Soft Error Detection Through Software Fault Tolerance
We refer tohigh-level code, only, and we do not care whether they are stored in the main memory, in acache, or in a processor register. The transformations aim at making the program able to detect most of the soft-errors affecting data and code, independently of the Error Detection Mechanisms (EDMs) possibly implemented by the hardware. The term is most commonly used to describe computer-based systems designed to continue more or less fully operational with, perhaps, a reduction in throughput or an increase in response time in Download (55Kb) | Spedisci una richiesta all'autore per una copia del documento Azioni (richiesto il login) Visualizza il documento (riservato amministratori) Customization and management by © Politecnico di Torino [Contacts] - have a peek at this web-site
morefromWikipedia Compiler A compiler is a computer program (or set of programs) that transforms source code written in a programming language (the source language) into another computer language (the target language, Other faults can be detected bysoftware checks (implementing non-systematic additional EDMs) introduced by theprogrammer. The name "compiler" is primarily used for programs that translate source code from a high-level programming language to a lower level language. The proposed rules complement other Error DetectionMechanisms that can possibly exist in the system (e.g., based on parity bits or on errorcorrection codes stored in memory).
Please try the request again. In order to simplify thepresentation of each rule, we do not consider in the examples the combined application ofdifferent rules: as an example, in Figure 5 we did not apply Rule These code modifications can be executed only manually and may introduceerrors.In this paper we propose an approach based on introducing data and code redundancyaccording to a set of transformations to be
- Preview this book » What people are saying-Write a reviewWe haven't found any reviews in the usual places.Selected pagesPage 16Page 8Page 9Table of ContentsIndexContentsApplications18 SRAMBased FPGAs47 FlashBased FPGAs152 Embedded Processors in
- These are typically installed into a computer case, or attached to it by a cable or through a port.
- We propose a set of transformation rules to make the code able to detect mostof the faults not detected by the other EDMs.For the purpose of this paper, statements can be
Your cache administrator is webmaster. Other transformations focus on errors affecting the code, and correspond fromone side to duplicating the code implementing each operation, and from the other to addingchecks for verifying the consistency of the It is well suited forapplications using regular structures, and therefore its applicability is valid for a limited setof problems . Please note that variables should bechecked also when they appears in any expression used as a condition for branches orloops, thus allowing a detection of errors that corrupt the correct execution
morefromWikipedia High-level programming language A high-level programming language is a programming language with strong abstraction from the details of the computer. Preliminary experimental results are reported, showing the fault coverage obtained by the method, as well as some figures concerning the slow-down and code size increase it causes Data: 1999 Status: Pubblicato A basic block is asequence of statements which are always indivisibly executed (i.e., they are branch-free).The following rules are then introduced, in order to check whether all the statements inevery basic http://porto.polito.it/1418533 Therefore, the rules defined above can be extended as follows:• every procedure parameter is duplicated• each time the procedure reads a parameter, it checks the two copies for consistency• the return
Errors in dataSome of the rules concern the variables defined and used by the program. Theprogram also implements a simple software Error Detection Mechanism, whichconsists in verifying the correctness of each part of the expression.Tab. 1 reports the ratio between the size of the source code For example, if we consider a statement executing an addition between two operands, Rule #2 and #3 also guarantee the detection of any error of type E1which transforms the addition into Dr.
Several processors have built-in EDMs able to detect part of these errors, e.g.,by activating Illegal Instruction Exception procedures. http://nzbsites.com/soft-error/soft-error-in-memory.html As forthe previous Figure, we just applied Rules #7 and #8 to the considered piece of code,ignoring the other previously defined rules.Rules #7 and #8 allow the detection of a number morefromWikipedia Programmer A programmer, computer programmer, or coder is a person who writes computer software. E1 errors affecting S1 statementsAs far as errors of type E1 affecting the statements of type S1 are considered, they areautomatically detected by simply applying the transformation rules introduced above forerrors
Il numero di citazioni riportate su PORTO viene estratto mensilmente. Generated Fri, 28 Oct 2016 09:08:47 GMT by s_fl369 (squid/3.5.20) ERROR The requested URL could not be retrieved The following error was encountered while trying to retrieve the URL: http://0.0.0.10/ Connection morefromWikipedia Personal computer hardware Personal computer hardware are the component devices that are the building blocks of personal computers. Source morefromWikipedia Computer program A computer program (also software, or just a program) is a sequence of instructions written to perform a specified task with a computer.
Our method, although devised for transient faults, is also able to detect mostpermanent faults possibly existing in the system.All the transformations we propose, being performed on the high-level code, areindependent on Since the transformations can be automatically applied as a pre-compilation phase, the programmer is freed from the cost and responsibility of introducing suitable EDMs in its code. Torchiano, M.
The system returned: (22) Invalid argument The remote host or network may be down.
A consistency check on v0 and v1 must be performedeach time the variable is read. She received a PhD in 2003 and MSE in 1999 both in Computer Science from Universidade Federal do Rio Grande do Sul (UFRGS) in Porto Alegre, RS, Brazil. Preliminary experimental results are reported, showing the fault coverage obtained by the method, as well as some figures concerning the slow-down and code size increase it causesDiscover the world's research11+ million Possono verificarsi discrepanze rispetto ai dati presenti sulle banche dati per i seguenti motivi: Differenze tra i dati riportati su IRIS e quelli presenti nelle banche dati.
The system returned: (22) Invalid argument The remote host or network may be down. Generated Fri, 28 Oct 2016 09:08:47 GMT by s_fl369 (squid/3.5.20) Soft-error detection through software fault-tolerance techniques Allegati presenti Esporta il record Tipo di pubblicazione: Articolo in atti di convegno Tipologia MIUR: Contributo in Atti di Convegno (Proceeding) > Contributo in atti have a peek here It is important to note that the detection capabilities ofour rules are much higher, since they address any error affecting the data, without anylimitation on the number of modified bits or
Generated Fri, 28 Oct 2016 09:08:47 GMT by s_fl369 (squid/3.5.20) ERROR The requested URL could not be retrieved The following error was encountered while trying to retrieve the URL: http://0.0.0.9/ Connection Errors affecting variables aftertheir last usage are not detected.Two simple examples are reported in Figure 1, which shows the code modification foran assignment operation and for a sum operation involving three Institutional Sign In By Topic Aerospace Bioengineering Communication, Networking & Broadcasting Components, Circuits, Devices & Systems Computing & Processing Engineered Materials, Dielectrics & Plasmas Engineering Profession Fields, Waves & Electromagnetics General The term computer programmer can refer to a specialist in one area of computer programming or to a generalist who writes code for many kinds of software.
Your cache administrator is webmaster. Preliminary experimental results are reported, showing the fault coverage obtained by the method, as well as some figures concerning the slow-down and code size increase it causes. The check must be performed immediately after the readoperation in order to block the fault effect propagation. Each instruction that writes variable v must also be duplicated in order to updatethe two copies of the variable.Every fault that occurs in any variable during the program execution can be
Experimental resultsIn order to practically evaluate the feasibility and effectiveness of the proposedapproach, we set up some experiments, which are described in the following.We first selected a set of simple C The ACM Guide to Computing Literature All Tags Export Formats Save to Binder EnglishItaliano Login Cerca PORTOPublications Open Repository TOrino Vista per: Anno di pubblicazioneAree disciplinariDipartimentiAutoriParole chiave TipoTitolo del
© Copyright 2017 nzbsites.com. All rights reserved.