2016
DOI: 10.1109/tns.2016.2522508
|View full text |Cite
|
Sign up to set email alerts
|

Analyzing the Impact of Radiation-Induced Failures in Programmable SoCs

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
9
0
1

Year Published

2017
2017
2022
2022

Publication Types

Select...
4
4
2

Relationship

0
10

Authors

Journals

citations
Cited by 38 publications
(10 citation statements)
references
References 14 publications
0
9
0
1
Order By: Relevance
“…On the PS part, one module is responsible send to the controller the indexes while a second module reads the output of the SVM through an AXI interconnect and forwards it to a host PC through a serial port. The L2 cache of the ARM processor has been disabled to reduce the probability of faults affecting the PS [21]. No scrubbing mechanism nor the Xilinx Soft Error Mitigation (SEM) core IP were instantiated.…”
Section: Radiation Test Set-upmentioning
confidence: 99%
“…On the PS part, one module is responsible send to the controller the indexes while a second module reads the output of the SVM through an AXI interconnect and forwards it to a host PC through a serial port. The L2 cache of the ARM processor has been disabled to reduce the probability of faults affecting the PS [21]. No scrubbing mechanism nor the Xilinx Soft Error Mitigation (SEM) core IP were instantiated.…”
Section: Radiation Test Set-upmentioning
confidence: 99%
“…This scheme also protects internal core memories from bit-flips. Besides, all cache levels available for both ARM and MicroBlaze processor were disabled to improve device reliability, as it is proven that cache utilization adversely affects the radiation sensitivity of an embedded system [14].…”
Section: A Architecturementioning
confidence: 99%
“…Most of the traditional techniques for approximative computing today make use of neural networks implemented on FPGAs. Programmable logic tends to be more susceptible to radiation errors than hardcore processors [13]. Therefore, for safetycritical systems, software-based approximation running on hardcore processors is preferable over programmable logic implementations or softcore processors.…”
Section: The Proposed Fault Mitigation Approachmentioning
confidence: 99%