version 1.3, 2009/06/24 14:31:51
|
version 1.4, 2009/06/26 07:34:20
|
Line 59 either the ECC protected or the unprotec
|
Line 59 either the ECC protected or the unprotec
|
balance energy consumption and reliability \cite{LeeShrivastava09a}. |
balance energy consumption and reliability \cite{LeeShrivastava09a}. |
The second spills registers to ECC protected memory if the register |
The second spills registers to ECC protected memory if the register |
contents are not used for a long period \cite{LeeShrivastava09c}. |
contents are not used for a long period \cite{LeeShrivastava09c}. |
There exist complete software solutions which use different forms |
There exist complete software solutions which use different forms of |
of code duplications \cite{Reis+05}, which do failure virutalization |
code duplications \cite{Oh+02a,Reis+05}, which do failure |
\cite{WapplerMueller08} or which use techniques like control flow |
virtualization \cite{WapplerMueller08} or which use techniques like |
checking \cite{} |
control flow checking \cite{Oh+02b}. A complete overview of processor |
|
description languages and generation of compilers and simulators from |
%ADL and Instruction Set Simulators \cite{MishraDutt08} |
processors specifications gives the book of Mishra and Dutt \cite{MishraDutt08}. |
|
A good survey of current instruction set simulators gives our chapter |
|
in the Handbook of Signal Processing systems \cite{BrHoKr09}. A famous |
|
instruction set simulator with modelling of energy consumtion is Wattch |
|
\cite{BrooksTiwariMartonosi00}. |
|
|
Compiler Verification \cite{Hoare,1328444,1314860} |
Compiler Verification \cite{Hoare,1328444,1314860} |
|
|