Proceedings 1999 IEEE International Symposium on Defect and Fault Tolerance in VLSI Systems (EFT'99)
DOI: 10.1109/dftvs.1999.802887
|View full text |Cite
|
Sign up to set email alerts
|

Soft-error detection through software fault-tolerance techniques

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
54
0

Publication Types

Select...
5
3
2

Relationship

2
8

Authors

Journals

citations
Cited by 111 publications
(54 citation statements)
references
References 4 publications
0
54
0
Order By: Relevance
“…The first step is, to identify the critical path in the data flow graph. The authors of [14,17,32] who proposed CPD technique introduced a simple principle for critical path detection. The longest path in the data flow graph is considered as a critical path because of the great possibility of error occurrence on that long path.…”
Section: Error Detection By Critical Path Duplicationmentioning
confidence: 99%
“…The first step is, to identify the critical path in the data flow graph. The authors of [14,17,32] who proposed CPD technique introduced a simple principle for critical path detection. The longest path in the data flow graph is considered as a critical path because of the great possibility of error occurrence on that long path.…”
Section: Error Detection By Critical Path Duplicationmentioning
confidence: 99%
“…Two types of errors are generally distinguished: data-flow errors, which affect data computations, and control-flow errors, which affect the correct order of instruction execution. Techniques for dataflow error detection are typically based on instruction and data duplication and comparison [22]. For control-flow errors, there is variety of techniques which are based on assertions [9], [10] or signatures [3], [11].…”
Section: Background and Related Workmentioning
confidence: 99%
“…To experimentally show the significance of the identified critical variables, we use a basic error correction scheme for these variables, similar to [18]. Firstly, we duplicate each considered variable and its computations in the C source code.…”
Section: Fault Correction By Software Redundancymentioning
confidence: 99%