<italic>In Situ</italic> Error Detection Techniques in Ultralow Voltage Pipelines: Analysis and Optimizations
نویسندگان
چکیده
منابع مشابه
Vision Pipelines and Optimizations
This chapter explores some hypothetical computer vision pipeline designs to understand HW/SW design alternatives and optimizations. Instead of looking at isolated computer vision algorithms, this chapter ties together many concepts into complete vision pipelines. Vision pipelines are sketched out for a few example applications to illustrate the use of different methods. Example applications inc...
متن کاملPerformance optimizations for compiler-based error detection
The trend towards smaller transistor technologies and lower operating voltages stresses the hardware and makes transistors more susceptible to transient errors. In future systems, performance and power gains will come at the cost of unreliable areas on the chip. For this reason, there is an increased need for low-overhead highlyreliable error detection methodologies. In the last years, several ...
متن کاملLeak Detection Methods in Transmission Pipelines and Error Sources
Leak detection in transmission pipelines is important for safe operation of pipelines. The probability of leaks may be occurred at any time and location, therefore pipeline leak detection systems play a key role in minimization of the occurrence of leaks probability and their impacts. Today there are many available assortments of modern technologies in the domain of leak detection. This paper p...
متن کاملUltralow-voltage, minimum-energy CMOS
minimum-energy CMOS S. Hanson B. Zhai K. Bernstein D. Blaauw A. Bryant L. Chang K. K. Das W. Haensch E. J. Nowak D. M. Sylvester Energy efficiency has become a ubiquitous design requirement for digital circuits. Aggressive supply-voltage scaling has emerged as the most effective way to reduce energy use. In this work, we review circuit behavior at low voltages, specifically in the subthreshold ...
متن کاملComplementarity of Error Detection Techniques
We study explicit techniques for detection of safety errors, e.g., depth-first search, directed search, random walk, and bitstate hashing. We argue that it is not important to find the best technique, but to find a set of complementary techniques. To this end, we choose nine diverse error detection techniques and perform experiments over a large set of models. We compare speed of techniques, le...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IEEE Transactions on Very Large Scale Integration (VLSI) Systems
سال: 2017
ISSN: 1063-8210,1557-9999
DOI: 10.1109/tvlsi.2016.2625598