BibSLEIGH
BibSLEIGH corpus
BibSLEIGH tags
BibSLEIGH bundles
BibSLEIGH people
CC-BY
Open Knowledge
XHTML 1.0 W3C Rec
CSS 2.1 W3C CanRec
email twitter
Used together with:
data (8)
memori (6)
detect (6)
learn (3)
applic (2)

Stem corrupt$ (all stems)

19 papers:

HCIHIMI-IKC-2015-Coelho
Association of National Dimensions of Culture with Perceived Public Sector Corruption (DAC), pp. 420–427.
ICMLICML-2015-MenonROW #estimation #learning
Learning from Corrupted Binary Labels via Class-Probability Estimation (AKM, BvR, CSO, BW), pp. 125–134.
HPDCHPDC-2015-BerrocalBDLC #data analysis #detection #lightweight #runtime
Lightweight Silent Data Corruption Detection Based on Runtime Data Analysis for HPC Applications (EB, LABG, SD, ZL, FC), pp. 275–278.
CIKMCIKM-2014-TangWPTL #approach #detection
An Appliance-Driven Approach to Detection of Corrupted Load Curve Data (GT, KW, JP, JT, JL), pp. 1429–1438.
PPoPPPPoPP-2014-Bautista-GomezC #detection #monitoring
Detecting silent data corruption through data dynamic monitoring for scientific applications (LABG, FC), pp. 381–382.
ICDARICDAR-2013-RabaevBEKD #detection
Text Line Detection in Corrupted and Damaged Historical Manuscripts (IR, OB, JES, KK, ID), pp. 812–816.
CIKMCIKM-2013-ChristenV #flexibility #generative
Flexible and extensible generation and corruption of personal data (PC, DV), pp. 1165–1168.
ICMLICML-c1-2013-MaatenCTW #learning
Learning with Marginalized Corrupted Features (LvdM, MC, ST, KQW), pp. 410–418.
ICMLICML-c3-2013-ChenCM #robust
Robust Sparse Regression under Adversarial Corruption (YC, CC, SM), pp. 774–782.
ICMLICML-c3-2013-Cho #image
Simple Sparsification Improves Sparse Denoising Autoencoders in Denoising Highly Corrupted Images (KC), pp. 432–440.
SIGMODSIGMOD-2011-BorisovBMU
Warding off the dangers of data corruption with amulet (NB, SB, NM, SU), pp. 277–288.
VLDBVLDB-2011-BorisovB #approach #declarative #detection #towards
Proactive Detection and Repair of Data Corruption: Towards a Hassle-free Declarative Approach with Amulet (NB, SB), pp. 1403–1408.
ICMLICML-2011-ChenXCS #matrix #robust
Robust Matrix Completion and Corrupted Columns (YC, HX, CC, SS), pp. 873–880.
ICSMEICSM-2008-JeffreyGG #debugging #identification #memory management #using
Identifying the root causes of memory bugs using corrupted memory location suppression (DJ, NG, RG), pp. 356–365.
ICMLICML-2008-DekelS #learning
Learning to classify with missing and corrupted features (OD, OS), pp. 216–223.
ICALPICALP-v2-2006-MicciancioP #encryption #multi
Corrupting One vs. Corrupting Many: The Case of Broadcast and Multicast Encryption (DM, SP), pp. 70–82.
HPCAHPCA-2005-QinLZ #detection #memory management #named
SafeMem: Exploiting ECC-Memory for Detecting Memory Leaks and Memory Corruption During Production Runs (FQ, SL, YZ), pp. 291–302.
AdaEuropeAdaEurope-2003-BriotGDCW #ada #memory management
Exposing Memory Corruption and Finding Leaks: Advanced Mechanisms in Ada (EB, FG, RD, DC, PW), pp. 129–141.
ICPRICPR-v3-2000-SaitoKOS #image #sequence
Image Processing for Restoration of Heavily-Corrupted Old Film Sequences (TS, TK, TO, TS), pp. 3017–3020.

Bibliography of Software Language Engineering in Generated Hypertext (BibSLEIGH) is created and maintained by Dr. Vadim Zaytsev.
Hosted as a part of SLEBOK on GitHub.