메뉴 건너뛰기




Volumn , Issue , 2009, Pages 345-350

Online computing and predicting architectural vulnerability factor of microprocessor structures

Author keywords

Architecture vulnerability factor; Microarchitecture; Performance; Reliability; Soft error

Indexed keywords

ARCHITECTURAL VULNERABILITY FACTOR; AVERAGE DIFFERENCE; COMPUTING METHODS; DIFFERENT STRUCTURE; FAULT COVERAGES; HARDWARE CONFIGURATIONS; MICRO ARCHITECTURES; MICROPROCESSOR DESIGNS; OFFLINE; ONLINE COMPUTING; PERFORMANCE DEGRADATION; PERFORMANCE RELIABILITY; PROTECTION SCHEMES; REDUNDANT MULTITHREADING; RESEARCH REPORTS; SOFT ERROR; SOFT-ERROR TOLERANCE;

EID: 77649304850     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/PRDC.2009.61     Document Type: Conference Paper
Times cited : (7)

References (22)
  • 1
    • 0036931372 scopus 로고    scopus 로고
    • Modeling the Effect of Technology Trends on Soft Error Rate of Combinational Logic
    • Jun
    • M. Kistler, S. Keckler, D. Burger, and L. Alvisi, "Modeling the Effect of Technology Trends on Soft Error Rate of Combinational Logic," DSN, pp. 389-398, Jun. 2002.
    • (2002) DSN , pp. 389-398
    • Kistler, M.1    Keckler, S.2    Burger, D.3    Alvisi, L.4
  • 2
    • 9144234352 scopus 로고    scopus 로고
    • Characterization of Soft Errors Caused by Single Event Upsets in CMOS Processes
    • Jun
    • T. Karnik, P. Hazucha, and J. Patel, "Characterization of Soft Errors Caused by Single Event Upsets in CMOS Processes," IEEE Trans. on Dependable and Secure Computing, 1(2):128-143, Jun. 2004.
    • (2004) IEEE Trans. on Dependable and Secure Computing , vol.1 , Issue.2 , pp. 128-143
    • Karnik, T.1    Hazucha, P.2    Patel, J.3
  • 4
    • 0032597692 scopus 로고    scopus 로고
    • AR-SMT: A microarchitectrual approach to fault tolerance in microprocessors
    • Jun
    • E. Rotenberg, "AR-SMT: A microarchitectrual approach to fault tolerance in microprocessors," FTCS, pp. 84-91, Jun. 1999.
    • (1999) FTCS , pp. 84-91
    • Rotenberg, E.1
  • 5
    • 0038346239 scopus 로고    scopus 로고
    • Transient-fault recovery for chip multiprocessors
    • Jun
    • M. Gomaa, C. Scarbrough, T. N. Vijaykumar, I. Pomeranz, "Transient-fault recovery for chip multiprocessors," ISCA, pp. 98-109, Jun. 2003.
    • (2003) ISCA , pp. 98-109
    • Gomaa, M.1    Scarbrough, C.2    Vijaykumar, T.N.3    Pomeranz, I.4
  • 6
    • 0036287327 scopus 로고    scopus 로고
    • Detailed Design and Evaluation of Redundant Multithreading Alternatives
    • May
    • S. S. Mukherjee, M. Kontz, and S. Reinhardt, "Detailed Design and Evaluation of Redundant Multithreading Alternatives," ISCA, pp. 99-110, May 2002.
    • (2002) ISCA , pp. 99-110
    • Mukherjee, S.S.1    Kontz, M.2    Reinhardt, S.3
  • 7
    • 4544282186 scopus 로고    scopus 로고
    • Characterizing the Effects of Transient Faults on a High-Performance Processor Pipeline
    • Jun
    • N. J. Wang, J. Quek, T. M. Rafacz, and S. J. Patel, "Characterizing the Effects of Transient Faults on a High-Performance Processor Pipeline," DSN, pp. 61-70, Jun. 2004.
    • (2004) DSN , pp. 61-70
    • Wang, N.J.1    Quek, J.2    Rafacz, T.M.3    Patel, S.J.4
  • 8
    • 84944403418 scopus 로고    scopus 로고
    • A Systematic Methodology to Compute the Architectural Vulnerability Factors for a High-Performance Microprocessor
    • Dec
    • S. Mukherjee, C. Weaver, J. Emer, S. Reinhardt, and T. Austin, "A Systematic Methodology to Compute the Architectural Vulnerability Factors for a High-Performance Microprocessor," MICRO, pp. 29-40, Dec. 2003.
    • (2003) MICRO , pp. 29-40
    • Mukherjee, S.1    Weaver, C.2    Emer, J.3    Reinhardt, S.4    Austin, T.5
  • 9
    • 84891462123 scopus 로고    scopus 로고
    • X. Fu, J. Poe, T. Li, and J. Fortes, Characterizing Microarchitecture Soft Error Vulnerability Phase Behavior, MASCOTS, pp. 147-155, M. A. Gomaa and T. N. Vijaykumar, Opportunistic transient-fault detection, ISCA, pp. 172-183, Jun. 2005.
    • X. Fu, J. Poe, T. Li, and J. Fortes, "Characterizing Microarchitecture Soft Error Vulnerability Phase Behavior," MASCOTS, pp. 147-155, M. A. Gomaa and T. N. Vijaykumar, "Opportunistic transient-fault detection," ISCA, pp. 172-183, Jun. 2005.
  • 10
    • 27544468225 scopus 로고    scopus 로고
    • Opportunistic transient-fault detection
    • Jun
    • M. A. Gomaa and T. N. Vijaykumar, "Opportunistic transient-fault detection," ISCA, pp. 172-183, Jun. 2005.
    • (2005) ISCA , pp. 172-183
    • Gomaa, M.A.1    Vijaykumar, T.N.2
  • 11
    • 28444483117 scopus 로고    scopus 로고
    • The Soft Error Problem: An Architectural Perspective
    • Feb
    • S. Mukherjee, J. Emer, and S. Reinhardt, "The Soft Error Problem: An Architectural Perspective," HPCA, pp. 243-247, Feb. 2005.
    • (2005) HPCA , pp. 243-247
    • Mukherjee, S.1    Emer, J.2    Reinhardt, S.3
  • 12
    • 52649105030 scopus 로고    scopus 로고
    • Online Estimation of Architectural Vulnerability Factor for Soft Errors
    • Jun
    • X. Li, S. V. Adve, P. Bose, and J. A. Rivers, "Online Estimation of Architectural Vulnerability Factor for Soft Errors," ISCA, pp. 341-352, Jun. 2008.
    • (2008) ISCA , pp. 341-352
    • Li, X.1    Adve, S.V.2    Bose, P.3    Rivers, J.A.4
  • 13
    • 35348845144 scopus 로고    scopus 로고
    • Dynamic Prediction of Architectural Vulnerability from Microarchitectural State
    • Jun
    • K. Walcott, G. Humpheys, and S. Gurumurthi, "Dynamic Prediction of Architectural Vulnerability from Microarchitectural State," ISCA, pp. 516-527, Jun. 2007.
    • (2007) ISCA , pp. 516-527
    • Walcott, K.1    Humpheys, G.2    Gurumurthi, S.3
  • 14
    • 35348914300 scopus 로고    scopus 로고
    • Mechanisms for Bounding Vulnerabilities of Processor Structures
    • Jun
    • N. Soundararajan, A. Parashar, and A. Sivasubramaniam, "Mechanisms for Bounding Vulnerabilities of Processor Structures," ISCA, pp. 506-515, Jun. 2007.
    • (2007) ISCA , pp. 506-515
    • Soundararajan, N.1    Parashar, A.2    Sivasubramaniam, A.3
  • 15
    • 0012612903 scopus 로고    scopus 로고
    • Sim-alpha: A Validated, Execution-Driven Alpha 21264 Simulator,
    • Technical Report, TR-01-23, Department of Computer Sciences, University of Texas at Austin
    • R. Desikan, D. Burger, S. Keckler, and T. Austin, "Sim-alpha: A Validated, Execution-Driven Alpha 21264 Simulator," Technical Report, TR-01-23, Department of Computer Sciences, University of Texas at Austin, 2001.
    • (2001)
    • Desikan, R.1    Burger, D.2    Keckler, S.3    Austin, T.4
  • 16
    • 0034844928 scopus 로고    scopus 로고
    • Measuring Experimental Error in Microprocessor Simulation
    • Jun
    • R. Desikan, D. Burger, and S. Keckler, "Measuring Experimental Error in Microprocessor Simulation," ISCA, pp. 266-277, Jun. 2001.
    • (2001) ISCA , pp. 266-277
    • Desikan, R.1    Burger, D.2    Keckler, S.3
  • 17
    • 0032639289 scopus 로고    scopus 로고
    • The Alpha 21264 Microprocessor
    • Mar./Apr
    • R. E. Kessler, "The Alpha 21264 Microprocessor," IEEE Micro, 19(2):24-36, Mar./Apr. 1999.
    • (1999) IEEE Micro , vol.19 , Issue.2 , pp. 24-36
    • Kessler, R.E.1
  • 18
    • 0036953769 scopus 로고    scopus 로고
    • Automatically Characterizing Large Scale Program Behavior
    • Oct
    • T. Sherwood, E. Perelman, G. Hamerly, and B. Calder, "Automatically Characterizing Large Scale Program Behavior," ASPLOS, pp. 45-57, Oct. 2002.
    • (2002) ASPLOS , pp. 45-57
    • Sherwood, T.1    Perelman, E.2    Hamerly, G.3    Calder, B.4
  • 19
    • 34247169237 scopus 로고    scopus 로고
    • Performance prediction based on inherent program similarity
    • Sep
    • K. Hoste, and A. Phansalkar, et al, "Performance prediction based on inherent program similarity," PACT, pp 114-122, Sep. 2006.
    • (2006) PACT , pp. 114-122
    • Hoste, K.1    Phansalkar, A.2
  • 20
    • 0035694429 scopus 로고    scopus 로고
    • Performance Characterization of a Hardware Mechanism for Dynamic Optimization
    • Dec
    • B. Fahs, and S. Bose, et al, "Performance Characterization of a Hardware Mechanism for Dynamic Optimization," MICRO, pp. 16-27, Dec. 2001.
    • (2001) MICRO , pp. 16-27
    • Fahs, B.1    Bose, S.2
  • 21
    • 0035696756 scopus 로고    scopus 로고
    • The Impact of If-Conversion and Branch Prediction on Program Execution on the Intel Itanium Processor
    • Dec
    • Y. Choi, A. Knies, L. Gerke, and T. F. Ngai, "The Impact of If-Conversion and Branch Prediction on Program Execution on the Intel Itanium Processor," MICRO, pp. 182-191, Dec. 2001.
    • (2001) MICRO , pp. 182-191
    • Choi, Y.1    Knies, A.2    Gerke, L.3    Ngai, T.F.4
  • 22
    • 27544458902 scopus 로고    scopus 로고
    • Computing Architectural Vulnerability Factors for Address-Based Structures
    • Jun
    • A. Biswas, P. Racunas, R. Cheveresan, J. Emer, S. Mukherjee, and R. Rangan, "Computing Architectural Vulnerability Factors for Address-Based Structures," ISCA, pp. 532-543, Jun. 2005.
    • (2005) ISCA , pp. 532-543
    • Biswas, A.1    Racunas, P.2    Cheveresan, R.3    Emer, J.4    Mukherjee, S.5    Rangan, R.6


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.