{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,19]],"date-time":"2025-10-19T15:44:23Z","timestamp":1760888663281,"version":"3.40.2"},"publisher-location":"Berlin, Heidelberg","reference-count":20,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540617723"},{"type":"electronic","value":"9783540706779"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1996]]},"DOI":"10.1007\/3-540-61772-8_30","type":"book-chapter","created":{"date-parts":[[2012,2,26]],"date-time":"2012-02-26T22:23:54Z","timestamp":1330295034000},"page":"55-72","source":"Crossref","is-referenced-by-count":3,"title":["Fault injection evaluation of assigned signatures in a RISC processor"],"prefix":"10.1007","author":[{"given":"Pedro","family":"Furtado","sequence":"first","affiliation":[]},{"given":"Henrique","family":"Madeira","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2005,6,6]]},"reference":[{"key":"4_CR1","unstructured":"A. Aho, R. Sethi, and J. Ulman, \u201cCompilers: principles, techniques, and tools\u201d, Addison-Wesley Ed., 1985."},{"key":"4_CR2","unstructured":"Carreira, J., H. Madeira and Jo\u00e3o Gabriel Silva \u201cXception:Software Fault Injection and Monitoring in Processor Functional Units\u201d. Procs. 5th Conference on Dependable Computing for Critical Applications, Urbana-Champaign, IL, USA, Sept 27\u201329,1995."},{"key":"4_CR3","doi-asserted-by":"crossref","unstructured":"Gunneflo, U., J. Karsson and J. Torin, \u201cEvaluation of Error Detection Schemes Using Fault Injection by Heavy-ion Radiation\u201d, Procs. 19th FTCS, pp.340\u2013347, 1989.","DOI":"10.1109\/FTCS.1989.105590"},{"key":"4_CR4","unstructured":"Madeira,H., M. Rela,P. Furtado and J. G. Silva \u201cTime Behaviour monitoring as an Error Detection Mechanism\u201d. Conf. on Dependable Computing for Critical Applications DCCA-3 Sept-92"},{"key":"4_CR5","doi-asserted-by":"crossref","unstructured":"Madeira, H. and J. Gabriel Silva \u201cOn-Line Signature Learning and Checking\u201d. Conference on Dependable Computing for Critical Applications, Springer-Verlag, J. Meyer and R. Schlichting (eds.) 1992 pp 394\u2013420.","DOI":"10.1007\/978-3-7091-9198-9"},{"key":"4_CR6","unstructured":"Mahmood, A. and E. McCluskey. Watchdog Processors \u2014 Error Coverage and Overhead. Proc. of the 15th Symposium on Fault Tolerant Computing, Ann Arbor, Michigan, USA, June 1985, pp 214\u2013219."},{"key":"4_CR7","doi-asserted-by":"crossref","first-page":"160","DOI":"10.1109\/12.2145","volume":"37","author":"A. Mahmood","year":"1988","unstructured":"Mahmood, A. and E. McCluskey. Concurrent Error Detection using Watchdog Processors \u2014 A Survey. IEEE Trans. on Computers, Vol37, pp 160\u2013174, Feb 1988.","journal-title":"IEEE Trans. on Computers"},{"key":"4_CR8","unstructured":"Miremadi, G., J. Karlsson,U. Gunneflo, J. Torin, \u201cTwo Software Techniques for On-line Error Detection\u201d. Procs. of 22th Symp. on Fault Tolerant Computing, 1992."},{"key":"4_CR9","unstructured":"Miremadi, G., J. Ohlsson, M. Rim\u00e9m, J. Karlsson, \u201cUse of Time and Address Signatures for Control Flow Checking\u201d. Conference on Dependable Computing for Critical Applications (DCCA 5), Urbana-Champaign, USA, Sept. 95, pp 113\u2013124."},{"key":"4_CR10","unstructured":"Namjoo, M. \u201cTechniques for Concurrent Testing of VLSI Processor Operation\u201d. Proceedings of Int. Test Conf., Philadelphia, Nov.15\u201318 1982, p.461\u2013468."},{"key":"4_CR11","doi-asserted-by":"crossref","unstructured":"Ohlssom, J., M. Rimen,U. Gunneflo, A Study of Transient Fault-Injection into a 32-bit RISC with Built.in Watchdog, Proceedings of the 22th Fault Tolerant Computing Symposium, 1992,pp. 316\u2013325.","DOI":"10.1109\/FTCS.1992.243569"},{"key":"4_CR12","unstructured":"Ohlsson, J., M. Rim\u00e9n, \u201cImplicit Signature Checking\u201d Proc. of 25th Symposium on Fault Tolerant Computing, FTCS-25, Jun 95."},{"key":"4_CR13","doi-asserted-by":"crossref","unstructured":"Saxena, N. R. and E. J. McCluskey, \u201c Control Flow Checking Using Watchdog Assists and Extended Precision Checksums\u201d IEEE Transactions on Computers Vol 39, n\u22184, April 1990.","DOI":"10.1109\/12.54849"},{"key":"4_CR14","unstructured":"Shen, J. P. and M. A. Shuette \u201cOn-line self-monitoring using signatured instruction streams\u201d, International Test Conference, ITC83,pp 275\u2013282,1983."},{"key":"4_CR15","doi-asserted-by":"crossref","first-page":"264","DOI":"10.1109\/TC.1987.1676899","volume":"36","author":"M. Shuette","year":"1987","unstructured":"Shuette, M. and J. Shen. \u201cProcessor Control Flow Monitoring using Signatured Instruction Steams\u201d. IEEE Trans. on Computers, Vol 36, pp 264\u2013275, March 1987.","journal-title":"IEEE Trans. on Computers"},{"key":"4_CR16","first-page":"318","volume":"21","author":"M. Shuette","year":"1991","unstructured":"Shuette, M. and J. P. Shen. Exploiting Instruction-level Resource Parallelism for Transparent, Integrated Control-flow Monitoring. Proc.of 21th Symposium on Fault Tolerant Computing, IEEE FTCS 21, 318\u2013325, 1991.","journal-title":"IEEE FTCS"},{"key":"4_CR17","first-page":"189","volume-title":"Hardware and Software for real time process control","author":"J. Sosnowski","year":"1989","unstructured":"Sosnowski, J., \u201cTransient fault tolerance in microprocessor controllers\u201d, Hardware and Software for real time process control, J. Zalewski and W. Ehrenberger (eds.), Elsevier Science Publishers B. V. (North Holland), IFIP, 1989, pp. 189\u2013195."},{"key":"4_CR18","first-page":"442","volume":"FTCS-20","author":"N. J. Warter","year":"1991","unstructured":"Warter, N. J. and W. W. Hwu, \u201cA software based approach to achieving optimal performance for signature control flow checking\u201d, Proceedings of 20th Symposium on Fault Tolerant Computing, FTCS-20, 1991, pp. 442\u2013449.","journal-title":"Proceedings of 20th Symposium on Fault Tolerant Computing"},{"issue":"No.6","key":"4_CR19","doi-asserted-by":"crossref","first-page":"629","DOI":"10.1109\/43.55193","volume":"9","author":"K. Wilken","year":"1990","unstructured":"Wilken, K. and J. P. Shen, \u201cContinous Signature Monitoring: Low-Cost Concurrent Detection of Processor Control Erros\u201d, IEEE Transactions on Computer-Aided Design, Vol. 9, No. 6, June 1990, p. 629\u2013641.","journal-title":"IEEE Transactions on Computer-Aided Design"},{"key":"4_CR20","unstructured":"Wilken, K. and J. Shen. Continuous Signature Monitoring: Efficient Concurrent Error-detection of Processor Control Errors. IEEE 18th International Test Conference."}],"container-title":["Lecture Notes in Computer Science","Dependable Computing \u2014 EDCC-2"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-61772-8_30.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,21]],"date-time":"2025-03-21T23:26:18Z","timestamp":1742599578000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-61772-8_30"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1996]]},"ISBN":["9783540617723","9783540706779"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/3-540-61772-8_30","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[1996]]}}}