• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Huang Hailin, Tang Zhimin, Xu Tong. Fault Injection and Soft Error Sensitivity Characterization for Fault-Tolerant Godson-1 Processor[J]. Journal of Computer Research and Development, 2006, 43(10): 1820-1827.
Citation: Huang Hailin, Tang Zhimin, Xu Tong. Fault Injection and Soft Error Sensitivity Characterization for Fault-Tolerant Godson-1 Processor[J]. Journal of Computer Research and Development, 2006, 43(10): 1820-1827.

Fault Injection and Soft Error Sensitivity Characterization for Fault-Tolerant Godson-1 Processor

More Information
  • Published Date: October 14, 2006
  • Dependability plays an important role in the design of nanometer-scale processors and application-specific processors exposed to harsh environments such as cosmic rays. Fault injection is employed to characterize the soft error sensitivity and validate the integrated fault tolerance mechanisms in a fault-tolerant processor. With Godson-1 processor as the research prototype, a novel fault injection technique is presented, which can perform fast and continuous simulation-based fault injections to the subjected processor by running two synthesizable processor RTL models simultaneously. Based on this technique, about 30,0000 soft errors are injected into Godson-1 and the soft error sensitivity of Godson-1 is further investigated to direct the design of a fault-tolerant and dependable Godson-1 processor with good statistical significance.
  • Related Articles

    [1]Hou Bingnan, Liu Ning, Li Xionglüe, Zhou Tongqing, Chen Yingwen, Cai Zhiping, Lu Kai. Survey on Target-Generated IPv6 Network Address Scanning[J]. Journal of Computer Research and Development, 2024, 61(9): 2307-2320. DOI: 10.7544/issn1000-1239.202330335
    [2]Chen Xiaofeng, Song Zhaoxiong, Zheng Peiyu, Zhang Jun, Yu Zhi, Sun Yi. A Multichain-Collaborating Governing Chain-Supervising-Chain Supervision Framework[J]. Journal of Computer Research and Development, 2024, 61(9): 2290-2306. DOI: 10.7544/issn1000-1239.202330279
    [3]Duan Tiantian, Guo Yi, Li Bo, Zhang Hanwen, Song Zhaoxiong, Li Zhongcheng, Zhang Jun, Sun Yi. PieBridge:An On-Demand Scalable Cross-Chain Architecture[J]. Journal of Computer Research and Development, 2023, 60(11): 2520-2533. DOI: 10.7544/issn1000-1239.202230284
    [4]Chen Liangyin, Li Zhanghua, Wang Chaolong, Zhang Jingyu, Yan Bingshu, Liu Yan, Yin Feng, Chen Pengpeng. RBSA: Repeatedly-Woken Based Scanning Algorithm for Road Network Surveillance[J]. Journal of Computer Research and Development, 2014, 51(5): 974-983.
    [5]Bao Xiao'an, Yao Lan, Zhang Na, and Song Jinyu. Adaptive Software Testing Based on Controlled Markov Chain[J]. Journal of Computer Research and Development, 2012, 49(6): 1332-1338.
    [6]Wang Weizheng, Kuang Jishun, You Zhiqiang, Liu Peng. A Low-Power and Low-Cost BIST Scheme Based on Capture in Turn of Sub-Scan Chains[J]. Journal of Computer Research and Development, 2012, 49(4): 864-872.
    [7]Guo Chi, Wang Lina, Guan Yiping, Zhang Xiaoying. A Network Immunization Strategy Based on Dynamic Preference Scan[J]. Journal of Computer Research and Development, 2012, 49(4): 717-724.
    [8]Zhou Yong, Xia Shixiong, Ding Shifei, Zhang Lei, Ao Xin. An Improved APIT Node Self-Localization Algorithm in WSN Based on Triangle-Center Scan[J]. Journal of Computer Research and Development, 2009, 46(4): 566-574.
    [9]Dong Jie, Hu Yu, Han Yinhe, Li Xiaowei. A Multiple-Scan-Chain Test Approach Based on Combinational Decompression Circuits[J]. Journal of Computer Research and Development, 2006, 43(6): 1001-1007.
    [10]Liu Lijun and Huai Jinpeng. Research of a Network Scan Detection Algorithm Based on the FSA Model[J]. Journal of Computer Research and Development, 2006, 43(3): 417-422.

Catalog

    Article views (863) PDF downloads (697) Cited by()

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return