Skip to search formSkip to main contentSkip to account menu

Error detection and correction

Known as: Error detection code, EDAC, Error coding 
In information theory and coding theory with applications in computer science and telecommunication, error detection and correction or error control… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2010
Highly Cited
2010
One of the most cited books in physics of all time, Quantum Computation and Quantum Information remains the best textbook in this… 
Highly Cited
2009
Highly Cited
2009
Traditional adaptive methods that compensate for PVT variations need safety margins and cannot respond to rapid environmental… 
Highly Cited
2008
Highly Cited
2008
We take advantage of these findings and propose a Razor II approach that introduces two components. First, instead of performing… 
Highly Cited
2006
Highly Cited
2006
In this paper, we present a dynamic voltage scaling (DVS) technique called Razor which incorporates an in situ error detection… 
Highly Cited
1998
Highly Cited
1998
General editor's preface Author's preface Abbreviations 1. Definition and Delimitation Human error Successive paradigms… 
Highly Cited
1995
Highly Cited
1995
Multiclass learning problems involve finding a definition for an unknown function f(x) whose range is a discrete set containing k… 
Highly Cited
1983
Highly Cited
1983
  • Shu LinD. Costello
  • Prentice Hall computer applications in electrical…
  • 1983
  • Corpus ID: 28213032
1. Coding for Reliable Digital Transmission and Storage. 2. Introduction to Algebra. 3. Linear Block Codes. 4. Important Linear… 
Highly Cited
1981
Highly Cited
1981
  • R. M. Tanner
  • IEEE Transactions on Information Theory
  • 1981
  • Corpus ID: 754232
A method is described for constructing long error-correcting codes from one or more shorter error-correcting codes, referred to… 
Highly Cited
1977
Highly Cited
1977
Highly Cited
1950
Highly Cited
1950
The author was led to the study given in this paper from a consideration of large scale computing machines in which a large…