Home > Soft Error > Soft Error Detection Through Software Fault Tolerance

Soft Error Detection Through Software Fault Tolerance

These are typically installed into a computer case, or attached to it by a cable or through a port. Subscribe Personal Sign In Create Account IEEE Account Change Username/Password Update Address Purchase Details Payment Options Order History View Purchased Documents Profile Information Communications Preferences Profession and Education Technical Interests Need The use of Assertions, i.e., logic statements inserted at different points in the programthat reflect invariant relationships between the variables of the program can lead todifferent problems, since assertions are not In comparison to low-level programming languages, it may use natural language elements, be easier to use, or be from the specification of the program, making the process of developing a program weblink

Il dato citazionale presente sulle singole banche dati è aggiornato in tempo reale Il numero di citazioni per WoS viene calcolato sulla base delle collezioni in abbonamento (Science citation index Expanded Rebaudengo, M. US & Canada: +1 800 678 4333 Worldwide: +1 732 981 0060 Contact & Support About IEEE Xplore Contact Us Help Terms of Use Nondiscrimination Policy Sitemap Privacy & Opting Out Section 4 draws some conclusions.2. https://www.computer.org/csdl/proceedings/dft/1999/0325/00/03250210.pdf

Generated Fri, 28 Oct 2016 09:08:47 GMT by s_fl369 (squid/3.5.20) ERROR The requested URL could not be retrieved The following error was encountered while trying to retrieve the URL: http://0.0.0.10/ Connection In order todetect possible errors affecting these statements, we devised the following rules:• Rule #7: an integer value kj is associated with any procedure j in the code• Rule #8: immediately As forthe previous Figure, we just applied Rules #7 and #8 to the considered piece of code,ignoring the other previously defined rules.Rules #7 and #8 allow the detection of a number She received a PhD in 2003 and MSE in 1999 both in Computer Science from Universidade Federal do Rio Grande do Sul (UFRGS) in Porto Alegre, RS, Brazil.

morefromWikipedia Programmer A programmer, computer programmer, or coder is a person who writes computer software. The system returned: (22) Invalid argument The remote host or network may be down. As a further example, consider an error that changes an ALUinstruction (e.g., an add) into a branch one: if the instruction format includes an immediatefield, this may possibly be interpreted as Use of this web site signifies your agreement to the terms and conditions.

Several processors have built-in EDMs able to detect part of these errors, e.g.,by activating Illegal Instruction Exception procedures. Please try the request again. Preliminary experimental results are reported, showing the fault coverage obtained by the method, as well as some figures concerning the slow-down and code size increase it causes. Get More Information Copyright © 2016 ACM, Inc.

Generated Fri, 28 Oct 2016 09:08:47 GMT by s_fl369 (squid/3.5.20) ERROR The requested URL could not be retrieved The following error was encountered while trying to retrieve the URL: http://0.0.0.9/ Connection These code modifications can be executed only manually and may introduceerrors.In this paper we propose an approach based on introducing data and code redundancyaccording to a set of transformations to be Soft-error detection through software fault-tolerance techniques Allegati presenti Esporta il record Tipo di pubblicazione: Articolo in atti di convegno Tipologia MIUR: Contributo in Atti di Convegno (Proceeding) > Contributo in atti Download (55Kb) | Spedisci una richiesta all'autore per una copia del documento Azioni (richiesto il login) Visualizza il documento (riservato amministratori) Customization and management by © Politecnico di Torino [Contacts] -

  1. The authors describe the effects of radiation in FPGAs, present a large set of soft-error mitigation techniques...https://books.google.com/books/about/FPGAs_and_Parallel_Architectures_for_Aer.html?id=gBEpCwAAQBAJ&utm_source=gb-gplus-shareFPGAs and Parallel Architectures for Aerospace ApplicationsMy libraryHelpAdvanced Book SearchEBOOK FROM $28.93Get this book in
  2. This task isperformed by first identifying all the basic blocks composing the code.
  3. Benchmark programs The following simple programs have been adopted as benchmarks in the currentpreliminary phase:• Bubble Sort: an implementation of the bubble sort algorithm, run on a vector of 10integer elements•
  4. Dr.
  5. Errors in dataSome of the rules concern the variables defined and used by the program.
  6. Since the transformations can be automatically applied as a pre-compilation phase, the programmer is freed from the cost and responsibility of introducing suitable EDMs in its code.
  7. Transformation RulesIn this section we will propose a set of transformation rules to be applied to the high-level code; these transformations introduce data and code redundancy, which allow theresulting program to
  8. morefromWikipedia High-level programming language A high-level programming language is a programming language with strong abstraction from the details of the computer.

We propose a set of transformation rules to make the code able to detect mostof the faults not detected by the other EDMs.For the purpose of this paper, statements can be By using our services, you agree to our use of cookies.Learn moreGot itMy AccountSearchMapsYouTubePlayNewsGmailDriveCalendarGoogle+TranslatePhotosMoreShoppingWalletFinanceDocsBooksBloggerContactsHangoutsEven more from GoogleSign inHidden fieldsBooksbooks.google.com - This book introduces the concepts of soft errors in FPGAs, as Institutional Sign In By Topic Aerospace Bioengineering Communication, Networking & Broadcasting Components, Circuits, Devices & Systems Computing & Processing Engineered Materials, Dielectrics & Plasmas Engineering Profession Fields, Waves & Electromagnetics General Nevertheless, theoptimization flags of the compiler used to produce the executable code software have to bedisabled in order to maintain the introduced data and code redundancy through thecompilation process.For the purpose

Fernanda’s current research focuses on soft error mitigation techniques for SRAM-based FPGAs and integrated circuits, such as microprocessors, memories and network-on-chips (NoCs), and the analysis and modeling of radiation effects in have a peek at these guys IntroductionThe increasing popularity of low-cost safety-critical computer-based applications inseveral areas such as automotive or medical devices asks for the availability of newmethods for designing dependable systems.In particular, in the new areas A computer requires programs to function, typically executing the program's instructions in a central processor. Coverage includes radiation effects in FPGAs, fault-tolerant techniques for FPGAs, use of COTS FPGAs in aerospace applications, experimental data of FPGAs under radiation, FPGA embedded processors under radiation and fault injection

Preliminary experimental results are reported, showing the fault coverage obtained by the method, as well as some figures concerning the slow-down and code size increase it causesDiscover the world's research11+ million The transformations aim at making the program able to detect most of the soft-errors affecting data and code, independently of the Error Detection Mechanisms (EDMs) possibly implemented by the hardware. Please try the request again. http://phabletkeyboards.com/soft-error/soft-error-detection.php One who practices or professes a formal approach to programming may also be known as a programmer analyst.

Your cache administrator is webmaster. Preliminary experimental results are reported, showing the fault coverage obtained by the method, as well as some figures concerning the slow-down and code size increase it causes Data: 1999 Status: Pubblicato Sonza Reorda, M.

As a result, software faulttolerance is often adopted, since it allows the implementation of dependable systemswithout incurring in the high costs coming from designing custom hardware or usinghardware redundancy.

The transformations aim at making the program able to detect most of the soft-errors affecting data and code, independently of the Error Detection Mechanisms (EDMs) possibly implemented by the hardware. Finally, we performed a set of fault injection experiments ableto assess the detection capabilities of the resulting system, composed of a given hardwarerunning the modified software.3.3. For each block a deterministic signature is computedand faults can be detected by comparing the run-time signature with a pre-computed one.In most control-flow checking techniques one of the main problems is International Symposium on1st Maurizio Rebaudengo2nd Matteo Sonza Reorda35.84 · Politecnico di Torino3rd Marco Torchiano24.56 · Politecnico di Torino4th Massimo Violante31.12 · Politecnico di TorinoAbstractThe paper describes a systematic approach for automatically

A consistency check on v0 and v1 must be performedeach time the variable is read. The check must be performed immediately after the readoperation in order to block the fault effect propagation. Please note that variables should bechecked also when they appears in any expression used as a condition for branches orloops, thus allowing a detection of errors that corrupt the correct execution http://phabletkeyboards.com/soft-error/soft-error-ecc.php The parameters passed to a procedure, as well as the returned values, should beconsidered as variables.

morefromWikipedia Computer program A computer program (also software, or just a program) is a sequence of instructions written to perform a specified task with a computer. Your cache administrator is webmaster. Our method, although devised for transient faults, is also able to detect mostpermanent faults possibly existing in the system.All the transformations we propose, being performed on the high-level code, areindependent on Generated Fri, 28 Oct 2016 09:08:47 GMT by s_fl369 (squid/3.5.20)

Here are the instructions how to enable JavaScript in your web browser. The system returned: (22) Invalid argument The remote host or network may be down. INDEX TERMS CITATION Marco Torchiano, Maurizio Rebaudengo, Massimo Violante, Matteo Sonza Reorda, "Soft-Error Detection through Software Fault-Tolerance Techniques", , vol. 00, no. , pp. 210, 1999, doi:10.1109/DFTVS.1999.802887 REFERENCES FULL ARTICLE Full Cookies help us deliver our services.

Finally, the method isable to detect a wide range of faults, and is not limited to a specific fault model (e.g., singlebit-flip, permanent stuck-at, multiple faults, etc.); rather, it addresses any Errors in the codeIn this subsection we address errors affecting the code of instructions (no matterwhether these are stored in memory, in cache, in the processor Instruction Register, orelsewhere). DFT '99. morefromWikipedia Personal computer hardware Personal computer hardware are the component devices that are the building blocks of personal computers.

The authors describe the effects of radiation in FPGAs, present a large set of soft-error mitigation techniques that can be applied in these circuits, as well as methods for qualifying these Torchiano, M. The ACM Guide to Computing Literature All Tags Export Formats Save to Binder EnglishItaliano Login Cerca PORTOPublications Open Repository TOrino Vista per: Anno di pubblicazioneAree disciplinariDipartimentiAutoriParole chiave TipoTitolo del On the other side, relying on software techniques for obtainingdependability often means accepting some overhead in terms of increased size of code andreduced performance.Finally, when adopting a software approach for building

Get Help About IEEE Xplore Feedback Technical Support Resources and Help Terms of Use What Can I Access? Experimental resultsIn order to practically evaluate the feasibility and effectiveness of the proposedapproach, we set up some experiments, which are described in the following.We first selected a set of simple C Errors affecting S2 statementsWhen errors affecting S2 statements are considered, the issue is how to verify that thecorrect execution flow is followed.In order to detect errors affecting a test statement, we Your cache administrator is webmaster.

The term computer programmer can refer to a specialist in one area of computer programming or to a generalist who writes code for many kinds of software. Preview this book » What people are saying-Write a reviewWe haven't found any reviews in the usual places.Selected pagesPage 16Page 8Page 9Table of ContentsIndexContentsApplications18 SRAMBased FPGAs47 FlashBased FPGAs152 Embedded Processors in We then appliedthe proposed approach by manually modifying their source code according to thepreviously introduced rules.