119 p.Thesis (Ph.D.)--University of Illinois at Urbana-Champaign, 2008.In the end, this dissertation proposes an interesting future work, which is to find a set of variables protecting which it can most likely catch harmful errors that would cause Silent Data Corruption to the program. By ignoring non-harmful errors, the cost spent on detecting them and unnecessary rollbacks can be saved.U of I OnlyRestricted to the U of I community idenfinitely during batch ingest of legacy ETD
According to Moore’s law, technology scaling is continuously providing smaller and faster devices. T...
A dependable software system must contain two dependability components: (i) error detection mechanis...
Silent Data Corruption (SDC) is a serious reliability issue in many domains, including embedded syst...
As semiconductor technology scales into the deep submicron regime the occurrence of transient or sof...
347 p.Thesis (Ph.D.)--University of Illinois at Urbana-Champaign, 1973.U of I OnlyRestricted to the ...
307 p.Thesis (Ph.D.)--University of Illinois at Urbana-Champaign, 2009.The key insight in this disse...
According to Moore’s law, technology scaling is continuously providing smaller and faster devices. T...
103 p.Thesis (Ph.D.)--University of Illinois at Urbana-Champaign, 1977.U of I OnlyRestricted to the ...
As machines increase in scale, it is predicted that failure rates of supercomputers will correspondi...
Both the scale and the reach of computer systems and embedded devices have been constantly increasin...
Hardware errors are on the rise with reducing chip sizes, and power constraints have necessitated th...
The paper describes a systematic approach for automatically introducing data and code redundancy int...
Computer intrusions can occur in various ways. Many of them occur by exploiting program flaws and sy...
Software-based fault tolerance techniques are a low-cost way to protect processors against soft erro...
This paper presents a technique to derive and implement error detectors to protect an application fr...
According to Moore’s law, technology scaling is continuously providing smaller and faster devices. T...
A dependable software system must contain two dependability components: (i) error detection mechanis...
Silent Data Corruption (SDC) is a serious reliability issue in many domains, including embedded syst...
As semiconductor technology scales into the deep submicron regime the occurrence of transient or sof...
347 p.Thesis (Ph.D.)--University of Illinois at Urbana-Champaign, 1973.U of I OnlyRestricted to the ...
307 p.Thesis (Ph.D.)--University of Illinois at Urbana-Champaign, 2009.The key insight in this disse...
According to Moore’s law, technology scaling is continuously providing smaller and faster devices. T...
103 p.Thesis (Ph.D.)--University of Illinois at Urbana-Champaign, 1977.U of I OnlyRestricted to the ...
As machines increase in scale, it is predicted that failure rates of supercomputers will correspondi...
Both the scale and the reach of computer systems and embedded devices have been constantly increasin...
Hardware errors are on the rise with reducing chip sizes, and power constraints have necessitated th...
The paper describes a systematic approach for automatically introducing data and code redundancy int...
Computer intrusions can occur in various ways. Many of them occur by exploiting program flaws and sy...
Software-based fault tolerance techniques are a low-cost way to protect processors against soft erro...
This paper presents a technique to derive and implement error detectors to protect an application fr...
According to Moore’s law, technology scaling is continuously providing smaller and faster devices. T...
A dependable software system must contain two dependability components: (i) error detection mechanis...
Silent Data Corruption (SDC) is a serious reliability issue in many domains, including embedded syst...