Preserving the bits of the Danish Internet

نویسنده

  • NIELS H. CHRISTENSEN
چکیده

One of the many challenges in large-scale web archiving is long-time preservation of the amounts of data generated by the harvester. We describe the bit preservation solution chosen by Netarkivet. We then define a programmatic, probabilistic model of hardware failures and repair operations in the solution. The mean time to failure of this model is then computed in a number of experiments based on simulation.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Lightweight Privacy-preserving Authenticated Key Exchange Scheme for Smart Grid Communications

Smart grid concept is introduced to modify the power grid by utilizing new information and communication technology. Smart grid needs live power consumption monitoring to provide required services and for this issue, bi-directional communication is essential. Security and privacy are the most important requirements that should be provided in the communication. Because of the complex design of s...

متن کامل

An ultra low power wake-up signal decoder for wireless nodes activation in Internet of Things technology

  This paper proposes a new structure for digital address decoders based on flip-flops with application in wake-up signal generators of wireless networks nodes. Such nodes equipped with this device can be utilized in Internet of Things applications where the nodes are dependent on environment energy harvesting to survive for a long time. Different parts in these wireless nodes should have an e...

متن کامل

Evaluation of the Two Methods for Thinning in Oak Plantation based on Ecological Capability (Case staudy: Neka area, Mazadaran Province)

The study was aimed to assess of the Danish and Swiss methods of thinning in 20 years old plantations of Chestnut leaved Oak (Quercus castaneifolia C. A. Mey.) in terms of quantitative and qualitative characteristics of trees, natural regeneration, plant and soil invertebrate diversity. The study area is located in Neka forests, east of Mazandaran province in the Caspian region. This research w...

متن کامل

Investigation of Some Attacks on GAGE (v1), InGAGE (v1), (v1.03), and CiliPadi (v1) Variants

In this paper, we present some attacks on GAGE, InGAGE, and CiliPadi which are candidates of the first round of the NIST-LWC competition. GAGE and InGAGE are lightweight sponge based hash function and Authenticated Encryption with Associated Data (AEAD), respectively and support different sets of parameters. The length of hash, key, and tag are always 256, 128, and 128 bits, respec...

متن کامل

The Economics of Network Neutrality Are “ prophylactic ” remedies to nonproblems needed ?

| Winter 2011-2012 S ince “network neutrality” first appeared in policy debates, its meaning has been less than crystal clear. Some advocates have argued that net neutrality demands that broadband Internet service providers (ISPs) treat all bits equally: “a bit is a bit is a bit,” while others make exceptions for malware bits, spam bits, child pornography bits, etc. Some advocates have argued t...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2005