{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,11]],"date-time":"2026-03-11T16:20:16Z","timestamp":1773246016075,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":61,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,10,23]],"date-time":"2023-10-23T00:00:00Z","timestamp":1698019200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62025203"],"award-info":[{"award-number":["62025203"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,10,23]]},"DOI":"10.1145\/3600006.3613149","type":"proceedings-article","created":{"date-parts":[[2023,10,3]],"date-time":"2023-10-03T14:44:17Z","timestamp":1696344257000},"page":"216-230","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":52,"title":["Understanding Silent Data Corruptions in a Large Production CPU Population"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0007-6842-3148","authenticated-orcid":false,"given":"Shaobu","family":"Wang","sequence":"first","affiliation":[{"name":"Tsinghua University, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3480-5902","authenticated-orcid":false,"given":"Guangyan","family":"Zhang","sequence":"additional","affiliation":[{"name":"Tsinghua University, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0688-6370","authenticated-orcid":false,"given":"Junyu","family":"Wei","sequence":"additional","affiliation":[{"name":"Tsinghua University, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9721-4923","authenticated-orcid":false,"given":"Yang","family":"Wang","sequence":"additional","affiliation":[{"name":"The Ohio State University, Columbus, United States of America"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7417-5469","authenticated-orcid":false,"given":"Jiesheng","family":"Wu","sequence":"additional","affiliation":[{"name":"Alibaba Cloud, Hangzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0009-3805-5377","authenticated-orcid":false,"given":"Qingchao","family":"Luo","sequence":"additional","affiliation":[{"name":"Alibaba Cloud, Hangzhou, China"}]}],"member":"320","published-online":{"date-parts":[[2023,10,23]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/6420.6422"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/263876.263881"},{"key":"e_1_3_2_1_3_1","first-page":"173","article-title":"Practical byzantine fault tolerance","volume":"99","author":"Castro","year":"1999","unstructured":"Castro et al. \" Practical byzantine fault tolerance \". In: OSDI. Vol. 99 . 1999. 1999 , pp. 173 -- 186 . Castro et al. \"Practical byzantine fault tolerance\". In: OSDI. Vol. 99. 1999. 1999, pp. 173--186.","journal-title":"OSDI."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/23.903758"},{"key":"e_1_3_2_1_5_1","first-page":"61","volume-title":"2001 Symposium on VLSI Circuits. Digest of Technical Papers (IEEE Cat. No. 01CH37185)","author":"Tanay","year":"2001","unstructured":"Tanay Karnik et al. \"Scaling trends of cosmic ray induced soft errors in static latches beyond 0.18\/spl mu \". In: 2001 Symposium on VLSI Circuits. Digest of Technical Papers (IEEE Cat. No. 01CH37185) . IEEE. 2001 , pp. 61 -- 62 . Tanay Karnik et al. \"Scaling trends of cosmic ray induced soft errors in static latches beyond 0.18\/spl mu\". In: 2001 Symposium on VLSI Circuits. Digest of Technical Papers (IEEE Cat. No. 01CH37185). IEEE. 2001, pp. 61--62."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/945445.945450"},{"key":"e_1_3_2_1_7_1","volume-title":"Advanced configuration and power interface specification","author":"Hewlett-Packard Intel","year":"2004","unstructured":"Intel Hewlett-Packard . Microsoft, Phoenix, and Toshiba. Advanced configuration and power interface specification . 2004 . Intel Hewlett-Packard. Microsoft, Phoenix, and Toshiba. Advanced configuration and power interface specification. 2004."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDMR.2005.853449"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/1064978.1065034"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDMR.2005.855685"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/HPCA.2005.37"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/FCCM.2005.61"},{"key":"e_1_3_2_1_13_1","volume-title":"VIRGINIA UNIV CHARLOTTESVILLE DEPT OF COMPUTER SCIENCE","author":"Humenay Eric","year":"2006","unstructured":"Eric Humenay , David Tarjan , and Kevin Skadron . Impact of parameter variations on multi-core chips. Tech. rep . VIRGINIA UNIV CHARLOTTESVILLE DEPT OF COMPUTER SCIENCE , 2006 . Eric Humenay, David Tarjan, and Kevin Skadron. Impact of parameter variations on multi-core chips. Tech. rep. VIRGINIA UNIV CHARLOTTESVILLE DEPT OF COMPUTER SCIENCE, 2006."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2007.99"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/1416944.1416947"},{"key":"e_1_3_2_1_16_1","first-page":"108","volume-title":"IEEE.","author":"Cristian","year":"2008","unstructured":"Cristian Constantinescu et al. \"Silent data corruption Myth or reality?\" In: 2008 IEEE International Conference on Dependable Systems and Networks With FTCS and DCC (DSN) . IEEE. 2008 , pp. 108 -- 109 . Cristian Constantinescu et al. \"Silent data corruption Myth or reality?\" In: 2008 IEEE International Conference on Dependable Systems and Networks With FTCS and DCC (DSN). IEEE. 2008, pp. 108--109."},{"key":"e_1_3_2_1_17_1","volume-title":"Dagstuhl Seminar Proceedings. Schloss Dagstuhl-Leibniz-Zentrum f\u00fcr Informatik.","author":"Markstein Peter","year":"2008","unstructured":"Peter Markstein . \" The new IEEE-754 standard for floating point arithmetic \". In: Dagstuhl Seminar Proceedings. Schloss Dagstuhl-Leibniz-Zentrum f\u00fcr Informatik. 2008 . Peter Markstein. \"The new IEEE-754 standard for floating point arithmetic\". In: Dagstuhl Seminar Proceedings. Schloss Dagstuhl-Leibniz-Zentrum f\u00fcr Informatik. 2008."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/1629575.1629602"},{"key":"e_1_3_2_1_19_1","first-page":"19","article-title":"Replication","volume":"5959","author":"Charron-Bost Bernadette","year":"2010","unstructured":"Bernadette Charron-Bost , Fernando Pedone , and Andr\u00e9 Schiper . \" Replication \". In: LNCS 5959 ( 2010 ), pp. 19 -- 40 . Bernadette Charron-Bost, Fernando Pedone, and Andr\u00e9 Schiper. \"Replication\". In: LNCS 5959 (2010), pp. 19--40.","journal-title":"LNCS"},{"key":"e_1_3_2_1_20_1","first-page":"29","article-title":"End-to-end Data Integrity for File Systems: A ZFS Case Study","author":"Yupu Zhang","year":"2010","unstructured":"Yupu Zhang et al . \" End-to-end Data Integrity for File Systems: A ZFS Case Study .\" In: FAST. 2010 , pp. 29 -- 42 . Yupu Zhang et al. \"End-to-end Data Integrity for File Systems: A ZFS Case Study.\" In: FAST. 2010, pp. 29--42.","journal-title":"FAST."},{"key":"e_1_3_2_1_21_1","unstructured":"Parth Deshmukh Sean Maginnis and Josh Chandler. \"Jerasure 2.0\". In: (2011).  Parth Deshmukh Sean Maginnis and Josh Chandler. \"Jerasure 2.0\". In: (2011)."},{"key":"e_1_3_2_1_22_1","volume-title":"Managing temperature effects in nanoscale adaptive systems","author":"Wolpert David Solomon","year":"2011","unstructured":"David Solomon Wolpert . Managing temperature effects in nanoscale adaptive systems . University of Rochester , 2011 . David Solomon Wolpert. Managing temperature effects in nanoscale adaptive systems. University of Rochester, 2011."},{"key":"e_1_3_2_1_23_1","first-page":"1","volume-title":"SC'12: Proceedings of the International Conference on High Performance Computing, Networking, Storage and Analysis. IEEE.","author":"David","year":"2012","unstructured":"David Fiala et al. \"Detection and correction of silent data corruption for large-scale high-performance computing \". In: SC'12: Proceedings of the International Conference on High Performance Computing, Networking, Storage and Analysis. IEEE. 2012 , pp. 1 -- 12 . David Fiala et al. \"Detection and correction of silent data corruption for large-scale high-performance computing\". In: SC'12: Proceedings of the International Conference on High Performance Computing, Networking, Storage and Analysis. IEEE. 2012, pp. 1--12."},{"key":"e_1_3_2_1_24_1","first-page":"15","volume-title":"2012 USENIX Annual Technical Conference (USENIX ATC 12)","author":"Cheng","year":"2012","unstructured":"Cheng Huang et al. \"Erasure coding in windows azure storage \". In: 2012 USENIX Annual Technical Conference (USENIX ATC 12) . 2012 , pp. 15 -- 26 . Cheng Huang et al. \"Erasure coding in windows azure storage\". In: 2012 USENIX Annual Technical Conference (USENIX ATC 12). 2012, pp. 15--26."},{"key":"e_1_3_2_1_25_1","first-page":"237","volume-title":"Proceedings of the 10th USENIX Conference on Operating Systems Design and Implementation. OSDI'12","author":"Manos","year":"2012","unstructured":"Manos Kapritsos et al. \"All about Eve: Execute-Verify Replication for Multi-Core Servers \". In: Proceedings of the 10th USENIX Conference on Operating Systems Design and Implementation. OSDI'12 . Hollywood, CA, USA: USENIX Association , 2012 , pp. 237 -- 250 . isbn: 9781931971966. Manos Kapritsos et al. \"All about Eve: Execute-Verify Replication for Multi-Core Servers\". In: Proceedings of the 10th USENIX Conference on Operating Systems Design and Implementation. OSDI'12. Hollywood, CA, USA: USENIX Association, 2012, pp. 237--250. isbn: 9781931971966."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.2172\/1089338"},{"key":"e_1_3_2_1_27_1","first-page":"357","volume-title":"10th USENIX Symposium on Networked Systems Design and Implementation (NSDI 13)","author":"Yang","year":"2013","unstructured":"Yang Wang et al. \"Robustness in the Salus scalable block store \". In: 10th USENIX Symposium on Networked Systems Design and Implementation (NSDI 13) . 2013 , pp. 357 -- 370 . Yang Wang et al. \"Robustness in the Salus scalable block store\". In: 10th USENIX Symposium on Networked Systems Design and Implementation (NSDI 13). 2013, pp. 357--370."},{"key":"e_1_3_2_1_28_1","first-page":"1","volume-title":"CIPS 2014; 8th International Conference on Integrated Power Electronics Systems. VDE.","author":"Zorn Christian","year":"2014","unstructured":"Christian Zorn and Nando Kaminski . \" Temperature humidity bias (THB) testing on IGBT modules at high bias levels \". In: CIPS 2014; 8th International Conference on Integrated Power Electronics Systems. VDE. 2014 , pp. 1 -- 7 . Christian Zorn and Nando Kaminski. \"Temperature humidity bias (THB) testing on IGBT modules at high bias levels\". In: CIPS 2014; 8th International Conference on Integrated Power Electronics Systems. VDE. 2014, pp. 1--7."},{"key":"e_1_3_2_1_29_1","first-page":"128","volume-title":"2015 IEEE 17th International Conference on High Performance Computing and Communications","author":"Bautista-Gomez Leonardo","year":"2015","unstructured":"Leonardo Bautista-Gomez and Franck Cappello . \" Exploiting spatial smoothness in HPC applications to detect silent data corruption\". In: 2015 IEEE 17th International Conference on High Performance Computing and Communications , 2015 IEEE 7th International Symposium on Cyberspace Safety and Security, and 2015 IEEE 12th International Conference on Embedded Software and Systems. IEEE. 2015, pp. 128 -- 133 . Leonardo Bautista-Gomez and Franck Cappello. \"Exploiting spatial smoothness in HPC applications to detect silent data corruption\". In: 2015 IEEE 17th International Conference on High Performance Computing and Communications, 2015 IEEE 7th International Symposium on Cyberspace Safety and Security, and 2015 IEEE 12th International Conference on Embedded Software and Systems. IEEE. 2015, pp. 128--133."},{"key":"e_1_3_2_1_30_1","first-page":"275","volume-title":"Proceedings of the 24th International Symposium on High-Performance Parallel and Distributed Computing.","author":"Eduardo","year":"2015","unstructured":"Eduardo Berrocal et al. \"Lightweight silent data corruption detection based on runtime data analysis for HPC applications \". In: Proceedings of the 24th International Symposium on High-Performance Parallel and Distributed Computing. 2015 , pp. 275 -- 278 . Eduardo Berrocal et al. \"Lightweight silent data corruption detection based on runtime data analysis for HPC applications\". In: Proceedings of the 24th International Symposium on High-Performance Parallel and Distributed Computing. 2015, pp. 275--278."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/CCGrid.2015.17"},{"key":"e_1_3_2_1_32_1","first-page":"35","volume-title":"Proceedings of the 5th Workshop on Fault Tolerance for HPC at eXtreme Scale.","author":"Qiang","year":"2015","unstructured":"Qiang Guan et al. \"Empirical studies of the soft error susceptibility of sorting algorithms to statistical fault injection \". In: Proceedings of the 5th Workshop on Fault Tolerance for HPC at eXtreme Scale. 2015 , pp. 35 -- 40 . Qiang Guan et al. \"Empirical studies of the soft error susceptibility of sorting algorithms to statistical fault injection\". In: Proceedings of the 5th Workshop on Fault Tolerance for HPC at eXtreme Scale. 2015, pp. 35--40."},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.5555\/2811302"},{"key":"e_1_3_2_1_34_1","volume-title":"Semiconductor material and device characterization","author":"Schroder Dieter K","year":"2015","unstructured":"Dieter K Schroder . Semiconductor material and device characterization . John Wiley & Sons , 2015 . Dieter K Schroder. Semiconductor material and device characterization. John Wiley & Sons, 2015."},{"key":"e_1_3_2_1_35_1","first-page":"72","volume-title":"2016 46th Annual IEEE\/IFIP International Conference on Dependable Systems and Networks Workshop (DSN-W). IEEE.","author":"Bo","year":"2016","unstructured":"Bo Fang et al. \"Sdc is in the eye of the beholder: A survey and preliminary study \". In: 2016 46th Annual IEEE\/IFIP International Conference on Dependable Systems and Networks Workshop (DSN-W). IEEE. 2016 , pp. 72 -- 76 . Bo Fang et al. \"Sdc is in the eye of the beholder: A survey and preliminary study\". In: 2016 46th Annual IEEE\/IFIP International Conference on Dependable Systems and Networks Workshop (DSN-W). IEEE. 2016, pp. 72--76."},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1109\/DFT.2016.7684076"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1088\/978-0-7503-1155-7"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/3242086"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNS.2018.2852606"},{"key":"e_1_3_2_1_40_1","first-page":"1049","volume-title":"Asian Conference on Machine Learning. PMLR.","author":"Cheng","year":"2019","unstructured":"Cheng Liu et al. \"SDC-causing error detection based on lightweight vulnerability prediction \". In: Asian Conference on Machine Learning. PMLR. 2019 , pp. 1049 -- 1064 . Cheng Liu et al. \"SDC-causing error detection based on lightweight vulnerability prediction\". In: Asian Conference on Machine Learning. PMLR. 2019, pp. 1049--1064."},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2905842"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICPADS47876.2019.00127"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.3390\/electronics9111884"},{"key":"e_1_3_2_1_44_1","first-page":"1","volume-title":"Effects of thermal neutron irradiation on a Self-Refresh DRAM\". In: 2020 15th Design & Technology of Integrated Systems in Nanoscale Era (DTIS)","author":"Luza Lucas Matana","year":"2020","unstructured":"Lucas Matana Luza \" Effects of thermal neutron irradiation on a Self-Refresh DRAM\". In: 2020 15th Design & Technology of Integrated Systems in Nanoscale Era (DTIS) . IEEE. 2020 , pp. 1 -- 6 . Lucas Matana Luza et al. \"Effects of thermal neutron irradiation on a Self-Refresh DRAM\". In: 2020 15th Design & Technology of Integrated Systems in Nanoscale Era (DTIS). IEEE. 2020, pp. 1--6."},{"key":"e_1_3_2_1_45_1","first-page":"1","volume-title":"2020 IEEE International Symposium on Defect and Fault Tolerance in VLSI and Nanotechnology Systems (DFT). IEEE.","author":"Dario","year":"2020","unstructured":"Dario Mamone et al. \"On the analysis of real-time operating system reliability in embedded systems \". In: 2020 IEEE International Symposium on Defect and Fault Tolerance in VLSI and Nanotechnology Systems (DFT). IEEE. 2020 , pp. 1 -- 6 . Dario Mamone et al. \"On the analysis of real-time operating system reliability in embedded systems\". In: 2020 IEEE International Symposium on Defect and Fault Tolerance in VLSI and Nanotechnology Systems (DFT). IEEE. 2020, pp. 1--6."},{"key":"e_1_3_2_1_46_1","volume-title":"Silent Data Corruptions at Scale\". In: arXiv preprint arXiv:2102.11245","author":"Dixit Harish Dattatraya","year":"2021","unstructured":"Harish Dattatraya Dixit \" Silent Data Corruptions at Scale\". In: arXiv preprint arXiv:2102.11245 ( 2021 ). Harish Dattatraya Dixit et al. \"Silent Data Corruptions at Scale\". In: arXiv preprint arXiv:2102.11245 (2021)."},{"key":"e_1_3_2_1_47_1","first-page":"33","volume-title":"19th USENIX Conference on File and Storage Technologies (FAST 21)","author":"Siying","year":"2021","unstructured":"Siying Dong et al. \"Evolution of Development Priorities in Key-value Stores Serving Large-scale Applications: The RocksDB Experience \". In: 19th USENIX Conference on File and Storage Technologies (FAST 21) . 2021 , pp. 33 -- 49 . Siying Dong et al. \"Evolution of Development Priorities in Key-value Stores Serving Large-scale Applications: The RocksDB Experience\". In: 19th USENIX Conference on File and Storage Technologies (FAST 21). 2021, pp. 33--49."},{"key":"e_1_3_2_1_48_1","first-page":"9","volume-title":"Proceedings of the Workshop on Hot Topics in Operating Systems.","author":"Peter","year":"2021","unstructured":"Peter H Hochschild et al. \"Cores that don't count \". In: Proceedings of the Workshop on Hot Topics in Operating Systems. 2021 , pp. 9 -- 16 . Peter H Hochschild et al. \"Cores that don't count\". In: Proceedings of the Workshop on Hot Topics in Operating Systems. 2021, pp. 9--16."},{"key":"e_1_3_2_1_49_1","first-page":"1","volume-title":"Proceedings of the International Conference for High Performance Computing, Networking, Storage and Analysis.","author":"Sihuan","year":"2021","unstructured":"Sihuan Li et al. \"Resilient error-bounded lossy compressor for data transfer \". In: Proceedings of the International Conference for High Performance Computing, Networking, Storage and Analysis. 2021 , pp. 1 -- 14 . Sihuan Li et al. \"Resilient error-bounded lossy compressor for data transfer\". In: Proceedings of the International Conference for High Performance Computing, Networking, Storage and Analysis. 2021, pp. 1--14."},{"key":"e_1_3_2_1_50_1","volume-title":"SiliFuzz: Fuzzing CPUs by proxy\". In: arXiv preprint arXiv:2110.11519","author":"Kostya Serebryany","year":"2021","unstructured":"Kostya Serebryany et al. \" SiliFuzz: Fuzzing CPUs by proxy\". In: arXiv preprint arXiv:2110.11519 ( 2021 ). Kostya Serebryany et al. \"SiliFuzz: Fuzzing CPUs by proxy\". In: arXiv preprint arXiv:2110.11519 (2021)."},{"key":"e_1_3_2_1_51_1","volume-title":"Workshop on Silicon Errors in Logic - System Effects, IEEE","author":"Bacon David F","year":"2022","unstructured":"David F Bacon . \" Detection and Prevention of Silent Data Corruption in an Exabyte-scale Database System \". In: Workshop on Silicon Errors in Logic - System Effects, IEEE ( 2022 ). David F Bacon. \"Detection and Prevention of Silent Data Corruption in an Exabyte-scale Database System\". In: Workshop on Silicon Errors in Logic - System Effects, IEEE (2022)."},{"key":"e_1_3_2_1_52_1","volume-title":"Detecting silent data corruptions in the wild\". In: arXiv:2203.08989","author":"Dixit Harish Dattatraya","year":"2022","unstructured":"Harish Dattatraya Dixit \" Detecting silent data corruptions in the wild\". In: arXiv:2203.08989 ( 2022 ). Harish Dattatraya Dixit et al. \"Detecting silent data corruptions in the wild\". In: arXiv:2203.08989 (2022)."},{"key":"e_1_3_2_1_53_1","first-page":"91","volume-title":"16th USENIX Symposium on Operating Systems Design and Implementation (OSDI 22)","author":"Lou Chang","year":"2022","unstructured":"Chang Lou , Yuzhuo Jing , and Peng Huang . \" Demystifying and Checking Silent Semantic Violations in Large Distributed Systems\". In: 16th USENIX Symposium on Operating Systems Design and Implementation (OSDI 22) . 2022 , pp. 91 -- 107 . Chang Lou, Yuzhuo Jing, and Peng Huang. \"Demystifying and Checking Silent Semantic Violations in Large Distributed Systems\". In: 16th USENIX Symposium on Operating Systems Design and Implementation (OSDI 22). 2022, pp. 91--107."},{"key":"e_1_3_2_1_54_1","first-page":"376","volume-title":"Automation & Test in Europe Conference & Exhibition (DATE). IEEE.","author":"Luiz Rubens","year":"2022","unstructured":"Rubens Luiz Rech et al. \"Reliability of google's tensor processing units for embedded applications\". In: 2022 Design , Automation & Test in Europe Conference & Exhibition (DATE). IEEE. 2022 , pp. 376 -- 381 . Rubens Luiz Rech et al. \"Reliability of google's tensor processing units for embedded applications\". In: 2022 Design, Automation & Test in Europe Conference & Exhibition (DATE). IEEE. 2022, pp. 376--381."},{"key":"e_1_3_2_1_55_1","volume-title":"DISCC 2022 1ST WORKSHOP ON DATA INTEGRITY AND SECURE CLOUD COMPUTING.","author":"Gefei","year":"2022","unstructured":"Gefei Zuo et al. \"Tolerate Silent Data Errors with Coded Computation \". In: DISCC 2022 1ST WORKSHOP ON DATA INTEGRITY AND SECURE CLOUD COMPUTING. 2022 . Gefei Zuo et al. \"Tolerate Silent Data Errors with Coded Computation\". In: DISCC 2022 1ST WORKSHOP ON DATA INTEGRITY AND SECURE CLOUD COMPUTING. 2022."},{"key":"e_1_3_2_1_56_1","first-page":"287","volume-title":"17th USENIX Symposium on Operating Systems Design and Implementation (OSDI 23)","author":"Jialun","year":"2023","unstructured":"Jialun Lyu et al. \"Hyrax:{Fail-in-Place} Server Operation in Cloud Platforms \". In: 17th USENIX Symposium on Operating Systems Design and Implementation (OSDI 23) . 2023 , pp. 287 -- 304 . Jialun Lyu et al. \"Hyrax:{Fail-in-Place} Server Operation in Cloud Platforms\". In: 17th USENIX Symposium on Operating Systems Design and Implementation (OSDI 23). 2023, pp. 287--304."},{"key":"e_1_3_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2023.3285094"},{"key":"e_1_3_2_1_58_1","first-page":"1","volume-title":"2023 IEEE 41st VLSI Test Symposium (VTS). IEEE.","author":"Adit","year":"2023","unstructured":"Adit Singh et al. \"Silent Data Errors: Sources, Detection, and Modeling \". In: 2023 IEEE 41st VLSI Test Symposium (VTS). IEEE. 2023 , pp. 1 -- 12 . Adit Singh et al. \"Silent Data Errors: Sources, Detection, and Modeling\". In: 2023 IEEE 41st VLSI Test Symposium (VTS). IEEE. 2023, pp. 1--12."},{"key":"e_1_3_2_1_59_1","unstructured":"Intel Corporation. ECC for L2 Cache Data Memory. https:\/\/www.intel.com\/content\/www\/us\/en\/docs\/programmable\/683360\/18-0\/ecc-for-l2-cache-data-memory.html.  Intel Corporation. ECC for L2 Cache Data Memory. https:\/\/www.intel.com\/content\/www\/us\/en\/docs\/programmable\/683360\/18-0\/ecc-for-l2-cache-data-memory.html."},{"key":"e_1_3_2_1_60_1","unstructured":"Intel Corporation. OpenDCDiag. https:\/\/github.com\/opendcdiag\/opendcdiag.  Intel Corporation. OpenDCDiag. https:\/\/github.com\/opendcdiag\/opendcdiag."},{"key":"e_1_3_2_1_61_1","unstructured":"Intel Corporation. Optimizing storage solutions using the intel\u00ae intelligent storage acceleration library. https:\/\/software.intel.com\/en-us\/articles\/optimizing-storage-solutions-using-the-intel-intelligent-storage-acceleration-library.  Intel Corporation. Optimizing storage solutions using the intel\u00ae intelligent storage acceleration library. https:\/\/software.intel.com\/en-us\/articles\/optimizing-storage-solutions-using-the-intel-intelligent-storage-acceleration-library."}],"event":{"name":"SOSP '23: 29th Symposium on Operating Systems Principles","location":"Koblenz Germany","acronym":"SOSP '23","sponsor":["SIGOPS ACM Special Interest Group on Operating Systems","USENIX"]},"container-title":["Proceedings of the 29th Symposium on Operating Systems Principles"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3600006.3613149","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T16:36:49Z","timestamp":1750178209000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3600006.3613149"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,10,23]]},"references-count":61,"alternative-id":["10.1145\/3600006.3613149","10.1145\/3600006"],"URL":"https:\/\/doi.org\/10.1145\/3600006.3613149","relation":{},"subject":[],"published":{"date-parts":[[2023,10,23]]},"assertion":[{"value":"2023-10-23","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}