Hardware errors are on the rise with reducing chip sizes, and power constraints have necessitated the involvement of software in hardware error detection. At the same time, emerging workloads in the form of soft computing applications, (e.g., multimedia applications) can tolerate most hardware errors as long as the erroneous outputs do not deviate significantly from error-free outcomes. We term outcomes that deviate significantly from the error-free outcomes as Egregious Data Corruptions (EDCs). In this thesis, we propose a technique to place detectors for selectively detecting EDC causing errors in an application. Our technique identifies program locations for placing high coverage detectors for EDCs using static analysis and runtime p...
In the modern era of computing, processors are increasingly susceptible to soft errors. Current solu...
As semiconductor technology scales into the deep submicron regime the occurrence of transient or sof...
Soft errors are an important challenge in contemporary microprocessors. Particle hits on the compone...
Hardware errors are on the rise with reducing chip sizes, and power constraints have necessitated th...
According to Moore’s law, technology scaling is continuously providing smaller and faster devices. T...
According to Moore’s law, technology scaling is continuously providing smaller and faster devices. T...
As high-performance computing (HPC) continues to progress, constraints on HPC system design forces t...
The negative impact of the aggressive scaling of technology nodes on the sensitivity of CMOS devices...
Software-based fault tolerance techniques are a low-cost way to protect processors against soft erro...
Successive generations of processors use smaller transistors in the quest to make more powerful comp...
International audienceThis paper presents two error models to evaluate safety of a software error de...
Technology and voltage scaling is making integrated circuits increasingly susceptible to failures ca...
In this paper is described a software technique allowing the detection of soft errors occurring in p...
Silent Data Corruption (SDC) is a serious reliability issue in many domains, including embedded syst...
Resilient algorithms in high-performance computing are subject to rigorous non-functional constrain...
In the modern era of computing, processors are increasingly susceptible to soft errors. Current solu...
As semiconductor technology scales into the deep submicron regime the occurrence of transient or sof...
Soft errors are an important challenge in contemporary microprocessors. Particle hits on the compone...
Hardware errors are on the rise with reducing chip sizes, and power constraints have necessitated th...
According to Moore’s law, technology scaling is continuously providing smaller and faster devices. T...
According to Moore’s law, technology scaling is continuously providing smaller and faster devices. T...
As high-performance computing (HPC) continues to progress, constraints on HPC system design forces t...
The negative impact of the aggressive scaling of technology nodes on the sensitivity of CMOS devices...
Software-based fault tolerance techniques are a low-cost way to protect processors against soft erro...
Successive generations of processors use smaller transistors in the quest to make more powerful comp...
International audienceThis paper presents two error models to evaluate safety of a software error de...
Technology and voltage scaling is making integrated circuits increasingly susceptible to failures ca...
In this paper is described a software technique allowing the detection of soft errors occurring in p...
Silent Data Corruption (SDC) is a serious reliability issue in many domains, including embedded syst...
Resilient algorithms in high-performance computing are subject to rigorous non-functional constrain...
In the modern era of computing, processors are increasingly susceptible to soft errors. Current solu...
As semiconductor technology scales into the deep submicron regime the occurrence of transient or sof...
Soft errors are an important challenge in contemporary microprocessors. Particle hits on the compone...