Proceedings of the 2016 International Symposium on Code Generation and Optimization 2016
DOI: 10.1145/2854038.2854059
|View full text |Cite
|
Sign up to set email alerts
|

IPAS: intelligent protection against silent output corruption in scientific applications

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
27
0

Year Published

2016
2016
2021
2021

Publication Types

Select...
5
3

Relationship

2
6

Authors

Journals

citations
Cited by 59 publications
(27 citation statements)
references
References 30 publications
0
27
0
Order By: Relevance
“…In the remaining cases, most control flow diverges within the injected loop structure, leaving some vector entries unmodified. To ensure correct execution of these loops, instruction duplication techniques such as IPAS [28] and FlipBack [36] or low-cost invariant checks [23], offer the ability to ensure correct control flow with minor overheads. An optimization to lower the overhead of algorithmic based SDC detection schemes is to assume static data -e.g., the matrix in a linear solver is sufficiently protected that it does not need explicit checks for consistency and leaving SDC checks to inspect dynamic data.…”
Section: Abnormalmentioning
confidence: 99%
See 2 more Smart Citations
“…In the remaining cases, most control flow diverges within the injected loop structure, leaving some vector entries unmodified. To ensure correct execution of these loops, instruction duplication techniques such as IPAS [28] and FlipBack [36] or low-cost invariant checks [23], offer the ability to ensure correct control flow with minor overheads. An optimization to lower the overhead of algorithmic based SDC detection schemes is to assume static data -e.g., the matrix in a linear solver is sufficiently protected that it does not need explicit checks for consistency and leaving SDC checks to inspect dynamic data.…”
Section: Abnormalmentioning
confidence: 99%
“…To combat this, software based SDC detection schemes have been developed, with many leveraging application properties and heuristics [10,12,25]. Others have taken application agnostic approaches [5,6,8] or leverage various forms of redundancy [19,28,37].…”
mentioning
confidence: 99%
See 1 more Smart Citation
“…There has been work at compiler level to selectively duplicate instructions that may cause user-visible errors [17,22]. Shoestring [17] uses the data flow and control flow graphs of programs to select vulnerable instructions for error detection by duplication.…”
Section: Related Workmentioning
confidence: 99%
“…It is important to get an accurate picture of these proportions; for example, an application that experiences a large percentage of SDCs may require algorithmic error detection mechanisms, at the expense of runtime overhead. A concern in the HPC community is that a significant number of resilience studies have been based on this FI method [3,4,6,17,18,25,31,32,[34][35][36] (including our own work), which can potentially skew FI results and, in some cases, lead to incorrect conclusions. There has been research done in showing these inaccuracies.…”
Section: Introductionmentioning
confidence: 99%