Reliability issues such as a soft error and NBTI (negative bias temperature instability) have become a matter of concern as integrated circuits continue to shrink. It is getting more and more important to take reliability requirements into account even for consumer products. This paper presents a dynamic continuous signature monitoring (DCSM) technique for high reliable computer systems. The DCSM technique dynamically generates reference signatures as well as runtime ones during executing a program. The DCSM technique stores the generated signatures in a signature table, which is a small storage circuit in a microprocessor, unlike the conventional static continuous signature monitoring techniques and contributes to saving program or data me...
With the scaling of technology, transient errors caused by external particle strikes have become a c...
CFS is the first practical code-based signature scheme. In the present paper, we present the initial...
With more computing platforms connected to the Internet each day, computer system security has becom...
This thesis presents an architectural solution that provides secure and reliable execution of an app...
ISBN: 4930813670This paper addresses the detection of permanent and transient faults in complex VLSI...
Due to harsher working environments, soft errors or erroneous bit-flips occur more frequently in mic...
Software monitoring and debugging can be efficiently supported by one of the concurrent error detect...
Data communications between producer instructions and consumer instructions through memory incur ext...
TRANSACTIONAL MEMORY (TM) systems ease multithreaded application development by giving the programme...
Signature analysis is a well established technique in digital system maintenance. The paper illustra...
With more computing platforms connected to the Internet each day, computer system security has becom...
Building a high-performance microprocessor presents many reliability challenges. De-signers must ver...
We present the experimental evaluation of different security mechanisms applied to persistent state ...
Abstract-An efficient strategy to utilize a parallel signature analyzer (PSA) for concurrent soft-er...
The objective of this paper is twofold. First, it presents an experimental investigation on stabilit...
With the scaling of technology, transient errors caused by external particle strikes have become a c...
CFS is the first practical code-based signature scheme. In the present paper, we present the initial...
With more computing platforms connected to the Internet each day, computer system security has becom...
This thesis presents an architectural solution that provides secure and reliable execution of an app...
ISBN: 4930813670This paper addresses the detection of permanent and transient faults in complex VLSI...
Due to harsher working environments, soft errors or erroneous bit-flips occur more frequently in mic...
Software monitoring and debugging can be efficiently supported by one of the concurrent error detect...
Data communications between producer instructions and consumer instructions through memory incur ext...
TRANSACTIONAL MEMORY (TM) systems ease multithreaded application development by giving the programme...
Signature analysis is a well established technique in digital system maintenance. The paper illustra...
With more computing platforms connected to the Internet each day, computer system security has becom...
Building a high-performance microprocessor presents many reliability challenges. De-signers must ver...
We present the experimental evaluation of different security mechanisms applied to persistent state ...
Abstract-An efficient strategy to utilize a parallel signature analyzer (PSA) for concurrent soft-er...
The objective of this paper is twofold. First, it presents an experimental investigation on stabilit...
With the scaling of technology, transient errors caused by external particle strikes have become a c...
CFS is the first practical code-based signature scheme. In the present paper, we present the initial...
With more computing platforms connected to the Internet each day, computer system security has becom...