{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T20:58:09Z","timestamp":1725829089344},"publisher-location":"Cham","reference-count":25,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319242545"},{"type":"electronic","value":"9783319242552"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-24255-2_12","type":"book-chapter","created":{"date-parts":[[2015,9,5]],"date-time":"2015-09-05T09:51:13Z","timestamp":1441446673000},"page":"151-165","source":"Crossref","is-referenced-by-count":0,"title":["Understanding the Effects of Data Corruption on Application Behavior Based on Data Characteristics"],"prefix":"10.1007","author":[{"given":"Georgios","family":"Stefanakis","sequence":"first","affiliation":[]},{"given":"Vijay","family":"Nagarajan","sequence":"additional","affiliation":[]},{"given":"Marcelo","family":"Cintra","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,11,25]]},"reference":[{"key":"12_CR1","doi-asserted-by":"publisher","first-page":"1","DOI":"10.2200\/S00192ED1V01Y200904CAC005","volume":"4","author":"DJ Sorin","year":"2009","unstructured":"Sorin, D.J.: Fault tolerant computer architecture. Synth. Lect. Comput. Archit. 4, 1\u2013104 (2009)","journal-title":"Synth. Lect. Comput. Archit."},{"issue":"2","key":"12_CR2","doi-asserted-by":"publisher","first-page":"248","DOI":"10.1109\/12.364536","volume":"44","author":"G Kanawati","year":"1995","unstructured":"Kanawati, G., et al.: FERRARI: a flexible software-based fault and error injection system. Trans. Comput. 44(2), 248\u2013260 (1995)","journal-title":"Trans. Comput."},{"key":"12_CR3","doi-asserted-by":"crossref","unstructured":"Skarin, D., et al.: GOOFI-2: a tool for experimental dependability assessment. In: DSN (2010)","DOI":"10.1109\/DSN.2010.5544265"},{"key":"12_CR4","unstructured":"Stott, D., et al.: NFTAPE: a framework for assessing dependability in distributed systems with lightweight fault injectors. In: IPDS (2000)"},{"issue":"2","key":"12_CR5","doi-asserted-by":"publisher","first-page":"125","DOI":"10.1109\/32.666826","volume":"24","author":"J Carreira","year":"1998","unstructured":"Carreira, J., et al.: Xception: a technique for the experimental evaluation of dependability in modern computers. Trans. Softw. Eng. 24(2), 125\u2013136 (1998)","journal-title":"Trans. Softw. Eng."},{"key":"12_CR6","unstructured":"Segall, Z., et al.: FIAT-fault injection based automated testing environment. In: FTCS (1988)"},{"key":"12_CR7","unstructured":"Mukherjee, S.S., et al.: A systematic methodology to compute the architectural vulnerability factors for a high-performance microprocessor. In: MICRO (2003)"},{"key":"12_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"265","DOI":"10.1007\/978-3-642-40793-2_24","volume-title":"Computer Safety, Reliability, and Security","author":"F Ayatolahi","year":"2013","unstructured":"Ayatolahi, F., Sangchoolie, B., Johansson, R., Karlsson, J.: A study of the impact of single bit-flip and double bit-flip errors on program execution. In: Bitsch, F., Guiochet, J., Ka\u00e2niche, M. (eds.) SAFECOMP. LNCS, vol. 8153, pp. 265\u2013276. Springer, Heidelberg (2013)"},{"key":"12_CR9","doi-asserted-by":"crossref","unstructured":"Luk, C.K., et al.: Pin: Building customized program analysis tools with dynamic instrumentation. In: PLDI (2005)","DOI":"10.1145\/1065010.1065034"},{"key":"12_CR10","unstructured":"Zhu, Y., et al.: Privacy scope: a precise information flow tracking system for finding application leaks. Technical report (2009)"},{"issue":"3","key":"12_CR11","doi-asserted-by":"publisher","first-page":"63","DOI":"10.1177\/109434209100500306","volume":"5","author":"D Bailey","year":"1991","unstructured":"Bailey, D., et al.: The NAS parallel benchmarks. Intern J. High Perform. Comput. Appl. 5(3), 63\u201373 (1991)","journal-title":"Intern J. High Perform. Comput. Appl."},{"issue":"9","key":"12_CR12","doi-asserted-by":"publisher","first-page":"1115","DOI":"10.1109\/TC.2003.1228509","volume":"52","author":"J Arlat","year":"2003","unstructured":"Arlat, J., et al.: Comparison of physical and software-implemented fault injection techniques. Trans. Comput. 52(9), 1115\u20131133 (2003)","journal-title":"Trans. Comput."},{"key":"12_CR13","doi-asserted-by":"crossref","unstructured":"Hiller, M., et al.: PROPANE: an environment for examining the propagation of errors in software. In: ISSTA (2002)","DOI":"10.1145\/566172.566184"},{"issue":"4","key":"12_CR14","doi-asserted-by":"publisher","first-page":"311","DOI":"10.1016\/0166-3615(89)90130-9","volume":"11","author":"JP Gerardin","year":"1989","unstructured":"Gerardin, J.P.: The DEF-Injecto test instrument, assistance in the design of reliable and safe systems. Comput. Ind. 11(4), 311\u2013319 (1989)","journal-title":"Comput. Ind."},{"key":"12_CR15","doi-asserted-by":"crossref","unstructured":"Greskamp, B., et al.: BlueShift: designing processors for timing speculation from the ground up. In: HPCA (2009)","DOI":"10.1109\/HPCA.2009.4798256"},{"key":"12_CR16","unstructured":"Ernst, D., et al.: Razor: a low-power pipeline based on circuit-level timing speculation. In: MICRO (2003)"},{"key":"12_CR17","doi-asserted-by":"crossref","unstructured":"Zhang, W., et al.: Performance, energy, and reliability tradeoffs in replicating hot cache lines. In: CASES (2003)","DOI":"10.1145\/951710.951750"},{"key":"12_CR18","doi-asserted-by":"crossref","unstructured":"de Kruijf, M., et al.: Relax: an architectural framework for software recovery of hardware faults. In: ISCA (2010)","DOI":"10.1145\/1815961.1816026"},{"key":"12_CR19","unstructured":"Reis, G.A., et al.: SWIFT: software implemented fault tolerance. In: CGO (2005)"},{"issue":"1","key":"12_CR20","doi-asserted-by":"publisher","first-page":"89","DOI":"10.1007\/s11265-008-0175-9","volume":"57","author":"D Borodin","year":"2009","unstructured":"Borodin, D., et al.: Instruction-level fault tolerance configurability. J. Sig. Process. Syst. 57(1), 89\u2013105 (2009)","journal-title":"J. Sig. Process. Syst."},{"key":"12_CR21","doi-asserted-by":"crossref","unstructured":"Feng, S., et al.: Shoestring: probabilistic soft error reliability on the cheap. In: ASPLOS (2010)","DOI":"10.1145\/1736020.1736063"},{"issue":"3","key":"12_CR22","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/1455650.1455653","volume":"5","author":"M Mehrara","year":"2008","unstructured":"Mehrara, M., Austin, T.: Exploiting selective placement for low-cost memory protection. TACO 5(3), 1\u201324 (2008)","journal-title":"TACO"},{"issue":"9","key":"12_CR23","doi-asserted-by":"publisher","first-page":"1343","DOI":"10.1109\/TVLSI.2008.2002427","volume":"17","author":"K Lee","year":"2009","unstructured":"Lee, K., et al.: Partially protected caches to reduce failures due to soft errors in multimedia applications. Trans. VLSI Syst. 17(9), 1343\u20131347 (2009)","journal-title":"Trans. VLSI Syst."},{"key":"12_CR24","doi-asserted-by":"crossref","unstructured":"Sampson, A., et al.: EnerJ: approximate data types for safe and general low-power computation. In: PLDI (2011)","DOI":"10.1145\/1993498.1993518"},{"key":"12_CR25","unstructured":"Chang, J., et al.: Automatic instruction-level software-only recovery. In: DSN (2006)"}],"container-title":["Lecture Notes in Computer Science","Computer Safety, Reliability, and Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-24255-2_12","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,30]],"date-time":"2019-05-30T17:47:48Z","timestamp":1559238468000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-24255-2_12"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319242545","9783319242552"],"references-count":25,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-24255-2_12","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2015]]}}}