메뉴 건너뛰기




Volumn 44, Issue 7, 2009, Pages 41-49

A compiler optimization to reduce soft errors in register files

Author keywords

Architectural vulnerability factor; Compilation; Embedded system; Link time optimization; Register file; Soft error; Static analysis

Indexed keywords

EMBEDDED SYSTEMS; ERROR CORRECTION; HEURISTIC ALGORITHMS; PROGRAM COMPILERS; RADIATION HARDENING; STATIC ANALYSIS;

EID: 67650825001     PISSN: 15232867     EISSN: None     Source Type: Journal    
DOI: 10.1145/1543136.1542459     Document Type: Conference Paper
Times cited : (12)

References (27)
  • 1
    • 67650832306 scopus 로고    scopus 로고
    • Todd Austin. SimpleScalar LLC. URL http://www.simplescalar.com/.
    • Todd Austin. SimpleScalar LLC. URL http://www.simplescalar.com/.
  • 2
    • 34547178825 scopus 로고    scopus 로고
    • Cost-efficient soft error protection for embedded microprocessors
    • Jason A. Blome, Shantanu Gupta, Shuguang Feng, and Scott Mahlke. Cost-efficient soft error protection for embedded microprocessors. In CASES '06, pages 421-431, 2006.
    • (2006) CASES '06 , pp. 421-431
    • Blome, J.A.1    Gupta, S.2    Feng, S.3    Mahlke, S.4
  • 3
    • 0034794870 scopus 로고    scopus 로고
    • Retargetable static timing analysis for embedded software
    • Kaiyu Chen, Sharad Malik, and David I. August. Retargetable static timing analysis for embedded software. In ISSS '01, pages 39-44, 2001.
    • (2001) ISSS '01 , pp. 39-44
    • Chen, K.1    Malik, S.2    August, D.I.3
  • 7
    • 67650800303 scopus 로고    scopus 로고
    • executive summary. URL
    • ITRS. International technology roadmap for semiconductors 2007 executive summary. URL http://www.itrs.net/.
    • (2007)
  • 9
    • 84990479742 scopus 로고
    • An efficient heuristic procedure for partitioning graphs
    • February
    • B. Kernighan and S. Lin. An efficient heuristic procedure for partitioning graphs. Bell System Tech. Journal, 49:291-307, February 1970.
    • (1970) Bell System Tech. Journal , vol.49 , pp. 291-307
    • Kernighan, B.1    Lin, S.2
  • 13
    • 52649105030 scopus 로고    scopus 로고
    • Online estimation of architectural vulnerability factor for soft errors
    • Xiaodong Li, Sarita V. Adve, Pradip Bose, and Jude A. Rivers. Online estimation of architectural vulnerability factor for soft errors. SIGARCH Comput. Archit. News, 36(3):341-352, 2008.
    • (2008) SIGARCH Comput. Archit. News , vol.36 , Issue.3 , pp. 341-352
    • Li, X.1    Adve, S.V.2    Bose, P.3    Rivers, J.A.4
  • 15
    • 15044363155 scopus 로고    scopus 로고
    • Robust system design with built-in soft-error resilience
    • Subhasish Mitra, Norbert Seifert, Ming Zhang, Quan Shi, and Kee Sup Kim. Robust system design with built-in soft-error resilience. IEEE Computer, 38(2):43-52, 2005.
    • (2005) IEEE Computer , vol.38 , Issue.2 , pp. 43-52
    • Mitra, S.1    Seifert, N.2    Zhang, M.3    Shi, Q.4    Sup Kim, K.5
  • 16
    • 36049000932 scopus 로고    scopus 로고
    • Using register lifetime predictions to protect register files against soft errors
    • Pablo Montesinos, Wei Liu, and Josep Torrellas. Using register lifetime predictions to protect register files against soft errors. In DSN '07, pages 286-296, 2007.
    • (2007) DSN '07 , pp. 286-296
    • Montesinos, P.1    Liu, W.2    Torrellas, J.3
  • 19
    • 0036507790 scopus 로고    scopus 로고
    • Error detection by duplicated instructions in super-scalar processors
    • Nahmsuk Oh, Philip P. Shirvani, and Edward J. McCluskey. Error detection by duplicated instructions in super-scalar processors. IEEE Transactions on Reliability, 51:63-75, 2002b.
    • (2002) IEEE Transactions on Reliability , vol.51 , pp. 63-75
    • Oh, N.1    Shirvani, P.P.2    McCluskey, E.J.3
  • 21
    • 16244386553 scopus 로고    scopus 로고
    • Operation tables for scheduling in the presence of incomplete bypassing
    • Aviral Shrivastava, Eugene Earlie, Nikil D. Dutt, and Alexandru Nicolau. Operation tables for scheduling in the presence of incomplete bypassing. In CODES+ISSS, pages 194-199, 2004.
    • (2004) CODES+ISSS , pp. 194-199
    • Shrivastava, A.1    Earlie, E.2    Dutt, N.D.3    Nicolau, A.4
  • 23
    • 0032667728 scopus 로고    scopus 로고
    • Timothy J. Slegel, Robert M. III Averill, Mark A. Check, Bruce C. Giamei, Barry W. Krumm, Christopher A. Krygowski, Wen H. Li, John S. Liptay, John D. MacDougall, Thomas J. McPher-son, Jennifer A. Navarro, Eric M. Schwarz, Kevin Shum, and Charles F. Webb. IBM's S/390 G5 microprocessor design. IEEE Micro, 19(2):12-23, 1999.
    • Timothy J. Slegel, Robert M. III Averill, Mark A. Check, Bruce C. Giamei, Barry W. Krumm, Christopher A. Krygowski, Wen H. Li, John S. Liptay, John D. MacDougall, Thomas J. McPher-son, Jennifer A. Navarro, Eric M. Schwarz, Kevin Shum, and Charles F. Webb. IBM's S/390 G5 microprocessor design. IEEE Micro, 19(2):12-23, 1999.
  • 24
    • 35348845144 scopus 로고    scopus 로고
    • Dynamic prediction of architectural vulnerability from microarchitectural state
    • Kristen R. Walcott, Greg Humphreys, and Sudhanva Gurumurthi. Dynamic prediction of architectural vulnerability from microarchitectural state. SIGARCH CA News, (2):516-527, 2007.
    • (2007) SIGARCH CA News , vol.2 , pp. 516-527
    • Walcott, K.R.1    Humphreys, G.2    Gurumurthi, S.3
  • 25
    • 0028768030 scopus 로고
    • Static branch frequency and program profile analysis
    • Youfeng Wu and James Larus. Static branch frequency and program profile analysis. In MICRO 27, pages 1-11, 1994.
    • (1994) MICRO 27 , pp. 1-11
    • Wu, Y.1    Larus, J.2
  • 26
    • 29244462335 scopus 로고    scopus 로고
    • Compiler-guided register reliability improvement against soft errors
    • Jun Yan and Wei Zhang. Compiler-guided register reliability improvement against soft errors. In EMSOFT '05, pages 203-209, 2005.
    • (2005) EMSOFT '05 , pp. 203-209
    • Yan, J.1    Zhang, W.2
  • 27
    • 0030129806 scopus 로고    scopus 로고
    • The MIPS R10000 superscalar microprocessor
    • K. C. Yeager. The MIPS R10000 superscalar microprocessor. IEEE Micro, 1996.
    • (1996) IEEE Micro
    • Yeager, K.C.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.