Redundancy (engineering)

Known as: Redundancy (computer science), Redundancy, Voting logic 
In engineering, redundancy is the duplication of critical components or functions of a system with the intention of increasing reliability of the… (More)
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Review
2017
Review
2017
The paper reports some comparisons between commercial software able to automatically process image datasets for 3D reconstruction… (More)
  • table 1
  • figure 1
  • figure 3
  • figure 2
  • table 2
Is this relevant?
Review
2017
Review
2017
Wireless Body Area Network (WBAN) has been a key element in e-health to monitor bodies. This technology enables new applications… (More)
  • figure 1
  • figure 2
  • table I
  • table II
  • figure 3
Is this relevant?
Highly Cited
2008
Highly Cited
2008
Evaluation measures act as objective functions to be optimized by information retrieval systems. Such objective functions must… (More)
  • table 1
  • table 2
  • figure 2
  • figure 3
Is this relevant?
Highly Cited
2004
Highly Cited
2004
Redundancy and diversity are commonly applied principles for fault tolerance against accidental faults. Their use in security… (More)
Is this relevant?
Highly Cited
2003
Highly Cited
2003
Though research on the Semantic Web has progressed at a steady pace, its promise has yet to be realized. One major difficulty is… (More)
  • figure 1
  • figure 2
  • table 1
  • figure 3
  • figure 5
Is this relevant?
Highly Cited
2003
Highly Cited
2003
The purpose of this correspondence is to generalize a result by Donoho and Huo and Elad and Bruckstein on sparse representations… (More)
Is this relevant?
Highly Cited
2003
Highly Cited
2003
Soil is a complex and dynamic biological system, and still in 2003 it is difficult to determine the composition of microbial… (More)
  • figure 1
  • table 1
  • table 2
  • figure 2
  • figure 3
Is this relevant?
Highly Cited
2002
Highly Cited
2002
Large-scale peer-to-peer systems face security threats from faulty or hostile remote computing elements. To resist these threats… (More)
  • figure 1
Is this relevant?
Highly Cited
1997
Highly Cited
1997
We explore a new approach to shape recognition based on a virtually infinite family of binary features (queries) of the image… (More)
  • figure 10
  • figure 12
Is this relevant?
Highly Cited
1988
Highly Cited
1988
Suppose your netmail is being erratically censored by Captain Yossarian. Whenever you send a message, he censors each bit of the… (More)
Is this relevant?