Results 81 to 90 of about 29,957 (282)
Towards an accurate evaluation of deduplicated storage systems [PDF]
Deduplication has proven to be a valuable technique for eliminating duplicate data in backup and archival systems and is now being applied to new storage environments with distinct requirements and performance trade-offs. Namely, deduplication system are
Paulo, João +3 more
core
Hyperemesis gravidarum and oral health: A scoping review
Abstract Background Hyperemesis gravidarum (HG) is a severe form of nausea and vomiting in pregnancy (NVP), associated with dehydration, nutritional deficiencies, and systemic complications. Although recurrent vomiting, altered dietary patterns, and medication effects might plausibly affect oral health, this relationship has not been comprehensively ...
Niamh Coffey +4 more
wiley +1 more source
In ankylosing spondylitis‐acute anterior uveitis (AS‐AAU), trained immunity monocytes (Mono‐TI) differentiate into macrophages in the eye, retaining trained immunity features. Mono‐TI cells secrete pro‐inflammatory cytokines and chemokines, including IL‐1β, TNF‐α, and CCL3.
Yimeng Sun +13 more
wiley +1 more source
ABSTRACT Semi‐permanent make‐up (SPMU), or micropigmentation, involves implanting pigments into the dermal layer of the skin for cosmetic enhancement. Unlike topical cosmetics, which are rapidly cleared from the body, SPMU pigments persist in living tissues, raising unique toxicological considerations.
T. A. N. Kaye +3 more
wiley +1 more source
Secure Data Deduplication in Cloud Storage Services [PDF]
Cloudová úložiště se poslední dobou stala výhodnou alternativou k jiným typům úložišť, jejich provozovatelé se však potýkají s problémem jak skloubit optimalizaci a ochranu uložených dat. Pro zajištění utajenosti svých dat by klienti úložiště preferovali
Staněk Jan
core
3D‐Printed Models in Oral Surgery Simulation Training: A Scoping Review
ABSTRACT Background Advancements in three‐dimensional (3D) printing have introduced innovative tools for medical and dental education. In dental surgery, 3D‐printed simulation models offer valuable presurgical training. This review explores the scope, study types, key findings, limitations, and future research needs to enhance their application in ...
Shahrzad Rahimizadeh Nahavandi +5 more
wiley +1 more source
Efficient Group Proof of Storage With Malicious-Member Distinction and Revocation
Proof of Storage (POS) is a system utilized by a client to verify whether the original data is intact while being possessed by an untrusted server. In a grouping application, multiple members share and verify the same file, and the group manager is ...
Liehuang Zhu +4 more
doaj +1 more source
As the world moves to digital storage for archival purposes, there is an increasing demand for systems that can provide secure data storage in a cost-effective manner. By identifying common chunks of data both within and between files and storing them only once, deduplication can yield cost savings by increasing the utility of a given amount of storage.
Storer, Mark W +3 more
openaire +3 more sources
North–South Asymmetries in Research Cited in Global South Policy Documents
ABSTRACT This article examines whose research is cited in economy‐related policy documents produced by organizations in countries of the Global South. Using Overton's Economy topic, we link 243 675 policy documents from 155 Global South countries to 68 550 Web of Science articles cited in those documents.
Bernardo Cabral +2 more
wiley +1 more source
Deduplicating bibliographic data
There are several instances where I have a collection of references that I want to deduplicate and merge.
openaire +1 more source

