Self-stabilizing algorithms recover from all cases of transient failure, but the mechanism of self-stabilization may be costly for mild cases of transient failure. error-detecting codes can be used to identify, with h...
详细信息
Self-stabilizing algorithms recover from all cases of transient failure, but the mechanism of self-stabilization may be costly for mild cases of transient failure. error-detecting codes can be used to identify, with high probability, transient faults in data. This note investigates how error-detecting codes can enhance self-stabilization to deal efficiently with the common case of single-process transient faults. The main results are characterizations of self-stabilizing algorithms that can use error-detecting codes to recover from single-process transient faults in a single step. (C) 2000 Elsevier Science B.V. All rights reserved.
In some ARQ schemes, the combination of modulation and channel coding improves the performance of a communication system. The paper describes a new method for the integration of an error-detecting code withM-ary modul...
详细信息
In some ARQ schemes, the combination of modulation and channel coding improves the performance of a communication system. The paper describes a new method for the integration of an error-detecting code withM-ary modulation. Euclidean distances are obtained among modulated signals using successive transmissions of the same codeword larger than those obtained by other similar schemes. The results of the theoretical analysis show that the described method allows improvement of both the error probability and the throughput of an ARQ protocol with respect to other schemes.
DNA-based storage is considered to be a promising option to accommodate huge amounts of data. The strings of nucleotides are prone to errors though. To reduce the error probability, these strings should satisfy constr...
详细信息
DNA-based storage is considered to be a promising option to accommodate huge amounts of data. The strings of nucleotides are prone to errors though. To reduce the error probability, these strings should satisfy constraints on the ratio of A's and T's versus the number of G's and C's, and on the maximum number of repeated identical nucleotides. To deal with errors when they occur after all, it is also desirable that the set of DNA-strings possesses certain error correction or detection capabilities. This is established by designing quaternary constrained codes with a specified minimum distance. Here, maximum-sized block codes with a fixed number of G/C symbols, no symbol repetition, and a minimum Hamming distance of two are presented.
Lester S. Hill, who is known for the polygraphic cipher that he published in 1929, published three papers about error-detecting codes in 1926 and 1927, and he and Louis Weisner submitted a patent application for an er...
详细信息
Lester S. Hill, who is known for the polygraphic cipher that he published in 1929, published three papers about error-detecting codes in 1926 and 1927, and he and Louis Weisner submitted a patent application for an error-detection machine in 1929. Hill's error-detection schemes of the 1920s were based upon number theory and matrix multiplication, and one of Hill's error-detecting codes essentially includes the encoding method for linear error-correcting codes, which was developed two decades later by Richard Hamming.
An arithmetic function that assigns the value 0, 1, or 2 to each binary sequence is introduced, We call this function the error-check value. Two sequences that differ by a single symmetric error or a single shift erro...
详细信息
An arithmetic function that assigns the value 0, 1, or 2 to each binary sequence is introduced, We call this function the error-check value. Two sequences that differ by a single symmetric error or a single shift error are shown to have different error-check values. Runlength-limited codes for detecting single errors are designed by taking a set of the constrained sequences such that each code sequence has the same error-check value, Systematic runlength-limited codes that detect single errors are constructed, based on the error-check value, It is shown that these systematic runlength-limited codes have the shortest parity length possible for a single error-detecting code.
Asynchronous controllers exhibit various characteristics that limit the effectiveness and applicability of the Concurrent error Detection (CED) methods developed for their synchronous counterparts. Asynchronous Burst-...
详细信息
Asynchronous controllers exhibit various characteristics that limit the effectiveness and applicability of the Concurrent error Detection (CED) methods developed for their synchronous counterparts. Asynchronous Burst-Mode Machines (ABMMs), for example, do not have a global clock to synchronize the ABMM with the additional circuitry that is typically used by synchronous CED methods (for example, duplication). Therefore, performing effective CED in ABMMs requires a synchronization method that will appropriately enable the checker (for example, comparator) in order to avoid false alarms. Also, ABMMs contain redundant logic, which guarantees the hazard-free operation required for correct interaction between the circuit and its environment. Redundant logic, however, allows some single event transients to manifest themselves only as hazards but not as logic discrepancies. Therefore, performing effective CED in ABMMs requires the ability to detect hazards with which synchronous CED methods are not concerned. In this work, we first devise hardware solutions for performing checking synchronization and hazard detection. We then demonstrate how these solutions enable the development of three complete CED methods for ABMMs. The first method (Duplication-based CED) is an adaptation of the well-known duplication method within the context of ABMMs. The second method (Transition-Trigge red CED) is a variation of duplication wherein the implementation cost is reduced by allowing hazards in the duplicate circuit. In contrast to these two methods, which are nonintrusive, the third method (Berger code-based CED) is intrusive since it requires reencoding of the ABMM with check symbols based on the Berger code. Although this intrusiveness may slightly impact performance, Berger code-based CED incurs the lowest area overhead among the three methods, as indicated through experimental results.
The efficient application of error-detecting codes to VLSI designs requires a study of their cost and effectiveness to supplement the knowledge of their theoretical properties. The paper discusses the tradeoffs for a ...
详细信息
The efficient application of error-detecting codes to VLSI designs requires a study of their cost and effectiveness to supplement the knowledge of their theoretical properties. The paper discusses the tradeoffs for a low-cost residue code applied to common types of VLSI hardware. Comparisons are made between the kinds of residue codes available and their suitability for use in VLSI designs. The code is then applied to a typical VLSI system for comparison with other test strategies.
Analog content-addressable memories (in short, a-CAMs) have been recently introduced as accelerators for machine-learning tasks, such as tree-based inference or implementation of nonlinear activation functions. The ce...
详细信息
Analog content-addressable memories (in short, a-CAMs) have been recently introduced as accelerators for machine-learning tasks, such as tree-based inference or implementation of nonlinear activation functions. The cells in these memories contain nanoscale memristive devices, which may be susceptible to various types of errors, such as manufacturing defects, inaccurate programming of the cells, or drifts in their contents over time. The objective of this work is to develop techniques for overcoming the reliability issues that are caused by such error events. To this end, several coding schemes are presented for the detection of errors in a-CAMs. These schemes consist of an encoding stage, a detection cycle (which is performed periodically), and some minor additions to the hardware. During encoding, redundancy symbols are programmed into a portion of the a-CAM (or, alternatively, are written into an external memory). During each detection cycle, a certain set of input vectors is applied to the a-CAM. The schemes differ in several ways, e.g., in the range of alphabet sizes that they are most suitable for, in the tradeoff that each provides between redundancy and hardware additions, or in the type of errors that they handle (Hamming metric versus L(1 )metric).
SEC-ED-DED codes are single error correcting and double errordetecting while simultaneously providing byte error detection. SEC-BED-DED codes are constructed for byte lengths of 5 and larger. For many byte lengths an...
详细信息
SEC-ED-DED codes are single error correcting and double errordetecting while simultaneously providing byte error detection. SEC-BED-DED codes are constructed for byte lengths of 5 and larger. For many byte lengths and code lengths, these codes require fewer check bits or have implementation advantages when compared to other SEC-BED-DED codes.
Ternary content-addressable memory ( TCAM) devices are increasingly used for performing high-speed packet classification. A TCAM consists of an associative memory that compares a search key in parallel against all ent...
详细信息
Ternary content-addressable memory ( TCAM) devices are increasingly used for performing high-speed packet classification. A TCAM consists of an associative memory that compares a search key in parallel against all entries. TCAMs may suffer from error events that cause ternary cells to change their value to any symbol in the ternary alphabet {"0","1","*"}. Due to their parallel access feature, standard error detection schemes are not directly applicable to TCAMs;an additional difficulty is posed by the special semantic of the "*" symbol. This paper introduces PEDS, a novel parallel error detection scheme that locates the erroneous entries in a TCAM device. PEDS is based on applying an error-detecting code to each TCAM entry and utilizing the parallel capabilities of the TCAM by simultaneously checking the correctness of multiple TCAM entries. A key feature of PEDS is that the number of TCAM lookup operations required to locate all errors depends on the number of symbols per entry in a manner that is typically orders of magnitude smaller than the number of TCAM entries. For large TCAM devices, a specific instance of PEDS requires only 200 lookups for 100-symbol entries, while a naive approach may need hundreds of thousands of lookups. PEDS allows flexible and dynamic selection of tradeoff points between robustness, space complexity, and number of lookups.
暂无评论