{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:32:44Z","timestamp":1750221164336,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":48,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,5,8]],"date-time":"2018-05-08T00:00:00Z","timestamp":1525737600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"European Union","award":["780681"],"award-info":[{"award-number":["780681"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,5,8]]},"DOI":"10.1145\/3203217.3203240","type":"proceedings-article","created":{"date-parts":[[2018,7,26]],"date-time":"2018-07-26T11:58:06Z","timestamp":1532606286000},"page":"173-182","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":7,"title":["Comparative analysis of soft-error detection strategies"],"prefix":"10.1145","author":[{"given":"Gokcen","family":"Kestor","sequence":"first","affiliation":[{"name":"Oak Ridge National Lab"}]},{"given":"Burcu Ozcelik","family":"Mutlu","sequence":"additional","affiliation":[{"name":"Pacific Northwest National Lab and Universitat Politecnica de Catalunya"}]},{"given":"Joseph","family":"Manzano","sequence":"additional","affiliation":[{"name":"Pacific Northwest National Lab"}]},{"given":"Omer","family":"Subasi","sequence":"additional","affiliation":[{"name":"Pacific Northwest National Lab"}]},{"given":"Osman","family":"Unsal","sequence":"additional","affiliation":[{"name":"Barcelona Supercomputing Center"}]},{"given":"Sriram","family":"Krishnamoorthy","sequence":"additional","affiliation":[{"name":"Pacific Northwest National Lab"}]}],"member":"320","published-online":{"date-parts":[[2018,5,8]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/2807591.2807670"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/24.537015"},{"key":"e_1_3_2_1_3_1","volume-title":"Karl Rupp, Barry F. Smith, Stefano Zampini, Hong Zhang, and Hong Zhang.","author":"Balay Satish","year":"2017","unstructured":"Satish Balay , Shrirang Abhyankar , Mark F. Adams , Jed Brown , Peter Brune , Kris Buschelman , Lisandro Dalcin , Victor Eijkhout , William D. Gropp , Dinesh Kaushik , Matthew G. Knepley , Dave A. May , Lois Curfman McInnes , Karl Rupp, Barry F. Smith, Stefano Zampini, Hong Zhang, and Hong Zhang. 2017 . PETSc Web page. http:\/\/www.mcs.anl.gov\/petsc. (2017). http:\/\/www.mcs.anl.gov\/petsc Satish Balay, Shrirang Abhyankar, Mark F. Adams, Jed Brown, Peter Brune, Kris Buschelman, Lisandro Dalcin, Victor Eijkhout, William D. Gropp, Dinesh Kaushik, Matthew G. Knepley, Dave A. May, Lois Curfman McInnes, Karl Rupp, Barry F. Smith, Stefano Zampini, Hong Zhang, and Hong Zhang. 2017. PETSc Web page. http:\/\/www.mcs.anl.gov\/petsc. (2017). http:\/\/www.mcs.anl.gov\/petsc"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/12.54853"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/2749246.2749253"},{"volume-title":"The Int. Conference on High Performance Computing and Simulation (HPCS).","author":"Bohm S.","key":"e_1_3_2_1_6_1","unstructured":"S. Bohm and C. Engelmann . 2011. xSim: The extreme-scale simulator . In The Int. Conference on High Performance Computing and Simulation (HPCS). S. Bohm and C. Engelmann. 2011. xSim: The extreme-scale simulator. In The Int. Conference on High Performance Computing and Simulation (HPCS)."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/1375527.1375552"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-14325-5_47"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/2304576.2304590"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/2442516.2442533"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/SC.2014.53"},{"volume-title":"the Asia and South Pacific Design Automation Conference (ASP-DAC).","author":"Cher Chen-Yong","key":"e_1_3_2_1_12_1","unstructured":"Chen-Yong Cher , K.P. Muller , R.A. Haring , D.L. Satterfield , T.E. Musta , T.M. Gooding , K.D. Davis , M.B. Dombrowa , G.V. Kopcsay , R.M. Senger , Y. Sugawara , and K. Sugavanam . 2014. Soft Error Resiliency Characterization on IBM BlueGene\/Q Processor . In the Asia and South Pacific Design Automation Conference (ASP-DAC). Chen-Yong Cher, K.P. Muller, R.A. Haring, D.L. Satterfield, T.E. Musta, T.M. Gooding, K.D. Davis, M.B. Dombrowa, G.V. Kopcsay, R.M. Senger, Y. Sugawara, and K. Sugavanam. 2014. Soft Error Resiliency Characterization on IBM BlueGene\/Q Processor. In the Asia and South Pacific Design Automation Conference (ASP-DAC)."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/2463209.2488859"},{"volume-title":"Proceedings of the IEEE Pacific Rim International Symposium on Dependable Computing (PRDC). 43--48","author":"Ciocca E.","key":"e_1_3_2_1_14_1","unstructured":"E. Ciocca , I. Koren , Z. Koren , C. M. Krishna , and D. S. Katz . 2004. Application-Level Fault Tolerance in the Orbital Thermal Imaging Spectrometer . In Proceedings of the IEEE Pacific Rim International Symposium on Dependable Computing (PRDC). 43--48 . E. Ciocca, I. Koren, Z. Koren, C. M. Krishna, and D. S. Katz. 2004. Application-Level Fault Tolerance in the Orbital Thermal Imaging Spectrometer. In Proceedings of the IEEE Pacific Rim International Symposium on Dependable Computing (PRDC). 43--48."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/2938615.2938621"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/2049662.2049663"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"crossref","unstructured":"Scott Dawson and Farnam Jahanian. 1995. Deterministic fault injection of distributed systems. 178--196.   Scott Dawson and Farnam Jahanian. 1995. Deterministic fault injection of distributed systems . 178--196.","DOI":"10.1007\/3-540-60042-6_13"},{"volume-title":"Proceedings of IEEE International Computer Performance and Dependability Symposium. 56--.","author":"Dawson S.","key":"e_1_3_2_1_18_1","unstructured":"S. Dawson , F. Jahanian , and T. Mitton . 1996. ORCHESTRA: a probing and fault injection environment for testing protocol implementations . In Proceedings of IEEE International Computer Performance and Dependability Symposium. 56--. S. Dawson, F. Jahanian, and T. Mitton. 1996. ORCHESTRA: a probing and fault injection environment for testing protocol implementations. In Proceedings of IEEE International Computer Performance and Dependability Symposium. 56--."},{"key":"e_1_3_2_1_19_1","unstructured":"Sheng Di Eduardo Berrocal and Franck Cappello. 2015. An Efficient Silent Data Corruption Detection Method with Error-Feedback Control and Even Sampling for HPC Applications. In CCGrid. 271--280.  Sheng Di Eduardo Berrocal and Franck Cappello. 2015. An Efficient Silent Data Corruption Detection Method with Error-Feedback Control and Even Sampling for HPC Applications. In CCGrid . 271--280."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2016.2517639"},{"key":"e_1_3_2_1_21_1","volume-title":"Technical Report CS-95-303. University of Tennessee.","author":"Dongarra J.","year":"1995","unstructured":"J. Dongarra , A. Lumsdaine , R. Pozo , and K. Remington . 1995 . IML++ v. 1.2 Iterative Methods Library Reference Guide . Technical Report CS-95-303. University of Tennessee. J. Dongarra, A. Lumsdaine, R. Pozo, and K. Remington. 1995. IML++ v. 1.2 Iterative Methods Library Reference Guide. Technical Report CS-95-303. University of Tennessee."},{"volume-title":"Fault-Tolerant Computing: The Twenty-First International Symposium. 418--425","author":"Echtle K.","key":"e_1_3_2_1_22_1","unstructured":"K. Echtle and Y. Chen . 1991. Evaluation of deterministic fault injection for fault-tolerant protocol testing . In Fault-Tolerant Computing: The Twenty-First International Symposium. 418--425 . K. Echtle and Y. Chen. 1991. Evaluation of deterministic fault injection for fault-tolerant protocol testing. In Fault-Tolerant Computing: The Twenty-First International Symposium. 418--425."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/IPDPS.2014.123"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/1736020.1736063"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"crossref","unstructured":"David Fiala Frank Mueller Christian Engelmann Rolf Riesen Kurt Ferreira and Ron Brightwell. 2012. Detection and Correction of Silent Data Corruption for Large-scale High-performance Computing. In SC. Article 78 12 pages.   David Fiala Frank Mueller Christian Engelmann Rolf Riesen Kurt Ferreira and Ron Brightwell. 2012. Detection and Correction of Silent Data Corruption for Large-scale High-performance Computing. In SC . Article 78 12 pages.","DOI":"10.1109\/SC.2012.49"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/3126908.3126972"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/2.585157"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/12.364536"},{"volume-title":"Automation Test in Europe Conference Exhibition. 502--506","author":"Leveugle R.","key":"e_1_3_2_1_29_1","unstructured":"R. Leveugle , A. Calvez , P. Maistri , and P. Vanhauwaert . 2009. Statistical fault injection: Quantified error and confidence. In 2009 Design , Automation Test in Europe Conference Exhibition. 502--506 . R. Leveugle, A. Calvez, P. Maistri, and P. Vanhauwaert. 2009. Statistical fault injection: Quantified error and confidence. In 2009 Design, Automation Test in Europe Conference Exhibition. 502--506."},{"key":"e_1_3_2_1_30_1","unstructured":"Dong Li Jeffrey S. Vetter and Weikuan Yu. 2012. Classifying Soft Error Vulnerabilities in Extreme-scale Scientific Applications Using a Binary Instrumentation Tool. In SC.   Dong Li Jeffrey S. Vetter and Weikuan Yu. 2012. Classifying Soft Error Vulnerabilities in Extreme-scale Scientific Applications Using a Binary Instrumentation Tool. In SC."},{"key":"e_1_3_2_1_31_1","unstructured":"Man-Lap Li P. Ramachandran U.R. Karpuzcu S.K.S. Hari and S.V. Adve. 2009. Accurate microarchitecture-level fault modeling for studying hardware faults. In HPCA.  Man-Lap Li P. Ramachandran U.R. Karpuzcu S.K.S. Hari and S.V. Adve. 2009. Accurate microarchitecture-level fault modeling for studying hardware faults. In HPCA."},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/CLUSTER.2015.32"},{"key":"e_1_3_2_1_33_1","unstructured":"R. Maia L. Henriques D. Costa and H. Madeira. 2002. Xception - enhanced automated fault-injection environment. In DSN.   R. Maia L. Henriques D. Costa and H. Madeira. 2002. Xception - enhanced automated fault-injection environment. In DSN."},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2010.60"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/1995896.1995922"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1109\/PRDC.2013.14"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"crossref","unstructured":"D. Skarin R. Barbosa and J. Karlsson. 2010. GOOFI-2: A tool for experimental dependability assessment. In DSN.  D. Skarin R. Barbosa and J. Karlsson. 2010. GOOFI-2: A tool for experimental dependability assessment. In DSN.","DOI":"10.1109\/DSN.2010.5544265"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"crossref","unstructured":"Joseph Sloan Rakesh Kumar and Greg Bronevetsky. 2012. Algorithmic Approaches to Low Overhead Fault Detection for Sparse Linear Algebra. In DSN. 1--12.   Joseph Sloan Rakesh Kumar and Greg Bronevetsky. 2012. Algorithmic Approaches to Low Overhead Fault Detection for Sparse Linear Algebra. In DSN . 1--12.","DOI":"10.1109\/DSN.2012.6263938"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/2742854.2742903"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"crossref","unstructured":"Omer Subasi Sheng Di Leonardo Bautista-Gomez Prasanna Balaprakash Osman Unsal Jesus Labarta Adrian Cristal Franck Cappello and others. 2016. Spatial Support Vector Regression to Detect Silent Errors in the Exascale Era. In CCGrid. 413--424.  Omer Subasi Sheng Di Leonardo Bautista-Gomez Prasanna Balaprakash Osman Unsal Jesus Labarta Adrian Cristal Franck Cappello and others. 2016. Spatial Support Vector Regression to Detect Silent Errors in the Exascale Era. In CCGrid . 413--424.","DOI":"10.1109\/CCGrid.2016.33"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1109\/CLUSTER.2017.129"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1109\/CCGRID.2017.40"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/2907294.2907306"},{"key":"e_1_3_2_1_44_1","volume-title":"Sirius: Neural Network Based Probabilistic Assertions for Detecting Silent Data Corruption in Parallel Programs. In 35th Symposium on Reliable Distributed Systems (SRDS).","author":"Thomas Tara E.","year":"2016","unstructured":"Tara E. Thomas , Anmol J. Bhattad , Subrata Mitra , and Saurabh Bagchi . 2016 . Sirius: Neural Network Based Probabilistic Assertions for Detecting Silent Data Corruption in Parallel Programs. In 35th Symposium on Reliable Distributed Systems (SRDS). Tara E. Thomas, Anmol J. Bhattad, Subrata Mitra, and Saurabh Bagchi. 2016. Sirius: Neural Network Based Probabilistic Assertions for Detecting Silent Data Corruption in Parallel Programs. In 35th Symposium on Reliable Distributed Systems (SRDS)."},{"volume-title":"Proceedings of the 8th International Conference on Modelling Techniques and Tools for Computer Performance Evaluation: Quantitative Evaluation of Computing and Communication Systems. 26--40","author":"Timothy","key":"e_1_3_2_1_45_1","unstructured":"Timothy K. Tsai and Ravishankar K. Iyer. 1995. Measuring Fault Tolerance with the FTAPE Fault Injection Tool . In Proceedings of the 8th International Conference on Modelling Techniques and Tools for Computer Performance Evaluation: Quantitative Evaluation of Computing and Communication Systems. 26--40 . Timothy K. Tsai and Ravishankar K. Iyer. 1995. Measuring Fault Tolerance with the FTAPE Fault Injection Tool. In Proceedings of the 8th International Conference on Modelling Techniques and Tools for Computer Performance Evaluation: Quantitative Evaluation of Computing and Communication Systems. 26--40."},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2003.1197125"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2014.2"},{"key":"e_1_3_2_1_48_1","first-page":"171","article-title":"A Survey on Fault Injection","volume":"1","author":"Ziade Haissam","year":"2004","unstructured":"Haissam Ziade , Rafic A. Ayoubi , and Raoul Velazco . 2004 . A Survey on Fault Injection Techniques. Int. Arab J. Inf. Technol. 1 (2004), 171 -- 186 . Haissam Ziade, Rafic A. Ayoubi, and Raoul Velazco. 2004. A Survey on Fault Injection Techniques. Int. Arab J. Inf. Technol. 1 (2004), 171--186.","journal-title":"Techniques. Int. Arab J. Inf. Technol."}],"event":{"name":"CF '18: Computing Frontiers Conference","sponsor":["SIGMICRO ACM Special Interest Group on Microarchitectural Research and Processing"],"location":"Ischia Italy","acronym":"CF '18"},"container-title":["Proceedings of the 15th ACM International Conference on Computing Frontiers"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3203217.3203240","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3203217.3203240","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T01:08:46Z","timestamp":1750208926000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3203217.3203240"}},"subtitle":["a case study with iterative methods"],"short-title":[],"issued":{"date-parts":[[2018,5,8]]},"references-count":48,"alternative-id":["10.1145\/3203217.3203240","10.1145\/3203217"],"URL":"https:\/\/doi.org\/10.1145\/3203217.3203240","relation":{},"subject":[],"published":{"date-parts":[[2018,5,8]]},"assertion":[{"value":"2018-05-08","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}