2013
DOI: 10.1016/j.parco.2013.09.001
|View full text |Cite
|
Sign up to set email alerts
|

SpiNNaker: Fault tolerance in a power- and area- constrained large-scale neuromimetic architecture

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
7
0

Year Published

2014
2014
2019
2019

Publication Types

Select...
4
4

Relationship

1
7

Authors

Journals

citations
Cited by 10 publications
(7 citation statements)
references
References 38 publications
0
7
0
Order By: Relevance
“…This has motivated the development of various neuromorphic computing systems whose architectures reflect the general organizational principles of nervous systems in an effort to partially reproduce the immense efficiency advantage that biological computation exhibits in some problems. These neuromorphic systems are organized as populations of excitatory and inhibitory spiking neurons with configurable synaptic connections (FACETS, 2005–2009 ; Navaridas et al, 2013 ; Benjamin et al, 2014 ; Merolla et al, 2014 ; Ning et al, 2015 ).…”
Section: Introductionmentioning
confidence: 99%
“…This has motivated the development of various neuromorphic computing systems whose architectures reflect the general organizational principles of nervous systems in an effort to partially reproduce the immense efficiency advantage that biological computation exhibits in some problems. These neuromorphic systems are organized as populations of excitatory and inhibitory spiking neurons with configurable synaptic connections (FACETS, 2005–2009 ; Navaridas et al, 2013 ; Benjamin et al, 2014 ; Merolla et al, 2014 ; Ning et al, 2015 ).…”
Section: Introductionmentioning
confidence: 99%
“…The coding efficiency of the RZ Berger code protocol is quite straightforward to calculate (Equation 5). The variable k again denotes the number of parity bits as defined in Equation (2). However, since the code words of the Berger code have different Hamming weights the determination of the power metric is a little bit more involved.…”
Section: Delay-insensitive Codesmentioning
confidence: 99%
“…DI communication elegantly overcomes these problems: Here the data encoding is chosen such that the receiver can recognize when a code word is complete (i.e., all wires made their final transitions)-in the absence of an accompanying clock or valid signal, and even in the presence of arbitrary skew on the transmission link. Such links have been successfully employed in many applications, such as Spinnaker [2,3], or Chain [4].…”
Section: Introductionmentioning
confidence: 99%
“…During the boot process, any malfunctioning core is excluded from the list of available cores. This is a part of fault tolerance mechanisms in SpiNNaker that take place in several levels to ensure reliability against system failure [5]. In our work, we also applied an additional mechanism such that malfunction cores can also be detected during run time by monitoring their activities.…”
Section: Spinnaker Chips and Machinesmentioning
confidence: 99%