Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
27
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
5
2

Relationship

1
6

Authors

Journals

citations
Cited by 49 publications
(27 citation statements)
references
References 30 publications
0
27
0
Order By: Relevance
“…The system utilization is therefore calculated according to next equation: (2) = ∑ =1 . We model an application A as a Directed Acyclic Graph (DAG).…”
Section: Application Modelmentioning
confidence: 99%
See 3 more Smart Citations
“…The system utilization is therefore calculated according to next equation: (2) = ∑ =1 . We model an application A as a Directed Acyclic Graph (DAG).…”
Section: Application Modelmentioning
confidence: 99%
“…2b two equidistant checkpoints are inserted. Thus, task 1 is composed of two execution intervals 1(1) and 1 (2) . In Fig.…”
Section: Uniform Checkpointing With Rollback Recoverymentioning
confidence: 99%
See 2 more Smart Citations
“…The overhead of local fault detection is not free since it is hard to achieve perfect transient fault detection. Space redundancy (i.e., replication), based on executing redundant replicas of task independently on different cores, does not require any specific fault detection mechanism and uses result comparison (majority voting) for fault detection and masking (Koren and Krishna 2007;Pradhan 1996;Salehi et al 2016b). To make a majority voting, the number of replicas should be an odd number so that triple modular redundancy (TMR) is commonly used (Chen et al 2016;Lyons and Vanderkulk 1962).…”
Section: Introductionmentioning
confidence: 99%