-
1
-
-
0036931372
-
Modeling the Effect of Technology Trends on Soft Error Rate of Combinational Logic
-
Jun
-
M. Kistler, S. Keckler, D. Burger, and L. Alvisi, "Modeling the Effect of Technology Trends on Soft Error Rate of Combinational Logic," DSN, pp. 389-398, Jun. 2002.
-
(2002)
DSN
, pp. 389-398
-
-
Kistler, M.1
Keckler, S.2
Burger, D.3
Alvisi, L.4
-
2
-
-
9144234352
-
Characterization of Soft Errors Caused by Single Event Upsets in CMOS Processes
-
Jun
-
T. Karnik, P. Hazucha, and J. Patel, "Characterization of Soft Errors Caused by Single Event Upsets in CMOS Processes," IEEE Trans. on Dependable and Secure Computing, 1(2):128-143, Jun. 2004.
-
(2004)
IEEE Trans. on Dependable and Secure Computing
, vol.1
, Issue.2
, pp. 128-143
-
-
Karnik, T.1
Hazucha, P.2
Patel, J.3
-
3
-
-
57649151158
-
Sim-SODA: A Unified Framework for Architectural Level Software Reliability Analysis
-
Jun
-
X. Fu, T. Li, and J. Fortes, "Sim-SODA: A Unified Framework for Architectural Level Software Reliability Analysis," Workshop on Modeling, Benchmarking and Simulation (Held in conjunction with ISCA), Jun. 2006.
-
(2006)
Workshop on Modeling, Benchmarking and Simulation (Held in conjunction with ISCA)
-
-
Fu, X.1
Li, T.2
Fortes, J.3
-
4
-
-
0032597692
-
AR-SMT: A microarchitectrual approach to fault tolerance in microprocessors
-
Jun
-
E. Rotenberg, "AR-SMT: A microarchitectrual approach to fault tolerance in microprocessors," FTCS, pp. 84-91, Jun. 1999.
-
(1999)
FTCS
, pp. 84-91
-
-
Rotenberg, E.1
-
5
-
-
0038346239
-
Transient-fault recovery for chip multiprocessors
-
Jun
-
M. Gomaa, C. Scarbrough, T. N. Vijaykumar, I. Pomeranz, "Transient-fault recovery for chip multiprocessors," ISCA, pp. 98-109, Jun. 2003.
-
(2003)
ISCA
, pp. 98-109
-
-
Gomaa, M.1
Scarbrough, C.2
Vijaykumar, T.N.3
Pomeranz, I.4
-
6
-
-
0036287327
-
Detailed Design and Evaluation of Redundant Multithreading Alternatives
-
May
-
S. S. Mukherjee, M. Kontz, and S. Reinhardt, "Detailed Design and Evaluation of Redundant Multithreading Alternatives," ISCA, pp. 99-110, May 2002.
-
(2002)
ISCA
, pp. 99-110
-
-
Mukherjee, S.S.1
Kontz, M.2
Reinhardt, S.3
-
7
-
-
4544282186
-
Characterizing the Effects of Transient Faults on a High-Performance Processor Pipeline
-
Jun
-
N. J. Wang, J. Quek, T. M. Rafacz, and S. J. Patel, "Characterizing the Effects of Transient Faults on a High-Performance Processor Pipeline," DSN, pp. 61-70, Jun. 2004.
-
(2004)
DSN
, pp. 61-70
-
-
Wang, N.J.1
Quek, J.2
Rafacz, T.M.3
Patel, S.J.4
-
8
-
-
84944403418
-
A Systematic Methodology to Compute the Architectural Vulnerability Factors for a High-Performance Microprocessor
-
Dec
-
S. Mukherjee, C. Weaver, J. Emer, S. Reinhardt, and T. Austin, "A Systematic Methodology to Compute the Architectural Vulnerability Factors for a High-Performance Microprocessor," MICRO, pp. 29-40, Dec. 2003.
-
(2003)
MICRO
, pp. 29-40
-
-
Mukherjee, S.1
Weaver, C.2
Emer, J.3
Reinhardt, S.4
Austin, T.5
-
9
-
-
84891462123
-
-
X. Fu, J. Poe, T. Li, and J. Fortes, Characterizing Microarchitecture Soft Error Vulnerability Phase Behavior, MASCOTS, pp. 147-155, M. A. Gomaa and T. N. Vijaykumar, Opportunistic transient-fault detection, ISCA, pp. 172-183, Jun. 2005.
-
X. Fu, J. Poe, T. Li, and J. Fortes, "Characterizing Microarchitecture Soft Error Vulnerability Phase Behavior," MASCOTS, pp. 147-155, M. A. Gomaa and T. N. Vijaykumar, "Opportunistic transient-fault detection," ISCA, pp. 172-183, Jun. 2005.
-
-
-
-
10
-
-
27544468225
-
Opportunistic transient-fault detection
-
Jun
-
M. A. Gomaa and T. N. Vijaykumar, "Opportunistic transient-fault detection," ISCA, pp. 172-183, Jun. 2005.
-
(2005)
ISCA
, pp. 172-183
-
-
Gomaa, M.A.1
Vijaykumar, T.N.2
-
11
-
-
28444483117
-
The Soft Error Problem: An Architectural Perspective
-
Feb
-
S. Mukherjee, J. Emer, and S. Reinhardt, "The Soft Error Problem: An Architectural Perspective," HPCA, pp. 243-247, Feb. 2005.
-
(2005)
HPCA
, pp. 243-247
-
-
Mukherjee, S.1
Emer, J.2
Reinhardt, S.3
-
12
-
-
52649105030
-
Online Estimation of Architectural Vulnerability Factor for Soft Errors
-
Jun
-
X. Li, S. V. Adve, P. Bose, and J. A. Rivers, "Online Estimation of Architectural Vulnerability Factor for Soft Errors," ISCA, pp. 341-352, Jun. 2008.
-
(2008)
ISCA
, pp. 341-352
-
-
Li, X.1
Adve, S.V.2
Bose, P.3
Rivers, J.A.4
-
13
-
-
35348845144
-
Dynamic Prediction of Architectural Vulnerability from Microarchitectural State
-
Jun
-
K. Walcott, G. Humpheys, and S. Gurumurthi, "Dynamic Prediction of Architectural Vulnerability from Microarchitectural State," ISCA, pp. 516-527, Jun. 2007.
-
(2007)
ISCA
, pp. 516-527
-
-
Walcott, K.1
Humpheys, G.2
Gurumurthi, S.3
-
14
-
-
35348914300
-
Mechanisms for Bounding Vulnerabilities of Processor Structures
-
Jun
-
N. Soundararajan, A. Parashar, and A. Sivasubramaniam, "Mechanisms for Bounding Vulnerabilities of Processor Structures," ISCA, pp. 506-515, Jun. 2007.
-
(2007)
ISCA
, pp. 506-515
-
-
Soundararajan, N.1
Parashar, A.2
Sivasubramaniam, A.3
-
15
-
-
0012612903
-
Sim-alpha: A Validated, Execution-Driven Alpha 21264 Simulator,
-
Technical Report, TR-01-23, Department of Computer Sciences, University of Texas at Austin
-
R. Desikan, D. Burger, S. Keckler, and T. Austin, "Sim-alpha: A Validated, Execution-Driven Alpha 21264 Simulator," Technical Report, TR-01-23, Department of Computer Sciences, University of Texas at Austin, 2001.
-
(2001)
-
-
Desikan, R.1
Burger, D.2
Keckler, S.3
Austin, T.4
-
16
-
-
0034844928
-
Measuring Experimental Error in Microprocessor Simulation
-
Jun
-
R. Desikan, D. Burger, and S. Keckler, "Measuring Experimental Error in Microprocessor Simulation," ISCA, pp. 266-277, Jun. 2001.
-
(2001)
ISCA
, pp. 266-277
-
-
Desikan, R.1
Burger, D.2
Keckler, S.3
-
17
-
-
0032639289
-
The Alpha 21264 Microprocessor
-
Mar./Apr
-
R. E. Kessler, "The Alpha 21264 Microprocessor," IEEE Micro, 19(2):24-36, Mar./Apr. 1999.
-
(1999)
IEEE Micro
, vol.19
, Issue.2
, pp. 24-36
-
-
Kessler, R.E.1
-
18
-
-
0036953769
-
Automatically Characterizing Large Scale Program Behavior
-
Oct
-
T. Sherwood, E. Perelman, G. Hamerly, and B. Calder, "Automatically Characterizing Large Scale Program Behavior," ASPLOS, pp. 45-57, Oct. 2002.
-
(2002)
ASPLOS
, pp. 45-57
-
-
Sherwood, T.1
Perelman, E.2
Hamerly, G.3
Calder, B.4
-
19
-
-
34247169237
-
Performance prediction based on inherent program similarity
-
Sep
-
K. Hoste, and A. Phansalkar, et al, "Performance prediction based on inherent program similarity," PACT, pp 114-122, Sep. 2006.
-
(2006)
PACT
, pp. 114-122
-
-
Hoste, K.1
Phansalkar, A.2
-
20
-
-
0035694429
-
Performance Characterization of a Hardware Mechanism for Dynamic Optimization
-
Dec
-
B. Fahs, and S. Bose, et al, "Performance Characterization of a Hardware Mechanism for Dynamic Optimization," MICRO, pp. 16-27, Dec. 2001.
-
(2001)
MICRO
, pp. 16-27
-
-
Fahs, B.1
Bose, S.2
-
21
-
-
0035696756
-
The Impact of If-Conversion and Branch Prediction on Program Execution on the Intel Itanium Processor
-
Dec
-
Y. Choi, A. Knies, L. Gerke, and T. F. Ngai, "The Impact of If-Conversion and Branch Prediction on Program Execution on the Intel Itanium Processor," MICRO, pp. 182-191, Dec. 2001.
-
(2001)
MICRO
, pp. 182-191
-
-
Choi, Y.1
Knies, A.2
Gerke, L.3
Ngai, T.F.4
-
22
-
-
27544458902
-
Computing Architectural Vulnerability Factors for Address-Based Structures
-
Jun
-
A. Biswas, P. Racunas, R. Cheveresan, J. Emer, S. Mukherjee, and R. Rangan, "Computing Architectural Vulnerability Factors for Address-Based Structures," ISCA, pp. 532-543, Jun. 2005.
-
(2005)
ISCA
, pp. 532-543
-
-
Biswas, A.1
Racunas, P.2
Cheveresan, R.3
Emer, J.4
Mukherjee, S.5
Rangan, R.6
|