{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T07:40:51Z","timestamp":1740123651607,"version":"3.37.3"},"reference-count":42,"publisher":"Springer Science and Business Media LLC","issue":"5-6","license":[{"start":{"date-parts":[[2023,11,2]],"date-time":"2023-11-02T00:00:00Z","timestamp":1698883200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,11,2]],"date-time":"2023-11-02T00:00:00Z","timestamp":1698883200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61106029"],"award-info":[{"award-number":["61106029"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Electron Test"],"published-print":{"date-parts":[[2023,12]]},"DOI":"10.1007\/s10836-023-06087-2","type":"journal-article","created":{"date-parts":[[2023,11,2]],"date-time":"2023-11-02T09:02:48Z","timestamp":1698915768000},"page":"583-595","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Trade-off Mechanism Between Reliability and Performance for Data-flow Soft Error Detection"],"prefix":"10.1007","volume":"39","author":[{"given":"Zhenyu","family":"Zhao","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2706-5069","authenticated-orcid":false,"given":"Xin","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Yufan","family":"Lu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,11,2]]},"reference":[{"issue":"3","key":"6087_CR1","doi-asserted-by":"publisher","first-page":"376","DOI":"10.1109\/TCSII.2017.2717490","volume":"65","author":"LA Aranda","year":"2018","unstructured":"Aranda LA, Reviriego P, Maestro JA (2018) A Comparison of Dual Modular Redundancy and Concurrent Error Detection in Finite Impulse Response Filters Implemented in SRAM-Based FPGAs Through Fault Injection. IEEE Trans Circuits Syst II Express Briefs 65(3):376\u2013380. https:\/\/doi.org\/10.1109\/TCSII.2017.2717490","journal-title":"IEEE Trans Circuits Syst II Express Briefs"},{"key":"6087_CR2","doi-asserted-by":"publisher","first-page":"11","DOI":"10.1109\/DFT.2011.35","volume":"2011","author":"C Argyrides","year":"2011","unstructured":"Argyrides C, Ferreira RR, Lisboa CA, Carro L (2011) Decimal Hamming: A Software-Implemented Technique to Cope with Soft Errors. IEEE International Symposium on Defect and Fault Tolerance in VLSI and Nanotechnology Systems 2011:11\u201317. https:\/\/doi.org\/10.1109\/DFT.2011.35","journal-title":"IEEE International Symposium on Defect and Fault Tolerance in VLSI and Nanotechnology Systems"},{"issue":"3","key":"6087_CR3","doi-asserted-by":"publisher","first-page":"305","DOI":"10.1109\/TDMR.2005.853449","volume":"5","author":"RC Baumann","year":"2005","unstructured":"Baumann RC (2005) Radiation-induced soft errors in advanced semiconductor technologies. IEEE Trans Device Mater Reliab 5(3):305\u2013316. https:\/\/doi.org\/10.1109\/TDMR.2005.853449","journal-title":"IEEE Trans Device Mater Reliab"},{"key":"6087_CR4","doi-asserted-by":"publisher","unstructured":"Benso A, Chiusano S, Prinetto\u00a0P (2000) A software development kit for dependable applications in embedded systems. Proceedings International Test Conference 2000 (IEEE Cat. No.00CH37159) 170\u2013178.\u00a0https:\/\/doi.org\/10.1109\/TEST.2000.894204","DOI":"10.1109\/TEST.2000.894204"},{"key":"6087_CR5","doi-asserted-by":"publisher","unstructured":"Benso\u00a0A, Chiusano\u00a0S, Prinetto P, Tagliaferri\u00a0L (2000) A C\/C++ source-to-source compiler for dependable applications. Proceeding International Conference on Dependable Systems and Networks. DSN 71\u201378.\u00a0https:\/\/doi.org\/10.1109\/ICDSN.2000.857517","DOI":"10.1109\/ICDSN.2000.857517"},{"key":"6087_CR6","doi-asserted-by":"publisher","first-page":"802","DOI":"10.1109\/TEST.2003.1270912","volume":"2003","author":"A Benso","year":"2003","unstructured":"Benso A, Di Carlo S, Di Natale G, Prinetto P, Taghaferri L (2003) Data criticality estimation in software applications. International Test Conference, 2003. Proceedings ITC 2003:802\u2013810. https:\/\/doi.org\/10.1109\/TEST.2003.1270912","journal-title":"Proceedings ITC"},{"key":"6087_CR7","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/REDW.2014.7004589","volume":"2014","author":"GV Chukov","year":"2014","unstructured":"Chukov GV et al (2014) SEE Testing Results for RF and Microwave ICs. IEEE Radiation Effects Data Workshop (REDW) 2014:1\u20133. https:\/\/doi.org\/10.1109\/REDW.2014.7004589","journal-title":"IEEE Radiation Effects Data Workshop (REDW)"},{"key":"6087_CR8","doi-asserted-by":"publisher","first-page":"575","DOI":"10.1109\/TNANO.2019.2917139","volume":"18","author":"A Das","year":"2019","unstructured":"Das A, Touba NA (2019) Efficient One-Step Decodable Limited Magnitude Error Correcting Codes for Multilevel Cell Main Memories. IEEE Trans Nanotechnol 18:575\u2013583. https:\/\/doi.org\/10.1109\/TNANO.2019.2917139","journal-title":"IEEE Trans Nanotechnol"},{"key":"6087_CR9","doi-asserted-by":"publisher","first-page":"297","DOI":"10.1109\/ICCAD.2017.8203792","volume":"2017","author":"M Didehban","year":"2017","unstructured":"Didehban M, Shrivastava A, Lokam SRD (2017) NEMESIS: A software approach for computing in presence of soft errors. IEEE\/ACM International Conference on Computer-Aided Design (ICCAD) 2017:297\u2013304. https:\/\/doi.org\/10.1109\/ICCAD.2017.8203792","journal-title":"IEEE\/ACM International Conference on Computer-Aided Design (ICCAD)"},{"issue":"5","key":"6087_CR10","doi-asserted-by":"publisher","first-page":"509","DOI":"10.1109\/TNS.2021.3053424","volume":"68","author":"DM Fleetwood","year":"2021","unstructured":"Fleetwood DM (2021) Radiation Effects in a Post-Moore World. IEEE Trans Nucl Sci 68(5):509\u2013545. https:\/\/doi.org\/10.1109\/TNS.2021.3053424","journal-title":"IEEE Trans Nucl Sci"},{"key":"6087_CR11","doi-asserted-by":"publisher","unstructured":"Gonz\u00e1lez\u00a0CJ, Chenet\u00a0CP, Budelon\u00a0M, Vaz\u00a0RG, Gon\u00e7alez\u00a0O, Balen\u00a0TR (2017) Evaluation of a mixed-signal design diversity system under radiation effects. 2017 18th IEEE Latin American Test Symposium (LATS) 1\u20136.\u00a0https:\/\/doi.org\/10.1109\/LATW.2017.7906751","DOI":"10.1109\/LATW.2017.7906751"},{"key":"6087_CR12","doi-asserted-by":"publisher","unstructured":"Guthaus\u00a0MR, Ringenberg\u00a0JS, Ernst\u00a0D, Austin\u00a0TM, Mudge T, Brown\u00a0RB (2001) MiBench: A free, commercially representative embedded benchmark suite. Proceedings of the Fourth Annual IEEE International Workshop on Workload Characterization. WWC-4 (Cat. No.01EX538) 3\u201314.\u00a0https:\/\/doi.org\/10.1109\/WWC.2001.990739","DOI":"10.1109\/WWC.2001.990739"},{"key":"6087_CR13","doi-asserted-by":"publisher","unstructured":"Hiller\u00a0M (2000) Executable assertions for detecting data errors in embedded control systems. Proceeding International Conference on Dependable Systems and Networks. DSN 24\u201333.\u00a0https:\/\/doi.org\/10.1109\/ICDSN.2000.857510","DOI":"10.1109\/ICDSN.2000.857510"},{"key":"6087_CR14","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/ICRSE.2015.7366452","volume":"2015","author":"Y Huang","year":"2015","unstructured":"Huang Y, Pan X, Hu L (2015) Rapid assessment of system-of-systems(SoS) mission reliability based on Markov chains. First International Conference on Reliability Systems Engineering (ICRSE) 2015:1\u20136. https:\/\/doi.org\/10.1109\/ICRSE.2015.7366452","journal-title":"First International Conference on Reliability Systems Engineering (ICRSE)"},{"key":"6087_CR15","doi-asserted-by":"publisher","unstructured":"Kritikakou A, Sentieys O, Hubert G, Helen Y, Coulon JF, Deroux-Dauphin P (2022)\u00a0Flodam: Cross-Layer Reliability Analysis Flow for Complex Hardware Designs 2022 Design, Automation & Test in Europe Conference & Exhibition (DATE) 819\u2013824.\u00a0https:\/\/doi.org\/10.23919\/DATE54114.2022.9774541","DOI":"10.23919\/DATE54114.2022.9774541"},{"key":"6087_CR16","doi-asserted-by":"publisher","first-page":"227","DOI":"10.1145\/2854038.2854059","volume":"2016","author":"I Laguna","year":"2016","unstructured":"Laguna I, Schulz M, Richards DF, Calhoun J, Olson L (2016) IPAS: Intelligent protection against silent output corruption in scientific applications. IEEE\/ACM International Symposium on Code Generation and Optimization (CGO) 2016:227\u2013238","journal-title":"IEEE\/ACM International Symposium on Code Generation and Optimization (CGO)"},{"key":"6087_CR17","doi-asserted-by":"publisher","first-page":"502","DOI":"10.1109\/DATE.2009.5090716","volume":"2009","author":"R Leveugle","year":"2009","unstructured":"Leveugle R, Calvez A, Maistri P, Vanhauwaert P (2009) Statistical fault injection: Quantified error and confidence. 2009 Design, Automation & Test in Europe Conference & Exhibition, pp. 502-506.\u00a0https:\/\/doi.org\/10.1109\/DATE.2009.5090716","journal-title":"Automation & Test in Europe Conference & Exhibition"},{"key":"6087_CR18","doi-asserted-by":"publisher","unstructured":"Li\u00a0J, Reviriego\u00a0P, Xiao L, Wu\u00a0H (2021) Protecting Memories against Soft Errors: The Case for Customizable Error Correction Codes. In IEEE Trans Emerg Topics Comput 9(2):651\u2013663.\u00a0https:\/\/doi.org\/10.1109\/TETC.2019.2953139","DOI":"10.1109\/TETC.2019.2953139"},{"key":"6087_CR19","doi-asserted-by":"publisher","unstructured":"Li X, Adve SV, Bose P, Rivers JA (2005)\u00a0SoftArch: an architecture-level tool for modeling and analyzing soft errors. 2005 International Conference on Dependable Systems and Networks (DSN'05) 496\u2013505.\u00a0https:\/\/doi.org\/10.1109\/DSN.2005.88","DOI":"10.1109\/DSN.2005.88"},{"key":"6087_CR20","doi-asserted-by":"publisher","first-page":"118135","DOI":"10.1109\/ACCESS.2019.2936893","volume":"7","author":"J Ma","year":"2019","unstructured":"Ma J, Duan Z, Tang L (2019) A Methodology to Assess Output Vulnerability Factors for Detecting Silent Data Corruption. IEEE Access 7:118135\u2013118145. https:\/\/doi.org\/10.1109\/ACCESS.2019.2936893","journal-title":"IEEE Access"},{"key":"6087_CR21","doi-asserted-by":"publisher","unstructured":"Mittal\u00a0S, Vetter\u00a0JS (2016) A Survey of Techniques for Modeling and Improving Reliability of Computing Systems. In IEEE Trans Parallel Distrib Syst 27(4):1226\u20131238. https:\/\/doi.org\/10.1109\/TPDS.2015.2426179","DOI":"10.1109\/TPDS.2015.2426179"},{"key":"6087_CR22","unstructured":"Nahmsuk O (2001) Software implemented hardware fault tolerance. Ph.D. Dissertation. Stanford University, Stanford, CA, USA. Advisor(s) Edward J Mccluskey"},{"issue":"1","key":"6087_CR23","doi-asserted-by":"publisher","first-page":"63","DOI":"10.1109\/24.994913","volume":"51","author":"N Oh","year":"2002","unstructured":"Oh N, Shirvani PP, McCluskey EJ (2002) Error detection by duplicated instructions in super-scalar processors. IEEE Trans Reliab 51(1):63\u201375. https:\/\/doi.org\/10.1109\/24.994913","journal-title":"IEEE Trans Reliab"},{"issue":"2","key":"6087_CR24","doi-asserted-by":"publisher","first-page":"180","DOI":"10.1109\/12.980007","volume":"51","author":"N Oh","year":"2002","unstructured":"Oh N, Mitra S, McCluskey EJ (2002) ED\/sup 4\/I: error detection by diverse data and duplicated instructions. IEEE Trans Comput 51(2):180\u2013199. https:\/\/doi.org\/10.1109\/12.980007","journal-title":"IEEE Trans Comput"},{"key":"6087_CR25","doi-asserted-by":"publisher","unstructured":"Palazzi\u00a0L, Li\u00a0G, Fang\u00a0B, Pattabiraman\u00a0K (2019) A Tale of Two Injectors: End-to-End Comparison of IR-Level and Assembly-Level Fault Injection 2019 IEEE 30th International Symposium on Software Reliability Engineering (ISSRE) 151\u2013162.\u00a0https:\/\/doi.org\/10.1109\/ISSRE.2019.00024","DOI":"10.1109\/ISSRE.2019.00024"},{"key":"6087_CR26","doi-asserted-by":"publisher","unstructured":"Pham T, Defago\u00a0X (2013) Reliability Prediction for Component-Based Software Systems with Architectural-Level Fault Tolerance Mechanisms 2013 International Conference on Availability, Reliability and Security 11\u201320.\u00a0https:\/\/doi.org\/10.1109\/ARES.2013.8","DOI":"10.1109\/ARES.2013.8"},{"key":"6087_CR27","unstructured":"Philip Shirvani P, Edward McCluskey J (1998) Fault-Tolerant Systems in A Space Environment: The CRC ARGOS Project. CRC Tech Rep No. 98-2 (CSL TR No. 98-774)"},{"key":"6087_CR28","doi-asserted-by":"publisher","unstructured":"Racunas\u00a0P, Constantinides\u00a0K, Manne S, Mukherjee\u00a0SS (2007) Perturbation-based Fault Screening 2007 IEEE 13th International Symposium on High Performance Computer Architecture 169\u2013180\u00a0https:\/\/doi.org\/10.1109\/HPCA.2007.346195","DOI":"10.1109\/HPCA.2007.346195"},{"key":"6087_CR29","doi-asserted-by":"publisher","first-page":"66485","DOI":"10.1109\/ACCESS.2019.2902505","volume":"7","author":"M Raji","year":"2019","unstructured":"Raji M, Sabet MA, Ghavami B (2019) Soft Error Reliability Improvement of Digital Circuits by Exploiting a Fast Gate Sizing Scheme. IEEE Access 7:66485\u201366495. https:\/\/doi.org\/10.1109\/ACCESS.2019.2902505","journal-title":"IEEE Access"},{"key":"6087_CR30","doi-asserted-by":"publisher","unstructured":"Rebaudengo M, Reorda\u00a0MS, Violante M, Torchiano\u00a0M (2001) A source-to-source compiler for generating dependable software. Proceedings First IEEE International Workshop on Source Code Analysis and Manipulation 33\u201342.\u00a0https:\/\/doi.org\/10.1109\/SCAM.2001.972664","DOI":"10.1109\/SCAM.2001.972664"},{"key":"6087_CR31","doi-asserted-by":"publisher","unstructured":"Reis GA, Chang\u00a0J, Vachharajani\u00a0N, Rangan R, August\u00a0DI (2005) SWIFT: software implemented fault tolerance. Int Symp Code Gen Opt 243\u2013254.\u00a0https:\/\/doi.org\/10.1109\/CGO.2005.34","DOI":"10.1109\/CGO.2005.34"},{"issue":"11","key":"6087_CR32","doi-asserted-by":"publisher","first-page":"1521","DOI":"10.1109\/TC.2011.188","volume":"61","author":"A Savino","year":"2012","unstructured":"Savino A, Di Carlo S, Politano G, Benso A, Bosio A, Di Natale G (2012) Statistical Reliability Estimation of Microprocessor-Based Systems. IEEE Trans Comput 61(11):1521\u20131534. https:\/\/doi.org\/10.1109\/TC.2011.188","journal-title":"IEEE Trans Comput"},{"key":"6087_CR33","doi-asserted-by":"publisher","first-page":"2315","DOI":"10.1049\/iet-pel.2014.0977","volume":"8","author":"T Shoji","year":"2015","unstructured":"Shoji T, Nishida S, Hamada K, Tadano H (2015) Cosmic ray neutron-induced single-event burnout in power devices. IET Power Electron 8:2315\u20132321. https:\/\/doi.org\/10.1049\/iet-pel.2014.0977","journal-title":"IET Power Electronics"},{"key":"6087_CR34","doi-asserted-by":"publisher","unstructured":"Thati VB, Vankeirsbilck J, Penneman N, Pissoort D, Boydens J (2018)\u00a0CDFEDT: Comparison of Data Flow Error Detection Techniques in Embedded Systems: an Empirical Study. In Proceedings of the 13th International Conference on Availability, Reliability and Security (ARES 2018). Association for Computing Machinery, New York, NY, USA, Article 23, 1\u20139.\u00a0https:\/\/doi.org\/10.1145\/3230833.3230854","DOI":"10.1145\/3230833.3230854"},{"key":"6087_CR35","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/ET.2019.8878497","volume":"2019","author":"VB Thati","year":"2019","unstructured":"Thati VB, Vankeirsbilck J, Pissoort D, Boydens J (2019) Hybrid Technique for Soft Error Detection in Dependable Embedded Software: a First Experiment. IEEE XXVIII International Scientific Conference Electronics (ET) 2019:1\u20134. https:\/\/doi.org\/10.1109\/ET.2019.8878497","journal-title":"IEEE XXVIII International Scientific Conference Electronics (ET)"},{"key":"6087_CR36","doi-asserted-by":"publisher","unstructured":"Tselonis\u00a0S, Kaliorakis\u00a0M, Foutris\u00a0N, Papadimitriou G, Gizopoulos\u00a0D (2016) Microprocessor reliability-performance tradeoffs assessment at the microarchitecture level 2016 IEEE 34th VLSI Test Symposium (VTS) 1\u20136.\u00a0https:\/\/doi.org\/10.1109\/VTS.2016.7477300","DOI":"10.1109\/VTS.2016.7477300"},{"key":"6087_CR37","doi-asserted-by":"crossref","unstructured":"Turner JB, Agardy FJ (1994) The Advanced Research and Global Observation Satellite Program (ARGOS). Proc Space Prog TechnolConf 1994\u20134580","DOI":"10.2514\/6.1994-4580"},{"key":"6087_CR38","doi-asserted-by":"publisher","unstructured":"Vallero A et al. (2019) SyRA: Early System Reliability Analysis for Cross-Layer Soft Errors Resilience in Memory Arrays of Microprocessor Systems. In IEEE Transactions on Computer 68(5):765\u2013783.\u00a0https:\/\/doi.org\/10.1109\/TC.2018.2887225","DOI":"10.1109\/TC.2018.2887225"},{"key":"6087_CR39","doi-asserted-by":"publisher","first-page":"279","DOI":"10.1109\/ITA.2013.72","volume":"2013","author":"Y Wang","year":"2013","unstructured":"Wang Y, Li M, Li L (2013) The Research of System Reliability Calculation Method Based on the Improved Petri Net. Int Conf Inf Technol Appl 2013:279\u2013281. https:\/\/doi.org\/10.1109\/ITA.2013.72","journal-title":"International Conference on Information Technology and Applications"},{"key":"6087_CR40","doi-asserted-by":"publisher","unstructured":"Wei\u00a0J, Thomas\u00a0A, Li G, Pattabiraman\u00a0K (2014) Quantifying the Accuracy of High-Level Fault Injection Techniques for Hardware Faults 2014 44th Annual IEEE\/IFIP International Conference on Dependable Systems and Networks 375\u2013382.\u00a0https:\/\/doi.org\/10.1109\/DSN.2014.2","DOI":"10.1109\/DSN.2014.2"},{"key":"6087_CR41","doi-asserted-by":"publisher","unstructured":"Wu X, Yu\u00a0H (2019) A Petri Net Modeling Approach for Reliability of PMS with Time Redundancy 2019 IEEE 19th International Conference on Software Quality, Reliability and Security Companion (QRS-C) 249\u2013254.\u00a0https:\/\/doi.org\/10.1109\/QRS-C.2019.00055","DOI":"10.1109\/QRS-C.2019.00055"},{"key":"6087_CR42","doi-asserted-by":"publisher","first-page":"260","DOI":"10.1109\/ISPAW.2011.45","volume":"2011","author":"L Xiong","year":"2011","unstructured":"Xiong L, Tan Q (2011) A Configurable Approach to Tolerate Soft Errors via Partial Software Protection. IEEE Ninth International Symposium on Parallel and Distributed Processing with Applications Workshops 2011:260\u2013265. https:\/\/doi.org\/10.1109\/ISPAW.2011.45","journal-title":"IEEE Ninth International Symposium on Parallel and Distributed Processing with Applications Workshops"}],"container-title":["Journal of Electronic Testing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10836-023-06087-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10836-023-06087-2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10836-023-06087-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,1,22]],"date-time":"2024-01-22T05:06:03Z","timestamp":1705899963000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10836-023-06087-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,11,2]]},"references-count":42,"journal-issue":{"issue":"5-6","published-print":{"date-parts":[[2023,12]]}},"alternative-id":["6087"],"URL":"https:\/\/doi.org\/10.1007\/s10836-023-06087-2","relation":{},"ISSN":["0923-8174","1573-0727"],"issn-type":[{"type":"print","value":"0923-8174"},{"type":"electronic","value":"1573-0727"}],"subject":[],"published":{"date-parts":[[2023,11,2]]},"assertion":[{"value":"21 April 2023","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"5 October 2023","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"2 November 2023","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}]}}