{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T04:21:28Z","timestamp":1742962888370,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":18,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642297397"},{"type":"electronic","value":"9783642297403"}],"license":[{"start":{"date-parts":[[2012,1,1]],"date-time":"2012-01-01T00:00:00Z","timestamp":1325376000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-29740-3_31","type":"book-chapter","created":{"date-parts":[[2012,4,13]],"date-time":"2012-04-13T17:54:04Z","timestamp":1334339644000},"page":"272-281","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Evaluating Application Vulnerability to Soft Errors in Multi-level Cache Hierarchy"],"prefix":"10.1007","author":[{"given":"Zhe","family":"Ma","sequence":"first","affiliation":[]},{"given":"Trevor","family":"Carlson","sequence":"additional","affiliation":[]},{"given":"Wim","family":"Heirman","sequence":"additional","affiliation":[]},{"given":"Lieven","family":"Eeckhout","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"3","key":"31_CR1","doi-asserted-by":"publisher","first-page":"258","DOI":"10.1109\/MDT.2005.69","volume":"22","author":"R. Baumann","year":"2005","unstructured":"Baumann, R.: Soft errors in advanced computer systems. IEEE Design & Test of Computers\u00a022(3), 258\u2013266 (2005)","journal-title":"IEEE Design & Test of Computers"},{"key":"31_CR2","doi-asserted-by":"crossref","unstructured":"Bronevetsky, G., de Supinski, B.R.: Soft error vulnerability of iterative linear algebra methods. In: SELSE (2007)","DOI":"10.1145\/1375527.1375552"},{"key":"31_CR3","unstructured":"Carlson, T.E., Heirman, W., Eeckhout, L.: Exploring the level of abstraction for scalable and accurate parallel multicore simulation. In: SC (2011)"},{"key":"31_CR4","unstructured":"Cochran, W.G.: Sampling Techniques, 3rd edn. John Wiley (1977)"},{"key":"31_CR5","unstructured":"da Lu, C., Reed, D.A.: Assessing fault sensitivity in MPI applications. In: SC, p. 37. IEEE Computer Society (2004)"},{"key":"31_CR6","doi-asserted-by":"crossref","unstructured":"Daveau, J.-M., Blampey, A., Gasiot, G., Bulone, J., Roche, P.: An industrial fault injection platform for soft-error dependability analysis and hardening of complex system-on-a-chip. In: IRPS, pp. 212\u2013220 (2009)","DOI":"10.1109\/IRPS.2009.5173253"},{"issue":"6","key":"31_CR7","doi-asserted-by":"publisher","first-page":"3499","DOI":"10.1109\/TNS.2009.2033796","volume":"56","author":"D. Heidel","year":"2009","unstructured":"Heidel, D., Marchal, P., et al.: Single-event upsets and multiple-bit upsets on a 45nm SOI SRAM. IEEE Transactions on Nuclear Science\u00a056(6), 3499\u20133504 (2009)","journal-title":"IEEE Transactions on Nuclear Science"},{"key":"31_CR8","doi-asserted-by":"crossref","unstructured":"Kim, J., Hardavellas, N., Mai, K., Falsafi, B., Hoe, J.C.: Multi-bit error tolerant caches using two-dimensional error coding. In: MICRO, pp. 197\u2013209 (2007)","DOI":"10.1109\/MICRO.2007.19"},{"key":"31_CR9","doi-asserted-by":"crossref","unstructured":"Luk, C.-K., Cohn, R.S., Muth, R., Patil, H., Klauser, A., Geoffrey Lowney, P., Wallace, S., Reddi, V.J., Hazelwood, K.M.: Pin: building customized program analysis tools with dynamic instrumentation. In: PLDI, pp. 190\u2013200 (2005)","DOI":"10.1145\/1064978.1065034"},{"key":"31_CR10","doi-asserted-by":"crossref","unstructured":"Mak, T.M., Mitra, S., Zhang, M.: DFT assisted built-in soft error resilience. In: IOLTS, p. 69 (2005)","DOI":"10.1109\/IOLTS.2005.23"},{"key":"31_CR11","doi-asserted-by":"crossref","unstructured":"Miller, J.E., Kasture, H., Kurian, G., Gruenwald III, C., Beckmann, N., Celio, C., Eastep, J., Agarwal, A.: Graphite: A distributed parallel simulator for multicores. In: HPCA, pp. 1\u201312 (2010)","DOI":"10.1109\/HPCA.2010.5416635"},{"key":"31_CR12","doi-asserted-by":"crossref","unstructured":"Mukherjee, S.S., Weaver, C.T., Emer, J.S., Reinhardt, S.K., Austin, T.M.: A systematic methodology to compute the archi- tectural vulnerability factors for a high-performance microprocessor. In: MICRO, pp. 29\u201342. ACM\/IEEE (2003)","DOI":"10.1109\/MICRO.2003.1253181"},{"key":"31_CR13","doi-asserted-by":"crossref","unstructured":"Ramachandran, P., Kudva, P., Kellington, J.W., Schumann, J., Sanda, P.: Statistical fault injection. In: DSN, pp. 122\u2013127. IEEE Computer Society (2008)","DOI":"10.1109\/DSN.2008.4630080"},{"key":"31_CR14","unstructured":"Rao, S., Sanda, P., Ackaret, J., Barrera, A., Yanez, J., Mitra, S.: Examing workload dependence of soft error rates. In: SELSE (2008)"},{"key":"31_CR15","doi-asserted-by":"crossref","unstructured":"Ruckerbauer, F.X., Georgakos, G.: Soft error rates in 65nm SRAMs analysis of new phenomena. In: IOLTS, pp. 203\u2013204 (2007)","DOI":"10.1109\/IOLTS.2007.60"},{"key":"31_CR16","doi-asserted-by":"crossref","unstructured":"Schroeder, B., Gibson, G.A.: A large-scale study of failures in high performance computing systems. In: DSN, pp. 249\u2013258 (2006)","DOI":"10.1109\/DSN.2006.5"},{"key":"31_CR17","doi-asserted-by":"crossref","unstructured":"Wang, N.J., Fertig, M., Patel, S.J.: Y-branches: When you come to a fork in the road, take it. In: IEEE PACT, pp. 56\u201366 (2003)","DOI":"10.1109\/PACT.2003.1238002"},{"key":"31_CR18","doi-asserted-by":"crossref","unstructured":"Woo, S.C., Ohara, M., Torrie, E., Singh, J.P., Gupta, A.: The SPLASH-2 programs: Characterization and methodological considerations. In: ISCA, pp. 24\u201336 (1995)","DOI":"10.1145\/225830.223990"}],"container-title":["Lecture Notes in Computer Science","Euro-Par 2011: Parallel Processing Workshops"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-29740-3_31","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T20:57:58Z","timestamp":1742936278000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-29740-3_31"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642297397","9783642297403"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-29740-3_31","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2012]]},"assertion":[{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}