Results 91 to 100 of about 30,335 (280)
Towards an accurate evaluation of deduplicated storage systems [PDF]
Deduplication has proven to be a valuable technique for eliminating duplicate data in backup and archival systems and is now being applied to new storage environments with distinct requirements and performance trade-offs. Namely, deduplication system are
Paulo, João +3 more
core
In ankylosing spondylitis‐acute anterior uveitis (AS‐AAU), trained immunity monocytes (Mono‐TI) differentiate into macrophages in the eye, retaining trained immunity features. Mono‐TI cells secrete pro‐inflammatory cytokines and chemokines, including IL‐1β, TNF‐α, and CCL3.
Yimeng Sun +13 more
wiley +1 more source
Instance segmentation in high-resolution images is essential for applications such as remote sensing, medical imaging, and precision agriculture, yet remains challenging due to factors such as small object sizes, irregular shapes, and occlusions.
Marko Mihajlovic, Marina Marjanovic
doaj +1 more source
Data-Driven Application Maintenance: Views from the Trenches
In this paper we present our experience during design, development, and pilot deployments of a data-driven machine learning based application maintenance solution.
Misra, Janardan +4 more
core +1 more source
ABSTRACT Semi‐permanent make‐up (SPMU), or micropigmentation, involves implanting pigments into the dermal layer of the skin for cosmetic enhancement. Unlike topical cosmetics, which are rapidly cleared from the body, SPMU pigments persist in living tissues, raising unique toxicological considerations.
T. A. N. Kaye +3 more
wiley +1 more source
3D‐Printed Models in Oral Surgery Simulation Training: A Scoping Review
ABSTRACT Background Advancements in three‐dimensional (3D) printing have introduced innovative tools for medical and dental education. In dental surgery, 3D‐printed simulation models offer valuable presurgical training. This review explores the scope, study types, key findings, limitations, and future research needs to enhance their application in ...
Shahrzad Rahimizadeh Nahavandi +5 more
wiley +1 more source
ABSTRACT Background Orthodontic education has traditionally relied on didactic instruction and rule‐based teaching approaches. Increasing emphasis on clinical reasoning and evidence‐based treatment planning has led to the integration of conceptual learning strategies—approaches that emphasize understanding relationships between clinical concepts and ...
Martin Baxmann +2 more
wiley +1 more source
Efficient Group Proof of Storage With Malicious-Member Distinction and Revocation
Proof of Storage (POS) is a system utilized by a client to verify whether the original data is intact while being possessed by an untrusted server. In a grouping application, multiple members share and verify the same file, and the group manager is ...
Liehuang Zhu +4 more
doaj +1 more source
Secure Data Deduplication in Cloud Storage Services [PDF]
Cloudová úložiště se poslední dobou stala výhodnou alternativou k jiným typům úložišť, jejich provozovatelé se však potýkají s problémem jak skloubit optimalizaci a ochranu uložených dat. Pro zajištění utajenosti svých dat by klienti úložiště preferovali
Staněk Jan
core
Fast and secure laptop backups with encrypted de-duplication [PDF]
Many people now store large quantities of personal and corporate data on laptops or home computers. These often have poor or intermittent connectivity, and are vulnerable to theft or hardware failure.
Anderson, Paul, Zhang, Le
core +1 more source

