Approximate communication: Techniques for reducing communication bottlenecks in large-scale parallel systems

F Betzel, K Khatamifard, H Suresh, DJ Lilja… - ACM Computing …, 2018 - dl.acm.org
Approximate computing has gained research attention recently as a way to increase energy
efficiency and/or performance by exploiting some applications' intrinsic error resiliency …

Demystifying the system vulnerability stack: Transient fault effects across the layers

G Papadimitriou, D Gizopoulos - 2021 ACM/IEEE 48th Annual …, 2021 - ieeexplore.ieee.org
In this paper, we revisit the system vulnerability stack for transient faults. We reveal severe
pitfalls in widely used vulnerability measurement approaches, which separate the hardware …

Rumba: An online quality management system for approximate computing

DS Khudia, B Zamirai, M Samadi… - Proceedings of the 42nd …, 2015 - dl.acm.org
Approximate computing can be employed for an emerging class of applications from various
domains such as multimedia, machine learning and computer vision. The approximated …

One bit is (not) enough: An empirical study of the impact of single and multiple bit-flip errors

B Sangchoolie, K Pattabiraman… - 2017 47th annual IEEE …, 2017 - ieeexplore.ieee.org
Recent studies have shown that technology and voltage scaling are expected to increase
the likelihood that particle-induced soft errors manifest as multiple-bit errors. This raises …

Avgi: Microarchitecture-driven, fast and accurate vulnerability assessment

G Papadimitriou, D Gizopoulos - 2023 IEEE International …, 2023 - ieeexplore.ieee.org
We propose AVGI, a new Statistical Fault Injection (SFI)-based methodology, which delivers
orders of magnitude faster assessment of the Architectural Vulnerability Factor (AVF) of a …

Processor design for soft errors: Challenges and state of the art

T Li, JA Ambrose, R Ragel… - ACM Computing Surveys …, 2016 - dl.acm.org
Today, soft errors are one of the major design technology challenges at and beyond the
22nm technology nodes. This article introduces the soft error problem from the perspective …

Design and optimization of low voltage high performance dual threshold CMOS circuits

L Wei, Z Chen, M Johnson, K Roy, V De - Proceedings of the 35th annual …, 1998 - dl.acm.org
Reduction in leakage power has become an important concern in low voltage, low power
and high performance applications. In this paper, we use dual threshold technique to reduce …

Approxilyzer: Towards a systematic framework for instruction-level approximate computing and its application to hardware resiliency

R Venkatagiri, A Mahmoud, SKS Hari… - 2016 49th Annual …, 2016 - ieeexplore.ieee.org
Approximate computing environments trade off computational accuracy for improvements in
performance, energy, and resiliency cost. For widespread adoption of approximate …

Differential fault injection on microarchitectural simulators

M Kaliorakis, S Tselonis… - 2015 IEEE …, 2015 - ieeexplore.ieee.org
Fault injection on micro architectural structures modeled in performance simulators is an
effective method for the assessment of microprocessors reliability in early design stages …

Ipas: Intelligent protection against silent output corruption in scientific applications

I Laguna, M Schulz, DF Richards, J Calhoun… - Proceedings of the 2016 …, 2016 - dl.acm.org
This paper presents IPAS, an instruction duplication technique that protects scientific
applications from silent data corruption (SDC) in their output. The motivation for IPAS is that …