{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,1,19]],"date-time":"2025-01-19T21:10:23Z","timestamp":1737321023443,"version":"3.33.0"},"publisher-location":"Berlin, Heidelberg","reference-count":22,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540426073"},{"type":"electronic","value":"9783540454168"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2001]]},"DOI":"10.1007\/3-540-45416-0_15","type":"book-chapter","created":{"date-parts":[[2007,7,20]],"date-time":"2007-07-20T19:29:50Z","timestamp":1184959790000},"page":"145-155","source":"Crossref","is-referenced-by-count":0,"title":["A Comparison Study of the Behavior of Equivalent Algorithms in Fault Injection Experiments in Parallel Superscalar Architectures"],"prefix":"10.1007","author":[{"given":"Ioannis","family":"Vakalis","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2001,9,26]]},"reference":[{"issue":"11","key":"15_CR1","doi-asserted-by":"publisher","first-page":"69","DOI":"10.1145\/163359.163373","volume":"36","author":"B. Littlewood","year":"1993","unstructured":"B. Littlewood, L. Stringini \u201cValidation of Ultrahigh Dependability for Software Based Systems\u201d, Communications of the ACM Vol. 36, No. 11 Nov. 1993 pg. 69\u201380","journal-title":"Communications of the ACM"},{"key":"15_CR2","doi-asserted-by":"crossref","unstructured":"M.-C. Hsueh, T.K. Tsai, R. K. Iyer \u201cFault Injection Techniques and Tools\u201d, IEEE Computer, Apr. 1997 pp. 75\u201382","DOI":"10.1109\/2.585157"},{"key":"15_CR3","unstructured":"J. Carreira, H. Madeira, J. Silva, \u201cXception: Software Fault Injection and Monitoring in Processor Functional Units\u201d DCCA-5, Conference on Dependable Computing for Critical Applications, Urbana-Champaign,USA, September 1995, pp. 135\u2013149"},{"key":"15_CR4","doi-asserted-by":"crossref","unstructured":"J. Arlat, M. Aguera, L. Amat, Y. Crouzet, J.C. Fabre, J.-C. Laprie, E. Martins, D. Powell \u201cFault Injection for Dependability Validation: A Methodology and some Applications\u201d, IEEE Transactions on Software Engineering, Vol. 16, No. 2, February 1990, pp. 166\u2013182","DOI":"10.1109\/32.44380"},{"key":"15_CR5","doi-asserted-by":"crossref","unstructured":"T.A. Delong, B.W. Johnson, J.A. Profeta III, A Fault Injection Technique for VHDL Behavioral-LevelModels, IEEE Design & Test of Computers, Winter 1996, pp. 24\u201333","DOI":"10.1109\/54.544533"},{"key":"15_CR6","doi-asserted-by":"crossref","unstructured":"G.A. Kanawati, N.A. Kanawati, J.A. Abraham, \u201cFERRARI: A Flexible Software-Based Fault and Error Injection System\u201d, IEEE Trans. on Computers, Vol 44, N. 2, February 1995, pp. 248\u2013260","DOI":"10.1109\/12.364536"},{"key":"15_CR7","unstructured":"A. Benso, P. Prinetto, M. Rebaudengo, M. Sonza Reorda, A Fault Injection Environment for Microprocessor-based Boards, to be presented to IEEE International Test Conference, Washington (USA), October 1998"},{"key":"15_CR8","doi-asserted-by":"crossref","unstructured":"A. Benso, M. Rebaudengo, L. Impagliazzo, P. Marmo, Fault-list collapsing for fault injection experiments, Proc. Ann. Reliability & Maintainability Symp., 1998, pp. 383\u2013388","DOI":"10.1109\/RAMS.1998.653808"},{"key":"15_CR9","unstructured":"D.K. Pradhan, Fault-Tolerant Computer System Design, Prentice Hall PTR, 1996"},{"key":"15_CR10","doi-asserted-by":"crossref","unstructured":"M. Zenha Rela, H. Madeira, J. G. Silva, Experimental Evaluation of the Fail-Silent Behavior inPrograms with Consistency Checks, Proc. FTCS-26, 1996, pp. 394\u2013403","DOI":"10.1109\/FTCS.1996.534625"},{"key":"15_CR11","doi-asserted-by":"publisher","first-page":"518","DOI":"10.1109\/TC.1984.1676475","volume":"33","author":"K. H. Huang","year":"1984","unstructured":"K. H. Huang, J. A. Abraham \u201cAlgorithm-Based Fault Tolerance for Matrix Operations\u201d, IEEE Trans. Computers, vol. 33, Dec 1984, pp. 518\u2013528","journal-title":"IEEE Trans. Computers"},{"key":"15_CR12","doi-asserted-by":"publisher","first-page":"126","DOI":"10.1109\/TSE.1980.234478","volume":"SE-6","author":"S. Yau","year":"1980","unstructured":"S. Yau, F. Chen, An Approach to Concurrent Control Flow Checking, IEEE Transactions on Software Engineering, Vol. SE-6, No. 2, March 1980, pp. 126\u201313","journal-title":"IEEE Transactions on Software Engineering"},{"key":"15_CR13","doi-asserted-by":"crossref","unstructured":"A. Benso, P.L. Civera, M. Rebaudengo, M. Sonza Reorda, \u201cAn integrated HW and SW Fault Injection environment for real-time systems\u201d, Proc. IEEE International Symposium on Defect and FaultTolerance in VLSI Systems, 1998, pp. 117\u2013122","DOI":"10.1109\/DFTVS.1998.732158"},{"key":"15_CR14","doi-asserted-by":"crossref","unstructured":"M. Zagha, B. Larson, S. Turner, M. Itzkowitz \u201cPerformance Analysis Using the MIPS R10000 Performance Counters\u201d, IEEE Conference Proceedings Supercomputing\u201996, November 1996, Pittsburgh, PA","DOI":"10.1145\/369028.369059"},{"issue":"4","key":"15_CR15","doi-asserted-by":"publisher","first-page":"801","DOI":"10.1137\/1020098","volume":"20","author":"C. Moler","year":"1978","unstructured":"C. Moler, C. Van Loan \u201cNineteen dubious ways to compute the exponential of a matrix\u201d SIAM Review Vol. 20 No. 4, October 1978 pg. 801\u2013836","journal-title":"SIAM Review"},{"key":"15_CR16","unstructured":"M. Rebaudengo, M. Sonza Reorda, M. Violante, P. Cheynet, B. Nicolescu, R. Velazco \u201cEvaluating the effectiveness of a Software Fault-Tolerance technique on RISC-and CISC-based architectures\u201d IOLTW2000: International On-Line Test Workshop, July 2000"},{"key":"15_CR17","unstructured":"M. Rebaudengo, M. Sonza Reorda, M. Torchiano, M. Violante \u201cSoft-error Detection through Software Fault-Tolerance techniques\u201d DFT\u201999: IEEE International Symposium on Defect and Fault Tolerance in VLSI Systems, November 1-3-1999 Albuquerque, New Mexico, USA"},{"key":"15_CR18","doi-asserted-by":"crossref","unstructured":"L. T. Young, R. Iyer, K. K. Goswami, \u201cA Hybrid Monitor Assisted Fault injection Experiment\u201d, Proc. DCCA-3, 1993, pp. 163\u2013174","DOI":"10.1007\/978-3-7091-4009-3_12"},{"key":"15_CR19","unstructured":"N. Oh, P. P. Shirvani and E. J. McCluskey \u201cError Detection By Duplicated Instructions in Super-scalar Processors\u201d, (To appear )"},{"key":"15_CR20","unstructured":"G. H. Golub, C.F. van Loan \u201cMatrix Computations\u201d The John Hopkins University Press, 3rd Edition, 1996."},{"key":"15_CR21","unstructured":"MIPS R10000 Microprocessor User\u2019s manual. V. 2.0 October 10,1996."},{"key":"15_CR22","unstructured":"MIPS Open RISC Technology, R10000 Microprocessor. Product Overview October 1994."}],"container-title":["Lecture Notes in Computer Science","Computer Safety, Reliability and Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-45416-0_15","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,19]],"date-time":"2025-01-19T20:51:22Z","timestamp":1737319882000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-45416-0_15"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2001]]},"ISBN":["9783540426073","9783540454168"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/3-540-45416-0_15","relation":{},"ISSN":["0302-9743"],"issn-type":[{"type":"print","value":"0302-9743"}],"subject":[],"published":{"date-parts":[[2001]]}}}