{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T15:21:33Z","timestamp":1725549693452},"reference-count":21,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1109\/prdc.2004.1276552","type":"proceedings-article","created":{"date-parts":[[2004,6,10]],"date-time":"2004-06-10T14:19:45Z","timestamp":1086877185000},"page":"49-54","source":"Crossref","is-referenced-by-count":8,"title":["Error detection enhancement in COTS superscalar processors with event monitoring features"],"prefix":"10.1109","author":[{"given":"A.","family":"Rajabzadeh","sequence":"first","affiliation":[]},{"given":"M.","family":"Mohandespour","sequence":"additional","affiliation":[]},{"given":"G.","family":"Miremadi","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2001.941415"},{"key":"17","first-page":"8","article-title":"Developing safety-critical software within a CASE environment","author":"croll","year":"1991","journal-title":"IEE Colloquium on Computer Aided Software Engineering Tools for Real-Time Control"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1109\/ATS.2001.990300"},{"year":"0","key":"15"},{"year":"0","key":"16"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1109\/FTCS.1995.466976"},{"journal-title":"ETX-P3M User's Guide","year":"2003","key":"14"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1109\/24.994913"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1109\/FTCSH.1995.532618"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2002.805822"},{"journal-title":"Pentium \ufffd Processor Family Developer's Manual","year":"1997","key":"3"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1109\/ICDSN.2000.857581"},{"journal-title":"Alpha Architecture Handbook","year":"1998","key":"2"},{"journal-title":"AMD x86-64 Architecture Programmer's Manual Volume 2 System Programming","year":"2002","key":"1"},{"journal-title":"PowerPC ? 604 RISC Microprocessor Technical Summary","year":"1994","key":"10"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1109\/12.2145"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/MELCON.1991.162054"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1109\/CMPEUR.1991.257464"},{"key":"4","first-page":"121","article-title":"Time behaviour monitoring as an error detection mechanism","author":"madeira","year":"0","journal-title":"3rd IFIP Working Conference on Dependable Computing for Critical Applications (DCCA-3)"},{"key":"9","article-title":"Use of time, location and instruction signatures for control flow checking","author":"miremadi","year":"1998","journal-title":"Proceedings of the DCCA-6 International Conference"},{"journal-title":"MIPS R10000 Microprocessor User s Manual","year":"1996","key":"8"}],"event":{"name":"10th IEEE Pacific Rim International Symposium on Dependable Computing, 2004.","location":"Papeete, Tahiti, French Polynesia"},"container-title":["10th IEEE Pacific Rim International Symposium on Dependable Computing, 2004. Proceedings."],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/8995\/28541\/01276552.pdf?arnumber=1276552","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,14]],"date-time":"2017-03-14T02:35:50Z","timestamp":1489458950000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/1276552\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"references-count":21,"URL":"https:\/\/doi.org\/10.1109\/prdc.2004.1276552","relation":{},"subject":[]}}