Skip to search formSkip to main content
You are currently offline. Some features of the site may not work correctly.

Data redundancy

Known as: Redundancy, Redundancy (databases), Reliability 
In computer main memory, auxiliary storage and computer buses, data redundancy is the existence of data that is additional to the actual data and… Expand
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Review
2019
Review
2019
The k‐nearest neighbors algorithm is characterized as a simple yet effective data mining technique. The main drawback of this… Expand
Is this relevant?
Review
2018
Review
2018
Integrity is one criteria to evaluate GNSS performance, which was first introduced in the aviation field. It is a measure of… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 5
  • figure 4
Is this relevant?
Highly Cited
2010
Highly Cited
2010
In just noticeable difference (JND) models, evaluation of contrast masking (CM) is a crucial step. More specifically, CM due to… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
2007
Highly Cited
2007
Many factors affect the success of Machine Learning (ML) on a given task. The representation and quality of the instance data is… Expand
  • table I
Is this relevant?
Highly Cited
2007
Highly Cited
2007
A cluster operator takes a set of data points and partitions the points into clusters (subsets). As with any scientific model… Expand
  • figure 1
  • figure 2
  • table 1
  • table 2
  • table 3
Is this relevant?
Highly Cited
2006
Highly Cited
2006
We propose a service differentiated peer selection mechanism for peer-to-peer media streaming systems. The mechanism provides… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
2004
Highly Cited
2004
  • A. Habib, J. Chuang
  • Twelfth IEEE International Workshop on Quality of…
  • 2004
  • Corpus ID: 7255056
We propose a rank-based peer-selection mechanism for peer-to-peer media streaming systems. The mechanism provides incentives for… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
2000
Highly Cited
2000
We give cryptographic schemes that help trace the source of leaks when sensitive or proprietary data is made available to a large… Expand
  • figure 1
  • figure 2
  • table I
  • table II
  • figure 3
Is this relevant?
Highly Cited
1998
Highly Cited
1998
The power of human vision to synthesize information and recognize pattern is fundamental to the success of visualization as a… Expand
  • figure 1
  • table 1
  • table 2
  • table 3
Is this relevant?
Highly Cited
1991
Highly Cited
1991
We present an I/O architecture, called Swift, that addresses the problem of data rate mismatches between the requirements of an… Expand
  • figure 1
  • figure 2
  • table 1
  • table 2
  • table 3
Is this relevant?