1,967 Hits in 8.1 sec

Mitigating soft error failures for multimedia applications by selective data protection

Kyoungwoo Lee, Aviral Shrivastava, Ilya Issenin, Nikil Dutt, Nalini Venkatasubramanian
2006 Proceedings of the 2006 international conference on Compilers, architecture and synthesis for embedded systems - CASES '06  
Experimental results demonstrate that our selective data protection can achieve the failure rate close to that of a soft error protected cache system, while retaining the performance and energy consumption  ...  Consequently, we propose to partition the data space into failure critical and failure non-critical data, and provide a high-degree of soft error protection only to the failure critical data in Horizontally  ...  By mapping the failure critical data into the soft error protected cache, and the failure non-critical data into the unprotected cache, we can keep the failure rates of multimedia applications the same  ... 
doi:10.1145/1176760.1176810 dblp:conf/cases/LeeSIDV06 fatcat:ji7r6isurbeozamagg3lqcj3ee

Mitigating the impact of hardware defects on multimedia applications

Kyoungwoo Lee, Aviral Shrivastava, Minyoung Kim, Nikil Dutt, Nalini Venkatasubramanian
2008 Proceeding of the 16th ACM international conference on Multimedia - MM '08  
Increasing exponentially with each technology generation, hardwareinduced soft errors pose a significant threat for the reliability of mobile multimedia devices.  ...  at the application layer to mitigate the impact of hardware defects.  ...  For example, protecting all data in memory systems is an overkill in multimedia applications since we may not need to protect multimedia data that do not cause failures in general [10] .  ... 
doi:10.1145/1459359.1459402 dblp:conf/mm/LeeSKDV08 fatcat:g6avoui6tjgzlkojz66lskpg4y

Partially Protected Caches to Reduce Failures Due to Soft Errors in Multimedia Applications

Kyoungwoo Lee, A. Shrivastava, I. Issenin, N. Dutt, N. Venkatasubramanian
2009 IEEE Transactions on Very Large Scale Integration (vlsi) Systems  
Based on the observation that in multimedia applications, not all data require the same amount of protection from soft errors, we propose a Partially Protected Cache (PPC) architecture, in which there  ...  Owing to their large area, high density, and low operating voltages, caches are worst hit by soft errors.  ...  In this article, we propose a novel approach for mitigating failures caused by soft errors in multimedia embedded applications where power, performance, and reliability are all a concern.  ... 
doi:10.1109/tvlsi.2008.2002427 fatcat:ukkmqul3arek3lnlu7335tru2y

Partitioning techniques for partially protected caches in resource-constrained embedded systems

Kyoungwoo Lee, Aviral Shrivastava, Nikil Dutt, Nalini Venkatasubramanian
2010 ACM Transactions on Design Automation of Electronic Systems  
By finding and mapping the data that is more prone to soft errors to the protected cache, and error-resilient data to the unprotected cache, failures induced by soft errors can be significantly reduced  ...  Partially protected cache (PPC) is a promising microarchitectural feature to mitigate failures due to soft errors in power, performance, and cost sensitive embedded processors.  ...  error protection for multimedia applications.  ... 
doi:10.1145/1835420.1835423 fatcat:z6adzpk36jdgnp5cy4fspfjjsy

Error Tolerant Multimedia Stream Processing: There's Plenty of Room at the Top (of the System Stack)

Yiannis Andreopoulos
2013 IEEE transactions on multimedia  
However, research is currently emerging that attempts to utilize the error-tolerant nature of MSP applications for this purpose.  ...  Unlike conventional processing that aims for worst-case performance and accuracy guarantees, error-tolerant MSP attempts to provide guarantees for the expected performance and accuracy.  ...  Within this issue, we refer the reader to two new contributions on error control and error mitigation techniques [101] , [102] , ranging from cross-layer techniques for protection of multimedia applications  ... 
doi:10.1109/tmm.2012.2232649 fatcat:x6p5wvaxyvgopc435hqyoprhri

Revisiting Symptom-Based Fault Tolerant Techniques against Soft Errors

Hwisoo So, Moslem Didehban, Yohan Ko, Reiley Jeyapaul, Jongho Kim, Youngbin Kim, Kyoungwoo Lee, Aviral Shrivastava
2021 Electronics  
Therefore, monitoring such infrequent symptoms makes it possible to cover the manifestation of failures caused by soft errors.  ...  The considerable overheads from such full redundancy-based techniques has motivated researchers to propose low-cost soft error protection schemes, such as symptom-based error protection schemes.  ...  Partially protected caches to reduce failures due to soft errors in multimedia applications. IEEE Trans. Very Large Scale Integr. Syst. (TVLSI) 2009, 17, 1343–1347. 41.  ... 
doi:10.3390/electronics10233028 fatcat:6xmgwau25bgxpjm2jdhjop623y

Extracting Useful Computation from Error-Prone Processors for Streaming Applications

Yavuz Yetim, Margaret Martonosi, Sharad Malik
2013 Design, Automation & Test in Europe Conference & Exhibition (DATE), 2013  
In response, this paper addresses requirements for errortolerant execution by proposing and evaluating techniques for running error-tolerant software on a general-purpose processor built from an unreliable  ...  Since some applications (e.g. media) can tolerate limited computation errors and still provide useful results, error-tolerant computation models have been explored, with both the application and computation  ...  These benchmarks were primarily selected due to the suitability of multimedia applications for error-tolerant computation.  ... 
doi:10.7873/date.2013.055 dblp:conf/date/YetimMM13 fatcat:zyheqdycezfnzc6ksqrzjzeusm

A Low-SER Efficient Core Processor Architecture for Future Technologies

E. L. Rhod, C. A. Lisboa, L. Carro
2007 2007 Design, Automation & Test in Europe Conference & Exhibition  
Device scaling in new and future technologies brings along severe increase in the soft error rate of circuits, for combinational and sequential logic.  ...  Although potential solutions have started to be investigated by the community, the full use of future resources in circuits tolerant to SETs, without performance, area or power penalties, is still an open  ...  While successful mitigation techniques, and new memory technologies such as MRAM and FRAM, have already been devised to protect memories against soft errors, the protection of combinational logic, mainly  ... 
doi:10.1109/date.2007.364502 fatcat:pqapqckgwzbylovtfcprrjova4

A Survey on Transport Protocols for Wireless Multimedia Sensor Networks

Daniel G. Costa
2012 KSII Transactions on Internet and Information Systems  
Wireless networks composed of multimedia-enabled resource-constrained sensor nodes have enriched a large set of monitoring sensing applications.  ...  from traditional scalar wireless sensor networks are not suitable for multimedia sensor networks.  ...  FEC codes can be employed to protect the entire encoded data or more relevant bits can receive higher protection exploiting techniques as Unequal Error Protection (UEP) [56] . c) Partial reliability:  ... 
doi:10.3837/tiis.2012.01.014 fatcat:mfffe7xilbcgnhtrbppvnz3nda

SEUs Mitigation on Program Counter of the LEON3 Soft Processor

Afef KCHAOU, Wajih EL, Rached TOURKI
2017 International Journal of Advanced Computer Science and Applications  
Analyzing and evaluating the sensitivity of embedded systems to soft-errors have always been a challenge for aerospace or safety equipment designer.  ...  Fault injection mitigation and repair techniques are applied together on LEON3 processor in goal to study the reliability of a soft-core.  ...  SEU fault injection, called bit-flip, upset or soft-error propagates in the design depending on the application [10] and it can cause a data corruption or a circuit malfunction.  ... 
doi:10.14569/ijacsa.2017.080737 fatcat:eqgmnp5tevcy3dj5b3sxlmnibm

Dependable Software Generation and Execution on Embedded Systems [chapter]

Florian Kriebel, Kuan-Hsun Chen, Semeen Rehman, Jörg Henkel, Jian-Jia Chen, Muhammad Shafique
2020 Embedded Systems  
This is achieved for example by selecting appropriate application versions and protection levels for single and multi-core systems—for example using redundant multithreading (RMT) in different modes—under  ...  Both aspects are jointly taken into account by the run-time system software which decides—with the help of offline and online-generated datafor multiple concurrently executing applications how to protect  ...  Acknowledgments This work was supported in parts by the German Research Foundation (DFG) as part of the priority program "Dependable Embedded Systems" (SPP  ... 
doi:10.1007/978-3-030-52017-5_6 fatcat:ss7y476zjjg7polrkpipesgelm

A case study in reliability-aware design

Matthias May, Matthias Alles, Norbert Wehn
2008 Proceedings of the conference on Design, automation and test in Europe - DATE '08  
A state-of-the-art WiMAX channel decoder for LDPC codes is investigated on all design levels to increase its reliability for a given system performance with minimum hardware overhead.  ...  In this paper we present a case study in reliability-aware design tolerating transient errors.  ...  ., not all errors in the computation and transmission of data have an impact on the algorithmic performance. This is a typical property of many multimedia applications, too.  ... 
doi:10.1145/1403375.1403484 fatcat:lctos32yd5cbfayyc7qmovffua

A Case Study in Reliability-Aware Design: A Resilient LDPC Code Decoder

Matthias May, Matthias Alles, Norbert Wehn
2008 2008 Design, Automation and Test in Europe  
A state-of-the-art WiMAX channel decoder for LDPC codes is investigated on all design levels to increase its reliability for a given system performance with minimum hardware overhead.  ...  In this paper we present a case study in reliability-aware design tolerating transient errors.  ...  ., not all errors in the computation and transmission of data have an impact on the algorithmic performance. This is a typical property of many multimedia applications, too.  ... 
doi:10.1109/date.2008.4484723 dblp:conf/date/MayAW08 fatcat:up77lmvwzjcejgrl3et23oqkmq

A survey of cross-layer power-reliability tradeoffs in multi and many core systems-on-chip

Ahmed A. Eltawil, Michael Engel, Bibiche Geuskens, Amin Khajeh Djahromi, Fadi J. Kurdahi, Peter Marwedel, Smail Niar, Mazen A.R. Saghir
2013 Microprocessors and microsystems  
This paper surveys various cross layer techniques and approaches for power, performance, and reliability tradeoffs are technology, circuit, architecture and application layers.  ...  In order to do so, it is crucial to understand the close interplay between the different layers of a system: technology, platform, and application.  ...  Similarly, multimedia applications have soft real-time constraints that provide an opportunity to tradeoff Quality of Service (QoS) for errors in the data stream.  ... 
doi:10.1016/j.micpro.2013.07.008 fatcat:bl2v6dfvxnfxnble4pkcg2pcw4

Ada for the control of degradation of service

Gertrude Levine
2009 ACM SIGAda Ada Letters  
A classification scheme for service degradations clarifies their relationship to defects and errors and their role in the prevention of failure.  ...  With the growth of hard real-time systems, wireless networks, and multimedia applications, a comprehensive understanding of service degradations and their usage has become ever more important.  ...  Tolerating times degradation is particularly useful in forestalling errors in soft deadline tasks. Neither errors nor failures need occur.) 4) A non-critical task does not have a set deadline.  ... 
doi:10.1145/1620593.1620596 fatcat:ebljfsl6pvejfejjc6nipuvete
« Previous Showing results 1 — 15 out of 1,967 results