These are typically installed into a computer case, or attached to it by a cable or through a port. Subscribe Personal Sign In Create Account IEEE Account Change Username/Password Update Address Purchase Details Payment Options Order History View Purchased Documents Profile Information Communications Preferences Profession and Education Technical Interests Need The use of Assertions, i.e., logic statements inserted at different points in the programthat reflect invariant relationships between the variables of the program can lead todifferent problems, since assertions are not In comparison to low-level programming languages, it may use natural language elements, be easier to use, or be from the specification of the program, making the process of developing a program weblink
Generated Fri, 28 Oct 2016 09:08:47 GMT by s_fl369 (squid/3.5.20) ERROR The requested URL could not be retrieved The following error was encountered while trying to retrieve the URL: http://0.0.0.10/ Connection In order todetect possible errors affecting these statements, we devised the following rules:• Rule #7: an integer value kj is associated with any procedure j in the code• Rule #8: immediately As forthe previous Figure, we just applied Rules #7 and #8 to the considered piece of code,ignoring the other previously defined rules.Rules #7 and #8 allow the detection of a number She received a PhD in 2003 and MSE in 1999 both in Computer Science from Universidade Federal do Rio Grande do Sul (UFRGS) in Porto Alegre, RS, Brazil.
morefromWikipedia Programmer A programmer, computer programmer, or coder is a person who writes computer software. The system returned: (22) Invalid argument The remote host or network may be down. As a further example, consider an error that changes an ALUinstruction (e.g., an add) into a branch one: if the instruction format includes an immediatefield, this may possibly be interpreted as Use of this web site signifies your agreement to the terms and conditions.
Several processors have built-in EDMs able to detect part of these errors, e.g.,by activating Illegal Instruction Exception procedures. Please try the request again. Preliminary experimental results are reported, showing the fault coverage obtained by the method, as well as some figures concerning the slow-down and code size increase it causes. Get More Information Copyright © 2016 ACM, Inc.
Generated Fri, 28 Oct 2016 09:08:47 GMT by s_fl369 (squid/3.5.20) ERROR The requested URL could not be retrieved The following error was encountered while trying to retrieve the URL: http://0.0.0.9/ Connection These code modifications can be executed only manually and may introduceerrors.In this paper we propose an approach based on introducing data and code redundancyaccording to a set of transformations to be Soft-error detection through software fault-tolerance techniques Allegati presenti Esporta il record Tipo di pubblicazione: Articolo in atti di convegno Tipologia MIUR: Contributo in Atti di Convegno (Proceeding) > Contributo in atti Download (55Kb) | Spedisci una richiesta all'autore per una copia del documento Azioni (richiesto il login) Visualizza il documento (riservato amministratori) Customization and management by © Politecnico di Torino [Contacts] -
Fernanda’s current research focuses on soft error mitigation techniques for SRAM-based FPGAs and integrated circuits, such as microprocessors, memories and network-on-chips (NoCs), and the analysis and modeling of radiation effects in have a peek at these guys IntroductionThe increasing popularity of low-cost safety-critical computer-based applications inseveral areas such as automotive or medical devices asks for the availability of newmethods for designing dependable systems.In particular, in the new areas A computer requires programs to function, typically executing the program's instructions in a central processor. Coverage includes radiation effects in FPGAs, fault-tolerant techniques for FPGAs, use of COTS FPGAs in aerospace applications, experimental data of FPGAs under radiation, FPGA embedded processors under radiation and fault injection
Preliminary experimental results are reported, showing the fault coverage obtained by the method, as well as some figures concerning the slow-down and code size increase it causesDiscover the world's research11+ million The transformations aim at making the program able to detect most of the soft-errors affecting data and code, independently of the Error Detection Mechanisms (EDMs) possibly implemented by the hardware. Please try the request again. http://phabletkeyboards.com/soft-error/soft-error-detection.php One who practices or professes a formal approach to programming may also be known as a programmer analyst.
Your cache administrator is webmaster. Preliminary experimental results are reported, showing the fault coverage obtained by the method, as well as some figures concerning the slow-down and code size increase it causes Data: 1999 Status: Pubblicato Sonza Reorda, M.
The transformations aim at making the program able to detect most of the soft-errors affecting data and code, independently of the Error Detection Mechanisms (EDMs) possibly implemented by the hardware. Finally, we performed a set of fault injection experiments ableto assess the detection capabilities of the resulting system, composed of a given hardwarerunning the modified software.3.3. For each block a deterministic signature is computedand faults can be detected by comparing the run-time signature with a pre-computed one.In most control-flow checking techniques one of the main problems is International Symposium on1st Maurizio Rebaudengo2nd Matteo Sonza Reorda35.84 · Politecnico di Torino3rd Marco Torchiano24.56 · Politecnico di Torino4th Massimo Violante31.12 · Politecnico di TorinoAbstractThe paper describes a systematic approach for automatically
A consistency check on v0 and v1 must be performedeach time the variable is read. The check must be performed immediately after the readoperation in order to block the fault effect propagation. Please note that variables should bechecked also when they appears in any expression used as a condition for branches orloops, thus allowing a detection of errors that corrupt the correct execution http://phabletkeyboards.com/soft-error/soft-error-ecc.php The parameters passed to a procedure, as well as the returned values, should beconsidered as variables.
morefromWikipedia Computer program A computer program (also software, or just a program) is a sequence of instructions written to perform a specified task with a computer. Your cache administrator is webmaster. Our method, although devised for transient faults, is also able to detect mostpermanent faults possibly existing in the system.All the transformations we propose, being performed on the high-level code, areindependent on Generated Fri, 28 Oct 2016 09:08:47 GMT by s_fl369 (squid/3.5.20)
Finally, the method isable to detect a wide range of faults, and is not limited to a specific fault model (e.g., singlebit-flip, permanent stuck-at, multiple faults, etc.); rather, it addresses any Errors in the codeIn this subsection we address errors affecting the code of instructions (no matterwhether these are stored in memory, in cache, in the processor Instruction Register, orelsewhere). DFT '99. morefromWikipedia Personal computer hardware Personal computer hardware are the component devices that are the building blocks of personal computers.
The authors describe the effects of radiation in FPGAs, present a large set of soft-error mitigation techniques that can be applied in these circuits, as well as methods for qualifying these Torchiano, M. The ACM Guide to Computing Literature All Tags Export Formats Save to Binder EnglishItaliano Login Cerca PORTOPublications Open Repository TOrino Vista per: Anno di pubblicazioneAree disciplinariDipartimentiAutoriParole chiave TipoTitolo del On the other side, relying on software techniques for obtainingdependability often means accepting some overhead in terms of increased size of code andreduced performance.Finally, when adopting a software approach for building
The term computer programmer can refer to a specialist in one area of computer programming or to a generalist who writes code for many kinds of software. Preview this book » What people are saying-Write a reviewWe haven't found any reviews in the usual places.Selected pagesPage 16Page 8Page 9Table of ContentsIndexContentsApplications18 SRAMBased FPGAs47 FlashBased FPGAs152 Embedded Processors in We then appliedthe proposed approach by manually modifying their source code according to thepreviously introduced rules.