Статті в журналах з теми "Coded data storage"
Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями
Ознайомтеся з топ-50 статей у журналах для дослідження на тему "Coded data storage".
Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.
Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.
Переглядайте статті в журналах для різних дисциплін та оформлюйте правильно вашу бібліографію.
Oggier, Frédérique, and Anwitaman Datta. "On Grid Quorums for Erasure Coded Data." Entropy 23, no. 2 (January 30, 2021): 177. http://dx.doi.org/10.3390/e23020177.
Ojima, Masahiro, Atsushi Saito, Toshimitsu Kaku, Masaru Ito, Yoshito Tsunoda, Shinji Takayama, and Yutaka Sugita. "Compact magnetooptical disk for coded data storage." Applied Optics 25, no. 4 (February 15, 1986): 483. http://dx.doi.org/10.1364/ao.25.000483.
Ditlbacher, H., J. R. Krenn, B. Lamprecht, A. Leitner, and F. R. Aussenegg. "Spectrally coded optical data storage by metal nanoparticles." Optics Letters 25, no. 8 (April 15, 2000): 563. http://dx.doi.org/10.1364/ol.25.000563.
Ditlbacher, Harald, Joachim Rudolf Krenn, Bernhard Lamprecht, Alfred Leitner, and Franz Rembert Aussenegg. "Metal Nanoparticles for Spectrally Coded Optical Data Storage." Optics and Photonics News 11, no. 12 (December 1, 2000): 43. http://dx.doi.org/10.1364/opn.11.12.000043.
Ojima, M., Y. Tsunoda, T. Maeda, T. Kaku, A. Saito, S. Takayama, and Y. Sugita. "Compact Magneto-Optical Disk for Coded Data Storage." IEEE Translation Journal on Magnetics in Japan 1, no. 6 (September 1985): 698–99. http://dx.doi.org/10.1109/tjmj.1985.4548917.
Liu, Chengjian, Qiang Wang, Xiaowen Chu, Yiu-Wing Leung, and Hai Liu. "ESetStore: An Erasure-Coded Storage System With Fast Data Recovery." IEEE Transactions on Parallel and Distributed Systems 31, no. 9 (September 1, 2020): 2001–16. http://dx.doi.org/10.1109/tpds.2020.2983411.
Huang, Jianzhong, Panping Zhou, Xiao Qin, Yanqun Wang, and Changsheng Xie. "Optimizing Erasure-Coded Data Archival for Replica-Based Storage Clusters." Computer Journal 62, no. 2 (August 3, 2018): 247–62. http://dx.doi.org/10.1093/comjnl/bxy079.
Xiang, Yu, Tian Lan, Vaneet Aggarwal, and Yih-Farn R. Chen. "Joint Latency and Cost Optimization for Erasure-Coded Data Center Storage." IEEE/ACM Transactions on Networking 24, no. 4 (August 2016): 2443–57. http://dx.doi.org/10.1109/tnet.2015.2466453.
Tajeddine, Razane, Oliver W. Gnilke, and Salim El Rouayheb. "Private Information Retrieval From MDS Coded Data in Distributed Storage Systems." IEEE Transactions on Information Theory 64, no. 11 (November 2018): 7081–93. http://dx.doi.org/10.1109/tit.2018.2815607.
Xu, Liangliang, Min Lyu, Zhipeng Li, Yongkun Li, and Yinlong Xu. "Deterministic Data Distribution for Efficient Recovery in Erasure-Coded Storage Systems." IEEE Transactions on Parallel and Distributed Systems 31, no. 10 (October 1, 2020): 2248–62. http://dx.doi.org/10.1109/tpds.2020.2987837.
Song, Haiyang, Jianan Li, Dakui Lin, Hongjie Liu, Yongkun Lin, Jianying Hao, Kun Wang, Xiao Lin, and Xiaodi Tan. "Reducing the Crosstalk in Collinear Holographic Data Storage Systems Based on Random Position Orthogonal Phase-Coding Reference." Photonics 10, no. 10 (October 16, 2023): 1160. http://dx.doi.org/10.3390/photonics10101160.
Gaeta, Rossano, and Marco Grangetto. "Malicious Node Identification in Coded Distributed Storage Systems under Pollution Attacks." ACM Transactions on Modeling and Performance Evaluation of Computing Systems 6, no. 3 (September 30, 2021): 1–27. http://dx.doi.org/10.1145/3491062.
Oggier, Frédérique, and Anwitaman Datta. "On repairing erasure coded data in an active-passive mixed storage network." International Journal of Information and Coding Theory 3, no. 1 (2015): 58. http://dx.doi.org/10.1504/ijicot.2015.068697.
Bao, Han, Yijie Wang, and Fangliang Xu. "Reducing network cost of data repair in erasure-coded cross-datacenter storage." Future Generation Computer Systems 102 (January 2020): 494–506. http://dx.doi.org/10.1016/j.future.2019.08.027.
Xiao, Yifei, and Shijie Zhou. "Health Data Availability Protection: Delta-XOR-Relay Data Update in Erasure-Coded Cloud Storage Systems." Computer Modeling in Engineering & Sciences 135, no. 1 (2023): 169–85. http://dx.doi.org/10.32604/cmes.2022.021795.
Krishnan, Prasad, Lakshmi Natarajan, and V. Lalitha. "An Umbrella Converse for Data Exchange: Applied to Caching, Computing, and Shuffling." Entropy 23, no. 8 (July 30, 2021): 985. http://dx.doi.org/10.3390/e23080985.
Shao, Bilin, Dan Song, Genqing Bian, and Yu Zhao. "Rack Aware Data Placement for Network Consumption in Erasure-Coded Clustered Storage Systems." Information 9, no. 7 (June 21, 2018): 150. http://dx.doi.org/10.3390/info9070150.
Shen, Zhirong, Jiwu Shu, and Yingxun Fu. "Parity-Switched Data Placement: Optimizing Partial Stripe Writes in XOR-Coded Storage Systems." IEEE Transactions on Parallel and Distributed Systems 27, no. 11 (November 1, 2016): 3311–22. http://dx.doi.org/10.1109/tpds.2016.2525770.
Li, Xiaolu, Zuoru Yang, Jinhong Li, Runhui Li, Patrick P. C. Lee, Qun Huang, and Yuchong Hu. "Repair Pipelining for Erasure-coded Storage: Algorithms and Evaluation." ACM Transactions on Storage 17, no. 2 (May 28, 2021): 1–29. http://dx.doi.org/10.1145/3436890.
HAMADANI, AMBREEN, NAZIR A. GANAI, SHAH F. FAROOQ, and BASHARAT A. BHAT. "Big data management: from hard drives to DNA drives." Indian Journal of Animal Sciences 90, no. 2 (March 6, 2020): 134–40. http://dx.doi.org/10.56093/ijans.v90i2.98761.
Zhang, Xingjun, Ningjing Liang, Yunfei Liu, Changjiang Zhang, and Yang Li. "SA-RSR: a read-optimal data recovery strategy for XOR-coded distributed storage systems." Frontiers of Information Technology & Electronic Engineering 23, no. 6 (June 2022): 858–75. http://dx.doi.org/10.1631/fitee.2100242.
Shen, X. A., and R. Kachru. "Use of biphase-coded pulses for wideband data storage in time-domain optical memories." Applied Optics 32, no. 17 (June 10, 1993): 3149. http://dx.doi.org/10.1364/ao.32.003149.
Hu, Yupeng, Qian Li, Wei Xie, and Zhenyu Ye. "An Ant Colony Optimization Based Data Update Scheme for Distributed Erasure-Coded Storage Systems." IEEE Access 8 (2020): 118696–706. http://dx.doi.org/10.1109/access.2020.3004577.
Zhang, Shu Zhen, and Hai Long Song. "A Secret Sharing Algorithm Based on Regenerating Codes." Applied Mechanics and Materials 397-400 (September 2013): 2031–36. http://dx.doi.org/10.4028/www.scientific.net/amm.397-400.2031.
Su, Yu, Shu Hong Wen, and Jian Ping Chai. "Embedded System Based Television Data Collection and Return Technology." Applied Mechanics and Materials 48-49 (February 2011): 496–501. http://dx.doi.org/10.4028/www.scientific.net/amm.48-49.496.
Pandit, Anubhav. "The Identical Data in Cloud Storage with ADJDUP Technique." December 2020 2, no. 4 (January 6, 2021): 214–18. http://dx.doi.org/10.36548/jucct.2020.4.004.
Kim, Yongok, Gyuyeol Kong, and Sooyong Choi. "Error Correcting Capable 2/4 Modulation Code Using Trellis Coded Modulation in Holographic Data Storage." Japanese Journal of Applied Physics 51, no. 8S2 (August 1, 2012): 08JD08. http://dx.doi.org/10.7567/jjap.51.08jd08.
Kim, Yongok, Gyuyeol Kong, and Sooyong Choi. "Error Correcting Capable 2/4 Modulation Code Using Trellis Coded Modulation in Holographic Data Storage." Japanese Journal of Applied Physics 51 (August 20, 2012): 08JD08. http://dx.doi.org/10.1143/jjap.51.08jd08.
Pei, Xiaoqiang, Yijie Wang, Xingkong Ma, and Fangliang Xu. "Efficient in-place update with grouped and pipelined data transmission in erasure-coded storage systems." Future Generation Computer Systems 69 (April 2017): 24–40. http://dx.doi.org/10.1016/j.future.2016.10.016.
Chen, Junqi, Yong Wang, Miao Ye, Qinghao Zhang, and Wenlong Ke. "A Load-Aware Multistripe Concurrent Update Scheme in Erasure-Coded Storage System." Wireless Communications and Mobile Computing 2022 (May 19, 2022): 1–15. http://dx.doi.org/10.1155/2022/5392474.
Mahalingam, Hemalatha, Padmapriya Velupillai Meikandan, Karuppuswamy Thenmozhi, Kawthar Mostafa Moria, Chandrasekaran Lakshmi, Nithya Chidambaram, and Rengarajan Amirtharajan. "Neural Attractor-Based Adaptive Key Generator with DNA-Coded Security and Privacy Framework for Multimedia Data in Cloud Environments." Mathematics 11, no. 8 (April 7, 2023): 1769. http://dx.doi.org/10.3390/math11081769.
Khan, Imran Ullah, M. A. Ansari, S. Hasan Saeed, and Kakul Khan. "Evaluation and Analysis of Rate Control Methods for H.264/AVC and MPEG-4 Video Codec." International Journal of Electrical and Computer Engineering (IJECE) 8, no. 2 (April 1, 2018): 1273. http://dx.doi.org/10.11591/ijece.v8i2.pp1273-1280.
Khan, Imran Ullah, M. A. Ansari, S. Hasan Saeed, and Kakul Khan. "Evaluation and Analysis of Rate Control Methods for H.264/AVC and MPEG-4 Video Codec." International Journal of Electrical and Computer Engineering (IJECE) 8, no. 5 (October 1, 2018): 2788. http://dx.doi.org/10.11591/ijece.v8i5.pp2788-2794.
Shen, Zhirong, Patrick P. C. Lee, Jiwu Shu, and Wenzhong Guo. "Encoding-Aware Data Placement for Efficient Degraded Reads in XOR-Coded Storage Systems: Algorithms and Evaluation." IEEE Transactions on Parallel and Distributed Systems 29, no. 12 (December 1, 2018): 2757–70. http://dx.doi.org/10.1109/tpds.2018.2842210.
Yao, Jing, and Qi Liang Du. "A Simple Data Acquisition Software for Serial Devices Based on Excel VBA and its Application in Rotary Kilns." Advanced Materials Research 591-593 (November 2012): 1638–44. http://dx.doi.org/10.4028/www.scientific.net/amr.591-593.1638.
Jagdish, Mukta, Amelec Viloria, Jesus Vargas, Omar Bonerge Pineda Lezama, and David Ovallos-Gazabon. "Modeling software architecture design on data storage security in cloud computing environments." Journal of Intelligent & Fuzzy Systems 39, no. 6 (December 4, 2020): 8557–64. http://dx.doi.org/10.3233/jifs-189172.
Zhou, Anan, Benshun Yi, and Laigan Luo. "Tree-structured data placement scheme with cluster-aided top-down transmission in erasure-coded distributed storage systems." Computer Networks 204 (February 2022): 108714. http://dx.doi.org/10.1016/j.comnet.2021.108714.
Gopinath, R., and B. G. Geetha. "An E-learning System Based on Secure Data Storage Services in Cloud Computing." International Journal of Information Technology and Web Engineering 8, no. 2 (April 2013): 1–17. http://dx.doi.org/10.4018/jitwe.2013040101.
Albina, Mayniar. "Perancangan Aplikasi Kompresi File Teks Menggunakan Algoritma Context Tree Weighting." Journal of Informatics Management and Information Technology 2, no. 3 (July 31, 2022): 78–82. http://dx.doi.org/10.47065/jimat.v2i3.149.
Ellis, Katy, Chris Brew, George Patargias, Tim Adye, Rob Appleyard, Alastair Dewhurst, and Ian Johnson. "XRootD and Object Store: A new paradigm." EPJ Web of Conferences 245 (2020): 04006. http://dx.doi.org/10.1051/epjconf/202024504006.
Courtney, S. B., M. J. Tricard, and R. W. Hendricks. "PC-Based Management and Analysis of X-Ray Residual Stress Data." Advances in X-ray Analysis 36 (1992): 535–41. http://dx.doi.org/10.1154/s0376030800019169.
Wei, Boan, Jianqin Zhang, Chaonan Hu, and Zheng Wen. "A Clustering Visualization Method for Density Partitioning of Trajectory Big Data Based on Multi-Level Time Encoding." Applied Sciences 13, no. 19 (September 26, 2023): 10714. http://dx.doi.org/10.3390/app131910714.
Yang, Jian Xi, and Li Wen Zhang. "Optimization of Sensor Placement in SHM Based on the Dual Coded Genetic Algorithm." Applied Mechanics and Materials 151 (January 2012): 139–44. http://dx.doi.org/10.4028/www.scientific.net/amm.151.139.
Vijayalakshmi, V., and K. Sharmila. "Secure Data Transactions based on Hash Coded Starvation Blockchain Security using Padded Ring Signature-ECC for Network of Things." International Journal on Recent and Innovation Trends in Computing and Communication 11, no. 1 (February 6, 2023): 53–61. http://dx.doi.org/10.17762/ijritcc.v11i1.5986.
Balaji, K., and S. S. Manikandasaran. "Data Security and Deduplication Framework for Securing and Deduplicating Users’ Data in Public and Private Cloud Environment." Journal of Scientific Research 14, no. 1 (January 1, 2022): 153–65. http://dx.doi.org/10.3329/jsr.v14i1.54063.
Kuang, Fengtian, Bo Mi, Yang Li, Yuan Weng, and Shijie Wu. "Multiparty Homomorphic Machine Learning with Data Security and Model Preservation." Mathematical Problems in Engineering 2021 (January 11, 2021): 1–11. http://dx.doi.org/10.1155/2021/6615839.
Wang, Nan, Yuan Zhang, and Wei Ning. "Research on Compressive and Coding Algorithm of Bearing Vibration Signal in Wireless Transmission." Applied Mechanics and Materials 757 (April 2015): 195–99. http://dx.doi.org/10.4028/www.scientific.net/amm.757.195.
Venable, Richard M. "Data Transmission Through the Telephone Network: Protocols, Pitfalls, and Some Examples." Journal of AOAC INTERNATIONAL 69, no. 5 (September 1, 1986): 749–54. http://dx.doi.org/10.1093/jaoac/69.5.749.
Wojas, Gosia. "The Infallible and the Specter – Manifesting (artificial) subjectification in female sex robots." Matter: Journal of New Materialist Research 8 (July 31, 2023): 41–53. http://dx.doi.org/10.1344/jnmr.v8.43452.
Arya, Mukesh Kumar, and Namit Gupta. "Adoptive Cloud Application in Semantic Web." International Journal of Advance Research and Innovation 2, no. 2 (2014): 48–51. http://dx.doi.org/10.51976/ijari.221407.