2018
DOI: 10.1109/tetc.2016.2594957
|View full text |Cite
|
Sign up to set email alerts
|

Efficient Performance Evaluation of Multi-Core SIMT Processors with Hot Redundancy

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
3

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(1 citation statement)
references
References 30 publications
0
1
0
Order By: Relevance
“…When a security monitoring node observes a functionality node is behaving suspiciously, it informs the security leader. To detect and tolerate security monitoring node failure, the methods are already known and available in the literature [ 16 , 22 , 36 ]. After confirming the suspected behavior to be malicious, the security leader removes the node from the normal node list and adds it to the compromised node list.…”
Section: The Proposed Architectural Modelmentioning
confidence: 99%
“…When a security monitoring node observes a functionality node is behaving suspiciously, it informs the security leader. To detect and tolerate security monitoring node failure, the methods are already known and available in the literature [ 16 , 22 , 36 ]. After confirming the suspected behavior to be malicious, the security leader removes the node from the normal node list and adds it to the compromised node list.…”
Section: The Proposed Architectural Modelmentioning
confidence: 99%