-
1
-
-
70350074012
-
-
executive summary, Online, Available
-
"International technology roadmap for semiconductors 2007 executive summary." [Online]. Available: http://www.itrs.net/.
-
(2007)
-
-
-
2
-
-
34547178825
-
Cost-efficient soft error protection for embedded microprocessors
-
J. A. Blome et al., "Cost-efficient soft error protection for embedded microprocessors," in CASES '06, 2006, pp. 421-431.
-
(2006)
CASES '06
, pp. 421-431
-
-
Blome, J.A.1
-
3
-
-
15044363155
-
Robust system design with built-in soft-error resilience
-
S. Mitra et al., "Robust system design with built-in soft-error resilience," IEEE Computer, vol. 38, pp. 43-52, 2005.
-
(2005)
IEEE Computer
, vol.38
, pp. 43-52
-
-
Mitra, S.1
-
4
-
-
16244386553
-
Operation tables for scheduling in the presence of incomplete bypassing
-
A. Shrivastava et al., "Operation tables for scheduling in the presence of incomplete bypassing." in CODES+ISSS, 2004, pp. 194-199.
-
(2004)
CODES+ISSS
, pp. 194-199
-
-
Shrivastava, A.1
-
6
-
-
0038721289
-
Basic mechanisms and modeling of single-event upset in digital microelectronics
-
June
-
P. Dodd and L. Massengill, "Basic mechanisms and modeling of single-event upset in digital microelectronics," IEEE Trans. on Nuclear Science, vol. 50, pp. 583-602, June 2003.
-
(2003)
IEEE Trans. on Nuclear Science
, vol.50
, pp. 583-602
-
-
Dodd, P.1
Massengill, L.2
-
8
-
-
28444441586
-
-
J. Hasan et al., Heat stroke: Power-density-based denial of service in SMT, in HPCA, 2005.
-
J. Hasan et al., "Heat stroke: Power-density-based denial of service in SMT," in HPCA, 2005.
-
-
-
-
9
-
-
33748999034
-
Bypass aware instruction scheduling for register file power reduction
-
S. Park et al., "Bypass aware instruction scheduling for register file power reduction," in LCTES, 2006, pp. 173-181.
-
(2006)
LCTES
, pp. 173-181
-
-
Park, S.1
-
10
-
-
27544478318
-
Engineering over-clocking: Reliability-performance trade-offs for high-performance register files
-
G. Memik et al., "Engineering over-clocking: reliability-performance trade-offs for high-performance register files," DSN '05, 2005.
-
(2005)
DSN '05
-
-
Memik, G.1
-
11
-
-
36049000932
-
Using register lifetime predictions to protect register files against soft errors
-
P. Montesinos et al., "Using register lifetime predictions to protect register files against soft errors," in DSN '07, 2007, pp. 286-296.
-
(2007)
DSN '07
, pp. 286-296
-
-
Montesinos, P.1
-
12
-
-
64549139547
-
An area-efficient approach to improving register file reliability against transient errors
-
M. Kandala et al., "An area-efficient approach to improving register file reliability against transient errors," in ISEC, 2007.
-
(2007)
ISEC
-
-
Kandala, M.1
-
13
-
-
70350061485
-
-
Compiler-Managed Register File Protection for Energy-Efficient Soft Error Reduction
-
Compiler-Managed Register File Protection for Energy-Efficient Soft Error Reduction, 2009.
-
(2009)
-
-
-
14
-
-
29244462335
-
Compiler-guided register reliability improvement against soft errors
-
J. Yan and W. Zhang, "Compiler-guided register reliability improvement against soft errors," in EMSOFT '05, 2005, pp. 203-209.
-
(2005)
EMSOFT '05
, pp. 203-209
-
-
Yan, J.1
Zhang, W.2
-
15
-
-
84944403418
-
A systematic methodology to compute the architectural vulnerability factors for a high-performance microprocessor
-
Dec
-
S. S. Mukherjee et al., "A systematic methodology to compute the architectural vulnerability factors for a high-performance microprocessor," in Proc. International Symposium on Microarchitecture, Dec 2003.
-
(2003)
Proc. International Symposium on Microarchitecture
-
-
Mukherjee, S.S.1
-
16
-
-
0032667728
-
IBM's S/390 G5 microprocessor design
-
T. J. Slegel et al., "IBM's S/390 G5 microprocessor design," IEEE Micro, vol. 19, pp. 12-23, 1999.
-
(1999)
IEEE Micro
, vol.19
, pp. 12-23
-
-
Slegel, T.J.1
-
17
-
-
52649105030
-
Online estimation of architectural vulnerability factor for soft errors
-
X. Li et al., "Online estimation of architectural vulnerability factor for soft errors," SIGARCH Comput. Archit. News, vol. 36, pp. 341-352, 2008.
-
(2008)
SIGARCH Comput. Archit. News
, vol.36
, pp. 341-352
-
-
Li, X.1
-
18
-
-
35348845144
-
Dynamic prediction of architectural vulnerability from microarchitectural state,
-
K. R. Walcott et al., "Dynamic prediction of architectural vulnerability from microarchitectural state," SIGARCH CA News, pp. 516-527, 2007.
-
(2007)
SIGARCH CA News
, pp. 516-527
-
-
Walcott, K.R.1
-
19
-
-
0034794870
-
Retargetable static timing analysis for embedded software
-
K. Chen et al., "Retargetable static timing analysis for embedded software," in ISSS '01, 2001, pp. 39-44.
-
(2001)
ISSS '01
, pp. 39-44
-
-
Chen, K.1
-
20
-
-
0034832018
-
Exact analysis of the cache behavior of nested loops
-
S. Chatterjee et al., "Exact analysis of the cache behavior of nested loops," in PLDI '01, 2001, pp. 286-297.
-
(2001)
PLDI '01
, pp. 286-297
-
-
Chatterjee, S.1
-
22
-
-
84962779213
-
Mibench: A free, commercially representative embedded benchmark suite
-
M. Guthaus et al., "Mibench: A free, commercially representative embedded benchmark suite," in IWWC, 2001.
-
(2001)
IWWC
-
-
Guthaus, M.1
-
24
-
-
0028768030
-
Static branch frequency and program profile analysis
-
Y. Wu and J. Larus, "Static branch frequency and program profile analysis," in MICRO 27, 1994, pp. 1-11.
-
(1994)
MICRO 27
, pp. 1-11
-
-
Wu, Y.1
Larus, J.2
|