scispace - formally typeset
Search or ask a question
Topic

Data Corruption

About: Data Corruption is a research topic. Over the lifetime, 435 publications have been published within this topic receiving 6784 citations.


Papers
More filters
01 Jan 2007
TL;DR: An integrated communication and mesochronous clocking strategy is presented, which avoidsstiming related errors while maintaining a globally synchronous system perspective, and is demonstrated with a 90 nm CMOS standard cell network-on-chip design which implements completely timing-safe, global communication in modular system.
Abstract: Growing system sizes together with increasing performance variability are making globally synchronous operation hard to realize. Mesochronous clocking constitutes a possible solution to the problems faced. The most fundamentalofproblemsfacedwhencommunicatingbetween mesochronously clocked regions concerns the possibility of data corruption caused by metastability. This paper presents an integrated communication and mesochronous clockingstrategy,whichavoidstimingrelatederrorswhile maintaining a globally synchronous system perspective. The architecture is scalable as timing integrity is based purely on local observations. It is demonstrated with a 90 nm CMOS standard cell network-on-chipdesign which implements completely timing-safe, global communication inamodularsystem.
Patent
11 Jan 2017
TL;DR: In this article, a processing method for asynchronous data consumption is presented, which includes the steps that after a first server successfully executes data consumption of a data item, a consumption success mail containing consumption data is sent to a second server and is stored in an appointed storage equipment.
Abstract: The invention discloses a processing method for asynchronous data consumption. The processing method includes the steps that after a first server successfully executes data consumption of a data item, a consumption success mail containing consumption data is sent to a second server and is stored in an appointed storage equipment; after receiving the consumption success mail containing the consumption data, the second server carries out corresponding service logic processing on the consumption data; if service logic processing is successful, the storage equipment is notified to cancel the consumption success mail; if the service logic processing is failing, a service logic processing failure mail containing the consumption data is returned to the first server, and the storage equipment is notified to cancel the consumption success mail; after receiving the service logic processing failure mail, the first server reimburses the consumption data corresponding to the data item. The probability of data corruption can be reduced, and human cost for error checking is reduced indirectly.
Journal ArticleDOI
TL;DR: This paper proposes a plan of database scheduled tasks based on Linux environment that can be timed to export the database, be sent automatically to a secure backup mailbox and complete the regular backup of the database finally.
Abstract: With the development of Internet technology and the increasing popularity of the Internet, the amount of information data of enterprises increased sharply. How to avoid unexpected data corruption and to improve the system of data security and data recovery capabilities has been the focus of attention of users and enterprises. Regular backups of the database is to restore the data the easiest and most effective guarantee method and is an effective measure database administrators to manage data. This paper proposes a plan of database scheduled tasks based on Linux environment. This plan can be timed to export the database, be sent automatically to a secure backup mailbox and complete the regular backup of the database finally.
Proceedings ArticleDOI
01 Sep 2016
TL;DR: The goal of the SafeCloud project is to provide an extensible platform to implement and evaluate censorship resistant storage systems for long term storage by combining classical techniques such as erasure coding and data dispersion with more novel ones like data block entanglement.
Abstract: Cloud based storage services are increasingly popular for storing private and enterprise data. Differentiating themselves over a large range of features, storage providers can catter to the needs of any customer. But among the needs they must satisfy, safety from data loss or data corruption is the most important one. While data corruption stemming from faulty hardware or software is usually covered by those services, it is not the case when the erasure is due to malicious activities from the storage provider itself. Therefore the need for anti-tampering countermeasures needs to be addressed for the customer to feel comfortable enough to use the service. In the context of the SafeCloud project, our goal is to provide an extensible platform to implement and evaluate censorship resistant storage systems for long term storage. By combining classical techniques such as erasure coding and data dispersion with more novel ones like data block entanglement, we aim at giving good anti-tampering guarantees for cloud based storage services. In this paper, we will present some of the work that has been done so far to reach this objective, results and future developments.
Patent
04 Jun 2020
TL;DR: In this paper, a system and method for high-speed transfer of small data sets, that provides near-instantaneous bit-level lossless compression, that is ideal for communications environments that cannot tolerate even small amounts of data corruption, have very low latency tolerance, where data has a low entropy rate, and where every bit costs the user bandwidth, power, or time so that deflation is worthwhile.
Abstract: A system and method for high-speed transfer of small data sets, that provides near-instantaneous bit- level lossless compression, that is ideal for communications environments that cannot tolerate even small amounts of data corruption, have very low latency tolerance, where data has a low entropy rate, and where every bit costs the user bandwidth, power, or time so that deflation is worthwhile. Where some loss of data can be tolerated, the system and method can be configured for use as lossy compression.

Network Information
Related Topics (5)
Network packet
159.7K papers, 2.2M citations
82% related
Software
130.5K papers, 2M citations
81% related
Wireless sensor network
142K papers, 2.4M citations
78% related
Wireless network
122.5K papers, 2.1M citations
77% related
Cluster analysis
146.5K papers, 2.9M citations
76% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
20221
202121
202025
201927
201827
201727