8,837 research outputs found
Iterated Expectations with Common Beliefs
This paper generalizes a result by Samet concerning iterated expecta- tions and common priors. When a player in some state of the world is allowed to ascribe probability zero to that state, something not allowed in Samet s framework, iterated expectations may not converge, and when they do, common knowledge of their limit may not characterize a common prior. It is shown here that replacing common knowledge with common belief, convergence is still lost in general, but when it obtains, the full characterization is restored.
The Art of Fault Injection
Classical greek philosopher considered the foremost virtues to be temperance, justice, courage, and prudence. In this paper we relate these cardinal virtues to the correct methodological approaches that researchers should follow when setting up a fault injection experiment. With this work we try to understand where the "straightforward pathway" lies, in order to highlight those common methodological errors that deeply influence the coherency and the meaningfulness of fault injection experiments. Fault injection is like an art, where the success of the experiments depends on a very delicate balance between modeling, creativity, statistics, and patience
Online self-repair of FIR filters
Chip-level failure detection has been a target of research for some time, but today's very deep-submicron technology is forcing such research to move beyond detection. Repair, especially self-repair, has become very important for containing the susceptibility of today's chips. This article introduces a self-repair-solution for the digital FIR filter, one of the key blocks used in DSPs
Static analysis of SEU effects on software applications
Control flow errors have been widely addressed in literature as a possible threat to the dependability of computer systems, and many clever techniques have been proposed to detect and tolerate them. Nevertheless, it has never been discussed if the overheads introduced by many of these techniques are justified by a reasonable probability of incurring control flow errors. This paper presents a static executable code analysis methodology able to compute, depending on the target microprocessor platform, the upper-bound probability that a given application incurs in a control flow error
AFSM-based deterministic hardware TPG
This paper proposes a new approach for designing a cost-effective, on-chip, hardware pattern generator of deterministic test sequences. Given a pre-computed test pattern (obtained by an ATPG tool) with predetermined fault coverage, a hardware Test Pattern Generator (TPG) based on Autonomous Finite State Machines (AFSM) structure is synthesized to generate it. This new approach exploits "don't care" bits of the deterministic test patterns to lower area overhead of the TPG. Simulations using benchmark circuits show that the hardware components cost is considerably less when compared with alternative solution
Mixing-induced Spontaneous Supersymmetry Breaking
It is conjectured that flavor mixing furnishes a universal mechanism for the
spontaneous breaking of supersymmetry. The conjecture is proved explicitly for
the mixing of two Wess--Zumino supermultiplets and arguments
for its general validity are given. The mechanism relies on the fact that,
despite mixing treats fermions and bosons symmetrically, both the fermionic and
the bosonic zero point energies are shifted by a positive amount and this kind
of shift does not respect supersymmetry.Comment: 5 pages, 1 figure, Eq(12) of V1 corrected to Eq(22), explicit
off-shell formulation included, one reference adde
Memory read faults: taxonomy and automatic test generation
This paper presents an innovative algorithm for the automatic generation of March tests. The proposed approach is able to generate an optimal March test for an unconstrained set of memory faults in very low computation time. Moreover, we propose a new complete taxonomy for memory read faults, a class of faults never carefully addressed in the past
A watchdog processor to detect data and control flow errors
A watchdog processor for the MOTOROLA M68040 microprocessor is presented. Its main task is to protect from transient faults caused by SEUs the transmission of data between the processor and the system memory, and to ensure a correct instructions' flow, just monitoring the external bus, without modifying the internal architecture of the M68040. A description of the principal procedures is given, together with the method used for monitoring the instructions' flow
Validation of a software dependability tool via fault injection experiments
Presents the validation of the strategies employed in the RECCO tool to analyze a C/C++ software; the RECCO compiler scans C/C++ source code to extract information about the significance of the variables that populate the program and the code structure itself. Experimental results gathered on an Open Source Router are used to compare and correlate two sets of critical variables, one obtained by fault injection experiments, and the other applying the RECCO tool, respectively. Then the two sets are analyzed, compared, and correlated to prove the effectiveness of RECCO's methodology
- âŠ