service…
2016
Corpus ID: 6940451
Internet applications are deployed on the same network infrastructure, yet they have diverse performance and functional…
Expand
2015
2015
SiMPLE: Survivability in multi-path link embedding
Md Mashrur Alam Khan
,
Nashid Shahriar
,
Reaz Ahmed
,
R. Boutaba
Conference on Network and Service Management
2015
Corpus ID: 2442151
Internet applications are deployed on the same network infrastructure, yet they have diverse performance and functional…
Expand
2015
2015
An energy efficient backup scheme with low inrush current for nonvolatile SRAM in energy harvesting sensor nodes
Hehe Li
,
Yongpan Liu
,
+7 authors
Huazhong Yang
Design, Automation and Test in Europe
2015
Corpus ID: 5024778
In modern energy harvesting sensor nodes, nonvolatile SRAM (nvSRAM) has been widely investigated as a promising on-chip memory…
Expand
2011
2011
NDT-Glossary - A MDE Approach for Glossary Generation
J. A. García-García
,
María José Escalona Cuaresma
,
C. R. Cutilla
,
M. Alba
International Conference on Enterprise…
2011
Corpus ID: 29127710
2009
2009
Optimal backup interval of database by incremental backup method
S. Nakamura
,
K. Nakayama
,
T. Nakagawa
IEEE International Conference on Industrial…
2009
Corpus ID: 44670171
Some media faults occur at random. To lessen the overhead of backup processing, the operation of a incremental backup with small…
Expand
2000
2000
Evaluating Backup Algorithms
Zachary Kurmas
,
A. Chervenak
IEEE Symposium on Mass Storage Systems
2000
Corpus ID: 7252700
We present a trace-driven simulator that evaluates the performance of backup algorithms. We use this simulator to compare the…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE