{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,29]],"date-time":"2026-03-29T16:33:31Z","timestamp":1774802011425,"version":"3.50.1"},"reference-count":33,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"1","license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"funder":[{"DOI":"10.13039\/100004807","name":"German Research Foundation","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100004807","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Dependable Embedded Systems"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Comput."],"published-print":{"date-parts":[[2016,1,1]]},"DOI":"10.1109\/tc.2015.2417554","type":"journal-article","created":{"date-parts":[[2015,3,29]],"date-time":"2015-03-29T02:45:19Z","timestamp":1427597119000},"page":"80-94","source":"Crossref","is-referenced-by-count":22,"title":["Cross-Layer Software Dependability on Unreliable Hardware"],"prefix":"10.1109","volume":"65","author":[{"given":"Semeen","family":"Rehman","sequence":"first","affiliation":[]},{"given":"Kuan-Hsun","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Florian","family":"Kriebel","sequence":"additional","affiliation":[]},{"given":"Anas","family":"Toma","sequence":"additional","affiliation":[]},{"given":"Muhammad","family":"Shafique","sequence":"additional","affiliation":[]},{"given":"Jian-Jia","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Jorg","family":"Henkel","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1145\/1086228.1086266"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/OLT.2003.1214380"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/DATE.2010.5457242"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2002.1028924"},{"key":"ref10","article-title":"Reliable on-chip systems in the nano-era: Lessons learnt and future trends","author":"henkel","year":"0","journal-title":"Proc 50th ACM \/ EDAC \/ IEEE Des Autom Conf"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/2593069.2596683"},{"key":"ref12","first-page":"281","article-title":"In-register duplication: Exploiting narrow-width value for improving register file reliability","author":"hu","year":"0","journal-title":"Proc Int Conf Dependable Syst Netw"},{"key":"ref13","first-page":"281","article-title":"In-register duplication: Exploiting narrow-width value for improving register file reliability","author":"hu","year":"0","journal-title":"Proc Int Conf Dependable Syst Netw"},{"key":"ref14","year":"0"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/ESTMED.2010.5666982"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/DELTA.2006.83"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/LPE.2004.1349323"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/321738.321743"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/RTCSA.2012.57"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/MM.2005.104"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/s10766-005-7301-0"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/1113841.1113843"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/EMRTS.2000.854010"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TCAD.2013.2289874"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1145\/2463209.2488755"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TDMR.2005.853449"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/1182807.1182810"},{"key":"ref7","article-title":"N-version programming: A fault-tolerance approach to reliability of software operation","author":"chen","year":"0","journal-title":"Proc Int Symp Fault Tolerant Computing"},{"key":"ref2","year":"0"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2003.1183950"},{"key":"ref1","year":"0"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/DATE.2010.5456961"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/MICRO.2003.1253181"},{"key":"ref21","article-title":"Fundamental design problems of distributed systems for the hard-real-time environment","author":"mok","year":"1983"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/TCAD.2014.2341894"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/24.994913"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/2039370.2039408"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/2228360.2228601"}],"container-title":["IEEE Transactions on Computers"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/12\/7350319\/7070723.pdf?arnumber=7070723","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,12]],"date-time":"2022-01-12T15:57:35Z","timestamp":1642003055000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7070723\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,1,1]]},"references-count":33,"journal-issue":{"issue":"1"},"URL":"https:\/\/doi.org\/10.1109\/tc.2015.2417554","relation":{},"ISSN":["0018-9340"],"issn-type":[{"value":"0018-9340","type":"print"}],"subject":[],"published":{"date-parts":[[2016,1,1]]}}}