-
1
-
-
0004072686
-
-
Addison-Wesley
-
A. Aho, R. Sethi, and J. Ullman, Compilers: Principles, Techniques, and Tools. Addison-Wesley, 1988.
-
(1988)
Compilers: Principles, Techniques, and Tools
-
-
Aho, A.1
Sethi, R.2
Ullman, J.3
-
2
-
-
0027963879
-
Efficient Detection of All Pointer and Array Access Errors
-
T. Austin, S. Breach, and G. Sohi, "Efficient Detection of All Pointer and Array Access Errors," Proc. Conf. Programming Language Design and Implementation, pp. 290-301, 1994.
-
(1994)
Proc. Conf. Programming Language Design and Implementation
, pp. 290-301
-
-
Austin, T.1
Breach, S.2
Sohi, G.3
-
4
-
-
0026139822
-
An Analysis of MIPS and SPARC Instruction Set Utilization on the SPEC Benchmarks
-
R. Cmelik, S. Kong, D. Ditzel, and E. Kelly, "An Analysis of MIPS and SPARC Instruction Set Utilization on the SPEC Benchmarks," Proc. Int'l Conf. Architectural Support for Programming Languages and Operating Systems, pp. 290-302, 1991.
-
(1991)
Proc. Int'l Conf. Architectural Support for Programming Languages and Operating Systems
, pp. 290-302
-
-
Cmelik, R.1
Kong, S.2
Ditzel, D.3
Kelly, E.4
-
7
-
-
0026618728
-
Formalizing Signature Analysis for Control Flow Checking of Pipelined RISC Microprocessors
-
X. Delord and G. Saucier, "Formalizing Signature Analysis for Control Flow Checking of Pipelined RISC Microprocessors," Proc. Int'l Test Conf., pp. 936-945, 1991.
-
(1991)
Proc. Int'l Test Conf.
, pp. 936-945
-
-
Delord, X.1
Saucier, G.2
-
8
-
-
0026821098
-
New CPU Benchmark Suites from SPEC
-
Spring 1992
-
K. Dixit, "New CPU Benchmark Suites from SPEC," Digest of Papers Compcon, Spring 1992, pp. 305-310, 1992.
-
(1992)
Digest of Papers Compcon
, pp. 305-310
-
-
Dixit, K.1
-
9
-
-
0026955423
-
A 200-mhz 64-b Dual-Issue CMOS Microprocessor
-
Nov.
-
D. Dobberphul et al., "A 200-mhz 64-b Dual-Issue CMOS Microprocessor," IEEE J. Solid State Circuits, vol. 27, no. 11, pp. 1,555-1,567, Nov. 1992.
-
(1992)
IEEE J. Solid State Circuits
, vol.27
, Issue.11
-
-
Dobberphul, D.1
-
10
-
-
0024873086
-
Evaluation of Error Detection Schemes Using Fault Injection by Heavy-Ion Radiation
-
U. Gunneflo, J. Karlsson, and J. Torin, "Evaluation of Error Detection Schemes Using Fault Injection by Heavy-Ion Radiation," Proc. Int'l Symp. Fault-Tolerant Computing, pp. 340-347, 1989.
-
(1989)
Proc. Int'l Symp. Fault-Tolerant Computing
, pp. 340-347
-
-
Gunneflo, U.1
Karlsson, J.2
Torin, J.3
-
11
-
-
0000596666
-
Purify: Fast Detection of Memory Leaks and Access Errors
-
R. Hastings and B. Joyce, "Purify: Fast Detection of Memory Leaks and Access Errors," Proc. Winter Usenix Conf., pp. 125-136, 1992.
-
(1992)
Proc. Winter Usenix Conf.
, pp. 125-136
-
-
Hastings, R.1
Joyce, B.2
-
16
-
-
0027701722
-
FINE: A Fault Injection and Monitoring Environment for Tracing the UNIX System Behavior under Faults
-
Nov.
-
W. Kao, R. Iyer, and D. Tang, "FINE: A Fault Injection and Monitoring Environment for Tracing the UNIX System Behavior Under Faults," IEEE Trans. Software Eng., vol. 19, no. 11, pp. 1,105-1,118, Nov. 1993.
-
(1993)
IEEE Trans. Software Eng.
, vol.19
, Issue.11
-
-
Kao, W.1
Iyer, R.2
Tang, D.3
-
18
-
-
84976850651
-
A Brief Survey of Papers on Scheduling for Pipelined Processors
-
July
-
S. Krishnamurth, "A Brief Survey of Papers on Scheduling for Pipelined Processors," SIGPLAN Notices, vol. 25, no. 7, pp. 97-106, July 1990.
-
(1990)
SIGPLAN Notices
, vol.25
, Issue.7
, pp. 97-106
-
-
Krishnamurth, S.1
-
19
-
-
0023961238
-
Concurrent Error Detection Using Watchdog Processors - A Survey
-
Feb.
-
A. Mahmood and E. McCluskey, "Concurrent Error Detection Using Watchdog Processors - A Survey," IEEE Trans. Computers, vol. 37, no. 2, pp. 160-174, Feb. 1988.
-
(1988)
IEEE Trans. Computers
, vol.37
, Issue.2
, pp. 160-174
-
-
Mahmood, A.1
McCluskey, E.2
-
20
-
-
0025557712
-
An Empirical Study of UNIX Utilities
-
Dec.
-
B. Miller, L. Fredriksen, and B. So, "An Empirical Study of UNIX Utilities," Comm. ACM, vol. 33, no. 12, pp. 32-44, Dec. 1989.
-
(1989)
Comm. ACM
, vol.33
, Issue.12
, pp. 32-44
-
-
Miller, B.1
Fredriksen, L.2
So, B.3
-
21
-
-
0020302217
-
Techniques for Concurrent Testing of VLSI Processor Operation
-
M. Namjoo, "Techniques for Concurrent Testing of VLSI Processor Operation," Proc. Int'l Test Conf., pp. 461-468, 1982.
-
(1982)
Proc. Int'l Test Conf.
, pp. 461-468
-
-
Namjoo, M.1
-
22
-
-
84881290765
-
A Study of the Effects of Transient Fault Injection into a 32-bit RISC with Built-in Watchdog
-
J. Ohlsson, M. Rimen, and U. Genneflo, "A Study of the Effects of Transient Fault Injection into a 32-bit RISC with Built-in Watchdog," Proc. Int'l Symp. Fault-Tolerant Computing, pp. 316-325, 1992.
-
(1992)
Proc. Int'l Symp. Fault-Tolerant Computing
, pp. 316-325
-
-
Ohlsson, J.1
Rimen, M.2
Genneflo, U.3
-
23
-
-
0027659116
-
Scheduling Time-Critical Instructions on RISC Machines
-
Sept.
-
K. Palem and B. Simons, "Scheduling Time-Critical Instructions on RISC Machines," ACM Trans. Programming Languages and Systems, vol. 15, no. 4, pp. 632-658, Sept. 1993.
-
(1993)
ACM Trans. Programming Languages and Systems
, vol.15
, Issue.4
, pp. 632-658
-
-
Palem, K.1
Simons, B.2
-
24
-
-
0025416472
-
Control-Flow Checking Using Watchdog Assists and Extended-Precision Checksums
-
Apr.
-
N. Saxena and E. McCluskey, "Control-Flow Checking Using Watchdog Assists and Extended-Precision Checksums," IEEE Trans. Computers, vol. 39, no. 4, pp. 554-558, Apr. 1990.
-
(1990)
IEEE Trans. Computers
, vol.39
, Issue.4
, pp. 554-558
-
-
Saxena, N.1
McCluskey, E.2
-
25
-
-
0023314559
-
Processor Control Flow Monitoring Using Signatured Instruction Streams
-
Mar.
-
M. Schuette and J. Shen, "Processor Control Flow Monitoring Using Signatured Instruction Streams," IEEE Trans. Computers, vol. 36, no. 3, pp. 264-276, Mar. 1987.
-
(1987)
IEEE Trans. Computers
, vol.36
, Issue.3
, pp. 264-276
-
-
Schuette, M.1
Shen, J.2
-
28
-
-
0024913502
-
A Study of Time-Redundant Fault Tolerant Techniques for High-Performance Pipelined Computers
-
G. Sohi, M. Franklin, and K. Saluja, "A Study of Time-Redundant Fault Tolerant Techniques for High-Performance Pipelined Computers," Proc. Int'l Symp. Fault-Tolerant Computing, pp. 436-443, 1989.
-
(1989)
Proc. Int'l Symp. Fault-Tolerant Computing
, pp. 436-443
-
-
Sohi, G.1
Franklin, M.2
Saluja, K.3
-
29
-
-
0020304742
-
Concurrent Checking of Program Flow in VLSI Processors
-
T. Sridhar and S. Thatte, "Concurrent Checking of Program Flow in VLSI Processors," Proc. Int'l Test Conf., pp. 191-199, 1982.
-
(1982)
Proc. Int'l Test Conf.
, pp. 191-199
-
-
Sridhar, T.1
Thatte, S.2
-
31
-
-
0026170711
-
Software Defects and Their Impact on System Availability - A Study of Field Failures in Operating Systems
-
M. Sullivan and R. Chillarege, "Software Defects and Their Impact on System Availability - A Study of Field Failures in Operating Systems," Proc. Int'l Symp. Fault-Tolerant Computing, pp. 2-9, 1991.
-
(1991)
Proc. Int'l Symp. Fault-Tolerant Computing
, pp. 2-9
-
-
Sullivan, M.1
Chillarege, R.2
-
32
-
-
0019079256
-
Redundancy in Data Structures: Improving Software Fault Tolerance
-
Nov.
-
D. Taylor, D. Morgan, and J. Black, "Redundancy in Data Structures: Improving Software Fault Tolerance," IEEE Trans. Software Eng., vol. 6, no. 6, pp. 585-594, Nov. 1980.
-
(1980)
IEEE Trans. Software Eng.
, vol.6
, Issue.6
, pp. 585-594
-
-
Taylor, D.1
Morgan, D.2
Black, J.3
-
33
-
-
0028467137
-
New Efficient Designs for XOR and XNOR Functions on the Transistor Level
-
July
-
J. Wang, S. Fang, and W. Feng, "New Efficient Designs for XOR and XNOR Functions on the Transistor Level," IEEE J. Solid State Circuits, vol. 29, no. 7, pp. 780-786, July 1994.
-
(1994)
IEEE J. Solid State Circuits
, vol.29
, Issue.7
, pp. 780-786
-
-
Wang, J.1
Fang, S.2
Feng, W.3
-
34
-
-
0025673043
-
A Software Based Approach to Achieving Optimal Performance for Signature Control Flow Checking
-
N. Warter and W. Hwu, "A Software Based Approach to Achieving Optimal Performance for Signature Control Flow Checking," Proc. Int'l Symp. Fault-Tolerant Computing, pp. 442-449, 1990.
-
(1990)
Proc. Int'l Symp. Fault-Tolerant Computing
, pp. 442-449
-
-
Warter, N.1
Hwu, W.2
-
35
-
-
0027698251
-
An Optimal Graph-Construction Approach to Placing Program Signaturea for Signature Monitoring
-
Nov.
-
K. Wilken, "An Optimal Graph-Construction Approach to Placing Program Signaturea for Signature Monitoring," IEEE Trans. Computers, vol. 42, no. 11, pp. 1,372-1,381, Nov. 1993.
-
(1993)
IEEE Trans. Computers
, vol.42
, Issue.11
-
-
Wilken, K.1
-
36
-
-
33746941387
-
A RISC Architecture for Concurrent Error Detection
-
Univ. of California at Davis, June
-
K. Wilken, A. Barr, and R. Hoskin, "A RISC Architecture for Concurrent Error Detection," Technical Report ECE-CERL-TR-95-06-01, Univ. of California at Davis, June 1995.
-
(1995)
Technical Report ECE-CERL-TR-95-06-01
-
-
Wilken, K.1
Barr, A.2
Hoskin, R.3
-
37
-
-
0025439730
-
Continuous Signature Monitoring: Low-Cost Concurrent-Detection of Processor Control Errors
-
June
-
K. Wilken and J. Shen, "Continuous Signature Monitoring: Low-Cost Concurrent-Detection of Processor Control Errors," IEEE Trans. Computer-Aided Design, vol. 9, no. 3, pp. 629-641, June 1990.
-
(1990)
IEEE Trans. Computer-Aided Design
, vol.9
, Issue.3
, pp. 629-641
-
-
Wilken, K.1
Shen, J.2
|