|
[1] Chee Peng Lim Wui Lee Chang, Kai Meng Tay, “Clustering and visualization of failure modes using an evolving tree”, Expert Systems with Applications, vol. 42, pp. 7235–7244, 2015. [2] C.-Y. Cher J. Abraham H. Cho, S. Mirkhani and S. Mitra, “Quantitative evaluation of soft er- ror injection techniques for robust system design”, IEEE 2013 50th ACM/EDAC/IEEE design automation conference, pp. 1–10, 2013. [3] S. S. Mukherjee, C. Weaver, J. Emer, S. K. Reinhardt, and T. Austin, “A systematic method- ology to compute the architectural vulnerability factors for a high-performance microproces- sor”, in Proceedings. 36th Annual IEEE/ACM International Symposium on Microarchitec- ture, 2003. MICRO-36., 2003, pp. 29–40. [4] O. Pusz, D. Kiechle, C. Dietrich, and D. Lohmann, “Program-structure-guided approximation of large fault spaces”, in 2019 IEEE 24th Pacific Rim International Symposium on Depend- able Computing (PRDC), 2019, pp. 138–13809. [5] A. Biswas, P. Racunas, J. Emer, and S. Mukherjee, “Computing accurate avfs using ace analysis on performance models: A rebuttal”, IEEE Computer Architecture Letters, vol. 7, no. 1, pp. 21–24, 2008. [6] S. Raasch, A. Biswas, J. Stephan, P. Racunas, and J. Emer, “A fast and accurate analyti- cal technique to compute the avf of sequential bits in a processor”, in 2015 48th Annual IEEE/ACM International Symposium on Microarchitecture (MICRO), 2015, pp. 738–749. [7] Nicholas J. Wang, Aqeel Mahesri, and Sanjay J. Patel, “Examining ace analysis reliability estimates using fault-injection”, in Proceedings of the 34th Annual International Symposium
on Computer Architecture, New York, NY, USA, 2007, ISCA ’07, p. 460–469, Association for Computing Machinery. [8] A. Biswas, P. Racunas, R. Cheveresan, J. Emer, S. S. Mukherjee, and R. Rangan, “Com- puting architectural vulnerability factors for address-based structures”, in 32nd International Symposium on Computer Architecture (ISCA’05), 2005, pp. 532–543. [9] Serdar Zafer Can, Gulay Yalcin, Oguz Ergin, Osman Sabri Unsal, and Adrian Cristal, “Bit impact factor: Towards making fair vulnerability comparison”, Microprocess. Microsyst., vol. 38, no. 6, pp. 598–604, Aug. 2014. [10] Neo4j, https://neo4j.com/.
[11] Verilator, https://www.veripool.org/wiki/verilator.
[12] PicoRV32, https://github.com/cliffordwolf/picorv32.
[13] Pulpino, https://github.com/pulp-platform/pulpino.
|