2009
DOI: 10.1109/jssc.2008.2007145
|View full text |Cite
|
Sign up to set email alerts
|

RazorII: In Situ Error Detection and Correction for PVT and SER Tolerance

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

3
240
0
2

Year Published

2012
2012
2019
2019

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 484 publications
(265 citation statements)
references
References 16 publications
3
240
0
2
Order By: Relevance
“…The most prominent techniques include TMR, BISER, Razor, GRAAL, Razor II and information redundancy [5,6,7,8,9,14]. TMR and BISER techniques employ hardware redundancy to mask hard errors and/or SEU at latch and flip-flop outputs.…”
Section: A Fault-tolerance In Logic Circuitsmentioning
confidence: 99%
See 2 more Smart Citations
“…The most prominent techniques include TMR, BISER, Razor, GRAAL, Razor II and information redundancy [5,6,7,8,9,14]. TMR and BISER techniques employ hardware redundancy to mask hard errors and/or SEU at latch and flip-flop outputs.…”
Section: A Fault-tolerance In Logic Circuitsmentioning
confidence: 99%
“…These circuits are combined of combinational logic and sequential elements such as latches and flip-flops. Different techniques have been proposed to protect the sequential part from hard errors and/or SEUs [5,6,7,8,9]. Some of these techniques are also efficient for SETs and timing errors that arrived at the combinational part of logic circuits [7,8].…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…The in-situ error detection and correction (EDAC) techniques [4,5,6,7,8,9,10,11,12,13] are proposed to eliminate the timing margins. They monitor timing violations by specially designed circuits, and then take measures to recover functionality of the design if such a violation occurs.…”
Section: Introductionmentioning
confidence: 99%
“…They monitor timing violations by specially designed circuits, and then take measures to recover functionality of the design if such a violation occurs. Examples of EDAC techniques include Razor [3,4,5,9], TIMBER [14], TDTB [6], DSTB [6,8], time borrowing [10,12,14], and etc. These techniques either correct timing errors with large cycle penalty, which in return degrades energy efficiency and throughput [10,15]; or require massive hardware cost and high design complexity to reduce the penalty, which makes them unsuitable for commercial processors [16].…”
Section: Introductionmentioning
confidence: 99%