iBet uBet web content aggregator. Adding the entire web to your favor.
iBet uBet web content aggregator. Adding the entire web to your favor.



Link to original content: https://api.crossref.org/works/10.1109/DSN58367.2023.00021
{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T15:13:27Z","timestamp":1730214807054,"version":"3.28.0"},"reference-count":65,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,6,1]],"date-time":"2023-06-01T00:00:00Z","timestamp":1685577600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,6,1]],"date-time":"2023-06-01T00:00:00Z","timestamp":1685577600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,6]]},"DOI":"10.1109\/dsn58367.2023.00021","type":"proceedings-article","created":{"date-parts":[[2023,8,9]],"date-time":"2023-08-09T17:23:37Z","timestamp":1691601817000},"page":"81-94","source":"Crossref","is-referenced-by-count":3,"title":["Compiler-Implemented Differential Checksums: Effective Detection and Correction of Transient and Permanent Memory Errors"],"prefix":"10.1109","author":[{"given":"Christoph","family":"Borchert","sequence":"first","affiliation":[{"name":"Osnabrück University,Germany"}]},{"given":"Horst","family":"Schirmeier","sequence":"additional","affiliation":[{"name":"TU Dresden,Germany"}]},{"given":"Olaf","family":"Spinczyk","sequence":"additional","affiliation":[{"name":"Osnabrück University,Germany"}]}],"member":"263","reference":[{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2015.57"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1109\/FTCS.1995.466959"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1147\/rd.144.0395"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1109\/EDCC.2016.29"},{"journal-title":"Transcript of morning trial proceedings had on the 14th day of October 2013","article-title":"reporter, Bookout v. Toyota Motor Corporation, ser. Case No. CJ-2008–7969","year":"2013","author":"twyford","key":"ref15"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-54999-6_1"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2019.00017"},{"journal-title":"Proceedings of the 1st Java Virtual Machine Research and Technology Symposium (JVM '01)","article-title":"JVM susceptibility to memory errors","year":"2001","author":"chen","key":"ref58"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2012.6263960"},{"key":"ref52","first-page":"7","article-title":"Bochs: A portable PC emulator for Unix\/X","volume":"1996","author":"lawton","year":"1996","journal-title":"Linux Journal"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/IRPS.2011.5784522"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP.2019.00031"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TNS.2009.2012426"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2015.44"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/OLT.2001.937838"},{"journal-title":"ISO ISO 26262–11 2018 Road vehicles - Functional safety - Part 11 Guidelines on application of ISO 26262 to semiconductors","year":"2018","key":"ref16"},{"key":"ref19","first-page":"140","article-title":"Object duplication for improving reliability","author":"chen","year":"2006","journal-title":"Proceedings of the 2006 Asia and South Pacific Design Automation Conference (ASP-DAC '06)"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/1016720.1016775"},{"journal-title":"Programming Embedded Systems in C and C++","year":"1999","author":"barr","key":"ref51"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/EDCC.2015.28"},{"journal-title":"ISO 26262–6 2018 Road vehicles - Functional safety - Part 6 Product development at the software level","year":"2018","key":"ref46"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/FPT.2004.1393289"},{"key":"ref48","first-page":"330","article-title":"MediaBench: A tool for evaluating and synthesizing multimedia and communications systems","author":"lee","year":"1997","journal-title":"proceedings of 30th Annual International Symposium on Microarchitecture"},{"key":"ref47","first-page":"3","article-title":"MiBench: A free, commercially representative embedded benchmark suite","author":"guthaus","year":"2001","journal-title":"Proc IEEE Int Workshop Workload Characterization (WWC)"},{"journal-title":"Aspect-Oriented Technology for Dependable Operating Systems","year":"2017","author":"borchert","key":"ref42"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1145\/2883591.2883600"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/24.914544"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2007.05.004"},{"journal-title":"Effective C An Introduction to Professional C Programming","year":"2020","author":"seacord","key":"ref49"},{"key":"ref8","first-page":"75","article-title":"A realistic evaluation of memory hardware errors and software system susceptibility","author":"li","year":"2010","journal-title":"Proceedings of the 2010 USENIX Annual Technical Conference (ATC '10)"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TNS.2016.2547963"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/SC.2012.13"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/2694344.2694348"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/2503210.2503257"},{"key":"ref6","first-page":"1","article-title":"Soft error trends and mitigation techniques in memory devices","author":"slayman","year":"2011","journal-title":"Proceedings of Annual Reliability and Maintainability Symposium (RAMS)"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/2150976.2150989"},{"key":"ref40","first-page":"197","article-title":"High performance metadata integrity protection in the WAFL copy-on-write file system","author":"kumar","year":"2017","journal-title":"15th USENIX Conference on File and Storage Technologies (FAST 2017)"},{"volume":"2","journal-title":"The art of computer programming","year":"1997","author":"knuth","key":"ref35"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/HPSR.2001.923602"},{"journal-title":"Error-Correcting Codes","year":"1972","author":"peterson","key":"ref37"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1002\/j.1538-7305.1950.tb00463.x"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/JRPROC.1961.287814"},{"journal-title":"Memory Systems Cache DRAM Disk","year":"2008","author":"jacob","key":"ref30"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2002.1028931"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/26.231911"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/SC.2018.00046"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1126\/science.206.4420.776"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.17487\/rfc1950"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/TCOM.1982.1095369"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2007.15"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/TDMR.2005.853449"},{"key":"ref26","first-page":"2519","article-title":"Return-address protection in C\/C++ code by dependability aspects","author":"borchert","year":"2013","journal-title":"Proceedings of the 2nd GI Workshop on Software-Based Methods for Robust Embedded Systems (SOBRES‘13) ser Lecture Notes in Informatics"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2017.30"},{"key":"ref20","first-page":"1","article-title":"The use of overloaded software operators for error detection and correction","author":"mcdermott","year":"0","journal-title":"Proceedings of the 18th AIAA\/USU Conference on Small Satellites (SSC04-IV-7)"},{"key":"ref64","article-title":"The new ext4 filesystem: current status and future plans","volume":"2","author":"mathur","year":"2007","journal-title":"Proceedings of the Linux Symposium"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1145\/2501620.2501623"},{"key":"ref22","first-page":"2:1","article-title":"TACLeBench: A benchmark collection to support worst-case execution time research","volume":"55","author":"falk","year":"2016","journal-title":"16th International Workshop on Worst-Case Execution Time Analysis (WCET 2016) ser OpenAccess Series in Informatics (OASIcs)"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/ISORC.2014.26"},{"journal-title":"Proceedings of the 1996 Annual Conference on USENIX Annual Technical Conference","article-title":"Scalability in the XFS file system","year":"1996","author":"sweeney","key":"ref65"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.17487\/rfc1624"},{"key":"ref27","first-page":"897","article-title":"Pangolin: A fault-tolerant persistent memory programming library","author":"zhang","year":"2019","journal-title":"2019 USENIX Annual Technical Conference (USENIX ATC 19)"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2007.70216"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2013.6575308"},{"journal-title":"Proc USENIX Conf File and Storage Technologies (FAST '10)","article-title":"End-to-end data integrity for file systems: A ZFS case study","year":"2010","author":"zhang","key":"ref62"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2015.2427832"}],"event":{"name":"2023 53rd Annual IEEE\/IFIP International Conference on Dependable Systems and Networks (DSN)","start":{"date-parts":[[2023,6,27]]},"location":"Porto, Portugal","end":{"date-parts":[[2023,6,30]]}},"container-title":["2023 53rd Annual IEEE\/IFIP International Conference on Dependable Systems and Networks (DSN)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10202598\/10202599\/10202626.pdf?arnumber=10202626","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,9,11]],"date-time":"2023-09-11T17:50:16Z","timestamp":1694454616000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10202626\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,6]]},"references-count":65,"URL":"https:\/\/doi.org\/10.1109\/dsn58367.2023.00021","relation":{},"subject":[],"published":{"date-parts":[[2023,6]]}}}