2011 IEEE/ACM International Conference on Computer-Aided Design (ICCAD) 2011
DOI: 10.1109/iccad.2011.6105319
|View full text |Cite
|
Sign up to set email alerts
|

Assuring application-level correctness against soft errors

Abstract: ABSTRACT

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

1
15
0

Year Published

2013
2013
2018
2018

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 32 publications
(16 citation statements)
references
References 26 publications
1
15
0
Order By: Relevance
“…We compare with error detector placement work by Thomas et al [21] in Section V. Sundaram et al [29] propose selective replication of instructions that has 30% to 75% performance overhead. Cong et al [30] propose an approach to protect instructions based on their criticality. The technique is a combination of static analysis and dynamic monitoring.…”
Section: Experimental Evaluation and Analysismentioning
confidence: 99%
“…We compare with error detector placement work by Thomas et al [21] in Section V. Sundaram et al [29] propose selective replication of instructions that has 30% to 75% performance overhead. Cong et al [30] propose an approach to protect instructions based on their criticality. The technique is a combination of static analysis and dynamic monitoring.…”
Section: Experimental Evaluation and Analysismentioning
confidence: 99%
“…They propose to transfer to the software world the concept of selective hardening, typical from the hardware world [22,39,40]. In [15,16], the authors propose the selective instruction replication to guarantee the application-level correctness in multimedia applications. This kind of applications can tolerate, in some cases, a execution which is not 100% numerically correct, and the program results can still appear to be correct from the user perspective [41].…”
Section: Related Workmentioning
confidence: 99%
“…1, instructions 1, 3, and 13 are classified as inSoR and are followed by data replication instructions on the hardened code (lines: 2, 4, and 14). Instructions 5,8,11,15, and 18 are classified as none. Instructions 5, and 15 perform an arithmetic operation, thus, they are replicated after the original instruction using the register copies (lines: 6, 7, 16, and 17).…”
Section: Fig 1 Example Hardened Program Using Swift-rmentioning
confidence: 99%
See 1 more Smart Citation
“…Only selected portions of the application will be protected, not the entire application. Few works based on selective hardening aim to guarantee application-level correctness in multimedia applications [24] [25]. For multimedia applications, some errors can be tolerated since they will not be noticed by the user [26].…”
Section: Selective Hardeningmentioning
confidence: 99%