1. Basic concepts and taxonomy of dependable and secure computing;Avizienis;IEEE Trans. Dependable Sec. Comput.,2004
2. Which verification for soft error detection?;Bautista-Gomez,2015
3. Detecting silent data corruption through data dynamic monitoring for scientific applications;Bautista Gomez,2014
4. Detecting and correcting data corruption in stencil applications through multivariate interpolation;Bautista Gomez,2015
5. Exploiting spatial smoothness in HPC applications to detect silent data corruption;Bautista Gomez,2015