Academic literature on the topic 'Write protection'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Write protection.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Write protection"

1

Grech, Victor. "WASP (Write a Scientific Paper): Ethical issues and data protection in research." Early Human Development 124 (September 2018): 42–43. http://dx.doi.org/10.1016/j.earlhumdev.2018.04.020.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Grech, Victor, and Hugo Agius-Muscat. "WASP (Write a Scientific Paper): Data protection, a guide for health researchers." Early Human Development 124 (September 2018): 44–45. http://dx.doi.org/10.1016/j.earlhumdev.2018.04.021.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Xiao, Zhi Gen, Jie Tong, Yang Wang, and Xi Gao. "Research on Field Management of Relay Protection Device Based on RFID Technology." Advanced Materials Research 1070-1072 (December 2014): 1071–76. http://dx.doi.org/10.4028/www.scientific.net/amr.1070-1072.1071.

Full text
Abstract:
In consideration of the slow development of informatization level of relay protection device system business process handling at present, upon the request of relay protection device full life cycle management, this text has put forward the anti-metal RFID technical system for relay protection device field management on the basis of RFID technology, covering the lectotype of tags and read-write device, tag encapsulation, safety protection method. which contributes to settle the problems in relay protection device management, avoid waste of resources, save the economic cost, significantly raise
APA, Harvard, Vancouver, ISO, and other styles
4

Zhou, Hong Gang, Qiang Song, Chun Yu Peng, and Shou Biao Tan. "A New 10T SRAM Cell with Improved Read/Write Margin and No Half Select Disturb for Bit-Interleaving Architecture." Applied Mechanics and Materials 263-266 (December 2012): 9–14. http://dx.doi.org/10.4028/www.scientific.net/amm.263-266.9.

Full text
Abstract:
A new 10T SRAM cell is proposed in this paper for simultaneously addressing the half select problem and improving the read/write stability. Without the half select condition, the proposed 10T cell allows efficient bit-interleaving to provide soft error rate protection and the dynamic power is also decreased significantly due to the reduction in the number of bitlines discharged and charged during the read and write operation. In the new 10T SRAM cell, one side of the cross-coupled inverters cuts off the pull up path or pull down path through adding two gated transistors according to the write
APA, Harvard, Vancouver, ISO, and other styles
5

Wu, Jiang Jiang, Yong Cheng, Song Zhu Mei, et al. "SSR-CDPS: A Novel Continuous Data Protection System Supporting Service Recovery." Advanced Materials Research 601 (December 2012): 318–24. http://dx.doi.org/10.4028/www.scientific.net/amr.601.318.

Full text
Abstract:
With the rapid development of computer networks, invasion and attack becomes more and more frequent in network environment. Therefore, insuring the information system continuously and correctly working has become an urgent problem in the information security field. And continuous data protection (CDP) supporting service recovery provides us a good idea to resolve it. In this article, we have designed and implemented a continuous data protection system supporting service recovery, which is named SSR-CDPS. The basic design idea of the SSR-CDPS architecture is dividing the whole protection proces
APA, Harvard, Vancouver, ISO, and other styles
6

Qing Wei Jia. "Write Fault Protection Against Shock Disturbance in Hard Disk Drives Without a Shock Sensor." IEEE Transactions on Magnetics 43, no. 9 (2007): 3689–93. http://dx.doi.org/10.1109/tmag.2007.902971.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Veniard, Marie. "Referring to parents in child protection reporting." Pragmatics and Society 2, no. 2 (2011): 301–27. http://dx.doi.org/10.1075/ps.2.2.09ven.

Full text
Abstract:
This paper considers the terms used for designating parents in reports dealing with child protection, and explores the pragmatic impact of the reports’ extremely cautious choice of words. I test the hypothesis that, even if words are not argumentative in themselves, they can become argumentative in the context of a particular discourse. To this end, this paper develops a two-pronged analysis, combining lexical description (both from a paradigmatic and from a syntagmatic perspective) with quantitative as well as qualitative methodologies. The findings suggest that lexis is argumentative not onl
APA, Harvard, Vancouver, ISO, and other styles
8

Levine, Iain. "Human Rights without Borders: The Movement for Moral Globalization and Universal Protection." PMLA/Publications of the Modern Language Association of America 121, no. 5 (2006): 1651–55. http://dx.doi.org/10.1632/s0030812900099995.

Full text
Abstract:
as a human rights practitioner rather than an academic, I am humbled in a number of ways to be part of this conversation. I am also reminded of the gulf of perception that exists between human rights practitioners and those who write and think about the practice of human rights. One example of this is the very different sense of the human rights movement's capacity to influence change.
APA, Harvard, Vancouver, ISO, and other styles
9

Handayani, Emi Puasa. "PERLINDUNGAN HUKUM TERHADAP JURNALIS WARGA YANG BERBASIS TEKNOLOGI INFORMASI." DIVERSI : Jurnal Hukum 1, no. 1 (2018): 1. http://dx.doi.org/10.32503/diversi.v1i1.125.

Full text
Abstract:
Along with the development of technology with the invention of the internet, the speed information cannot be blocked. Black list that occurredin the print era no longer applied when the era of information technology. The problem is, when it appears journalists from citizens namely the ordinary citizens who write news or facts in blogs or personal website, then it is exposed to public whether there is any protection for the journalist. These are problems that were examined in the article titled Legal Protection Against Journalists Citizen-Based Information Technology. The results of this study
APA, Harvard, Vancouver, ISO, and other styles
10

Stevens, Clarissa, Fran Proctor, Barbara Rishworth, et al. "Rethinking child protection and adoption: achieving social justice in practice." Critical and Radical Social Work 8, no. 1 (2020): 125–32. http://dx.doi.org/10.1332/204986019x15663821773868.

Full text
Abstract:
This article presents contributions made at the ‘Rethinking Fostering and Adoption: Achieving Social Justice in Practice’ plenary at the 2019 Social Work Action Network conference. The contributors write from a variety of vantage points but share the view that the current child protection and adoption system in England requires radical transformation in order to become more humane, supportive and socially just. The article begins with an outline of the ‘investigative turn’ in children’s services and key findings from the adoption enquiry of the British Association of Social Workers. It goes on
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Write protection"

1

Bengtsson, Johnny. "Forensisk hårddiskkloning och undersökning av hårddiskskrivskydd." Thesis, Linköping University, Department of Science and Technology, 2004. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-2378.

Full text
Abstract:
<p>Detta examensarbete reder ut arbetsprinciperna för olika typer av hårddiskskrivskydd; hårdvaruskrivskydd, mjukvaruskrivskydd, hybridskrivskydd och bygelskrivskydd. Slutsatsen av utredningen är att endast hårdvaruskrivskydd Detta examensarbete reder ut arbetsprinciperna för olika typer av hårddiskskrivskydd; hårdvaruskrivskydd, mjukvaruskrivskydd, hybridskrivskydd och bygelskrivskydd. Slutsatsen av utredningen är att endast hårdvaruskrivskydd bedöms ha tillräckligt pålitliga skyddsprinciper, vilket motiveras av dess oberoende från både hårdvara och operativsystem. </p><p>Vidare undersöks hår
APA, Harvard, Vancouver, ISO, and other styles
2

Mejía-Escalante, Mónica Elizabeth. "Moradia adequada e dignidade humana na experiência espacial." Universidade de São Paulo, 2016. http://www.teses.usp.br/teses/disponiveis/16/16137/tde-16022017-101845/.

Full text
Abstract:
A gênese, evolução e conteúdo das noções \"moradia adequada\" e \"moradia digna\" foi investigado nas resoluções e relatórios da Organização das Nações Unidas (ONU); nos indicadores de habitação e nas Constituições dos países da América Latina; na produção acadêmica compilada em grandes repositórios; nas Sentencias de Tutela da Corte Constitucional da Colômbia. Agentes da política urbana que utilizam indistintamente essas noções, e embora sejam expressões equivalentes, seu abarcamento conceitual se difere. O objetivo desta pesquisa depara por elementos socioespaciais que configurassem a
APA, Harvard, Vancouver, ISO, and other styles
3

Pinto, Marcos Vinícius. "O mandado de segurança coletivo como instrumento de tutela coletiva." Universidade de São Paulo, 2015. http://www.teses.usp.br/teses/disponiveis/2/2137/tde-29082015-100435/.

Full text
Abstract:
O presente estudo tem como objetivo discutir o mandado de segurança coletivo como verdadeira demanda a serviço da tutela processual de direitos coletivos em sentido amplo. Nesse sentido, as intenções principais residem em destacar o mandamus coletivo naquilo em que o distingue do mandado de segurança individual. Desse modo, são propositalmente lançados problemas que acentuam essas substanciais diferenças entre os dois institutos, o que passa pela discussão da natureza jurídica, dos direitos tutelados, da legitimidade, da coisa julgada, da litispendência, do procedimento (especialmente no tocan
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "Write protection"

1

Constitutional protection of human rights in Latin America: A comparative study of amparo proceedings. Cambridge University Press, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Contreras, Carlos Hernández. Constitucionalidad o inconstitucionalidad del Art. 539 del C.T.: El principio protector en el proceso ante los tribunales de trabajo. Instituto de Estudios del Trabajo, 1997.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Sarmiento, Rene V. Towards more justice and more liberty: Undestanding Writ of Amparo and Writ of Habeas Data. Central Book Supply, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Bustillos, Julio. Federalismo judicial a través del amparo: Relación entre las jurisdicciones federal y locales a través del instumento protector de los derechos fundamentales. Universidad Nacional Autónoma de México, Instituto de Investigaciones Jurídicas, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Córdova, Luis Castillo. Hábeas corpus, amparo y hábeas Data: Un estudio esencialmente jurisprudencial. ARA Editores, 2004.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Acevedo, Lucio Cabrera. El Amparo colectivo protector del derecho al ambiente y de otros derechos humanos. Editorial Porrúa, 2000.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Serra, María Mercedes. El hábeas data en el derecho argentino. Editorial Juris, 2001.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Vargas, José Alejandro. El Tribunal Constitucional y las garantías de derechos fundamentales: Análisis general y procedimiento de amparo, Habeas Data, Habeas Corpus, inconstitucionalidad. [José Alejandro Vargas], 2013.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Bancos de datos y acción de hábeas data. Abeledo-Perrot, 2001.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

José Miguel de la Calle Restrepo. Autodeterminación informativa y habeas data en Colombia: Análisis de la ley 1266 de 2008, jurisprudencia y derecho comparado. Editorial Temis, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "Write protection"

1

Weik, Martin H. "write protection." In Computer Science and Communications Dictionary. Springer US, 2000. http://dx.doi.org/10.1007/1-4020-0613-6_21258.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Weik, Martin H. "read-write protection." In Computer Science and Communications Dictionary. Springer US, 2000. http://dx.doi.org/10.1007/1-4020-0613-6_15564.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Weik, Martin H. "write-protection label." In Computer Science and Communications Dictionary. Springer US, 2000. http://dx.doi.org/10.1007/1-4020-0613-6_21259.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Wishnoff, Christine Moretto, Pamela Hayes-Shell, David Shore, and Cheryl Anne Boyce. "Human Subject Protection and Special Population Issues." In How to Write a Successful Research Grant Application. Springer US, 2010. http://dx.doi.org/10.1007/978-1-4419-1454-5_19.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Monazzah, Amir Mahdi Hosseini, Amir M. Rahmani, Antonio Miele, and Nikil Dutt. "Exploiting Memory Resilience for Emerging Technologies: An Energy-Aware Resilience Exemplar for STT-RAM Memories." In Dependable Embedded Systems. Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-52017-5_21.

Full text
Abstract:
AbstractDue to the consistent pressing quest of larger on-chip memories and caches of multicore and manycore architectures, Spin Transfer Torque Magnetic RAM (STT-MRAM or STT-RAM) has been proposed as a promising technology to replace classical SRAMs in near-future devices. Main advantages of STT-RAMs are a considerably higher transistor density and a negligible leakage power compared with SRAM technology. However, the drawback of this technology is the high probability of errors occurring especially in write operations. Such errors are asymmetric and transition-dependent, where 0 → 1 is the most critical one, and is high subjected to the amount and current (voltage) supplied to the memory during the write operation. As a consequence, STT-RAMs present an intrinsic trade-off between energy consumption vs. reliability that needs to be properly tuned w.r.t. the currently running application and its reliability requirement. This chapter proposes FlexRel, an energy-aware reliability improvement architectural scheme for STT-RAM cache memories. FlexRel considers a memory architecture provided with Error Correction Codes (ECCs) and a custom current regulator for the various cache ways and conducts a trade-off between reliability and energy consumption. FlexRel cache controller dynamically profiles the number of 0 → 1 transitions of each individual bit write operation in a cache block and based on that selects the most-suitable cache way and current level to guarantee the necessary error rate threshold (in terms of occurred write errors) while minimizing the energy consumption. We experimentally evaluated the efficiency of FlexRel against the most efficient uniform protection scheme from reliability, energy, area, and performance perspectives. Experimental simulations performed by using gem5 has demonstrated that while FlexRel satisfies the given error rate threshold, it delivers up to 13.2% energy saving. From the area footprint perspective, FlexRel delivers up to 7.9% cache ways’ area saving. Furthermore, the performance overhead of the FlexRel algorithm which changes the traffic patterns of the cache ways during the executions is 1.7%, on average.
APA, Harvard, Vancouver, ISO, and other styles
6

Livraga, Giovanni. "Enforcing Dynamic Read and Write Privileges." In Protecting Privacy in Data Release. Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-16109-9_5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Phillips, Andelka M., and Tamara K. Hervey. "Brexit and Biobanking: GDPR Perspectives." In GDPR and Biobanking. Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-49388-2_9.

Full text
Abstract:
AbstractAt the time we wrote this chapter, we undertook the almost impossible task of providing a legal analysis of an event (Brexit) that had not happened and might never have happened. This chapter nonetheless contributes to the edited collection in that it reports on the then legal position in the UK, and presents an analysis of two possible immediate post-Brexit legal futures, for data protection law as applicable to biobanking in the UK. These post-Brexit futures are the position if the draft Withdrawal Agreement is ratified and comes into force, and the position if it does not (a so-called ‘No Deal’ Brexit). The chapter concludes with some thoughts on possible longer term futures. The main message is the deep uncertainties surrounding Brexit and what it means in both legal form and in practice.
APA, Harvard, Vancouver, ISO, and other styles
8

Chen, Hao-Yun. "Copyright Protection for Software 2.0?" In Artificial Intelligence and Intellectual Property. Oxford University Press, 2021. http://dx.doi.org/10.1093/oso/9780198870944.003.0015.

Full text
Abstract:
Traditionally, software programmers write a series of hard-coded rules to instruct a machine, step by step. However, with the ubiquity of neural networks, instead of giving specific instructions, programmers can write a skeleton of code to build a neural network structure, and then feed the machine with data sets, in order to have the machine write code by itself. Software containing the code written in this manner changes and evolves over time as new data sets are input and processed. This characteristic distinguishes it markedly from traditional software, and is partly the reason why it is referred to as ‘software 2.0’. Yet the vagueness of the scope of such software might make it ineligible for protection by copyright law. To properly understand and address this issue, this chapter will first review the current scope of computer program protection under copyright laws, and point out the potential inherent issues arising from the application of copyright law to software 2.0. After identifying related copyright law issues, this chapter will then examine the possible justification for protecting computer programs in the context of software 2.0, aiming to explore whether new exclusivity should be granted or not under copyright law, and if not, what alternatives are available to provide protection for the investment in the creation and maintenance of software 2.0.
APA, Harvard, Vancouver, ISO, and other styles
9

"Smith, J., concurring." In What Obergefell v. Hodges Should Have Said, edited by Jack M. Balkin. Yale University Press, 2020. http://dx.doi.org/10.12987/yale/9780300221558.003.0007.

Full text
Abstract:
I join the majority opinion in holding that same-sex marriage bans and nonrecognition laws violate same-sex couples’ equal protection rights. I write separately to note an independent, and heretofore unrecognized, basis for such laws’ unconstitutionality: they violate the equal protection rights of the children of same-sex couples....
APA, Harvard, Vancouver, ISO, and other styles
10

Ayoade, John, and Judith Symonds. "An Evaluation of the RFID Security Benefits of the APF System." In Emerging Pervasive and Ubiquitous Aspects of Information Systems. IGI Global, 2011. http://dx.doi.org/10.4018/978-1-60960-487-5.ch003.

Full text
Abstract:
The main features of RFID are the ability to identify objects without a line of sight between reader and tag, read/write capability and ability of readers to read many tags at the same time. The read/write capability allows information to be stored in the tags embedded in the objects as it travels through a system. Some applications require information to be stored in the tag and be retrieved by the readers. This paper discusses the security and privacy challenges involve in such applications and how the proposed and implemented prototype system Authentication Processing Framework (APF) would be a solution to protect hospital patient data. The deployment of the APF provides mutual authentication for both tags and readers and the mutual authentication process in the APF provides security for the information stored in the tags. A prototype solution for hospital patient data protection for information stored on RFID bracelets is offered.
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Write protection"

1

Abdelraoof, Ahmed, Mohamed Azab, and Igor Stoppa. "Write-protection enforcement." In SAC '20: The 35th ACM/SIGAPP Symposium on Applied Computing. ACM, 2020. http://dx.doi.org/10.1145/3341105.3373919.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Jia, Qingwei, Guoxiao Guo, and Jie Yu. "Position-Error-Based Shock Protection in HDDs." In ASME 2013 Conference on Information Storage and Processing Systems. American Society of Mechanical Engineers, 2013. http://dx.doi.org/10.1115/isps2013-2911.

Full text
Abstract:
This paper studies off-track write protection in HDDs. The system data integrity requirement is formulated based on the head/media and data track pitch configurations and a servo-mechanical system track misregistration (TMR) under various conditions. A write fault protection scheme is formulated based on position estimation through the current and predicted future PES (position error signal). The write fault trigger threshold determination and its impact on the system trade-offs are qualitatively discussed. The shock protection method applies to both conventional magnetic recording (CMR) and s
APA, Harvard, Vancouver, ISO, and other styles
3

Zhao, Lianying, and Mohammad Mannan. "TEE-aided Write Protection Against Privileged Data Tampering." In Network and Distributed System Security Symposium. Internet Society, 2019. http://dx.doi.org/10.14722/ndss.2019.23197.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Jia, Q., and S. Yoshida. "A New Sensorless Write Fault Protection Mechanism For HDD." In INTERMAG 2006 - IEEE International Magnetics Conference. IEEE, 2006. http://dx.doi.org/10.1109/intmag.2006.376508.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Nikolaou, Panagiota, Yiannakis Sazeides, Lorena Ndreu, Emre Ozer, and Sachin Idgunji. "Memory Array Protection: Check on Read or Check on Write?" In Design Automation and Test in Europe. IEEE Conference Publications, 2013. http://dx.doi.org/10.7873/date.2013.057.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Sha, Sai, Yi Zhang, Yingwei Luo, Xiaolin Wang, and Zhenlin Wang. "Swift shadow paging (SSP): no write-protection but following TLB flushing." In VEE '21: 17th ACM SIGPLAN/SIGOPS International Conference on Virtual Execution Environments. ACM, 2021. http://dx.doi.org/10.1145/3453933.3454012.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Jia, QingWei, and Shinobu Yoshida. "Write Fault Protection for Shock Disturbance in HDDs Without a Shock Sensor." In 2006 Asia-Pacific Magnetic Recording Conference. IEEE, 2006. http://dx.doi.org/10.1109/apmrc.2006.365915.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Hatano, Yasuo, Kunihiko Miyazaki, and Toshinobu Kaneko. "A study on read-write protection of a digital document by cryptographic techniques." In 2009 IEEE 6th International Conference on Mobile Adhoc and Sensor Systems (MASS). IEEE, 2009. http://dx.doi.org/10.1109/mobhoc.2009.5336931.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Jeevitha, L., B. Umadevi, and M. Hemavathy. "SATA Protocol implementation on FPGA for Write Protection of Hard Disk Drive/Solid State Device." In 2019 3rd International conference on Electronics, Communication and Aerospace Technology (ICECA). IEEE, 2019. http://dx.doi.org/10.1109/iceca.2019.8821926.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Li, B., P. A. Clark, and K. H. Church. "Robust Direct-Write Dispensing Tool and Solutions for Micro/Meso-Scale Manufacturing and Packaging." In ASME 2007 International Manufacturing Science and Engineering Conference. ASMEDC, 2007. http://dx.doi.org/10.1115/msec2007-31037.

Full text
Abstract:
The development of functional and reliable miniaturized devices including Micro Electro Mechanical Systems (MEMS) has stressed the manufacturing and packaging processes. The traditional micro fabrication techniques, such as lithography, physical vapor deposition (PVD), chemical vapor deposition (CVD) and etching, are layer-by-layer processes and mostly suitable for thin-filmed devices. LIGA (an acronym from German words for lithography, electroplating, and molding) is a newly developed process for thick metallic devices; however, it involves electroplating process and high quality molds, which
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Write protection"

1

Yatsymirska, Mariya. SOCIAL EXPRESSION IN MULTIMEDIA TEXTS. Ivan Franko National University of Lviv, 2021. http://dx.doi.org/10.30970/vjo.2021.49.11072.

Full text
Abstract:
The article investigates functional techniques of extralinguistic expression in multimedia texts; the effectiveness of figurative expressions as a reaction to modern events in Ukraine and their influence on the formation of public opinion is shown. Publications of journalists, broadcasts of media resonators, experts, public figures, politicians, readers are analyzed. The language of the media plays a key role in shaping the worldview of the young political elite in the first place. The essence of each statement is a focused thought that reacts to events in the world or in one’s own country. Th
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!