Sciweavers

21 search results - page 5 / 5
» A General Method for Compiling Event-Driven Simulations
Sort
View
LCTRTS
2010
Springer
13 years 10 months ago
Cache vulnerability equations for protecting data in embedded processor caches from soft errors
Continuous technology scaling has brought us to a point, where transistors have become extremely susceptible to cosmic radiation strikes, or soft errors. Inside the processor, cac...
Aviral Shrivastava, Jongeun Lee, Reiley Jeyapaul