Author:
Shan Baodi,Shamji Aabid,Tian Jiannan,Li Guanpeng,Tao Dingwen
Cited by
3 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Druto: Upper-Bounding Silent Data Corruption Vulnerability in GPU Applications;2024 IEEE International Parallel and Distributed Processing Symposium (IPDPS);2024-05-27
2. Gem5-MARVEL: Microarchitecture-Level Resilience Analysis of Heterogeneous SoC Architectures;2024 IEEE International Symposium on High-Performance Computer Architecture (HPCA);2024-03-02
3. Exploring Data Corruption Inside SZ;2022 IEEE International Conference on Big Data (Big Data);2022-12-17