Please use this identifier to cite or link to this item: https://hdl.handle.net/20.500.11851/1156
Full metadata record
DC FieldValueLanguage
dc.contributor.authorCan, Serdar Zafer-
dc.contributor.authorYalçın, Gülay-
dc.contributor.authorErgin, Oğuz-
dc.contributor.authorSabri Ünsal, Osman-
dc.contributor.authorCristal, Adrian-
dc.date.accessioned2019-06-26T07:40:34Z-
dc.date.available2019-06-26T07:40:34Z-
dc.date.issued2014-08-
dc.identifier.citationCan, S. Z., Yalcin, G., Ergin, O., Unsal, O. S., & Cristal, A. (2014). Bit Impact Factor: Towards making fair vulnerability comparison. Microprocessors and Microsystems, 38(6), 598-604.en_US
dc.identifier.issn0141-9331-
dc.identifier.urihttps://www.sciencedirect.com/science/article/pii/S0141933114000684?via%3Dihub-
dc.identifier.urihttps://hdl.handle.net/20.500.11851/1156-
dc.description.abstractReliability is becoming a major design concern in contemporary microprocessors since soft error rate is increasing due to technology scaling. Therefore, design time system vulnerability estimation is of paramount importance. Architectural Vulnerability Factor (AVF) is an early vulnerability estimation methodology. However, AVF considers that the value of a bit in a clock cycle is either required for Architecturally Correct Execution (i.e. ACE-bit) or not (i.e. unACE-bit); therefore, AVF cannot distinguish the vulnerability impact level of an ACE-bit. In this study, we present a new dimension which takes into account the vulnerability impact level of a bit. We introduce Bit Impact Factor metric which, we believe, will be helpful for extending AVF evaluation to provide a more accurate vulnerability analysis. (C) 2014 Elsevier B.V. All rights reserved.en_US
dc.language.isoenen_US
dc.publisherElsevieren_US
dc.relation.ispartofMicroprocessors And Microsystemsen_US
dc.rightsinfo:eu-repo/semantics/closedAccessen_US
dc.subjectArchitectural Vulnerability Factoren_US
dc.subjectSoft Errorsen_US
dc.subjectVulnerabilityen_US
dc.subjectFault İnjectionen_US
dc.titleBit Impact Factor: Towards making fair vulnerability comparisonen_US
dc.typeArticleen_US
dc.departmentFaculties, Faculty of Engineering, Department of Computer Engineeringen_US
dc.departmentFakülteler, Mühendislik Fakültesi, Bilgisayar Mühendisliği Bölümütr_TR
dc.identifier.volume38-
dc.identifier.issue6-
dc.identifier.startpage598-
dc.identifier.endpage604-
dc.relation.tubitakScientific and Technological Research Council of Turkey (TUBITAK) [112E004]en_US
dc.authorid0000-0003-2701-3787-
dc.identifier.wosWOS:000341554900009en_US
dc.identifier.scopus2-s2.0-84906259258en_US
dc.institutionauthorErgin, Oğuz-
dc.identifier.doi10.1016/j.micpro.2014.04.009-
dc.authorwosidE-5717-2010-
dc.authorscopusid6603141208-
dc.relation.publicationcategoryMakale - Uluslararası Hakemli Dergi - Kurum Öğretim Elemanıen_US
dc.identifier.scopusqualityQ3-
item.fulltextNo Fulltext-
item.openairecristypehttp://purl.org/coar/resource_type/c_18cf-
item.languageiso639-1en-
item.cerifentitytypePublications-
item.openairetypeArticle-
item.grantfulltextnone-
crisitem.author.dept02.3. Department of Computer Engineering-
Appears in Collections:Bilgisayar Mühendisliği Bölümü / Department of Computer Engineering
Scopus İndeksli Yayınlar Koleksiyonu / Scopus Indexed Publications Collection
WoS İndeksli Yayınlar Koleksiyonu / WoS Indexed Publications Collection
Show simple item record



CORE Recommender

SCOPUSTM   
Citations

1
checked on Apr 20, 2024

WEB OF SCIENCETM
Citations

3
checked on Apr 20, 2024

Page view(s)

72
checked on Apr 22, 2024

Google ScholarTM

Check




Altmetric


Items in GCRIS Repository are protected by copyright, with all rights reserved, unless otherwise indicated.