Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 218,258,722 papers from all fields of science
Search
Sign In
Create Free Account
Error-tolerant design
Known as:
Error tolerance
, Error tolerant
, Error tolerant design
Expand
An error-tolerant design (also: human-error-tolerant design) is one that does not unduly penalize user or human errors. It is the human equivalent of…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
12 relations
Computer
Computer security
DOS
Edit distance
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2017
Highly Cited
2017
SABER: Selection of approximate bits for the design of error tolerant circuits
Deepashree Sengupta
,
F. S. Snigdha
,
Jiang Hu
,
S. Sapatnekar
Design Automation Conference
2017
Corpus ID: 243441778
A wide variety of error tolerant applications supports the use of approximate circuits that achieve power savings by introducing…
Expand
Highly Cited
2011
Highly Cited
2011
A new circuit simplification method for error tolerant applications
Doochul Shin
,
S. Gupta
Design, Automation and Test in Europe
2011
Corpus ID: 2191643
Starting from a functional description or a gate level circuit, the goal of the multi-level logic optimization is to obtain a…
Expand
Highly Cited
2010
Highly Cited
2010
Design of Low-Power High-Speed Truncation-Error-Tolerant Adder and Its Application in Digital Signal Processing
Ning Zhu
,
W. Goh
,
Weija Zhang
,
K. Yeo
,
Z. Kong
IEEE Transactions on Very Large Scale Integration…
2010
Corpus ID: 7700579
In modern VLSI technology, the occurrence of all kinds of errors has become inevitable. By adopting an emerging concept in VLSI…
Expand
Highly Cited
2010
Highly Cited
2010
Approximate logic synthesis for error tolerant applications
Doochul Shin
,
S. Gupta
Design, Automation and Test in Europe
2010
Corpus ID: 3039676
Error tolerance formally captures the notion that - for a wide variety of applications including audio, video, graphics, and…
Expand
Highly Cited
2010
Highly Cited
2010
Low-power high-speed multiplier for error-tolerant application
K. Y. Kyaw
,
W. Goh
,
K. Yeo
International Conference on Electron Devices and…
2010
Corpus ID: 12855539
In this paper, a new design concept that engaged accuracy as a design parameter is proposed. By introducing accuracy as a design…
Expand
Highly Cited
2010
Highly Cited
2010
The exact superconformal R-symmetry extremizes Z
D. Jafferis
2010
Corpus ID: 118581984
A bstractThe three sphere partition function, Z , of three dimensional theories with four supercharges and an R-symmetry is…
Expand
Highly Cited
2009
Highly Cited
2009
Vanish: Increasing Data Privacy with Self-Destructing Data
Roxana Geambasu
,
Tadayoshi Kohno
,
Amit A. Levy
,
Henry M. Levy
USENIX Security Symposium
2009
Corpus ID: 263885166
Today's technical and legal landscape presents formidable challenges to personal data privacy. First, our increasing reliance on…
Expand
Highly Cited
2006
Highly Cited
2006
An improvement of the h-index: the g-index
L. Egghe
2006
Corpus ID: 62262863
For a set of papers, ranked in decreasing order of the number of citations that they received, the h-index is the (unique…
Expand
Highly Cited
1991
Highly Cited
1991
Narrative and Self-Concept
D. Polkinghorne
1991
Corpus ID: 18335673
AbstractWhen the self is thought of as a narrative or story, rather than a substance or thing, the temporal and dramatic…
Expand
Highly Cited
1981
Highly Cited
1981
Cutmarks made by stone tools on bones from Olduvai Gorge, Tanzania
R. Potts
,
P. Shipman
Nature
1981
Corpus ID: 4326451
Fossils from Olduvai Gorge, Tanzania, show cutmarks which establish that hominids were using stone tools on animal tissues during…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE