Cited By
View all- Shrivastava ALee JJeyapaul R(2010)Cache vulnerability equations for protecting data in embedded processor caches from soft errorsACM SIGPLAN Notices10.1145/1755951.175591045:4(143-152)Online publication date: 13-Apr-2010
- Shrivastava ALee JJeyapaul RLee JChilders B(2010)Cache vulnerability equations for protecting data in embedded processor caches from soft errorsProceedings of the ACM SIGPLAN/SIGBED 2010 conference on Languages, compilers, and tools for embedded systems10.1145/1755888.1755910(143-152)Online publication date: 13-Apr-2010
- Ejlali AAl-Hashimi BRosinger PMiremadi SBenini L(2010)Performability/energy tradeoff in error-control schemes for on-chip networksIEEE Transactions on Very Large Scale Integration (VLSI) Systems10.1109/TVLSI.2008.200099418:1(1-14)Online publication date: 1-Jan-2010
- Show More Cited By