2002
DOI: 10.1109/12.980007
|View full text |Cite
|
Sign up to set email alerts
|

ED/sup 4/I: error detection by diverse data and duplicated instructions

Abstract: Errors in computing systems can cause abnormal behavior and degrade data integrity and system availability. Errors should be avoided especially in embedded systems for critical applications. However, as the trend in VLSI technologies has been towards smaller feature sizes, lower supply voltages, and higher frequencies, there is a growing concern about temporary errors as well as permanent errors in embedded systems; thus, it is very essential to detect those errors. Software Implemented Hardware Fault Toleranc… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

1
103
0
3

Year Published

2006
2006
2010
2010

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 218 publications
(113 citation statements)
references
References 30 publications
1
103
0
3
Order By: Relevance
“…For all approaches the error injection experiments show a non-negligible amount of undetected failures. This is even higher for [10] and [7] because the used encoding is incomplete.…”
Section: Related Workmentioning
confidence: 97%
See 1 more Smart Citation
“…For all approaches the error injection experiments show a non-negligible amount of undetected failures. This is even higher for [10] and [7] because the used encoding is incomplete.…”
Section: Related Workmentioning
confidence: 97%
“…Therefore, the program and the processed data are modified. ANencoding was already used by [10,7,14]. For all approaches the error injection experiments show a non-negligible amount of undetected failures.…”
Section: Related Workmentioning
confidence: 99%
“…[13] duplicates instruction and compares their outcomes. A similar approach is taken in ED4I [14], but the duplicated instructions do not process the original data but a k-multiple of it. Thus all results of duplicate instructions have to be k-multiples of the original results.…”
Section: Related Workmentioning
confidence: 99%
“…In that case, the program and the processed data are modified. ED4I [20], for example, duplicates instructions but the duplicated instructions do not process the original data but a k-multiple of it, which is a so-called AN-code. All results of duplicate instructions have to be k-multiples of the original results.…”
Section: Related Workmentioning
confidence: 99%
“…3). In contrast to similar previous approaches such as [20,10,34], we encode the whole application with the same powerful code. This includes memory, logical operations, and handling of external functions whose source code is not available for encoding.…”
Section: Introductionmentioning
confidence: 99%