2015
DOI: 10.1109/tvlsi.2015.2497368
|View full text |Cite
|
Sign up to set email alerts
|

Unequal-Error-Protection Error Correction Codes for the Embedded Memories in Digital Signal Processors

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
5
0

Year Published

2018
2018
2021
2021

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(5 citation statements)
references
References 10 publications
0
5
0
Order By: Relevance
“…11(a). For B = 8, a (15,11) Hamming code cannot be incorporated into an 8-bit word. Hence, we store four parity bits of a Hamming (15,11) codeword in the last LSBs of four different 8-bit words as proposed in [18].…”
Section: Numerical Resultsmentioning
confidence: 99%
See 3 more Smart Citations
“…11(a). For B = 8, a (15,11) Hamming code cannot be incorporated into an 8-bit word. Hence, we store four parity bits of a Hamming (15,11) codeword in the last LSBs of four different 8-bit words as proposed in [18].…”
Section: Numerical Resultsmentioning
confidence: 99%
“…For B = 8, a (15,11) Hamming code cannot be incorporated into an 8-bit word. Hence, we store four parity bits of a Hamming (15,11) codeword in the last LSBs of four different 8-bit words as proposed in [18]. Note that selective ECC (15,11) for B = 8 converges to LSB dropping (L = 1) for high E(∆) since both schemes discard only the last LSBs.…”
Section: Numerical Resultsmentioning
confidence: 99%
See 2 more Smart Citations
“…In addition to the main thread, FERNANDO creates two redundant threads (Rthread1 and Rthread2) on two spare cores to redundantly execute the original program. Assuming that memory and cache are already effectively protected by widely used Error Correction Codes (ECC) [15], [31], [32], FERNANDO focus on errors inside the microprocessor, such as pipeline register, function units, and register file. As with all existing software RMT error resilience techniques [15][16][17][18][19][20], we focus on protecting the application instructions and function calls.…”
Section: Our Solution: Fernandomentioning
confidence: 99%