Please use this identifier to cite or link to this item:
https://hdl.handle.net/20.500.11851/1156
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Can, Serdar Zafer | - |
dc.contributor.author | Yalçın, Gülay | - |
dc.contributor.author | Ergin, Oğuz | - |
dc.contributor.author | Sabri Ünsal, Osman | - |
dc.contributor.author | Cristal, Adrian | - |
dc.date.accessioned | 2019-06-26T07:40:34Z | - |
dc.date.available | 2019-06-26T07:40:34Z | - |
dc.date.issued | 2014-08 | - |
dc.identifier.citation | Can, S. Z., Yalcin, G., Ergin, O., Unsal, O. S., & Cristal, A. (2014). Bit Impact Factor: Towards making fair vulnerability comparison. Microprocessors and Microsystems, 38(6), 598-604. | en_US |
dc.identifier.issn | 0141-9331 | - |
dc.identifier.uri | https://www.sciencedirect.com/science/article/pii/S0141933114000684?via%3Dihub | - |
dc.identifier.uri | https://hdl.handle.net/20.500.11851/1156 | - |
dc.description.abstract | Reliability is becoming a major design concern in contemporary microprocessors since soft error rate is increasing due to technology scaling. Therefore, design time system vulnerability estimation is of paramount importance. Architectural Vulnerability Factor (AVF) is an early vulnerability estimation methodology. However, AVF considers that the value of a bit in a clock cycle is either required for Architecturally Correct Execution (i.e. ACE-bit) or not (i.e. unACE-bit); therefore, AVF cannot distinguish the vulnerability impact level of an ACE-bit. In this study, we present a new dimension which takes into account the vulnerability impact level of a bit. We introduce Bit Impact Factor metric which, we believe, will be helpful for extending AVF evaluation to provide a more accurate vulnerability analysis. (C) 2014 Elsevier B.V. All rights reserved. | en_US |
dc.language.iso | en | en_US |
dc.publisher | Elsevier | en_US |
dc.relation.ispartof | Microprocessors And Microsystems | en_US |
dc.rights | info:eu-repo/semantics/closedAccess | en_US |
dc.subject | Architectural Vulnerability Factor | en_US |
dc.subject | Soft Errors | en_US |
dc.subject | Vulnerability | en_US |
dc.subject | Fault İnjection | en_US |
dc.title | Bit Impact Factor: Towards Making Fair Vulnerability Comparison | en_US |
dc.type | Article | en_US |
dc.department | Faculties, Faculty of Engineering, Department of Computer Engineering | en_US |
dc.department | Fakülteler, Mühendislik Fakültesi, Bilgisayar Mühendisliği Bölümü | tr_TR |
dc.identifier.volume | 38 | - |
dc.identifier.issue | 6 | - |
dc.identifier.startpage | 598 | - |
dc.identifier.endpage | 604 | - |
dc.relation.tubitak | Scientific and Technological Research Council of Turkey (TUBITAK) [112E004] | en_US |
dc.authorid | 0000-0003-2701-3787 | - |
dc.identifier.wos | WOS:000341554900009 | en_US |
dc.identifier.scopus | 2-s2.0-84906259258 | en_US |
dc.institutionauthor | Ergin, Oğuz | - |
dc.identifier.doi | 10.1016/j.micpro.2014.04.009 | - |
dc.authorwosid | E-5717-2010 | - |
dc.authorscopusid | 6603141208 | - |
dc.relation.publicationcategory | Makale - Uluslararası Hakemli Dergi - Kurum Öğretim Elemanı | en_US |
dc.identifier.scopusquality | Q3 | - |
item.openairetype | Article | - |
item.languageiso639-1 | en | - |
item.grantfulltext | none | - |
item.fulltext | No Fulltext | - |
item.openairecristype | http://purl.org/coar/resource_type/c_18cf | - |
item.cerifentitytype | Publications | - |
crisitem.author.dept | 02.3. Department of Computer Engineering | - |
Appears in Collections: | Bilgisayar Mühendisliği Bölümü / Department of Computer Engineering Scopus İndeksli Yayınlar Koleksiyonu / Scopus Indexed Publications Collection WoS İndeksli Yayınlar Koleksiyonu / WoS Indexed Publications Collection |
CORE Recommender
SCOPUSTM
Citations
1
checked on Dec 21, 2024
WEB OF SCIENCETM
Citations
3
checked on Dec 21, 2024
Page view(s)
132
checked on Dec 23, 2024
Google ScholarTM
Check
Altmetric
Items in GCRIS Repository are protected by copyright, with all rights reserved, unless otherwise indicated.