Results 221 to 230 of about 1,421,451 (285)
Some of the next articles are maybe not open access.

Modularizing error recovery

2009 IEEE International Conference on Software Maintenance, 2009
Error recovery in compilers often involves significant amounts of cognitive effort to identify the code and execution points in the compiler that are related to identifying and handling input-program errors. This is because current implementations fail to explicitly identify error-related control dependencies, and to separately characterize the actions
Jeeva Paudel, Christopher Dutchyn
openaire   +1 more source

Error Recovery Problems

2nd International Conference on Dependability of Computer Systems (DepCoS-RELCOMEX '07), 2007
The paper deals with the problem of handling detected faults in computer systems. We present software procedures targeted at fault detection, fault masking and error recovery. They are discussed in the context of standard PC Windows and Linux environments. Various aspects of checkpointing and recovery policies are studied.
A. Lesiak, P. Gawkowski, J. Sosnowski
openaire   +1 more source

Sparse Recovery-Based Error Concealment

IEEE Transactions on Multimedia, 2017
no ...
Akbari, Ali   +2 more
openaire   +2 more sources

Errors and error recovery

2000
This paper highlights the positive role that human operators often play in preventing small failures and errors from developing into an actual system breakdown. The resulting ‘near misses’ may provide an insight into a powerful alternative to human error prevention, namely: human recovery promotion.
Schaaf, van der, T.W., Kanse, L.
openaire   +2 more sources

Practical syntactic error recovery

Communications of the ACM, 1975
This paper describes a recovery scheme for syntax errors which provides automatically-generated high quality recovery with good diagnostic information at relatively low cost. Previous recovery techniques are summarized and empirical comparisons are made. Suggestions for further research on this topic conclude the paper.
Graham, Susan L., Rhodes, Steven P.
openaire   +2 more sources

Convivial error recovery

Proceedings of the international conference on APL - APL '81, 1981
This paper presents a new approach to an Event Control Mechanism (ECM) for APL. After an informal review of some typical ECM implementations, it describes the general architecture of an ECM and shows how the mentioned implementations map onto it. An extended ECM is then presented that combines many features of existing implementations with some new ...
Denis Samson, Yves Ouellet
openaire   +1 more source

Remnant error concealment technique for error recovery

Proceedings Second International Workshop on Digital and Computational Video, 2002
This paper presents a remnant error concealment (REC) technique based on generic error concealment (GEC). Two most common issues in video error recovery systems are the locations of lost blocks and error recovery techniques. By using a multistage error detection algorithm to obtain the location of lost blocks of random bit error in the MPEG-2 bit ...
null Hung-Sheng Wong   +2 more
openaire   +1 more source

Coefficient quantization error recovery

ISCAS'99. Proceedings of the 1999 IEEE International Symposium on Circuits and Systems VLSI (Cat. No.99CH36349), 2003
A novel method to recover perfect reconstruction (PR), after error caused by filter bank coefficient quantization is presented. At the moment, most work involving the design of two channel filter banks with signed-powers-of-two coefficients proposes to minimize the peak reconstruction error and/or the peak stop band ripple; the exact filter is never ...
J.I. Suarez, C.S. Lindquist
openaire   +1 more source

Error-tolerant password recovery

Proceedings of the 8th ACM conference on Computer and Communications Security - CCS '01, 2001
Many encryption systems require the user to memorize high entropy passwords or passphrases and reproduce them exactly. This is often a difficult task. We propose a more fault-tolerant scheme, where a high entropy key (or password) is derived from a sequence of low entropy passwords. The user is able to recover the correct key if she remembers a certain
Niklas Frykholm, Ari Juels
openaire   +1 more source

Home - About - Disclaimer - Privacy