File Download

There are no files associated with this item.

  • Find it @ UNIST can give you direct access to the published full text of this article. (UNISTARs only)
Related Researcher

이종은

Lee, Jongeun
Intelligent Computing and Codesign Lab.
Read More

Views & Downloads

Detailed Information

Cited time in webofscience Cited time in scopus
Metadata Downloads

Full metadata record

DC Field Value Language
dc.citation.endPage 152 -
dc.citation.number 4 -
dc.citation.startPage 143 -
dc.citation.title ACM SIGPLAN NOTICES -
dc.citation.volume 45 -
dc.contributor.author Shrivastava, Aviral -
dc.contributor.author Lee, Jongeun -
dc.contributor.author Jeyapaul, Reiley -
dc.date.accessioned 2023-12-22T07:10:49Z -
dc.date.available 2023-12-22T07:10:49Z -
dc.date.created 2013-06-10 -
dc.date.issued 2010-04 -
dc.description.abstract Continuous technology scaling has brought us to a point, where transistors have become extremely susceptible to cosmic radiation strikes, or soft errors. Inside the processor, caches are most vulnerable to soft errors, and techniques at various levels of design abstraction, e. g., fabrication, gate design, circuit design, and microarchitecture-level, have been developed to protect data in caches. However, no work has been done to investigate the effect of code transformations on the vulnerability of data in caches. Data is vulnerable to soft errors in the cache only if it will be read by the processor, and not if it will be overwritten. Since code transformations can change the read-write pattern of program variables, they significantly effect the soft error vulnerability of program variables in the cache. We observe that often opportunity exists to significantly reduce the soft error vulnerability of cache data by trading-off a little performance. However, even if one wanted to exploit this trade-off, it is difficult, since there are no efficient techniques to estimate vulnerability of data in caches. To this end, this paper develops efficient static analysis method to estimate program vulnerability in caches, which enables the compiler to exploit the performance-vulnerability trade-offs in applications. Finally, as compared to simulation based estimation, static analysis techniques provide the insights into vulnerability calculations that provide some simple schemes to reduce program vulnerability. -
dc.identifier.bibliographicCitation ACM SIGPLAN NOTICES, v.45, no.4, pp.143 - 152 -
dc.identifier.doi 10.1145/1755951.1755910 -
dc.identifier.issn 0362-1340 -
dc.identifier.scopusid 2-s2.0-77951237912 -
dc.identifier.uri https://scholarworks.unist.ac.kr/handle/201301/3244 -
dc.identifier.url http://www.scopus.com/inward/record.url?partnerID=HzOxMe3b&scp=77951237912 -
dc.identifier.wosid 000277056500016 -
dc.language 영어 -
dc.publisher ASSOC COMPUTING MACHINERY -
dc.title Cache Vulnerability Equations for Protecting Data in Embedded Processor Caches from Soft Errors -
dc.type Article -
dc.relation.journalWebOfScienceCategory Computer Science, Software Engineering -
dc.relation.journalResearchArea Computer Science -
dc.description.journalRegisteredClass scie -

qrcode

Items in Repository are protected by copyright, with all rights reserved, unless otherwise indicated.