Please use this identifier to cite or link to this item:
https://hdl.handle.net/20.500.11851/6689
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Koç, Fahrettin | - |
dc.contributor.author | Bozdaş, Kenan | - |
dc.contributor.author | Karslı, Burak | - |
dc.contributor.author | Ergin, Oğuz | - |
dc.date.accessioned | 2021-09-11T15:43:12Z | - |
dc.date.available | 2021-09-11T15:43:12Z | - |
dc.date.issued | 2013 | en_US |
dc.identifier.citation | Design, Automation and Test in Europe Conference and Exhibition (DATE) -- MAR 18-22, 2013 -- Grenoble, FRANCE | en_US |
dc.identifier.isbn | 978-3-9815370-0-0 | - |
dc.identifier.issn | 1530-1591 | - |
dc.identifier.uri | https://hdl.handle.net/20.500.11851/6689 | - |
dc.description.abstract | Register renaming is a widely used technique to remove false dependencies in contemporary superscalar microprocessors. A register alias table (RAT) is formed to hold current locations of the values that correspond to the architectural registers. Some recently designed processors take a copy of the rename table at each branch instruction, in order to recover its contents when a misspeculation occurs. In this paper first we investigate the RAT vulnerability against transient errors. Then we analyze the vulnerability of RAT checkpoints and propose two techniques for soft error detection and correction utilizing redundantly taken copies of the entries whose content is the same with the previous and/or next checkpoints. Simulation results of the spec 2006 benchmarks reveal that on the average RAT vulnerability is 25% and checkpoint vulnerability is 6%. Results also reveal that redundancy exists at sequential checkpoint copies and can be used for error detection and correction purposes. We propose techniques that exploit this redundancy and show that faults in 41% of all checkpoints and 44% of rolled-back checkpoints can be detected and errors in 33% of the rolled-back checkpoints can be corrected. Since we exploit the already available storage, proposed error detection and correction techniques can be implemented with minimal hardware overhead. | en_US |
dc.description.sponsorship | ACM Special Interest Grp Design Automat, RAS, EDA Consortium, IEEE Council Elect Design Automat, ECSI, European Design & Automat Assoc | en_US |
dc.description.sponsorship | Scientific and Technological Research Council of Turkey (TUBITAK)Turkiye Bilimsel ve Teknolojik Arastirma Kurumu (TUBITAK) [112E004]; COST ICT Action [1103] | en_US |
dc.description.sponsorship | This work was supported in part by the Scientific and Technological Research Council of Turkey (TUBITAK) under Grant 112E004 and in framework of COST ICT Action 1103. | en_US |
dc.language.iso | en | en_US |
dc.publisher | Assoc Computing Machinery | en_US |
dc.relation.ispartof | Design, Automation & Test In Europe | en_US |
dc.rights | info:eu-repo/semantics/closedAccess | en_US |
dc.subject | Microprocessors | en_US |
dc.subject | Register Rename | en_US |
dc.subject | Checkpoint | en_US |
dc.subject | RAT Vulnerability | en_US |
dc.subject | Soft Error | en_US |
dc.subject | Error Detection and Correction | en_US |
dc.title | Exploiting Replicated Checkpoints for Soft Error Detection and Correction | en_US |
dc.type | Conference Object | en_US |
dc.relation.ispartofseries | Design Automation and Test in Europe Conference and Exhibition | en_US |
dc.department | Faculties, Faculty of Engineering, Department of Computer Engineering | en_US |
dc.department | Fakülteler, Mühendislik Fakültesi, Bilgisayar Mühendisliği Bölümü | tr_TR |
dc.identifier.startpage | 1494 | en_US |
dc.identifier.endpage | 1497 | en_US |
dc.authorid | 0000-0003-2379-4184 | - |
dc.authorid | 0000-0003-2701-3787 | - |
dc.identifier.wos | WOS:000415129400289 | en_US |
dc.identifier.scopus | 2-s2.0-84885634198 | en_US |
dc.institutionauthor | Ergin, Oğuz | - |
dc.identifier.doi | 10.7873/date.2013.304 | - |
dc.relation.publicationcategory | Konferans Öğesi - Uluslararası - Kurum Öğretim Elemanı | en_US |
dc.relation.conference | Design, Automation and Test in Europe Conference and Exhibition (DATE) | en_US |
dc.identifier.scopusquality | - | - |
item.openairetype | Conference Object | - |
item.languageiso639-1 | en | - |
item.grantfulltext | none | - |
item.fulltext | No Fulltext | - |
item.openairecristype | http://purl.org/coar/resource_type/c_18cf | - |
item.cerifentitytype | Publications | - |
crisitem.author.dept | 02.3. Department of Computer Engineering | - |
Appears in Collections: | Bilgisayar Mühendisliği Bölümü / Department of Computer Engineering Scopus İndeksli Yayınlar Koleksiyonu / Scopus Indexed Publications Collection WoS İndeksli Yayınlar Koleksiyonu / WoS Indexed Publications Collection |
CORE Recommender
Items in GCRIS Repository are protected by copyright, with all rights reserved, unless otherwise indicated.