Proceedings of the International Conference on Compilers, Architectures and Synthesis for Embedded Systems 2016
DOI: 10.1145/2968455.2968517
|View full text |Cite
|
Sign up to set email alerts
|

Runtime management of adaptive MPSoCs for graceful degradation

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2017
2017
2019
2019

Publication Types

Select...
2
1
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(2 citation statements)
references
References 28 publications
0
2
0
Order By: Relevance
“…Moreover such finer grained reconfiguration requires a specific network for interconnecting pipeline stages of all the cores within the architecture. Finally, this componentbased isolation strategy is also employed by Tzilis et al (2016); they proposed a mapping approach exploiting a sort of health table to collect for each core in the many-core architecture which are the healthy components and the failed ones. Thus, an application, or a task, can be mapped on a given core only if this last one provides all components required for the execution.…”
Section: Error Detectionmentioning
confidence: 99%
“…Moreover such finer grained reconfiguration requires a specific network for interconnecting pipeline stages of all the cores within the architecture. Finally, this componentbased isolation strategy is also employed by Tzilis et al (2016); they proposed a mapping approach exploiting a sort of health table to collect for each core in the many-core architecture which are the healthy components and the failed ones. Thus, an application, or a task, can be mapped on a given core only if this last one provides all components required for the execution.…”
Section: Error Detectionmentioning
confidence: 99%
“…Reliability aware resource allocation is desired to increase the mean time to failure of a system ]. However, in case a fault has happened, resource reallocation is desired during the system operation in order to make the system fault-tolerant [Lee et al 2010;Derin et al 2011;Schor et al 2012;Das et al 2013;Sahoo et al 2016;Tzilis et al 2016;Zeng et al 2016]. The demand to support increasing number of applications within a device and then their communication with the applications in other devices has created security threats due to possible attack in the communication channels and interaction with untrusted devices.…”
Section: Multi-objective Resource Allocationmentioning
confidence: 99%