Results 11 to 20 of about 1,170,289 (309)

Scalable Storage for Data-Intensive Computing [PDF]

open access: yes, 2011
Persistent storage is a fundamental abstraction in computing. It consists of a named set of data items that come into existence through explicit creation, persist through temporary failures of the system, until they are explicitly deleted. Sharing of data in distributed systems has become pervasive as these systems have grown in scale in terms of ...
Abhishek Verma   +3 more
openaire   +1 more source

Secure Cloud Storage with Client-Side Encryption Using a Trusted Execution Environment

open access: yes, 2020
With the evolution of computer systems, the amount of sensitive data to be stored as well as the number of threats on these data grow up, making the data confidentiality increasingly important to computer users.
da Rocha, Marciano   +5 more
core   +1 more source

Traits Expansion and Storage of Soybean Phenotypic Data in Computer Vision-Based Test

open access: yesFrontiers in Plant Science, 2022
Phenotypic traits of crops are an important basis for cultivating new crop varieties. Breeding experts expect to use artificial intelligence (AI) technology and obtain many accurate phenotypic data at a lower cost for the design of breeding programs ...
Yongchao Xing   +5 more
doaj   +1 more source

Ultracompact TM-Pass Silicon Nanophotonic Waveguide Polarizer and Design

open access: yesIEEE Photonics Journal, 2010
An ultracompact transverse magnetic (TM)-pass polarizer based on silicon nanophotonic waveguides is proposed, which contains two tapered waveguides sandwiching a narrow waveguide section only supporting TM-mode propagation.
Qian Wang, Seng-Tiong Ho
doaj   +1 more source

An Access Control Model Based on System Security Risk for Dynamic Sensitive Data Storage in the Cloud

open access: yesApplied Sciences, 2023
In cloud computing, dynamic storage of data generated by users, applications, tasks, workflows, etc. requires frequent access operations, so traditional encryption cannot be applied in this case.
Nawaf Alharbe   +3 more
doaj   +1 more source

Some information security problems of cloud data storage

open access: yesБезопасность информационных технологий, 2018
Last years the systems of remote data storage based on the Cloud Storage technologies have become widely used. This popularity is explained by its significant advantages for the users as compared to any other technologies of storing and accessing data ...
Oleg Y. Madatov
doaj   +1 more source

Knowledge concept recognition in the learning brain via fMRI classification

open access: yesFrontiers in Neuroscience
Knowledge concept recognition (KCR) aims to identify the concepts learned in the brain, which has been a longstanding area of interest for learning science and education.
Wenxin Zhang   +7 more
doaj   +1 more source

On short-term traffic flow forecasting and its reliability [PDF]

open access: yes, 2016
Recent advances in time series, where deterministic and stochastic modelings as well as the storage and analysis of big data are useless, permit a new approach to short-term traffic flow forecasting and to its reliability, i.e., to the traffic volatility.
Abouaïssa, Hassane   +2 more
core   +4 more sources

MMOS:Memory Resource Sharing Methods to Support Overselling in Multi-tenant Databases [PDF]

open access: yesJisuanji kexue
This paper presents an oversold memory resource sharing method for multi-tenant databases in an online analysis and processing scenario.The current static resource allocation strategy,which assigns a fixed resource quota to each tenant,leads to ...
XU Haiyang, LIU Hailong, YANG Chaoyun, WANG Shuo, LI Zhanhuai
doaj   +1 more source

Manipulating transient SOT-MRAM switching dynamics for efficiency improvement and probabilistic switching

open access: yesScientific Reports
In this paper, we investigate the effect of transient dynamics in the switching process for spin-orbit torque magnetic random-access memory (SOT-MRAM) devices stabilized by in-plane uniaxial magnetocrystalline anisotropy.
Shreyes Nallan, Jian-Gang Zhu
doaj   +1 more source

Home - About - Disclaimer - Privacy