Proceedings of Annual Symposium on Fault Tolerant Computing
DOI: 10.1109/ftcs.1996.534618
|View full text |Cite
|
Sign up to set email alerts
|

Behavioral synthesis of fault secure controller/datapaths using aliasing probability analysis

Abstract: AbstractÐThis paper addresses the problem of synthesizing fault-secure controller/data path circuits from behavioral specifications. These circuits are guaranteed to either produce the correct output, or to flag an error. We use an iterative improvement-based behavioral synthesis framework that performs functional unit selection, clock selection, scheduling, and resource sharing with the aim of minimizing the area of the synthesized circuit, while allowing multicycling, chaining, and functional unit pipelining… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
7
0

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 13 publications
(7 citation statements)
references
References 25 publications
0
7
0
Order By: Relevance
“…Straightforward duplication of a computation followed by comparison entails substantial hardware overhead. Area-efficient fault-detection strategy by comparing carefully selected intermediate results has been presented in Karri and Orailoǧlu [1996] and Lakshminarayana et al [1996]. An area-efficient technique for reconfiguration has been presented in Iyer et al [1995].…”
Section: Related Researchmentioning
confidence: 99%
“…Straightforward duplication of a computation followed by comparison entails substantial hardware overhead. Area-efficient fault-detection strategy by comparing carefully selected intermediate results has been presented in Karri and Orailoǧlu [1996] and Lakshminarayana et al [1996]. An area-efficient technique for reconfiguration has been presented in Iyer et al [1995].…”
Section: Related Researchmentioning
confidence: 99%
“…Karri and Iyer presented an RTL CED technique that uses the spare computation cycles of the functional units and the spare data transfer cycles in the interconnection network for CED [11]. Karri and Orailoglu [12] and Jha et al [14] presented CED techniques that yield fault-secure data paths with less than proportional increase in hardware. These techniques selectively check intermediate results in a control data flow graph (CDFG) of a computation and weaken some data precedence constraints and reduce hardware overhead without violating the time constraints.…”
Section: B Related Researchmentioning
confidence: 99%
“…Karri and Iyer presented a RT level CED technique that uses the spare computation cycles and the spare data transfer cycles for CED [12]. Karri & Orailoglu [13], and Lakshminarayana et al [14] presented fault security based techniques which yield CED data paths with less than a proportional increase in hardware.…”
Section: Introductionmentioning
confidence: 99%