Fulfilling increasing performance demands of space and automotive applications can be problematic as high dependability is required. Memory is one of the most radiationsensitive parts, so it is often protected with in...
Fulfilling increasing performance demands of space and automotive applications can be problematic as high dependability is required. Memory is one of the most radiationsensitive parts, so it is often protected with information redundancy. This paper describes an integration of error correction and detection techniques into the interface of RISC-V processor to protect the data stored in the memory. We also provide a hardware-software interface for reporting errors and software routines for correcting data in memory. Our solution has a negligible impact (-3.9%) on the overall performance of the core with a small area and power consumption overhead.
Traditional data monetization approaches face challenges related to data protection and logistics. In response, digital data marketplaces have emerged as intermediaries simplifying data transactions. Despite the growi...
详细信息
Nursing care jobs are predominantly described as burdensome. In particular, the workload and the time available to deal with it are in a state of imbalance. Nurses are very often under time pressure and have to make d...
详细信息
Digital transformation allows organizations to maintain sustainable development and address ongoing challenges. The current digital transformation and advanced technology mega-trend significantly impact society and or...
详细信息
ISBN:
(纸本)9798400700408
Digital transformation allows organizations to maintain sustainable development and address ongoing challenges. The current digital transformation and advanced technology mega-trend significantly impact society and organizations, making digital technology crucial for public and private organizations, universities, and daily life. Despite the rising demand, there is often a lack of standard policies governing the use of digital technology. Practical experience and literature reveal key challenges in transitioning from traditional to digital systems, including limited public awareness, mindset, ICT skills, government support, and collaboration between organizations and softwareengineering societies. Governments must establish digital transformation policies and offer software development guidelines for public organizations to digitalize their systems. Additionally, they should provide or support research projects funded by governmental and nongovernmental organizations to identify infrastructure and regulatory issues within Afghanistan’s digital transformation context. This study documents six organizational patterns observed during the transformation of traditional systems into digital systems, illustrating their sequence and explaining the development of a pattern language from these patterns.
User contributions is an important part in software development, the pursuit of identifying effective means of user contributions in software development is a crucial area of interest for software companies and their ...
详细信息
ISBN:
(纸本)9798400700408
User contributions is an important part in software development, the pursuit of identifying effective means of user contributions in software development is a crucial area of interest for software companies and their development teams. Determining the most opportune moments, locations, and methods for such contributions presents a significant challenge for organizations, which necessitates the exploration of generic and proven solutions. Applying patterns, established and observed solutions may provide the answers to such challenges and similar ones. This paper offers insights into the practical implementation of seven newly discovered organizational patterns in a real-life environment. The patterns are comprehensively described, accompanied by illustrative examples, and subsequently applied in actual practices.
As the demand for deploying machine learning models on high-end mobile devices and IoT devices increases, the need for efficient machine learning model optimization becomes critical to execute on-device AI tasks. One ...
As the demand for deploying machine learning models on high-end mobile devices and IoT devices increases, the need for efficient machine learning model optimization becomes critical to execute on-device AI tasks. One of the primary challenges in this context is the retraining process of these models on IoT and mobile devices with new data, which is constrained due to limited processing power. This limitation hinders the generation of accurate domain-specific inference results, as models may not be as well-trained with real-world data, potentially reducing their predictive accuracy and generalizability when applied to practical scenarios.
Mission/safety-critical applications rely on the dependability of their semiconductor control systems. The lockstepping is state-of-the-art when it comes to their protection. This paper compares the dual/triple lockst...
详细信息
ISBN:
(数字)9798350380385
ISBN:
(纸本)9798350380392
Mission/safety-critical applications rely on the dependability of their semiconductor control systems. The lockstepping is state-of-the-art when it comes to their protection. This paper compares the dual/triple lockstep systems with the Hardisc, which features microarchitecture-level protection. For a fair comparison, each system is based on the same architecture and integrates protection against bit-flips in memory and transient faults in the bus. We analyse how individual structures of the system affect the vulnerability of a system to faults. Our fault injection methodology combines pre-synthesis simulation with synthesis data to scale the fault rate of the structures according to their size. The results show that the Hardisc can withstand fault rates orders of magnitude higher than the dual-core lockstep system while preserving the same area and power consumption. It comes with a 5% frequency penalty. The pipeline logic has the most significant impact on the vulnerability of the lockstep system. On the other hand, the ECC-protected register file constraints the maximum failure rate the Hardisc can withstand due to fault accumulation during specific program sections.
Safety/mission-critical applications require high dependability of the control systems. Their state-of-the-art protection approach is a system-level lockstep. This paper compares the system-level dual and triple locks...
详细信息
ISBN:
(数字)9798350377569
ISBN:
(纸本)9798350377576
Safety/mission-critical applications require high dependability of the control systems. Their state-of-the-art protection approach is a system-level lockstep. This paper compares the system-level dual and triple lockstep technique to the microarchitecture-level protection of the Hardisc RISC-V core. For a fair comparison, each system is based on the same core(s) and integrates protection against bit-flips in memory and transient faults in the bus. We propose a fault injection methodology, combining pre-synthesis simulation with synthesis data to analyse the vulnerability of a system to faults. The fault injection campaigns show that the Hardisc can withstand fault rates orders of magnitude higher than the dual-core lockstep system while preserving the same area and power consumption. It comes with a 5% frequency penalty. We have shown that system failures are more frequent once the fault rate reaches an application-specific threshold (one fault in 100 clock cycles).
Increasing bus frequency to fulfill the performance requirements of dependable applications may increase the susceptibility of the system to transient faults. This paper describes an integration of protection against ...
Increasing bus frequency to fulfill the performance requirements of dependable applications may increase the susceptibility of the system to transient faults. This paper describes an integration of protection against transient bus faults into the interface of the Hardisc RISC-V core. The protection is based on information redundancy with spatial redundancy features. It enables uninterrupted execution in the presence of transient faults and provides a hardware-software interface for its reporting. The benchmarking results indicate that most of the applications will be impacted minimally. The protection has a negligible impact on the maximal frequency and 8% area and power consumption overhead.
Safety of the intended functionality is an indispensable safe condition that must be considered for autonomous driving on the road. The key to study SOTIF is to construct as many hazardous scenarios as possible and ac...
详细信息
暂无评论