Results 181 to 190 of about 1,016,543 (243)
Spin‐Split Edge States in Metal‐Supported Graphene Nanoislands Obtained by CVD
Combining STM measurements and ab‐initio calculations, we show that zig‐zag edges in graphene nanoislands grown on Ni(111) by CVD retrieve their spin‐polarized edge states after intercalation of a few monolayers of Au. ABSTRACT Spin‐split states localized on zigzag edges have been predicted for different free‐standing graphene nanostructures.
Michele Gastaldo +6 more
wiley +1 more source
Some of the next articles are maybe not open access.
Related searches:
Related searches:
Practical syntactic error recovery
Communications of the ACM, 1975This paper describes a recovery scheme for syntax errors which provides automatically-generated high quality recovery with good diagnostic information at relatively low cost. Previous recovery techniques are summarized and empirical comparisons are made. Suggestions for further research on this topic conclude the paper.
Susan L. Graham, Steven P. Rhodes
openaire +4 more sources
Error recovery in a hospital pharmacy
Ergonomics, 2006A field study was performed in a hospital pharmacy aimed at identifying positive and negative influences on the process of detection of and further recovery from initial errors or other failures, thus avoiding negative consequences. Confidential reports and follow-up interviews provided data on 31 near-miss incidents involving such recovery processes ...
Kanse, L +3 more
openaire +6 more sources
Signal Processing, 2022
Abstract We propose a data denoising method using Extreme Learning Machine (ELM) structure which allows us to use Johnson-Lindenstraus Lemma (JL) for preserving Restricted Isometry Property (RIP) in order to give theoretical guarantees for recovery. Furthermore, we show that the method is equivalent to a robust two-layer ELM that implicitly benefits ...
Ömer Ekmekcioglu +2 more
openaire +3 more sources
Abstract We propose a data denoising method using Extreme Learning Machine (ELM) structure which allows us to use Johnson-Lindenstraus Lemma (JL) for preserving Restricted Isometry Property (RIP) in order to give theoretical guarantees for recovery. Furthermore, we show that the method is equivalent to a robust two-layer ELM that implicitly benefits ...
Ömer Ekmekcioglu +2 more
openaire +3 more sources
2009 IEEE International Conference on Software Maintenance, 2009
Error recovery in compilers often involves significant amounts of cognitive effort to identify the code and execution points in the compiler that are related to identifying and handling input-program errors. This is because current implementations fail to explicitly identify error-related control dependencies, and to separately characterize the actions
Jeeva Paudel, Christopher Dutchyn
openaire +1 more source
Error recovery in compilers often involves significant amounts of cognitive effort to identify the code and execution points in the compiler that are related to identifying and handling input-program errors. This is because current implementations fail to explicitly identify error-related control dependencies, and to separately characterize the actions
Jeeva Paudel, Christopher Dutchyn
openaire +1 more source
2nd International Conference on Dependability of Computer Systems (DepCoS-RELCOMEX '07), 2007
The paper deals with the problem of handling detected faults in computer systems. We present software procedures targeted at fault detection, fault masking and error recovery. They are discussed in the context of standard PC Windows and Linux environments. Various aspects of checkpointing and recovery policies are studied.
A. Lesiak +2 more
openaire +1 more source
The paper deals with the problem of handling detected faults in computer systems. We present software procedures targeted at fault detection, fault masking and error recovery. They are discussed in the context of standard PC Windows and Linux environments. Various aspects of checkpointing and recovery policies are studied.
A. Lesiak +2 more
openaire +1 more source
Remnant error concealment technique for error recovery
Proceedings Second International Workshop on Digital and Computational Video, 2002This paper presents a remnant error concealment (REC) technique based on generic error concealment (GEC). Two most common issues in video error recovery systems are the locations of lost blocks and error recovery techniques. By using a multistage error detection algorithm to obtain the location of lost blocks of random bit error in the MPEG-2 bit ...
Hung-Sheng Wong +2 more
openaire +1 more source
Coefficient quantization error recovery
ISCAS'99. Proceedings of the 1999 IEEE International Symposium on Circuits and Systems VLSI (Cat. No.99CH36349), 2003A novel method to recover perfect reconstruction (PR), after error caused by filter bank coefficient quantization is presented. At the moment, most work involving the design of two channel filter banks with signed-powers-of-two coefficients proposes to minimize the peak reconstruction error and/or the peak stop band ripple; the exact filter is never ...
J. I. Suarez, Claude S. Lindquist
openaire +1 more source
2000
This paper highlights the positive role that human operators often play in preventing small failures and errors from developing into an actual system breakdown. The resulting ‘near misses’ may provide an insight into a powerful alternative to human error prevention, namely: human recovery promotion.
Schaaf, van der, T.W., Kanse, L.
openaire +2 more sources
This paper highlights the positive role that human operators often play in preventing small failures and errors from developing into an actual system breakdown. The resulting ‘near misses’ may provide an insight into a powerful alternative to human error prevention, namely: human recovery promotion.
Schaaf, van der, T.W., Kanse, L.
openaire +2 more sources
Error reporting and recovery in Sangrah
Software: Practice and Experience, 1981AbstractIn Sangrah, exception conditions of CODASYL have been replaced by fatal errors and by boolean valued functions. Fatal errors can occur either because all the preconditions necessary for a DML statement are not fulfilled or because of the state of the data base at the time when this statement is executed. A mechanism which anticipates the former
Naveen Prakash, P. N. Gejji
openaire +1 more source

