{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,19]],"date-time":"2025-12-19T09:36:09Z","timestamp":1766136969589,"version":"3.37.3"},"reference-count":59,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"1","license":[{"start":{"date-parts":[[2018,3,1]],"date-time":"2018-03-01T00:00:00Z","timestamp":1519862400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2018,3,1]],"date-time":"2018-03-01T00:00:00Z","timestamp":1519862400000},"content-version":"am","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2018,3,1]],"date-time":"2018-03-01T00:00:00Z","timestamp":1519862400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2018,3,1]],"date-time":"2018-03-01T00:00:00Z","timestamp":1519862400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"name":"National Science Foundation","award":["CCF 1055094","CNS 1525855"],"award-info":[{"award-number":["CCF 1055094","CNS 1525855"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Rel."],"published-print":{"date-parts":[[2018,3]]},"DOI":"10.1109\/tr.2018.2793098","type":"journal-article","created":{"date-parts":[[2018,2,12]],"date-time":"2018-02-12T22:48:04Z","timestamp":1518475684000},"page":"249-263","source":"Crossref","is-referenced-by-count":14,"title":["A Compiler Technique for Processor-Wide Protection From Soft Errors in Multithreaded Environments"],"prefix":"10.1109","volume":"67","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-9357-4702","authenticated-orcid":false,"given":"Moslem","family":"Didehban","sequence":"first","affiliation":[]},{"given":"Aviral","family":"Shrivastava","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/MICRO.2003.1253181"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1145\/2903150.2903170"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/CGO.2007.7"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1145\/859618.859631"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/MICRO.2006.42"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/ISCA.2002.1003566"},{"article-title":"A research agenda for mixed-criticality systems","year":"0","author":"stuart","key":"ref37"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/40.755464"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1145\/1113841.1113843"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/ISCA.2005.21"},{"key":"ref28","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/2024716.2024718","article-title":"The gem5 simulator","volume":"39","author":"binkert","year":"2011","journal-title":"ACM SIGARCH Comput Archit News"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/L-CA.2010.14"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1145\/356989.357013"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2004.14"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2002.1028924"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/2248418.2248433"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/IPDPS.2008.4536435"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/2480362.2480644"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/265924.265927"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/IPDPS.2013.107"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/ISCA.1995.524546"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/CGO.2004.1281665"},{"journal-title":"Computer Organization and Design The Hardware\/Software Interface","year":"2013","author":"patterson","key":"ref50"},{"key":"ref51","article-title":"Extending a compiler backend for complete memory error detection","author":"rink","year":"2017","journal-title":"Automotive-Safety & Security 2017-Sicherheit und Zuverl&#x00E4;ssigkeit f&#x00FC;r automobile Informationstechnik"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2015.44"},{"key":"ref58","first-page":"213","article-title":"Using dynamic binary translation to fuse dependent instructions","author":"hu","year":"2004","journal-title":"Proc Int Symp Code Gen Optim"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1109\/ISPASS.2016.7482078"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2015.2475270"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1145\/1168919.1168864"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1145\/1594835.1504202"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1145\/1273442.1250738"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1145\/3075564.3075565"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2005.70"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2015.2419661"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/RELPHY.2008.4558933"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/12.980007"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/CGO.2005.34"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/2897937.2898054"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/MM.2007.4"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2006.15"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/2854038.2854059"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-09967-5_13"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/CGO.2009.14"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/MDT.2005.69"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/23.903813"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TED.2010.2047907"},{"year":"2015","key":"ref5","article-title":"International technology roadmap for semiconductors 2.0-executive summary"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/1735970.1736063"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/HPCA.2013.6522302"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/PRDC.2000.897290"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1147\/rd.435.0863"},{"key":"ref46","first-page":"16","article-title":"Techniques for efficient software checking","author":"yu","year":"2007","journal-title":"Proc Int Workshop Lang Compilers Parall Comput"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1007\/s10766-011-0183-4"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1007\/s10586-011-0196-1"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1145\/2670529.2754959"},{"key":"ref42","article-title":"Software fault detection using dynamic instrumentation","author":"reis","year":"2006","journal-title":"Proc of 4th Annual Boston Area Architecture Workshop"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2015.57"},{"key":"ref44","article-title":"Configurable transient fault detection via dynamic binary translation","author":"chang","year":"2006","journal-title":"Proc 2nd Workshop Archit Rel"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2011.54"}],"container-title":["IEEE Transactions on Reliability"],"original-title":[],"link":[{"URL":"http:\/\/ieeexplore.ieee.org\/ielaam\/24\/8305671\/8289351-aam.pdf","content-type":"application\/pdf","content-version":"am","intended-application":"syndication"},{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/24\/8305671\/08289351.pdf?arnumber=8289351","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,4,8]],"date-time":"2022-04-08T18:56:02Z","timestamp":1649444162000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/8289351\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,3]]},"references-count":59,"journal-issue":{"issue":"1"},"URL":"https:\/\/doi.org\/10.1109\/tr.2018.2793098","relation":{},"ISSN":["0018-9529","1558-1721"],"issn-type":[{"type":"print","value":"0018-9529"},{"type":"electronic","value":"1558-1721"}],"subject":[],"published":{"date-parts":[[2018,3]]}}}