{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:27:38Z","timestamp":1750220858124,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":46,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,2,22]],"date-time":"2020-02-22T00:00:00Z","timestamp":1582329600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"U.S. Department of Energy, Office of Science, Office of Advanced Scientific Computing Research (ASCR)","award":["DE-SC0014134"],"award-info":[{"award-number":["DE-SC0014134"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,2,22]]},"DOI":"10.1145\/3368826.3377920","type":"proceedings-article","created":{"date-parts":[[2020,2,21]],"date-time":"2020-02-21T21:49:28Z","timestamp":1582321768000},"page":"30-42","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":5,"title":["Low-cost prediction-based fault protection strategy"],"prefix":"10.1145","author":[{"given":"Sunghyun","family":"Park","sequence":"first","affiliation":[{"name":"University of Michigan, USA"}]},{"given":"Shikai","family":"Li","sequence":"additional","affiliation":[{"name":"University of Michigan, USA"}]},{"given":"Ze","family":"Zhang","sequence":"additional","affiliation":[{"name":"University of Michigan, USA"}]},{"given":"Scott","family":"Mahlke","sequence":"additional","affiliation":[{"name":"University of Michigan, USA"}]}],"member":"320","published-online":{"date-parts":[[2020,2,22]]},"reference":[{"doi-asserted-by":"publisher","key":"e_1_3_2_1_2_1","DOI":"10.1109\/TC.2005.119"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_3_1","DOI":"10.1109\/TC.2011.79"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_4_1","DOI":"10.1109\/MICRO.1999.809458"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_5_1","DOI":"10.1145\/1806596.1806620"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_6_1","DOI":"10.1145\/1454115.1454128"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_7_1","DOI":"10.1145\/2024716.2024718"},{"key":"e_1_3_2_1_8_1","first-page":"3","article-title":"Microarchitecture and design challenges for gigascale integration","volume":"37","author":"Shekhar Borkar","year":"2004","unstructured":"Shekhar Borkar et al. 2004. Microarchitecture and design challenges for gigascale integration. In MICRO, Vol. 37. 3\u20133.","journal-title":"MICRO"},{"volume-title":"A foundation for the accurate prediction of the soft error vulnerability of scientific applications","author":"Bronevetsky Greg","unstructured":"Greg Bronevetsky, B de Supinski, and Martin Schulz. 2009. A foundation for the accurate prediction of the soft error vulnerability of scientific applications. Technical Report. Lawrence Livermore National Lab.(LLNL), Livermore, CA (United States).","key":"e_1_3_2_1_9_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_10_1","DOI":"10.1109\/IISWC.2009.5306797"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_11_1","DOI":"10.1145\/2897937.2898054"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_12_1","DOI":"10.1145\/1736020.1736063"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_13_1","DOI":"10.1145\/2155620.2155667"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_14_1","DOI":"10.1145\/859618.859631"},{"key":"e_1_3_2_1_15_1","volume-title":"ACM SIGARCH Computer Architecture News","volume":"18","author":"Horst Robert W","year":"1990","unstructured":"Robert W Horst, Richard L Harris, and Robert L Jardine. 1990. Multiple instruction issue in the NonStop Cyclone processor. In ACM SIGARCH Computer Architecture News, Vol. 18. ACM, 216\u2013226."},{"key":"e_1_3_2_1_16_1","volume-title":"ACM SIGPLAN Notices","volume":"48","author":"Khudia Daya Shanker","year":"2013","unstructured":"Daya Shanker Khudia and Scott Mahlke. 2013. Low cost control flow protection using abstract control signatures. In ACM SIGPLAN Notices, Vol. 48. ACM, 3\u201312."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_17_1","DOI":"10.1109\/MICRO.2014.33"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_18_1","DOI":"10.1145\/3205289.3205317"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_19_1","DOI":"10.1109\/TPDS.2007.1090"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_20_1","DOI":"10.12988\/ams.2013.13133"},{"volume-title":"Introduction to linear regression analysis","author":"Montgomery Douglas C","unstructured":"Douglas C Montgomery, Elizabeth A Peck, and G Geoffrey Vining. 2012. Introduction to linear regression analysis. Vol. 821. John Wiley &amp; Sons.","key":"e_1_3_2_1_21_1"},{"unstructured":"Shubu Mukherjee. 2011. Architecture design for soft errors. Morgan Kaufmann.","key":"e_1_3_2_1_22_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_23_1","DOI":"10.1109\/ISCA.2002.1003566"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_24_1","DOI":"10.1109\/MM.2003.1261389"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_25_1","DOI":"10.1109\/24.994913"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_26_1","DOI":"10.1109\/HPCA.2007.346195"},{"unstructured":"Joseph Redmon. 2013\u20132016. Darknet: Open Source Neural Networks in C. http:\/\/pjreddie.com\/darknet\/ .","key":"e_1_3_2_1_27_1"},{"key":"e_1_3_2_1_28_1","volume-title":"Faster, Stronger. arXiv preprint arXiv:1612.08242","author":"Redmon Joseph","year":"2016","unstructured":"Joseph Redmon and Ali Farhadi. 2016. YOLO9000: Better, Faster, Stronger. arXiv preprint arXiv:1612.08242 (2016)."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_29_1","DOI":"10.1145\/339647.339652"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_30_1","DOI":"10.1109\/MM.2007.4"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_31_1","DOI":"10.1109\/CGO.2005.34"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_32_1","DOI":"10.1109\/DSN.2008.4630072"},{"key":"e_1_3_2_1_33_1","volume-title":"Janghaeng Lee, and Scott Mahlke.","author":"Samadi Mehrzad","year":"2014","unstructured":"Mehrzad Samadi, Davoud Anoushe Jamshidi, Janghaeng Lee, and Scott Mahlke. 2014. Paraprox: Pattern-based approximation for data parallel applications. In ACM SIGARCH Computer Architecture News, Vol. 42. ACM, 35\u201350."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_34_1","DOI":"10.1145\/2540708.2540711"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_35_1","DOI":"10.1109\/MICRO.2016.7783746"},{"key":"e_1_3_2_1_36_1","volume-title":"1998 IEEE International Conference on","volume":"3","author":"Saxena Nirmal R","year":"1998","unstructured":"Nirmal R Saxena and Edward J McCluskey. 1998. Dependable adaptive computing systems-the roar project. In Systems, Man, and Cybernetics, 1998. 1998 IEEE International Conference on, Vol. 3. IEEE, 2172\u20132177."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_37_1","DOI":"10.1145\/2025113.2025133"},{"key":"e_1_3_2_1_38_1","volume-title":"Mark A Check, Bruce C Giamei, Barry W Krumm, Christopher A Krygowski, Wen H Li, John S Liptay, John D MacDougall, Thomas J McPherson, et al.","author":"Slegel Timothy J","year":"1999","unstructured":"Timothy J Slegel, Robert MIII Averill, Mark A Check, Bruce C Giamei, Barry W Krumm, Christopher A Krygowski, Wen H Li, John S Liptay, John D MacDougall, Thomas J McPherson, et al. 1999. IBM\u2019s S\/390 G5 microprocessor design. IEEE micro 19, 2 (1999), 12\u201323."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_39_1","DOI":"10.1109\/MICRO.2004.19"},{"key":"e_1_3_2_1_40_1","volume-title":"Geng Daniel Liu, and Wen-mei W Hwu","author":"Stratton John A","year":"2012","unstructured":"John A Stratton, Christopher Rodrigues, I-Jui Sung, Nady Obeid, LiWen Chang, Nasser Anssari, Geng Daniel Liu, and Wen-mei W Hwu. 2012. Parboil: A revised benchmark suite for scientific and commercial throughput computing. Center for Reliable and High-Performance Computing 127 (2012)."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_41_1","DOI":"10.1109\/MICRO.2016.7783745"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_42_1","DOI":"10.1109\/TDSC.2006.40"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_43_1","DOI":"10.1109\/DSN.2001.941425"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_44_1","DOI":"10.1109\/ISPASS.2013.6557155"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_45_1","DOI":"10.1109\/AERO.1996.495891"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_46_1","DOI":"10.1007\/s10766-011-0183-4"},{"volume-title":"Trends and Challenges: A Guide for Designing with Memory ICs","author":"Ziegler James F","unstructured":"James F Ziegler and Helmut Puchner. 2004. SER\u2013history, Trends and Challenges: A Guide for Designing with Memory ICs. Cypress.","key":"e_1_3_2_1_47_1"}],"event":{"sponsor":["SIGPLAN ACM Special Interest Group on Programming Languages","SIGMICRO ACM Special Interest Group on Microarchitectural Research and Processing","IEEE-CS Computer Society"],"acronym":"CGO '20","name":"CGO '20: 18th ACM\/IEEE International Symposium on Code Generation and Optimization","location":"San Diego CA USA"},"container-title":["Proceedings of the 18th ACM\/IEEE International Symposium on Code Generation and Optimization"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3368826.3377920","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3368826.3377920","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:23:28Z","timestamp":1750202608000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3368826.3377920"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,2,22]]},"references-count":46,"alternative-id":["10.1145\/3368826.3377920","10.1145\/3368826"],"URL":"https:\/\/doi.org\/10.1145\/3368826.3377920","relation":{},"subject":[],"published":{"date-parts":[[2020,2,22]]},"assertion":[{"value":"2020-02-22","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}