Search

Your search keyword '"Data Corruption"' showing total 1,058 results

Search Constraints

Start Over You searched for: Descriptor "Data Corruption" Remove constraint Descriptor: "Data Corruption" Search Limiters Full Text Remove constraint Search Limiters: Full Text
1,058 results on '"Data Corruption"'

Search Results

1. Securing oil port logistics: A blockchain framework for efficient and trustworthy trade documents.

2. Impact of Data Corruption and Operating Temperature on Performance of Model-Based SoC Estimation.

3. AHEAD: A Novel Technique Combining Anti-Adversarial Hierarchical Ensemble Learning with Multi-Layer Multi-Anomaly Detection for Blockchain Systems.

4. Blockchain-enabled transparent traffic enforcement for sustainable road safety in cities.

5. Diffusion Models-Based Purification for Common Corruptions on Robust 3D Object Detection.

6. Can GPU performance increase faster than the code error rate?

7. A Comparative Study on Imputation Techniques: Introducing a Transformer Model for Robust and Efficient Handling of Missing EEG Amplitude Data.

8. Robust 3D Point Cloud Recognition: Enhancing Robustness with GPT-4 and CLIP Integration.

9. Corruption spills over on citizens: The case of self‐reported motivation to cheat on tax.

10. Symmetrical Data Recovery: FPGA-Based Multi-Dimensional Elastic Recovery Acceleration for Multiple Block Failures in Ceph Systems.

11. A High-Speed Asynchronous Data I/O Method for HEPS.

12. Hydra: Computer Vision for Online Data Quality Monitoring.

13. A vendor-unlocked ITS GPU reconstruction in ALICE.

14. A Blueprint for a Contemporary Storage Element, building a new WLCG storage system with widely available hardware and software components: Ceph, XRootD, and Prometheus.

15. Investigation of Single-Event Effects for Space Applications: Instrumentation for In-Depth System Monitoring.

16. CYBER HYGIENE IN PUBLIC ADMINISTRATION OF AZERBAIJAN: ENSURING DATA SECURITY.

17. Effect of corruption on green growth.

18. VConMC: Enabling Consistency Verification for Distributed Systems Using Implementation-Level Model Checkers and Consistency Oracles.

19. Advanced Dual Reversible Data Hiding: A Focus on Modification Direction and Enhanced Least Significant Bit (LSB) Approaches.

20. Examining the global influence of e-governance on corruption: a panel data analysis.

21. A Practical Approach to Enhance Data Quality Management in Government: Case Study of Indonesian Customs and Excise Office.

22. Residual LSTM-based short duration forecasting of polarization current for effective assessment of transformers insulation.

23. The definition of corporate corruption prevention during the last decade: Bibliometrics and content data for the future research agenda.

24. Examining corruption risks in the procurement and distribution of COVID-19 vaccines in select states in Nigeria.

25. Protect medical records by using blockchain technology.

26. The phenotype-genotype reference map: Improving biobank data science through replication.

27. A Digital-Twin-Based Detection and Protection Framework for SDC-Induced Sinkhole and Grayhole Nodes in Satellite Networks.

28. Federated Transfer Learning Strategy: A Novel Cross-Device Fault Diagnosis Method Based on Repaired Data.

29. A general robust low–rank multinomial logistic regression for corrupted matrix data classification.

30. DrunkChain: Blockchain-Based IoT System for Preventing Drunk Driving-Related Traffic Accidents.

31. Soft error vulnerability prediction of GPGPU applications.

32. Prevention of corruption offenses by public officials: Experience from European Union countries.

33. Corruption, accountability, and discretion of procurement officials: An analysis of selection Preferences for Performance-based Evaluation Criteria (PBEC) in PPP procurement.

34. Standing in the Age of Data Breaches: A CONSUMER-FRIENDLY FRAMEWORK TO PLEADING FUTURE INJURY AND PROVIDING EQUITABLE RELIEF TO DATA BREACH VICTIMS.

35. LSTM-Based Multi-Task Method for Remaining Useful Life Prediction under Corrupted Sensor Data.

36. Robust estimation of highly corrupted low‐rank matrix via alternating direction method of multiplier.

37. Public corruption and the allocation of government contracts.

38. The dynamic relationship between regional corruption and carbon emissions in China.

39. The influence of perceived government corruption on depressive symptoms with social status as a moderator.

40. El análisis de redes complejas aplicado a grupos de crimen y corrupción: introducción y perspectiva.

41. A Deep Convolutional Autoencoder for Automatic Motion Artifact Removal in Electrodermal Activity.

42. Domain generalization by class-aware negative sampling-based contrastive learning

43. DINI: data imputation using neural inversion for edge applications.

44. A general theory for subspace-sparse recovery.

45. CapOS: Capacitor Error Resilience for Energy Harvesting Systems.

46. Understanding and Exploiting the Full Potential of SSD Address Remapping.

47. Efficient Low-Rank Semidefinite Programming With Robust Loss Functions.

48. Soft Error Effects on Arm Microprocessors: Early Estimations versus Chip Measurements.

49. Instruction-Fetching Attack and Practice in Collision Fault Attack on AES.

50. Deep Neural Network Model for Evaluating and Achieving the Sustainable Development Goal 16.

Catalog

Books, media, physical & digital resources