Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 218,236,584 papers from all fields of science
Search
Sign In
Create Free Account
Write protection
Known as:
Write-protected
, Write-protect
, Write protect ring
Expand
Write protection is any physical mechanism that prevents modification or erasure of valuable data on a device. Most commercial software, audio and…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
15 relations
9 track tape
Compact Cassette
Computer data storage
Computer forensics
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2016
2016
Multi-functional low-pass filters with dynamically-controlled in-band rejection notches
D. Psychogiou
,
R. Gómez‐García
,
D. Peroulis
Intelligent Memory Systems
2016
Corpus ID: 26798749
A new class of multi-functional low-pass filters (LPFs) with multiple dynamically-controlled rejection bands in their passband is…
Expand
2015
2015
Disclosure risk assessment via record linkage by a maximum-knowledge attacker
J. Domingo-Ferrer
,
Sara Ricci
,
Jordi Soria-Comas
Conference on Privacy, Security and Trust
2015
Corpus ID: 539853
Before releasing an anonymized data set, the data protector must know how safe the data set is, that is, how much disclosure risk…
Expand
2014
2014
Estudio traslacional de la vía Notch en nefropatía hipertensiva
Carolina Lavoz
,
Alejandra Droguett
,
+5 authors
M. Ruiz-Ortega
2014
Corpus ID: 196306846
La ruta de senalizacion de Notch esta activada en una gran variedad de patologias renales humanas. Recientemente hemos demostrado…
Expand
2010
2010
Improving virtualization performance and scalability with advanced hardware accelerations
Yaozu Dong
,
Xudong Zheng
,
+5 authors
Haibing Guan
IEEE International Symposium on Workload…
2010
Corpus ID: 34429990
Many advanced hardware accelerations for virtualization, such as Pause Loop Exit (PLE), Extended Page Table (EPT), and Single…
Expand
2009
2009
A study on read-write protection of a digital document by cryptographic techniques
Yasuo Hatano
,
K. Miyazaki
,
T. Kaneko
IEEE International Conference on Mobile Adhoc and…
2009
Corpus ID: 7158021
Sensitive information, e.g., privacy information or company secret, should be carefully managed and it is desired that only…
Expand
Highly Cited
2008
Highly Cited
2008
Mobile Device Analysis
Shafik G. Punja
,
Richard P. Mislan
2008
Corpus ID: 109634074
Abstract—The increased usage and proliferation of small scaledigital devices, like celluar (mobile) phones has led to…
Expand
2008
2008
Understanding the Effectiveness of Problem-based Learning through the Lens of Boundary Objects
Stefanie Markham
,
Timothy R. Olsen
Frontiers in Education: Computer Science…
2008
Corpus ID: 31606071
2004
2004
A Shared Write-protected Root Filesystem for a Group of Networked Clients
I. Souvatzis
arXiv.org
2004
Corpus ID: 6662003
A method to boot a cluster of diskless network clients from a single write-protected NFS root file system is shown. The problems…
Expand
Review
2004
Review
2004
Tools and Environments for Parallel and Distributed Computing
S. Hariri
,
M. Parashar
2004
Corpus ID: 16500594
Preface.1. Parallel and Distributed Computing (S. Hariri & M. Parashar).1.1 Introduction: Basic Concepts.1.2 Promises and…
Expand
1990
1990
The Novell virus
Jon David
Computers & security
1990
Corpus ID: 30392042
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE