Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 225,471,384 papers from all fields of science
Search
Sign In
Create Free Account
Write protection
Known as:
Write-protected
, Write-protect
, Write protect ring
Expand
Write protection is any physical mechanism that prevents modification or erasure of valuable data on a device. Most commercial software, audio and…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
15 relations
9 track tape
Compact Cassette
Computer data storage
Computer forensics
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2016
2016
Multi-functional low-pass filters with dynamically-controlled in-band rejection notches
D. Psychogiou
,
R. Gómez‐García
,
D. Peroulis
Intelligent Memory Systems
2016
Corpus ID: 26798749
A new class of multi-functional low-pass filters (LPFs) with multiple dynamically-controlled rejection bands in their passband is…
Expand
2014
2014
Estudio traslacional de la vía Notch en nefropatía hipertensiva
Carolina Lavoz
,
Alejandra Droguett
,
+5 authors
M. Ruiz-Ortega
2014
Corpus ID: 196306846
La ruta de senalizacion de Notch esta activada en una gran variedad de patologias renales humanas. Recientemente hemos demostrado…
Expand
2011
2011
Mining Icebergs in Time-Stamped Databases
Jhimli Adhikari
,
P. Rao
,
W. Pedrycz
Indian International Conference on Artificial…
2011
Corpus ID: 7882260
Many organizations possess large databases collected over a long period of time. Analysis of such databases might be…
Expand
2009
2009
A study on read-write protection of a digital document by cryptographic techniques
Yasuo Hatano
,
K. Miyazaki
,
T. Kaneko
IEEE International Conference on Mobile Adhoc and…
2009
Corpus ID: 7158021
Sensitive information, e.g., privacy information or company secret, should be carefully managed and it is desired that only…
Expand
Highly Cited
2008
Highly Cited
2008
Mobile Device Analysis
Shafik G. Punja
,
Richard P. Mislan
2008
Corpus ID: 109634074
Abstract—The increased usage and proliferation of small scaledigital devices, like celluar (mobile) phones has led to…
Expand
2008
2008
Notations for Living Mathematical Documents
M. Kohlhase
,
Christine Müller
,
Florian Rabe
AISC/MKM/Calculemus
2008
Corpus ID: 17542472
Notations are central for understanding mathematical discourse. Readers would like to read notations that transport the meaning…
Expand
2008
2008
UML Specification of e-Consent Requirements in a Health Care System
Chun Ruan
International Symposium on Computer Science and…
2008
Corpus ID: 18280898
Access control requirements have become an important part in any secure system. Specification of these requirements at early…
Expand
2005
2005
Towards Secure Network Programming and Recovery in Wireless Sensor Networks
P. Dutta
,
J. Hui
,
D. Chu
,
D. Culler
2005
Corpus ID: 2960556
A number of multi-hop wireless reprogramming systems haveemerged for sensor network retasking but none of these sys-tems support…
Expand
2001
2001
From the Editor - Roundtable: Who Needs Software Engineering?
S. McConnell
IEEE Software
2001
Corpus ID: 45239276
T he traditional distinction between software and hardware was that software was easily changeable and therefore " soft…
Expand
2000
2000
Impacts of wildlife viewing: A case study of Dixville Notch wildlife viewing area
J. A. Silverberg
2000
Corpus ID: 186981771
x
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE