scispace - formally typeset
Search or ask a question
Topic

Data Corruption

About: Data Corruption is a research topic. Over the lifetime, 435 publications have been published within this topic receiving 6784 citations.


Papers
More filters
Patent
21 Nov 2007
TL;DR: In this article, a write algorithm is used to remove errors due to back pattern effects, cell-to-cell capacitive coupling, and program disturb in memory cells, and the original data is then programmed into the memory cells in another programming operation.
Abstract: In one of the disclosed embodiments, a write algorithm is used to remove errors due to back pattern effects, cell-to-cell capacitive coupling, and program disturb in memory cells. Original data to be programmed is adjusted prior to an initial programming operation of the memory cells. The original data is then programmed into the memory cells in another programming operation. In an alternate embodiment, a read adjustment weight data value is associated with each series string of memory cells. The weight data value is used to compensate data read during an initial word line read. The weight data value is updated after each read and read adjustment such that the adjusted weight data value is used on the subsequent read operations.

30 citations

Patent
19 Dec 2001
TL;DR: In this article, the authors use watermarking techniques that allow accurate spatial and temporal localization of degraded or corrupted data sets without requiring access to an original source data set, which can be reported to a data processor to permit near real-time modifications to data bandwidth or encoding techniques to reduce further data corruption.
Abstract: Dynamic monitoring and correction of network or transcoding service quality is accomplished by use of watermarking techniques that allow accurate spatial and temporal localization of degraded or corrupted data sets without requiring access to an original source data set. Damage to watermarks, corresponding to damage to a data set in which the watermark is embedded, can be reported to a data processor to permit near real time modifications to data bandwidth or encoding techniques to reduce further data corruption.

27 citations

Proceedings ArticleDOI
26 Jan 1993
TL;DR: FMEA techniques in assessing the software safety of embedded real-time control systems designed for use in automotive applications has allowed analysis of the effects of a more comprehensive set of potential failures, including data corruption, than is practical using other software safety analysis techniques.
Abstract: Traditional failure modes and effects analysis techniques have been adapted and extended to include assessment of software failures. The resulting technique is used to assess the safety of embedded real-time control systems designed for use in automotive applications. The use of FMEA techniques in assessing the software safety of those controllers has allowed analysis of the effects of a more comprehensive set of potential failures, including data corruption, than is practical using other software safety analysis techniques. The ability to assess the results of data corruption has proven to be crucial in providing feedback to design teams about the potential safety risks of the designs analyzed. >

26 citations

Patent
22 Jul 2002
TL;DR: In this article, the authors present a system and method for testing integrity of data transmitted across a network connection, which generally includes creating one or more test threads on test clients attached to a server through the network connection.
Abstract: Embodiments of the present invention generally provide a system and method for testing integrity of data transmitted across a network connection. In one embodiment, the method generally includes creating one or more test threads on one or more test clients attached to a server through the network connection. The method further includes, for each test thread, generating a data load on the data connection by repetitively writing test data patterns to a common data file on the server, reading data patterns from the common data file, and comparing the data patterns read from the common data file to the test data patterns written to the common data file to detect data corruptions. The method may further include measuring data throughput between the one or more test clients and the server and generating debug information if a data corruption is detected by one of the test threads.

26 citations

Patent
20 Apr 2010
TL;DR: In this paper, the authors propose a method to detect inadvertent or malicious data corruption and for recovering data including receiving a query specifying corrupted application data; analyzing transaction logs to find update operations related to the data; determining where the data are stored; and analyzing snapshot volume bitmaps to determine if the bitmaps show changes to the table data stored in the volume logical blocks.
Abstract: Embodiments of the invention detect inadvertent or malicious data corruption and for recovering data including receiving a query specifying corrupted application data; analyzing transaction logs to find update operations related to the data; determining where the data are stored, by mapping the table data to locations within the file system and mapping the file system locations to volume logical blocks; and analyzing snapshot volume bitmaps to determine if the bitmaps show changes to the table data stored in the volume logical blocks. Changes which are reflected in the bitmaps for the data, but which do not have corresponding entries in the transaction logs are flagged as unauthorized changes. Snapshots of the data, from a time prior to the time at which a flagged snapshot was taken, are identified for use in restoring data to its status prior to the unauthorized change.

26 citations


Network Information
Related Topics (5)
Network packet
159.7K papers, 2.2M citations
82% related
Software
130.5K papers, 2M citations
81% related
Wireless sensor network
142K papers, 2.4M citations
78% related
Wireless network
122.5K papers, 2.1M citations
77% related
Cluster analysis
146.5K papers, 2.9M citations
76% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
20221
202121
202025
201927
201827
201727