Results 1 - 10
of
17,416
Table 5. Error detection mechanisms
"... In PAGE 7: ...atchdog, in turn, detected 30.0% of the errors. The TPC- HA consistency tests did not detected a single corruption in user data, which is definitely a good mark on the robustness of the target system. Table5 summarizes the detection figures. It should be stressed that the detection vales are counted independently of the detection of other mechanisms.... ..."
Table 1. Error Detection Mechanisms in Chameleon ARMORs
2000
"... In PAGE 7: ... Levels 3 and 4 involve distributed detection protocols among replicas or pseudo-replicas of ARMORs, possibly executing on different nodes; these levels are not considered for this paper. Table1 lists the available techniques. It should be noted that the ARMOR architecture is designed to support both control flow and data signatures.... ..."
Cited by 1
Table 1. Error Detection Mechanisms in Chameleon ARMORs
"... In PAGE 7: ... Levels 3 and 4 involve distributed detection protocols among replicas or pseudo-replicas of ARMORs, possibly executing on different nodes; these levels are not considered for this paper. Table1 lists the available techniques. It should be noted that the ARMOR architecture is designed to support both control flow and data signatures.... ..."
Table 1. Error detection mechanisms of Thor. Error Detection
2001
"... In PAGE 4: ... Thor is a 32-bit CPU with a four-stage pipeline and a 128 byte data cache located within the pipeline. Several error detection mechanisms, see Table1 , and support for Ada tasking are included in the processor. Thor also features advanced scan-chain logic that allows read access to more than 3000 of the almost 4500 internal state elements of the CPU and write access to more than 2700 internal state elements.... In PAGE 6: ....1.1. Effective errors. Effective errors are errors which were either detected by the error detection mechanisms of the Thor processor (see Table1 ) or errors causing undetected wrong results (value failures) to be produced by the PI controller: Detected errors: Errors detected by the error detection mechanisms in Thor. These errors are further classified into errors detected by each of the various mechanisms or other errors.... ..."
Cited by 5
Table 1. Error Detections in Chameleon Detection Mechanism Description
2001
"... In PAGE 3: ...niques. Table1 lists the error detection techniques used in this study. Table 1.... ..."
Cited by 2
Table 1. Error Detections in Chameleon Detection Mechanism Description
2001
"... In PAGE 3: ...niques. Table1 lists the error detection techniques used in this study. Table 1.... ..."
Cited by 2
Table 1. Error Detections in Chameleon Detection Mechanism Description
"... In PAGE 3: ...niques. Table1 lists the error detection techniques used in this study. Table 1.... ..."
Table 2 summarizes the configuration options related to the automatic main detection mechanism.
"... In PAGE 15: ... Table2 . Automatic Main Detection mechanism options 2.... ..."
Table 2: Bandwidth requirements for the passive detection mechanisms, in bytes/instruction.
2004
"... In PAGE 8: ... This approach to detection requires no extra pin bandwidth over that already required to run applications, since it passively monitors tra c going to memory or the rest of the system. In Table2 , we report the average bandwidth generated by the three application classes (calculated as the sum of ad- dress and data tra c required to complete the memory re- quests). The passive nature of this approach makes it an attractive option for detecting errors in redundant proces- sors across physical chips.... ..."
Cited by 26
Table 2: Bandwidth requirements for the passive detection mechanisms, in bytes/instruction.
2004
"... In PAGE 8: ... This approach to detection requires no extra pin bandwidth over that already required to run applications, since it passively monitors tra c going to memory or the rest of the system. In Table2 , we report the average bandwidth generated by the three application classes (calculated as the sum of ad- dress and data tra c required to complete the memory re- quests). The passive nature of this approach makes it an attractive option for detecting errors in redundant proces- sors across physical chips.... ..."
Cited by 26
Results 1 - 10
of
17,416