• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 20,709
Next 10 →

Error-Detecting Properties of Languages

by Stavros Konstantinidis, Amber O'Hearn - Theoretical Computer Science , 2002
"... The language property of error-detection ensures that the communications medium cannot transform a word of the language to another word of the language. In this paper we provide some insights on the notion of error-detection from a language theoretic point of view. We de ne certain error-detecting p ..."
Abstract - Cited by 4 (3 self) - Add to MetaCart
The language property of error-detection ensures that the communications medium cannot transform a word of the language to another word of the language. In this paper we provide some insights on the notion of error-detection from a language theoretic point of view. We de ne certain error-detecting

Error Detection By Fragile Watermarking

by Minghua Chen State , 2001
"... Error concealment techniques are useful in video transmission over channels that introduce bit errors. The efficiency and result of error concealment technique, however, rely on the error detection capabilities of video decoders. A novel error detection technique employing fragile watermarking is pr ..."
Abstract - Add to MetaCart
Error concealment techniques are useful in video transmission over channels that introduce bit errors. The efficiency and result of error concealment technique, however, rely on the error detection capabilities of video decoders. A novel error detection technique employing fragile watermarking

ERROR DETECTING DECIMAL DIGITS

by Edgar H. Sibley, Neal R. Wagner, Paul S. Putter
"... Decimal-oriented error detection schemes are explored in the context of one particular company project. ..."
Abstract - Add to MetaCart
Decimal-oriented error detection schemes are explored in the context of one particular company project.

Unidirectional Error Detecting Codes

by Gerard D. Cohen, Luisa Gargano, Ugo Vaccaro
"... A fixed-length binary code is called t--unidirectional error detecting if no codeword can be transformed into another codeword by at most t unidirectional errors. In this paper we consider the problem of mapping information sequences of length k into codewords of a t-unidirectional error detectin ..."
Abstract - Add to MetaCart
A fixed-length binary code is called t--unidirectional error detecting if no codeword can be transformed into another codeword by at most t unidirectional errors. In this paper we consider the problem of mapping information sequences of length k into codewords of a t-unidirectional error

Simple Error Detection Method

by Sachin Gupta
"... In any communication system, the received signal will differ from the transmitted signal due to various transmission impairments. For analog signals, these impairments introduce various random modifications that degrade signal quality. For digital signals, bit errors are introduced: A binary 1 is ch ..."
Abstract - Add to MetaCart
desirable to receive data with fewer bit errors. This motivates the use of error- detection techniques. Various types of error detection techniques and codes are used. Some are used for detection of single bit errors and some are for burst errors or multiple bit errors. In this paper, a simple error

Fault Containment and Error Detection in

by H. Kopetz , 2002
"... Abstract: TTP/C and FlexRay are two protocols that have been designed for use in time-triggered systems for safety-critical applications. This paper investigates the fault-containment and error-detection mechanisms of safety-critical time-triggered systems that are based on these two protocols. The ..."
Abstract - Cited by 2 (0 self) - Add to MetaCart
Abstract: TTP/C and FlexRay are two protocols that have been designed for use in time-triggered systems for safety-critical applications. This paper investigates the fault-containment and error-detection mechanisms of safety-critical time-triggered systems that are based on these two protocols

Error Detection for Treebank Validation

by Bharat Ram Ambati, Mridul Gupta, Rahul Agarwal, Samar Husain, Dipti Misra Sharma
"... This paper describes an error detection mechanism which helps in validation of dependency treebank annotation. Consistency in treebank annotation is a must for making data as errorfree as possible and for assuring the usefulness of treebank. This work is aimed at ensuring this consistency and to mak ..."
Abstract - Cited by 4 (3 self) - Add to MetaCart
This paper describes an error detection mechanism which helps in validation of dependency treebank annotation. Consistency in treebank annotation is a must for making data as errorfree as possible and for assuring the usefulness of treebank. This work is aimed at ensuring this consistency

Model-Based Analysis of Oligonucleotide Arrays: Model Validation, Design Issues and Standard Error Application

by Cheng Li, Wing Hung Wong , 2001
"... Background: A model-based analysis of oligonucleotide expression arrays we developed previously uses a probe-sensitivity index to capture the response characteristic of a specific probe pair and calculates model-based expression indexes (MBEI). MBEI has standard error attached to it as a measure of ..."
Abstract - Cited by 775 (28 self) - Add to MetaCart
correlations with the original 20-probe PM/MM difference model. MBEI method is able to extend the reliable detection limit of expression to a lower mRNA concentration. The standard errors of MBEI can be used to construct confidence intervals of fold changes, and the lower confidence bound of fold change is a

Mining Temporal Specifications for Error Detection

by Westley Weimer, George C. Necula - In TACAS , 2005
"... Abstract. Specifications are necessary in order to find software bugs using program verification tools. This paper presents a novel automatic specification mining algorithm that uses information about error handling to learn temporal safety rules. Our algorithm is based on the observation that progr ..."
Abstract - Cited by 102 (5 self) - Add to MetaCart
Abstract. Specifications are necessary in order to find software bugs using program verification tools. This paper presents a novel automatic specification mining algorithm that uses information about error handling to learn temporal safety rules. Our algorithm is based on the observation

Hardware and Software Error Detection

by Ravishankar K. Iyer, Ravishankar Iyer, Zbigniew Kalbarczyk, Zbigniew Kalbarczyk
"... this article are two-fold: (1) to introduce and characterize a variety of hardwareand software- based error detection techniques and (2) more importantly, to illustrate and discuss these techniques in real-world systems and applications. Consequently, the paper does not aim at providing an exhaustiv ..."
Abstract - Cited by 1 (0 self) - Add to MetaCart
this article are two-fold: (1) to introduce and characterize a variety of hardwareand software- based error detection techniques and (2) more importantly, to illustrate and discuss these techniques in real-world systems and applications. Consequently, the paper does not aim at providing
Next 10 →
Results 1 - 10 of 20,709
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University