File Download

There are no files associated with this item.

  • Find it @ UNIST can give you direct access to the published full text of this article. (UNISTARs only)
Related Researcher

이종은

Lee, Jongeun
Intelligent Computing and Codesign Lab.
Read More

Views & Downloads

Detailed Information

Cited time in webofscience Cited time in scopus
Metadata Downloads

Full metadata record

DC Field Value Language
dc.citation.endPage 20 -
dc.citation.number 1 -
dc.citation.startPage 1 -
dc.citation.title ACM TRANSACTIONS ON EMBEDDED COMPUTING SYSTEMS -
dc.citation.volume 13 -
dc.contributor.author Lee, Jongeun -
dc.contributor.author Shrivastava, Aviral -
dc.date.accessioned 2023-12-22T03:14:26Z -
dc.date.available 2023-12-22T03:14:26Z -
dc.date.created 2014-01-02 -
dc.date.issued 2013-11 -
dc.description.abstract Register File (RF) is extremely vulnerable to soft errors, and traditional redundancy based schemes to protect the RF are prohibitive not only because RF is often in the timing critical path of the processor, but also since it is one of the hottest blocks on the chip. Software approaches would be ideal in this case, but previous approaches based on instruction scheduling are only moderately effective due to local scope. In this article we present a compiler approach, based on interprocedural program analysis, to reduce the vulnerability of registers by temporarily writing live variables to protected memory. We formulate the problem as an integer linear programming problem and also present a very efficient heuristic algorithm. Further we present an iterative optimization method based on Kernighan-Lin's graph partitioning algorithm. Our experiments demonstrate that our proposed techniques can reduce the vulnerability of a RF by 33 ~ 37% on average and up to 66%, with a small 2% increase in runtime. In addition, our overhead reduction optimization can effectively reduce the code size overhead, by more than 40% on average, to a mere 5 ~ 6%, compared to highly optimized binaries. Categories and Subject Descriptors: D.3.4 [Programming Languages]: Processors-Code generation, compilers, optimization; B.8.1 [Performance and Reliability]: Reliability, Testing, and Fault-Tolerance. -
dc.identifier.bibliographicCitation ACM TRANSACTIONS ON EMBEDDED COMPUTING SYSTEMS, v.13, no.1, pp.1 - 20 -
dc.identifier.doi 10.1145/2536747.2536760 -
dc.identifier.issn 1539-9087 -
dc.identifier.scopusid 2-s2.0-84890346874 -
dc.identifier.uri https://scholarworks.unist.ac.kr/handle/201301/4237 -
dc.identifier.url http://www.scopus.com/inward/record.url?partnerID=HzOxMe3b&scp=84890346874 -
dc.identifier.wosid 000329135500013 -
dc.language 영어 -
dc.publisher ASSOC COMPUTING MACHINERY -
dc.title Software-based register file vulnerability reduction for embedded processors -
dc.type Article -
dc.relation.journalWebOfScienceCategory Computer Science, Hardware & Architecture; Computer Science, Software Engineering -
dc.relation.journalResearchArea Computer Science -
dc.description.journalRegisteredClass scie -
dc.description.journalRegisteredClass scopus -
dc.subject.keywordAuthor Compilation -
dc.subject.keywordAuthor Embedded system -
dc.subject.keywordAuthor Link-time optimization -
dc.subject.keywordAuthor Register file -
dc.subject.keywordAuthor Soft error -
dc.subject.keywordAuthor Static analysis -
dc.subject.keywordAuthor Vulnerability -

qrcode

Items in Repository are protected by copyright, with all rights reserved, unless otherwise indicated.