Results 231 to 240 of about 2,566,761 (292)
Some of the next articles are maybe not open access.
Errors and Error Detection in Typing
Quarterly Journal of Experimental Psychology, 1969The errors and error detections made by qualified and trainee typists were examined, when they were given a passage of prose that included pseudo-words and words made up of random consonants. It was shown that trainees make more and detect relatively fewer errors.
L H, Shaffer, J, Hardwick
openaire +2 more sources
Enhanced Pedigree Error Detection
Human Heredity, 2002Accurate information on the relationships among individuals in a study is critical for valid linkage analysis. We extend the MLLR, EIBD, AIBS and IBS tests for detection of misspecified relationships to a broader range of relative pairs, and we improve the two-stage screening procedure for analyzing large data sets.
Lei, Sun +2 more
openaire +2 more sources
Unidirectional error detecting codes
1991A fixed-length binary code is called t-unidirectional error detecting if no codeword can be transformed into another codeword by at most t unidirectional errors. In this paper we consider the problem of mapping information sequences of length k into code-words of a t-unidirectional error detecting code of length k+p. In case of systematic codes we show
G. Cohen, GARGANO, Luisa, VACCARO, Ugo
openaire +1 more source
2000 IEEE International Symposium on Information Theory (Cat. No.00CH37060), 2002
We show that the probability of undetected error for a quantum code on the depolarizing channel can be expressed via code's weight enumerators. We prove that there exist quantum codes whose probability of undetected error falls exponentially with the length of the code and derive a lower bound on this exponent.
A. Ashikhmin +3 more
openaire +1 more source
We show that the probability of undetected error for a quantum code on the depolarizing channel can be expressed via code's weight enumerators. We prove that there exist quantum codes whose probability of undetected error falls exponentially with the length of the code and derive a lower bound on this exponent.
A. Ashikhmin +3 more
openaire +1 more source
Detecting Pedigree Relationship Errors
2011Pedigree relationship errors often occur in family data collected for genetic studies, and unidentified errors can lead to either increased false positives or decreased power in both linkage and association analyses. Here we review several allele sharing, as well as likelihood-based statistics, that were proposed to efficiently extract genealogical ...
openaire +3 more sources
Proceedings of the VLDB Endowment, 2016
Data cleaning has played a critical role in ensuring data quality for enterprise applications. Naturally, there has been extensive research in this area, and many data cleaning algorithms have been translated into tools to detect and to possibly repair certain classes of errors such as outliers, duplicates, missing values, and violations ...
Ziawasch Abedjan +8 more
openaire +1 more source
Data cleaning has played a critical role in ensuring data quality for enterprise applications. Naturally, there has been extensive research in this area, and many data cleaning algorithms have been translated into tools to detect and to possibly repair certain classes of errors such as outliers, duplicates, missing values, and violations ...
Ziawasch Abedjan +8 more
openaire +1 more source
Possibilistic Coding: Error Detection vs. Error Correction
2010Possibilistic information theory is a flexible approach to old and new forms of coding; it is based on possibilities and patterns, rather than pointwise probabilities and traditional statistics. Here we fill up a gap of the possibilistic approach, and extend it to the case of error detection, while so far only error correction had been considered.
BORTOLUSSI, LUCA, SGARRO, ANDREA
openaire +2 more sources
t-error correcting/d-error detecting/all unidirectional error detecting codes
Conference Proceeding IEEE Pacific Rim Conference on Communications, Computers and Signal Processing, 2003The theory and design of t-EC/d-ED/AUED codes is presented, where d>or=t. Necessary and sufficient conditions for a code to be t-EC/d-ED/AUED were established. A code construction procedure is described to form these codes for any given value of t and d. Encoding and decoding of these codes involve minimal addition hardware.
openaire +1 more source
Proceedings of the 9th ACM International Conference on PErvasive Technologies Related to Assistive Environments, 2016
People with cognitive impairment have difficulties in planning and correctly undertaking activities of daily living due to severe deterioration in cognitive skills. As a promising solution, smart homes try to make these people live on their own with less nursing care by providing appropriate cognitive assistance while carrying out activities.
Jianguo Hao +2 more
openaire +1 more source
People with cognitive impairment have difficulties in planning and correctly undertaking activities of daily living due to severe deterioration in cognitive skills. As a promising solution, smart homes try to make these people live on their own with less nursing care by providing appropriate cognitive assistance while carrying out activities.
Jianguo Hao +2 more
openaire +1 more source
2010
At an early stage errors and coding flaws in a system model can be efficiently detected by deduction techniques that are presented in this chapter. Figure 3.1 illustrates the necessary preconditions to apply these techniques in the proposed flow. Besides the syntactical correctness of a design description, the smallest design unit, i.e. a module, shall
Frank Rogin, Rolf Drechsler
openaire +1 more source
At an early stage errors and coding flaws in a system model can be efficiently detected by deduction techniques that are presented in this chapter. Figure 3.1 illustrates the necessary preconditions to apply these techniques in the proposed flow. Besides the syntactical correctness of a design description, the smallest design unit, i.e. a module, shall
Frank Rogin, Rolf Drechsler
openaire +1 more source

