Vulnerability Analysis of Instructions for SDC-Causing Error Detection
Due to the centralization of communication in the management of data generated by diverse Internet of Thing (IoT) devices, there is a lack of reliability when data is being transferred and stored. Among errors caused by various behaviors, Silent Data Corruption (SDC) error, owing to stealthy destruc...
Main Authors: | Jingjing Gu, Weining Zheng, Yi Zhuang, Qianwen Zhang |
---|---|
Format: | Article |
Language: | English |
Published: |
IEEE
2019-01-01
|
Series: | IEEE Access |
Subjects: | |
Online Access: | https://ieeexplore.ieee.org/document/8887166/ |
Similar Items
-
A Methodology to Assess Output Vulnerability Factors for Detecting Silent Data Corruption
by: Junchi Ma, et al.
Published: (2019-01-01) -
Identify Silent Data Corruption Vulnerable Instructions Using SVM
by: Na Yang, et al.
Published: (2019-01-01) -
Addressing multiple bit/symbol errors in DRAM subsystem
by: Ravikiran Yeleswarapu, et al.
Published: (2021-02-01) -
InCheck - An Integrated Recovery Methodology for Fine-grained Soft-Error Detection Schemes
Published: (2016) -
F_Radish: Enhancing Silent Data Corruption Detection for Aerospace-Based Computing
by: Na Yang, et al.
Published: (2021-12-01)