19 papers:
HIMI-IKC-2015-Coelho- Association of National Dimensions of Culture with Perceived Public Sector Corruption (DAC), pp. 420–427.
ICML-2015-MenonROW #estimation #learning- Learning from Corrupted Binary Labels via Class-Probability Estimation (AKM, BvR, CSO, BW), pp. 125–134.
HPDC-2015-BerrocalBDLC #data analysis #detection #lightweight #runtime- Lightweight Silent Data Corruption Detection Based on Runtime Data Analysis for HPC Applications (EB, LABG, SD, ZL, FC), pp. 275–278.
CIKM-2014-TangWPTL #approach #detection- An Appliance-Driven Approach to Detection of Corrupted Load Curve Data (GT, KW, JP, JT, JL), pp. 1429–1438.
PPoPP-2014-Bautista-GomezC #detection #monitoring- Detecting silent data corruption through data dynamic monitoring for scientific applications (LABG, FC), pp. 381–382.
ICDAR-2013-RabaevBEKD #detection- Text Line Detection in Corrupted and Damaged Historical Manuscripts (IR, OB, JES, KK, ID), pp. 812–816.
CIKM-2013-ChristenV #flexibility #generative- Flexible and extensible generation and corruption of personal data (PC, DV), pp. 1165–1168.
ICML-c1-2013-MaatenCTW #learning- Learning with Marginalized Corrupted Features (LvdM, MC, ST, KQW), pp. 410–418.
ICML-c3-2013-ChenCM #robust- Robust Sparse Regression under Adversarial Corruption (YC, CC, SM), pp. 774–782.
ICML-c3-2013-Cho #image- Simple Sparsification Improves Sparse Denoising Autoencoders in Denoising Highly Corrupted Images (KC), pp. 432–440.
SIGMOD-2011-BorisovBMU- Warding off the dangers of data corruption with amulet (NB, SB, NM, SU), pp. 277–288.
VLDB-2011-BorisovB #approach #declarative #detection #towards- Proactive Detection and Repair of Data Corruption: Towards a Hassle-free Declarative Approach with Amulet (NB, SB), pp. 1403–1408.
ICML-2011-ChenXCS #matrix #robust- Robust Matrix Completion and Corrupted Columns (YC, HX, CC, SS), pp. 873–880.
ICSM-2008-JeffreyGG #debugging #identification #memory management #using- Identifying the root causes of memory bugs using corrupted memory location suppression (DJ, NG, RG), pp. 356–365.
ICML-2008-DekelS #learning- Learning to classify with missing and corrupted features (OD, OS), pp. 216–223.
ICALP-v2-2006-MicciancioP #encryption #multi- Corrupting One vs. Corrupting Many: The Case of Broadcast and Multicast Encryption (DM, SP), pp. 70–82.
HPCA-2005-QinLZ #detection #memory management #named- SafeMem: Exploiting ECC-Memory for Detecting Memory Leaks and Memory Corruption During Production Runs (FQ, SL, YZ), pp. 291–302.
AdaEurope-2003-BriotGDCW #ada #memory management- Exposing Memory Corruption and Finding Leaks: Advanced Mechanisms in Ada (EB, FG, RD, DC, PW), pp. 129–141.
ICPR-v3-2000-SaitoKOS #image #sequence- Image Processing for Restoration of Heavily-Corrupted Old Film Sequences (TS, TK, TO, TS), pp. 3017–3020.