BibSLEIGH corpus
BibSLEIGH tags
BibSLEIGH bundles
BibSLEIGH people
Open Knowledge
XHTML 1.0 W3C Rec
CSS 2.1 W3C CanRec
email twitter
Used together with:
data (8)
memori (6)
detect (6)
learn (3)
applic (2)

Stem corrupt$ (all stems)

19 papers:

Association of National Dimensions of Culture with Perceived Public Sector Corruption (DAC), pp. 420–427.
ICMLICML-2015-MenonROW #estimation #learning
Learning from Corrupted Binary Labels via Class-Probability Estimation (AKM, BvR, CSO, BW), pp. 125–134.
HPDCHPDC-2015-BerrocalBDLC #data analysis #detection #lightweight #runtime
Lightweight Silent Data Corruption Detection Based on Runtime Data Analysis for HPC Applications (EB, LABG, SD, ZL, FC), pp. 275–278.
CIKMCIKM-2014-TangWPTL #approach #detection
An Appliance-Driven Approach to Detection of Corrupted Load Curve Data (GT, KW, JP, JT, JL), pp. 1429–1438.
PPoPPPPoPP-2014-Bautista-GomezC #detection #monitoring
Detecting silent data corruption through data dynamic monitoring for scientific applications (LABG, FC), pp. 381–382.
ICDARICDAR-2013-RabaevBEKD #detection
Text Line Detection in Corrupted and Damaged Historical Manuscripts (IR, OB, JES, KK, ID), pp. 812–816.
CIKMCIKM-2013-ChristenV #flexibility #generative
Flexible and extensible generation and corruption of personal data (PC, DV), pp. 1165–1168.
ICMLICML-c1-2013-MaatenCTW #learning
Learning with Marginalized Corrupted Features (LvdM, MC, ST, KQW), pp. 410–418.
ICMLICML-c3-2013-ChenCM #robust
Robust Sparse Regression under Adversarial Corruption (YC, CC, SM), pp. 774–782.
ICMLICML-c3-2013-Cho #image
Simple Sparsification Improves Sparse Denoising Autoencoders in Denoising Highly Corrupted Images (KC), pp. 432–440.
Warding off the dangers of data corruption with amulet (NB, SB, NM, SU), pp. 277–288.
VLDBVLDB-2011-BorisovB #approach #declarative #detection #towards
Proactive Detection and Repair of Data Corruption: Towards a Hassle-free Declarative Approach with Amulet (NB, SB), pp. 1403–1408.
ICMLICML-2011-ChenXCS #matrix #robust
Robust Matrix Completion and Corrupted Columns (YC, HX, CC, SS), pp. 873–880.
ICSMEICSM-2008-JeffreyGG #debugging #identification #memory management #using
Identifying the root causes of memory bugs using corrupted memory location suppression (DJ, NG, RG), pp. 356–365.
ICMLICML-2008-DekelS #learning
Learning to classify with missing and corrupted features (OD, OS), pp. 216–223.
ICALPICALP-v2-2006-MicciancioP #encryption #multi
Corrupting One vs. Corrupting Many: The Case of Broadcast and Multicast Encryption (DM, SP), pp. 70–82.
HPCAHPCA-2005-QinLZ #detection #memory management #named
SafeMem: Exploiting ECC-Memory for Detecting Memory Leaks and Memory Corruption During Production Runs (FQ, SL, YZ), pp. 291–302.
AdaEuropeAdaEurope-2003-BriotGDCW #ada #memory management
Exposing Memory Corruption and Finding Leaks: Advanced Mechanisms in Ada (EB, FG, RD, DC, PW), pp. 129–141.
ICPRICPR-v3-2000-SaitoKOS #image #sequence
Image Processing for Restoration of Heavily-Corrupted Old Film Sequences (TS, TK, TO, TS), pp. 3017–3020.

Bibliography of Software Language Engineering in Generated Hypertext (BibSLEIGH) is created and maintained by Dr. Vadim Zaytsev.
Hosted as a part of SLEBOK on GitHub.