Data redundancy

Results: 134



#Item
41Technology / Survival analysis / Maintenance / Data center infrastructure management / Data center / Downtime / Availability / Redundancy / Maintenance /  repair /  and operations / Failure / Systems engineering / Reliability engineering

Data center reliability Downtime is the enemy of every data center. Aberdeen Research reports downtime in “average” performing facilities at 60 minutes in an average of 2.3 incidents per year. Best-in-class organiza

Add to Reading List

Source URL: www05.abb.com

Language: English
42Information retrieval / Computational linguistics / Artificial intelligence / Automatic summarization / Data mining / Multi-document summarization / Artificial intelligence applications / Natural language processing / Information science / Science

Text Summarization: News and Beyond Kathleen McKeown Department of Computer Science Columbia University Redundancy in large text collections, such as the web, creates both problems and opportunities for natural language

Add to Reading List

Source URL: www.alta.asn.au

Language: English - Date: 2006-02-22 22:07:53
43Data management / Information theory / Confidence interval / IP / Redundancy / Scattering parameters / Statistics / Data mining / Association rule learning

PARAS: A Parameter Space Framework for Online Association Mining∗ Xika Lin†, Abhishek Mukherji†, Elke A. Rundensteiner , Carolina Ruiz , Matthew O. Ward Computer Science Department, Worcester Polytechnic Institute

Add to Reading List

Source URL: www.vldb.org

Language: English - Date: 2013-02-20 04:21:54
44Fourier analysis / Digital signal processing / Image processing / Curvelet / Contourlet / Fast Fourier transform / Fourier transform / S transform / Continuous wavelet transform / Mathematical analysis / Wavelets / Integral transforms

3-D Data Denoising and Inpainting with the low-redundancy Fast Curvelet Transform A. Woiselle1,2 , J-L. Starck1 , J. Fadili3 1 CEA, IRFU, SEDI-SAP, Laboratoire Astrophysique des Interactions Multi-´echelles (UMR 7158),

Add to Reading List

Source URL: jstarck.free.fr

Language: English - Date: 2010-10-05 10:50:37
45Binary arithmetic / Cyclic redundancy check / Technology / Disk formatting / Radio-frequency identification / Computer architecture / Ubiquitous computing / Computing / Wireless

INTEGRATED CIRCUITS DATA SHEET SL2 ICS11 I•CODE UID

Add to Reading List

Source URL: www.nxp.com

Language: English - Date: 2011-09-12 16:23:47
46Data / Routing protocols / Virtual Router Redundancy Protocol / Hot Standby Router Protocol / MAC address / Communications protocol / Router / Linux Virtual Server / IPsec / Computing / Internet protocols / Network architecture

Linux Virtual Server High Availability using VRRPv2 Alexandre Cassen Linux Virtual Server OpenSource Project Paris, France [removed], http://www.LinuxVirtualServer.org/~acassen/

Add to Reading List

Source URL: www.keepalived.org

Language: English - Date: 2014-01-28 06:50:35
47Information theory / Computer arithmetic / Arithmetic / Binary arithmetic / Data transmission / Hamming code / Parity bit / Hamming / Cyclic redundancy check / Error detection and correction / Coding theory / Mathematics

CODING NINJA CODING TUTORIAL BEN EVERARD ERROR DETECTION WITH

Add to Reading List

Source URL: www.linuxvoice.com

Language: English - Date: 2015-02-27 04:15:22
48Cyclic redundancy check / Mathematics / Information / Numbers / 1-Wire / Parity bit / Network packet / Computation of CRC / CRC-based framing / Binary arithmetic / Finite fields / Data transmission

Understanding and Using Cyclic Redundancy Checks with Maxim 1-Wire and iButton Products - Application Note - Maxim

Add to Reading List

Source URL: pdfserv.maximintegrated.com

Language: English - Date: 2013-10-09 15:18:55
49Computing / Data / Cyclic redundancy check / Universal Serial Bus / Network packet / Polynomial code / Communications protocol / Modulo operation / Transmission Control Protocol / Finite fields / Information / Binary arithmetic

Draft CYCLIC REDUNDANCY CHECKS IN USB Introduction The USB specification calls for the use of Cyclic Redundancy Checksums (CRC) to protect all non-PID fields in token and data packets from errors during transmission. Th

Add to Reading List

Source URL: www.usb.org

Language: English - Date: 2005-04-14 12:54:13
50Virtual machines / Backup software / Backup / Data security / Recovery point objective / Hyper-V / VM / Replication / Disaster recovery / System software / Software / Computing

Backup Strategies with Scale Computing’s HC3 System ® Redundancy and Failover When infrastructure (server or storage) fails in a traditional, physical environment, there is typically resulting downtime

Add to Reading List

Source URL: www.scalecomputing.com

Language: English - Date: 2015-03-23 11:21:54
UPDATE