نتایج جستجو برای: backup nodes

تعداد نتایج: 136625  

2016
Quan Zhang Mu Qiao Ramani R. Routray Weisong Shi

Data protection is the process of backing up data in case of a data loss event. It is one of the most critical routine activities for every organization. Detecting abnormal backup jobs is important to prevent data protection failures and ensure the service quality. Given the large scale backup endpoints and the variety of backup jobs, from a backup-asa-service provider viewpoint, we need a scal...

Journal: :Journal of Object Technology 2004
Conrad Bock

This is the fourth in a series introducing the activity model in the Unified Modeling Language, version 2 (UML 2), and how it integrates with the action model [1]. The first article gives an overview of activities and actions [2], while the second two cover actions generally and control nodes [3][4]. The remainder of the series elaborates other specific elements. This article covers object node...

1996
Dan Boneh Richard J. Lipton

We present a system which enables a user to remove a le from both the le system and all the backup tapes on which the le is stored. The ability to remove les from all backup tapes is desirable in many cases. Our system erases information from the backup tape without actually writing on the tape. This is achieved by applying cryptography in a new way: a block cipher is used to enable the system ...

2002
Giuseppe F. Italiano Rajeev Rastogi Bülent Yener

A Virtual Private Network (VPN) aims to emulate the services provided by a private network over the shared Internet. The endpoints of a VPN are connected using abstractions such as Virtual Channels (VCs) of ATM or Label Switching Paths (LSPs) of MPLS technologies. Reliability of an end-to-end VPN connection depends on the reliability of the links and nodes in the fixed path that it traverses in...

2007
Adriana Karagiozova

In this dissertation we study two problems from the area of network design. The first part discusses the multicommodity buy-at-bulk network design problem, a problem that occurs naturally in the design of telecommunication and transportation networks. We are given an underlying graph and associated with each edge of the graph, a cost function that represents the price of routing demand along th...

Journal: :The Journal of the Kentucky Medical Association 2009
John Myers Guy Brock Savitri Appana Laman Gray

PURPOSE The American College of Cardiology, the American Heart Association, and the Society for Cardiovascular Angiography and Interventions strongly recommend that primary Percutaneous Coronary Intervention (PCI) should be performed in facilities that have an experienced cardiovascular surgical team available as emergency backup for all procedures. The current study investigates the medical so...

2015
Caetano Sauer Goetz Graefe Theo Härder

When persistent storage fails, traditional media recovery first restores an old backup image followed by replaying the recovery log since the last backup operation. Restoring a backup can take hours, but log replay often takes much longer due to its random access pattern. We introduce single-pass restore, a technique in which restoration of all backups and log replay are performed in a single o...

2013
Stephen Smaldone Grant Wallace Windsor W. Hsu

Physical level backups offer increased performance in terms of throughput and scalability as compared to logical backup models, while still maintaining logical consistency [2]. As the trend toward virtualization grows, virtual machine backups (a form of physical backup) are even more important, while becoming easier to perform. The downside is that physical backup generally requires more storag...

Journal: :Electronic Notes in Theoretical Computer Science 2006

Journal: :Nature Reviews Molecular Cell Biology 2011

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید