2017 IEEE 23rd International Symposium on on-Line Testing and Robust System Design (IOLTS) 2017
DOI: 10.1109/iolts.2017.8046245
|View full text |Cite
|
Sign up to set email alerts
|

Temporal redundancy latch-based architecture for soft error mitigation

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
6
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
5

Relationship

1
4

Authors

Journals

citations
Cited by 6 publications
(6 citation statements)
references
References 12 publications
0
6
0
Order By: Relevance
“…fi Finally, the boundary model is reused again for the new value of AVF mix ðECCÞ calculation in Eq (4) and Eq (5). w err denotes the error rate in the ECC mapped new model M new in Eq (4).…”
Section: Proposed Virtual Filter Based Assessment Methodologymentioning
confidence: 99%
See 1 more Smart Citation
“…fi Finally, the boundary model is reused again for the new value of AVF mix ðECCÞ calculation in Eq (4) and Eq (5). w err denotes the error rate in the ECC mapped new model M new in Eq (4).…”
Section: Proposed Virtual Filter Based Assessment Methodologymentioning
confidence: 99%
“…They take up half of area in a router [3] and vulnerable to MCU faults. Diverse fault tolerant schemes are used to protect the VCs from soft errors, e.g., redundancy strategies [4] and error codes for NoCs [5]. The accurate and fast estimation issue is critical for an early NoC design and dynamic reliable NoC configurations.…”
Section: Introductionmentioning
confidence: 99%
“…Dual modular redundancy [26] and error detection codes like parity [27] are hardware-based error detection techniques which exploit spatial redundancy to detect errors. Detection based on temporal redundancy is possible as well, and allows to trade performance for reliability and energy savings [28], [29].…”
Section: Related Workmentioning
confidence: 99%
“…32 Unfortunately, TMR results in a more than 3x power, area and speed penalty due to the voters and long interconnects. To alleviate these drawbacks, several alternatives are possible 33,34 Instead of logic level triplication, these individual gates can be hardened At system level less generic and more specific mitigation is used. For instance, processors can use software level mitigation like signatures or tightly coupled cores, executing the same program.…”
Section: Introductionmentioning
confidence: 99%