19 papers:
- HIMI-IKC-2015-Coelho
- Association of National Dimensions of Culture with Perceived Public Sector Corruption (DAC), pp. 420–427.
- ICML-2015-MenonROW #estimation #learning
- Learning from Corrupted Binary Labels via Class-Probability Estimation (AKM, BvR, CSO, BW), pp. 125–134.
- HPDC-2015-BerrocalBDLC #data analysis #detection #lightweight #runtime
- Lightweight Silent Data Corruption Detection Based on Runtime Data Analysis for HPC Applications (EB, LABG, SD, ZL, FC), pp. 275–278.
- CIKM-2014-TangWPTL #approach #detection
- An Appliance-Driven Approach to Detection of Corrupted Load Curve Data (GT, KW, JP, JT, JL), pp. 1429–1438.
- PPoPP-2014-Bautista-GomezC #detection #monitoring
- Detecting silent data corruption through data dynamic monitoring for scientific applications (LABG, FC), pp. 381–382.
- ICDAR-2013-RabaevBEKD #detection
- Text Line Detection in Corrupted and Damaged Historical Manuscripts (IR, OB, JES, KK, ID), pp. 812–816.
- CIKM-2013-ChristenV #flexibility #generative
- Flexible and extensible generation and corruption of personal data (PC, DV), pp. 1165–1168.
- ICML-c1-2013-MaatenCTW #learning
- Learning with Marginalized Corrupted Features (LvdM, MC, ST, KQW), pp. 410–418.
- ICML-c3-2013-ChenCM #robust
- Robust Sparse Regression under Adversarial Corruption (YC, CC, SM), pp. 774–782.
- ICML-c3-2013-Cho #image
- Simple Sparsification Improves Sparse Denoising Autoencoders in Denoising Highly Corrupted Images (KC), pp. 432–440.
- SIGMOD-2011-BorisovBMU
- Warding off the dangers of data corruption with amulet (NB, SB, NM, SU), pp. 277–288.
- VLDB-2011-BorisovB #approach #declarative #detection #towards
- Proactive Detection and Repair of Data Corruption: Towards a Hassle-free Declarative Approach with Amulet (NB, SB), pp. 1403–1408.
- ICML-2011-ChenXCS #matrix #robust
- Robust Matrix Completion and Corrupted Columns (YC, HX, CC, SS), pp. 873–880.
- ICSM-2008-JeffreyGG #debugging #identification #memory management #using
- Identifying the root causes of memory bugs using corrupted memory location suppression (DJ, NG, RG), pp. 356–365.
- ICML-2008-DekelS #learning
- Learning to classify with missing and corrupted features (OD, OS), pp. 216–223.
- ICALP-v2-2006-MicciancioP #encryption #multi
- Corrupting One vs. Corrupting Many: The Case of Broadcast and Multicast Encryption (DM, SP), pp. 70–82.
- HPCA-2005-QinLZ #detection #memory management #named
- SafeMem: Exploiting ECC-Memory for Detecting Memory Leaks and Memory Corruption During Production Runs (FQ, SL, YZ), pp. 291–302.
- AdaEurope-2003-BriotGDCW #ada #memory management
- Exposing Memory Corruption and Finding Leaks: Advanced Mechanisms in Ada (EB, FG, RD, DC, PW), pp. 129–141.
- ICPR-v3-2000-SaitoKOS #image #sequence
- Image Processing for Restoration of Heavily-Corrupted Old Film Sequences (TS, TK, TO, TS), pp. 3017–3020.