Trident: Comprehensive Choke Error Mitigation in NTC Systems
نویسندگان
چکیده
منابع مشابه
Error Mitigation in MPEG-4 Audio Packet Communication Systems
This convention paper has been reproduced from the author’s advance manuscript, without editing, corrections, or consideration by the Review Board. The AES takes no responsibility for the contents. Additional papers may be obtained by sending request and remittance to Audio Engineering Society, 60 East 42nd Street, New York, New York 10165-2520, USA; also see www.aes.org. All rights reserved. R...
متن کاملNon-line-of-sight Error Mitigation in Wireless Communication Systems
The need for determining the position of a mobile station (MS) is increasing rapidly in wireless communications systems. When there is non-line-of-sight (NLOS) path between the MS and base stations (BSs), it is possible to integrate many kinds of measurements to achieve more accurate measurements of the MS location. This paper proposed hybrid methods that utilize time of arrival (TOA) at five B...
متن کاملA collusion mitigation scheme for reputation systems
Reputation management systems are in wide-spread use to regulate collaborations in cooperative systems. Collusion is one of the most destructive malicious behaviors in which colluders seek to affect a reputation management system in an unfair manner. Many reputation systems are vulnerable to collusion, and some model-specific mitigation methods are proposed to combat collusion. Detection of col...
متن کاملError and Error Mitigation in Low-Coverage Genome Assemblies
The recent release of twenty-two new genome sequences has dramatically increased the data available for mammalian comparative genomics, but twenty of these new sequences are currently limited to ∼2× coverage. Here we examine the extent of sequencing error in these 2× assemblies, and its potential impact in downstream analyses. By comparing 2× assemblies with high-quality sequences from the ENCO...
متن کاملError and Error Mitigation in Low-Coverage Genomes
We estimated relative rates of insertion/deletion events on each branch of the tree using a maximum likelihood approach. As described in the Methods section (under “Indel imputation”), we identify indel regions (IRs) and represent them as matrices of 0s and 1s in a collapsed form, under the assumption that the probability of an insertion or deletion does not depend on its length. As in the pars...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IEEE Transactions on Very Large Scale Integration (VLSI) Systems
سال: 2018
ISSN: 1063-8210,1557-9999
DOI: 10.1109/tvlsi.2018.2863954