Sciweavers

14 search results - page 1 / 3
» Analyzing the effects of disk-pointer corruption
Sort
View
DSN
2008
IEEE
13 years 11 months ago
Analyzing the effects of disk-pointer corruption
The long-term availability of data stored in a file system depends on how well it safeguards on-disk pointers used to access the data. Ideally, a system would correct all pointer...
Lakshmi N. Bairavasundaram, Meenali Rungta, Nitin ...
ICML
2008
IEEE
14 years 5 months ago
Learning to classify with missing and corrupted features
After a classifier is trained using a machine learning algorithm and put to use in a real world system, it often faces noise which did not appear in the training data. Particularl...
Ofer Dekel, Ohad Shamir
DSN
2004
IEEE
13 years 8 months ago
Characterizing the Effects of Transient Faults on a High-Performance Processor Pipeline
The progression of implementation technologies into the sub-100 nanometer lithographies renew the importance of understanding and protecting against single-event upsets in digital...
Nicholas J. Wang, Justin Quek, Todd M. Rafacz, San...
INTERSPEECH
2010
12 years 11 months ago
Verifying pronunciation dictionaries using conflict analysis
We describe a new language-independent technique for automatically identifying errors in an electronic pronunciation dictionary by analyzing the source of conflicting patterns dir...
Marelie H. Davel, Febe de Wet
TIP
2002
126views more  TIP 2002»
13 years 4 months ago
Multiframe error concealment for MPEG-coded video delivery over error-prone networks
Compressed video sequences are very vulnerable to channel disturbances when they are transmitted through an unreliable medium such as a wireless channel. Transmission errors not on...
Yen-Chi Lee, Yucel Altunbasak, Russell M. Merserea...