Characterization of Error-Tolerant Applications when Protecting Control Data

D. Thaker, D. Franklin, J. Oliver, Susmit Biswas, Derek Lockhart, Tzvetan S. Metodi, F. Chong
{"title":"Characterization of Error-Tolerant Applications when Protecting Control Data","authors":"D. Thaker, D. Franklin, J. Oliver, Susmit Biswas, Derek Lockhart, Tzvetan S. Metodi, F. Chong","doi":"10.1109/IISWC.2006.302738","DOIUrl":null,"url":null,"abstract":"Soft errors have become a significant concern and recent studies have measured the \"architectural vulnerability factor\" of systems to such errors, or conversely, the potential that a soft error is masked by latches or other system behavior. We take soft-error tolerance one step further and examine when an application can tolerate errors that are not masked. For example, a video decoder or approximation algorithm can tolerate errors if the user is willing to accept degraded output. The key observation is that while the decoder can tolerate error in its data, it can not tolerate error in its control. We first present static analysis that protects most control operations. We examine several SPEC CPU2000 and MiBench benchmarks for error tolerance, develop fidelity measures for each, and quantify the effect of errors on fidelity. We show that protecting control is crucial to producing error-tolerance, for without this protection, many applications experience catastrophic errors (infinite execution time or crashing). Overall, our results indicate that with simple control protection, the error tolerance of many applications can provide designers with considerable added flexibility when considering future challenges posed by soft errors","PeriodicalId":222041,"journal":{"name":"2006 IEEE International Symposium on Workload Characterization","volume":"20 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2006-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"43","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2006 IEEE International Symposium on Workload Characterization","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/IISWC.2006.302738","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 43

Abstract

Soft errors have become a significant concern and recent studies have measured the "architectural vulnerability factor" of systems to such errors, or conversely, the potential that a soft error is masked by latches or other system behavior. We take soft-error tolerance one step further and examine when an application can tolerate errors that are not masked. For example, a video decoder or approximation algorithm can tolerate errors if the user is willing to accept degraded output. The key observation is that while the decoder can tolerate error in its data, it can not tolerate error in its control. We first present static analysis that protects most control operations. We examine several SPEC CPU2000 and MiBench benchmarks for error tolerance, develop fidelity measures for each, and quantify the effect of errors on fidelity. We show that protecting control is crucial to producing error-tolerance, for without this protection, many applications experience catastrophic errors (infinite execution time or crashing). Overall, our results indicate that with simple control protection, the error tolerance of many applications can provide designers with considerable added flexibility when considering future challenges posed by soft errors
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
保护控制数据时容错应用的特征
软错误已经成为一个值得关注的问题,最近的研究已经测量了系统对此类错误的“体系结构脆弱性因素”,或者相反,软错误被闩锁或其他系统行为掩盖的可能性。我们将软错误容忍更进一步,检查应用程序何时可以容忍未被掩盖的错误。例如,如果用户愿意接受降级的输出,视频解码器或近似算法可以容忍错误。关键的观察是,虽然解码器可以容忍其数据中的错误,但它不能容忍其控制中的错误。我们首先介绍保护大多数控制操作的静态分析。我们检查了几个SPEC CPU2000和MiBench的容错基准,为每个基准开发了保真度度量,并量化了错误对保真度的影响。我们展示了保护控制对于产生容错性是至关重要的,因为如果没有这种保护,许多应用程序将经历灾难性的错误(无限的执行时间或崩溃)。总的来说,我们的研究结果表明,通过简单的控制保护,许多应用程序的容错能力可以为设计人员在考虑未来软错误带来的挑战时提供相当大的灵活性
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Evaluating Benchmark Subsetting Approaches An Architectural Characterization Study of Data Mining and Bioinformatics Workloads Techniques for Real-System Characterization of Java Virtual Machine Energy and Power Behavior A Quantitative Evaluation of the Contribution of Native Code to Java Workloads DFS: A Simple to Write Yet Difficult to Execute Benchmark
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1