Results 91 to 100 of about 30,335 (280)

Towards an accurate evaluation of deduplicated storage systems [PDF]

open access: yes, 2013
Deduplication has proven to be a valuable technique for eliminating duplicate data in backup and archival systems and is now being applied to new storage environments with distinct requirements and performance trade-offs. Namely, deduplication system are
Paulo, João   +3 more
core  

Monocytes with trained immunity–like signatures are associated with acute anterior uveitis in ankylosing spondylitis

open access: yesInterdisciplinary Medicine, EarlyView.
In ankylosing spondylitis‐acute anterior uveitis (AS‐AAU), trained immunity monocytes (Mono‐TI) differentiate into macrophages in the eye, retaining trained immunity features. Mono‐TI cells secrete pro‐inflammatory cytokines and chemokines, including IL‐1β, TNF‐α, and CCL3.
Yimeng Sun   +13 more
wiley   +1 more source

Enhancing Instance Segmentation in High-Resolution Images Using Slicing-Aided Hyper Inference and Spatial Mask Merging Optimized via R-Tree Indexing

open access: yesMathematics
Instance segmentation in high-resolution images is essential for applications such as remote sensing, medical imaging, and precision agriculture, yet remains challenging due to factors such as small object sizes, irregular shapes, and occlusions.
Marko Mihajlovic, Marina Marjanovic
doaj   +1 more source

Data-Driven Application Maintenance: Views from the Trenches

open access: yes, 2018
In this paper we present our experience during design, development, and pilot deployments of a data-driven machine learning based application maintenance solution.
Misra, Janardan   +4 more
core   +1 more source

Exploring the Chemical Complexity and Toxicological Behaviour of Semi‐permanent Make‐Up Pigments: A Systematic Review

open access: yesJournal of Applied Toxicology, EarlyView.
ABSTRACT Semi‐permanent make‐up (SPMU), or micropigmentation, involves implanting pigments into the dermal layer of the skin for cosmetic enhancement. Unlike topical cosmetics, which are rapidly cleared from the body, SPMU pigments persist in living tissues, raising unique toxicological considerations.
T. A. N. Kaye   +3 more
wiley   +1 more source

3D‐Printed Models in Oral Surgery Simulation Training: A Scoping Review

open access: yesJournal of Dental Education, EarlyView.
ABSTRACT Background Advancements in three‐dimensional (3D) printing have introduced innovative tools for medical and dental education. In dental surgery, 3D‐printed simulation models offer valuable presurgical training. This review explores the scope, study types, key findings, limitations, and future research needs to enhance their application in ...
Shahrzad Rahimizadeh Nahavandi   +5 more
wiley   +1 more source

Conceptual Learning in Orthodontics: A Systematic Literature Review of Its Implementation and Impact on Clinical Decision‐Making

open access: yesJournal of Dental Education, EarlyView.
ABSTRACT Background Orthodontic education has traditionally relied on didactic instruction and rule‐based teaching approaches. Increasing emphasis on clinical reasoning and evidence‐based treatment planning has led to the integration of conceptual learning strategies—approaches that emphasize understanding relationships between clinical concepts and ...
Martin Baxmann   +2 more
wiley   +1 more source

Efficient Group Proof of Storage With Malicious-Member Distinction and Revocation

open access: yesIEEE Access, 2019
Proof of Storage (POS) is a system utilized by a client to verify whether the original data is intact while being possessed by an untrusted server. In a grouping application, multiple members share and verify the same file, and the group manager is ...
Liehuang Zhu   +4 more
doaj   +1 more source

Secure Data Deduplication in Cloud Storage Services [PDF]

open access: yes
Cloudová úložiště se poslední dobou stala výhodnou alternativou k jiným typům úložišť, jejich provozovatelé se však potýkají s problémem jak skloubit optimalizaci a ochranu uložených dat. Pro zajištění utajenosti svých dat by klienti úložiště preferovali
Staněk Jan
core  

Fast and secure laptop backups with encrypted de-duplication [PDF]

open access: yes, 2010
Many people now store large quantities of personal and corporate data on laptops or home computers. These often have poor or intermittent connectivity, and are vulnerable to theft or hardware failure.
Anderson, Paul, Zhang, Le
core   +1 more source

Home - About - Disclaimer - Privacy