Proceedings of the 15th ACM International Conference on Computing Frontiers 2018
DOI: 10.1145/3203217.3203240
|View full text |Cite
|
Sign up to set email alerts
|

Comparative analysis of soft-error detection strategies

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
4
3

Relationship

2
5

Authors

Journals

citations
Cited by 8 publications
(10 citation statements)
references
References 34 publications
0
5
0
Order By: Relevance
“…However, the detection rates and overheads were extremely conservative. The comparative analysis by Kestor et al [31] reports significant slowdown at a maximum of 1.4× for AID when snapshots were taken for every time step. We observed similar overheads when taking snapshots at every step.…”
Section: Soft Error Detectionmentioning
confidence: 99%
“…However, the detection rates and overheads were extremely conservative. The comparative analysis by Kestor et al [31] reports significant slowdown at a maximum of 1.4× for AID when snapshots were taken for every time step. We observed similar overheads when taking snapshots at every step.…”
Section: Soft Error Detectionmentioning
confidence: 99%
“…Our error injection framework instruments the source code to simulate an error. The framework decides on where to inject the error based on the inputs provided by the user (similar to our previous works [1], [2]). These inputs are: iteration number, statement number, vector name, position in the vector, list of bit positions to flip in the vector element.…”
Section: B Error Injection Mechanismmentioning
confidence: 99%
“…To be consistent in the rest of the section, we equivalently looked at the masked ratio, which is the fraction of error injections that result in a masked outcome. Note that these are complementary and one can directly derive one from the other 1 . Figure 3 plots the masked ratio computed using ground truth (y-axis) versus the masked ratio computed using various prediction strategies.…”
Section: B Evaluating Solver Vulnerabilitymentioning
confidence: 99%
See 2 more Smart Citations