Proceedings First IEEE International Workshop on Source Code Analysis and Manipulation
DOI: 10.1109/scam.2001.972664
|View full text |Cite
|
Sign up to set email alerts
|

A source-to-source compiler for generating dependable software

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
34
0

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 64 publications
(34 citation statements)
references
References 19 publications
0
34
0
Order By: Relevance
“…Some of them apply redundancy to highlevel source code (e.g., C language) by means of automatic transformation rules [37], whereas others use instruction redundancy at a low level (assembly code) in order to reduce the code overhead and performance degradation, and improve detection rates [26,27,36]. Only a few of these techniques have been extended to allow system recovery, but they incur, as a consequence, in higher overheads in terms of code size and execution time [17,38].…”
Section: Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…Some of them apply redundancy to highlevel source code (e.g., C language) by means of automatic transformation rules [37], whereas others use instruction redundancy at a low level (assembly code) in order to reduce the code overhead and performance degradation, and improve detection rates [26,27,36]. Only a few of these techniques have been extended to allow system recovery, but they incur, as a consequence, in higher overheads in terms of code size and execution time [17,38].…”
Section: Related Workmentioning
confidence: 99%
“…In this model, only one bit-flip of a storage element occurs throughout the circuit operation. Since this fault model closely matches the real fault behavior, it is widely used by the fault tolerance community to model real faults [37].…”
Section: Fault Coveragementioning
confidence: 99%
See 1 more Smart Citation
“…Source-to-source transformation techniques [6] have been investigated that generate a redundant copy of all variables and code at the source level. Throughout the transformed source code there are additional conditional checks that verify agreement in the redundant variables after each set of redundant calculations are performed.…”
Section: Related Workmentioning
confidence: 99%
“…Replication can be implemented at different levels of abstraction. Some approaches duplicate single instructions and execute them in one thread [22,19,10,25,24,6]. Other approaches execute duplicates of the whole program within several threads and provide synchronization means for them [31,12,32].…”
Section: Related Workmentioning
confidence: 99%