Cited By
View all- Wang SZhang GWei JWang YWu JLuo Q(2024)Understanding Silent Data Corruption in Processors for Mitigating its EffectsACM Transactions on Architecture and Code Optimization10.1145/369082521:4(1-27)Online publication date: 20-Nov-2024
- Karystinos NChatzopoulos OFragkoulis GPapadimitriou GGizopoulos DGurumurthi S(2024)Harpocrates: Breaking the Silence of CPU Faults through Hardware-in-the-Loop Program Generation2024 ACM/IEEE 51st Annual International Symposium on Computer Architecture (ISCA)10.1109/ISCA59077.2024.00045(516-531)Online publication date: 29-Jun-2024
- Rahman MDi SGuo SLu XLi GCappello F(2024)Druto: Upper-Bounding Silent Data Corruption Vulnerability in GPU Applications2024 IEEE International Parallel and Distributed Processing Symposium (IPDPS)10.1109/IPDPS57955.2024.00058(582-594)Online publication date: 27-May-2024
- Show More Cited By