An integrated approach for increasing the soft-error detection capabilities in SoCs processors
Citations
62 citations
30 citations
Cites methods from "An integrated approach for increasi..."
...The scenario, where mechanisms for handling hardware fault s re implemented in software, is called SIHFT (Software-Implemented Hardwa re Fault Tolerance) (for example, [7])....
[...]
16 citations
14 citations
Cites methods from "An integrated approach for increasi..."
...The main contribution of this paper is a revised version of the preliminary qualitative analysis of soft errors presented in [4], and a modified application of redundancy techniques with respect to those presented in [2], driven from the results of the presented analysis....
[...]
...The approach here presented, starts from the conclusions drawn in [2] and proposes an enhancement based on a more systematic analysis of the fault/error relationship....
[...]
10 citations
Cites methods from "An integrated approach for increasi..."
...The paper presents the methodological approach adopted to achieve the complete fault coverage, the proposed resulting architecture, and the experimental results gathered from the fault injection analysis campaign....
[...]
...In the most recent years, given the relevant computational power of IP cores, the design of reliable systems by means of software techniques received a lot of attention, due to the interesting possibility to use a commercial processor core, without requiring any customization....
[...]
References
1,610 citations
1,093 citations
1,093 citations
"An integrated approach for increasi..." refers methods in this paper
..., Recovery Blocks and N-Version Programming) [4][5]....
[...]
...In [5], a methodology is presented that proposes the replication (software redundancy) of the program and checks the results obtained executing the replicated versions....
[...]
662 citations
"An integrated approach for increasi..." refers background in this paper
...As far as hardware is considered, the most commonly adopted approach exploits redundancy [1] applicable at different levels: at the system level by replicating the whole...
[...]
599 citations
"An integrated approach for increasi..." refers background in this paper
...solution consists in the introduction of a special-purpose module, called watchdog, which constantly monitors the activities carried out by the processor [2][3]....
[...]