Results 311 to 320 of about 3,381,036 (348)
Some of the next articles are maybe not open access.
Quantum Error Detection and Correction
2001The algorithms discussed in Chapter 21 rely on having isolated systems to store information. In practical applications this is not possible, and the environment interacts with the systems causing decoherence. Suppose the data is contained in the state |x〉, and the environment is described by |E〉.
Yorick Hardy, Willi-Hans Steeb
openaire +2 more sources
Error Detection and Correction in SRAM Emulated TCAMs
IEEE Transactions on Very Large Scale Integration (VLSI) Systems, 2019Ternary content addressable memories (TCAMs) are widely used in network devices to implement packet classification. They are used, for example, for packet forwarding, for security, and to implement software-defined networks (SDNs).
P. Reviriego, S. Pontarelli, Anees Ullah
semanticscholar +1 more source
Error Detection and Correction in Content Addressable Memories
2010 IEEE 25th International Symposium on Defect and Fault Tolerance in VLSI Systems, 2010A Content Addressable Memory (CAM) is an SRAM based memory which can be accessed in parallel in order to search for a given search word, providing as result the address of the matching data. The use of CAM is widespread in many applications ranging from the controller of a CPU memory cache to the implementation of lookup tables of high speed routers ...
Pontarelli S, Ottavi M, Salsano A
openaire +4 more sources
A Machine Learning Approach to Aircraft Sensor Error Detection and Correction
Journal of Computing and Information Science in Engineering, 2018Sensors are crucial to modern mechanical systems. The location of these sensors can often make them vulnerable to outside interferences and failures, and the use of sensors over a lifetime can cause degradation and lead to failure. If a system has access
Renee C. Swischuk, D. Allaire
semanticscholar +1 more source
Error Detection and Correction in RNS
2002Error detection and correction in RNS has received considerable attention in literature. This was considered to be necessary in ROM based designs where some faults may occur which may be corrected by reconfiguring or bypassing the faulty device using additional residues corresponding to additional moduli. These additional moduli are termed as redundant
openaire +2 more sources
Stereo error detection, correction, and evaluation
IEEE Transactions on Pattern Analysis and Machine Intelligence, 1989An algorithm is presented for error detection and correction of disparity, as a process separate from stereo matching, with the contention that matching is not necessarily the best way to utilize all the physical constraints characteristic to stereopsis.
Ramakant Nevatia+2 more
openaire +1 more source
Error Detection and Correction Codes
2009This chapter contains sections titled: Introduction Code Interleaving Error Detection and Correction Strategies Summary References ...
openaire +2 more sources
Arabic spelling error detection and correction
Natural Language Engineering, 2015AbstractA spelling error detection and correction application is typically based on three main components: a dictionary (or reference word list), an error model and a language model. While most of the attention in the literature has been directed to the language model, we show how improvements in any of the three components can lead to significant ...
Mohammed Attia+4 more
openaire +2 more sources
Error detection/correction in collaborative writing
Reading and Writing, 2007In the present study, we examined error detection/correction during collaborative writing. Subjects were asked to identify and correct errors in two contexts: a passage written by the subject (familiar text) and a passage written by a person other than the subject (unfamiliar text).
Maura Pilotti, Martin Chodorow
openaire +2 more sources
On the design of error detection and correction cryptography schemes
IEEE/AFCEA EUROCOMM 2000. Information Systems for Enhanced Public Safety and Security (Cat. No.00EX405), 2002The paper introduces the method of modifying cryptography encryption and decryption units which includes circuitry of checks that operations has been performed without errors. This technique based on addition to storage devices error correction codes and modulo check of arithmetic and logic units operations.
Patsei, N. V., Urbanovich, P. P.
openaire +4 more sources