Approximate communication: Techniques for reducing communication bottlenecks in large-scale parallel systems
Approximate computing has gained research attention recently as a way to increase energy
efficiency and/or performance by exploiting some applications' intrinsic error resiliency …
efficiency and/or performance by exploiting some applications' intrinsic error resiliency …
Demystifying the system vulnerability stack: Transient fault effects across the layers
In this paper, we revisit the system vulnerability stack for transient faults. We reveal severe
pitfalls in widely used vulnerability measurement approaches, which separate the hardware …
pitfalls in widely used vulnerability measurement approaches, which separate the hardware …
Rumba: An online quality management system for approximate computing
Approximate computing can be employed for an emerging class of applications from various
domains such as multimedia, machine learning and computer vision. The approximated …
domains such as multimedia, machine learning and computer vision. The approximated …
One bit is (not) enough: An empirical study of the impact of single and multiple bit-flip errors
Recent studies have shown that technology and voltage scaling are expected to increase
the likelihood that particle-induced soft errors manifest as multiple-bit errors. This raises …
the likelihood that particle-induced soft errors manifest as multiple-bit errors. This raises …
Avgi: Microarchitecture-driven, fast and accurate vulnerability assessment
We propose AVGI, a new Statistical Fault Injection (SFI)-based methodology, which delivers
orders of magnitude faster assessment of the Architectural Vulnerability Factor (AVF) of a …
orders of magnitude faster assessment of the Architectural Vulnerability Factor (AVF) of a …
Processor design for soft errors: Challenges and state of the art
Today, soft errors are one of the major design technology challenges at and beyond the
22nm technology nodes. This article introduces the soft error problem from the perspective …
22nm technology nodes. This article introduces the soft error problem from the perspective …
Design and optimization of low voltage high performance dual threshold CMOS circuits
Reduction in leakage power has become an important concern in low voltage, low power
and high performance applications. In this paper, we use dual threshold technique to reduce …
and high performance applications. In this paper, we use dual threshold technique to reduce …
Approxilyzer: Towards a systematic framework for instruction-level approximate computing and its application to hardware resiliency
Approximate computing environments trade off computational accuracy for improvements in
performance, energy, and resiliency cost. For widespread adoption of approximate …
performance, energy, and resiliency cost. For widespread adoption of approximate …
Differential fault injection on microarchitectural simulators
M Kaliorakis, S Tselonis… - 2015 IEEE …, 2015 - ieeexplore.ieee.org
Fault injection on micro architectural structures modeled in performance simulators is an
effective method for the assessment of microprocessors reliability in early design stages …
effective method for the assessment of microprocessors reliability in early design stages …
Ipas: Intelligent protection against silent output corruption in scientific applications
This paper presents IPAS, an instruction duplication technique that protects scientific
applications from silent data corruption (SDC) in their output. The motivation for IPAS is that …
applications from silent data corruption (SDC) in their output. The motivation for IPAS is that …