Search

Your search keyword '"Data Corruption"' showing total 2,271 results

Search Constraints

Start Over You searched for: Descriptor "Data Corruption" Remove constraint Descriptor: "Data Corruption"
2,271 results on '"Data Corruption"'

Search Results

1. Securing oil port logistics: A blockchain framework for efficient and trustworthy trade documents.

2. Impact of Data Corruption and Operating Temperature on Performance of Model-Based SoC Estimation.

3. Sex instead of money: Conceptualizing sexual corruption.

4. AHEAD: A Novel Technique Combining Anti-Adversarial Hierarchical Ensemble Learning with Multi-Layer Multi-Anomaly Detection for Blockchain Systems.

5. Modeling user choice behavior under data corruption: Robust learning of the latent decision threshold model.

6. Blockchain-enabled transparent traffic enforcement for sustainable road safety in cities.

7. Diffusion Models-Based Purification for Common Corruptions on Robust 3D Object Detection.

8. Can GPU performance increase faster than the code error rate?

9. A Comparative Study on Imputation Techniques: Introducing a Transformer Model for Robust and Efficient Handling of Missing EEG Amplitude Data.

10. Sec-Auditor: A Blockchain-Based Data Auditing Solution for Ensuring Integrity and Semantic Correctness.

11. Robust 3D Point Cloud Recognition: Enhancing Robustness with GPT-4 and CLIP Integration.

12. Corruption spills over on citizens: The case of self‐reported motivation to cheat on tax.

13. Symmetrical Data Recovery: FPGA-Based Multi-Dimensional Elastic Recovery Acceleration for Multiple Block Failures in Ceph Systems.

14. A High-Speed Asynchronous Data I/O Method for HEPS.

15. Hydra: Computer Vision for Online Data Quality Monitoring.

16. A vendor-unlocked ITS GPU reconstruction in ALICE.

17. A Blueprint for a Contemporary Storage Element, building a new WLCG storage system with widely available hardware and software components: Ceph, XRootD, and Prometheus.

18. Properties and application of OpenZFS file system for secure data storage.

19. Make Your USB STICKS Last Forever.

20. Investigation of Single-Event Effects for Space Applications: Instrumentation for In-Depth System Monitoring.

21. N‐representable one‐electron reduced density matrix reconstruction with frozen core electrons.

22. CYBER HYGIENE IN PUBLIC ADMINISTRATION OF AZERBAIJAN: ENSURING DATA SECURITY.

23. Effect of corruption on green growth.

24. Blockchain based intrusion detection in agent-driven flight operations.

25. VConMC: Enabling Consistency Verification for Distributed Systems Using Implementation-Level Model Checkers and Consistency Oracles.

26. Advanced Dual Reversible Data Hiding: A Focus on Modification Direction and Enhanced Least Significant Bit (LSB) Approaches.

27. Examining the global influence of e-governance on corruption: a panel data analysis.

28. A Practical Approach to Enhance Data Quality Management in Government: Case Study of Indonesian Customs and Excise Office.

29. Residual LSTM-based short duration forecasting of polarization current for effective assessment of transformers insulation.

30. Corruption, culture and effects on national innovation in international societies.

31. The definition of corporate corruption prevention during the last decade: Bibliometrics and content data for the future research agenda.

32. Corruption, homelessness and disasters.

33. A robust fusion-extraction procedure with summary statistics in the presence of biased sources.

34. Purifying Data by Machine Learning with Certainty Levels

36. Defense Models for Data Recovery in Industrial Control Systems

37. Deontological and Consequentialist Ethics and Attitudes Towards Corruption: A Survey Data Analysis.

38. Examining corruption risks in the procurement and distribution of COVID-19 vaccines in select states in Nigeria.

39. Measurement and determinants of corruption across Indian states.

40. Protect medical records by using blockchain technology.

41. INTERCONNECTIONS ASSESSMENT OF BANKING CAPITALIZATION WITH MACROECONOMIC STABILITY, INCLUDING CORRUPTION AND SHADOW ECONOMY.

42. The phenotype-genotype reference map: Improving biobank data science through replication.

43. A Digital-Twin-Based Detection and Protection Framework for SDC-Induced Sinkhole and Grayhole Nodes in Satellite Networks.

44. Federated Transfer Learning Strategy: A Novel Cross-Device Fault Diagnosis Method Based on Repaired Data.

45. A general robust low–rank multinomial logistic regression for corrupted matrix data classification.

46. DrunkChain: Blockchain-Based IoT System for Preventing Drunk Driving-Related Traffic Accidents.

47. Single and double-adjacent error correcting code (SDECC) with lower design overheads and mis-correction rate for SRAMs.

48. On the robustness to adversarial corruption and to heavy-tailed data of the Stahel–Donoho median of means.

49. Anti-aliasing deep image classifiers using novel depth adaptive blurring and activation function.

50. ПОРІВНЯЛЬНИЙ АНАЛІЗ ЕФЕКТИВНОСТІ ОКРЕМИХ АСПЕКТІВ ЕКОНОМІЧНОЇ ТА СОЦІАЛЬНОЇ ПОЛІТИКИ У 2014–2019 РР. ТА 2019–2022 РР.

Catalog

Books, media, physical & digital resources