نتایج جستجو برای: error handling
تعداد نتایج: 322151 فیلتر نتایج به سال:
This paper describes the interesting features of the recursive descent parser generator Ell from the user’s point of view. Some of the interesting implementation aspects are discussed. The generated parsers are extremely fast and run at speed of 55,000 tokens per second or 900,000 lines per minute on a MC 68020 processor. The outstanding features of Ell are the L-attribution mechanism, its abil...
Undetected errors in the expression measurements from highthroughput DNA microarrays and protein spectroscopy could seriously affect the diagnostic reliability in disease detection. In addition to a high resilience against such errors, diagnostic models need to be more comprehensible so that a deeper understanding of the causal interactions among biological entities like genes and proteins may ...
A spoken dialog system typically characterizes a domain task with multiple states interconnected by actions or thresholds as transitions between states. As the system attempts to solicit a piece of information from the user, it may have to engage in a hidden subdialog, or error handling within a particular state, before transitioning to a new state. Hidden subdialogs generally center on illocut...
Redundant disk arrays are single fault tolerant, incorporating a layer of error handling not found in nonredundant disk systems. Recovery from these errors is complex, due in part to the large number of erroneous states the system may reach. The established approach to error recovery in disk systems is to transition directly from an erroneous state to completion. This technique, known as forwar...
The Coordinated Atomic Action (or CA action) concept is a unified scheme for coordinating complex concurrent activities and supporting error recovery between multiple interacting objects in a distributed object-oriented system. It provides a conceptual framework for dealing with different kinds of concurrency and achieving fault tolerance by extending and integrating two complementary concepts ...
Voice calls are still one of the most common use cases for smartphones. Often, sensitive personal information but also confidential business information is shared. End-to-end security is required to protect against wiretapping of voice calls. For such real-time communication, the ZRTP key-agreement protocol has been proposed. By verbally comparing a small number of on-screen characters or words...
When speaking to interactive systems, people sometimes hyperarticulate— or adopt a clarified form of speech that has been associated with increased recognition errors. The goals of the present study were: (1) to establish a flexible simulation method for studying users’ reactions to system errors, (2) to analyze the type and magnitude of linguistic adaptations in speech during human-computer er...
Attrition is a common occurrence in cluster randomised trials which leads to missing outcome data. Two approaches for analysing such trials are cluster-level analysis and individual-level analysis. This paper compares the performance of unadjusted cluster-level analysis, baseline covariate adjusted cluster-level analysis and linear mixed model analysis, under baseline covariate dependent missin...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید