{"id":"https://openalex.org/W1991988844","doi":"https://doi.org/10.1109/dft.2014.6962071","title":"Characterizing soft error vulnerability of cache coherence protocols for chip-multiprocessors","display_name":"Characterizing soft error vulnerability of cache coherence protocols for chip-multiprocessors","publication_year":2014,"publication_date":"2014-10-01","ids":{"openalex":"https://openalex.org/W1991988844","doi":"https://doi.org/10.1109/dft.2014.6962071","mag":"1991988844"},"language":"en","primary_location":{"id":"doi:10.1109/dft.2014.6962071","is_oa":false,"landing_page_url":"https://doi.org/10.1109/dft.2014.6962071","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2014 IEEE International Symposium on Defect and Fault Tolerance in VLSI and Nanotechnology Systems (DFT)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5012812762","display_name":"Chuanlei Zheng","orcid":"https://orcid.org/0000-0002-7317-826X"},"institutions":[{"id":"https://openalex.org/I881766915","display_name":"Nanjing University","ror":"https://ror.org/01rxvg760","country_code":"CN","type":"education","lineage":["https://openalex.org/I881766915"]},{"id":"https://openalex.org/I36399199","display_name":"Nanjing University of Science and Technology","ror":"https://ror.org/00xp9wg62","country_code":"CN","type":"education","lineage":["https://openalex.org/I36399199"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Chuanlei Zheng","raw_affiliation_strings":["Department of Computer Science and Technology, Nanjing University, Nanjing, Jiang Su, China","State Key Laboratory of Novel Software Technology, Department of Computer Science and Technology Nanjing University, Nanjing, Jiang Su 210046, China"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Technology, Nanjing University, Nanjing, Jiang Su, China","institution_ids":["https://openalex.org/I36399199"]},{"raw_affiliation_string":"State Key Laboratory of Novel Software Technology, Department of Computer Science and Technology Nanjing University, Nanjing, Jiang Su 210046, China","institution_ids":["https://openalex.org/I881766915"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100328354","display_name":"Shuai Wang","orcid":"https://orcid.org/0000-0003-3946-4497"},"institutions":[{"id":"https://openalex.org/I881766915","display_name":"Nanjing University","ror":"https://ror.org/01rxvg760","country_code":"CN","type":"education","lineage":["https://openalex.org/I881766915"]},{"id":"https://openalex.org/I36399199","display_name":"Nanjing University of Science and Technology","ror":"https://ror.org/00xp9wg62","country_code":"CN","type":"education","lineage":["https://openalex.org/I36399199"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Shuai Wang","raw_affiliation_strings":["Department of Computer Science and Technology, Nanjing University, Nanjing, Jiang Su, China","State Key Laboratory of Novel Software Technology, Department of Computer Science and Technology Nanjing University, Nanjing, Jiang Su 210046, China"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Technology, Nanjing University, Nanjing, Jiang Su, China","institution_ids":["https://openalex.org/I36399199"]},{"raw_affiliation_string":"State Key Laboratory of Novel Software Technology, Department of Computer Science and Technology Nanjing University, Nanjing, Jiang Su 210046, China","institution_ids":["https://openalex.org/I881766915"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5012812762"],"corresponding_institution_ids":["https://openalex.org/I36399199","https://openalex.org/I881766915"],"apc_list":null,"apc_paid":null,"fwci":0.2093,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.57087794,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":94},"biblio":{"volume":null,"issue":null,"first_page":"15","last_page":"20"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11005","display_name":"Radiation Effects in Electronics","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11005","display_name":"Radiation Effects in Electronics","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10472","display_name":"Semiconductor materials and devices","score":0.9944999814033508,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10502","display_name":"Advanced Memory and Neural Computing","score":0.9871000051498413,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8402436375617981},{"id":"https://openalex.org/keywords/cache-coherence","display_name":"Cache coherence","score":0.7664541006088257},{"id":"https://openalex.org/keywords/cache","display_name":"Cache","score":0.7079156637191772},{"id":"https://openalex.org/keywords/mesi-protocol","display_name":"MESI protocol","score":0.685775637626648},{"id":"https://openalex.org/keywords/vulnerability","display_name":"Vulnerability (computing)","score":0.5945048332214355},{"id":"https://openalex.org/keywords/mesif-protocol","display_name":"MESIF protocol","score":0.5104912519454956},{"id":"https://openalex.org/keywords/soft-error","display_name":"Soft error","score":0.5096840858459473},{"id":"https://openalex.org/keywords/bus-sniffing","display_name":"Bus sniffing","score":0.49024754762649536},{"id":"https://openalex.org/keywords/coherence","display_name":"Coherence (philosophical gambling strategy)","score":0.43853792548179626},{"id":"https://openalex.org/keywords/cache-invalidation","display_name":"Cache invalidation","score":0.423652708530426},{"id":"https://openalex.org/keywords/multi-core-processor","display_name":"Multi-core processor","score":0.4211788773536682},{"id":"https://openalex.org/keywords/context","display_name":"Context (archaeology)","score":0.4165942668914795},{"id":"https://openalex.org/keywords/cache-pollution","display_name":"Cache pollution","score":0.4127744734287262},{"id":"https://openalex.org/keywords/cache-algorithms","display_name":"Cache algorithms","score":0.38764166831970215},{"id":"https://openalex.org/keywords/parallel-computing","display_name":"Parallel computing","score":0.3559797406196594},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.3264045715332031},{"id":"https://openalex.org/keywords/cpu-cache","display_name":"CPU cache","score":0.3025369644165039},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.16274899244308472},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.06912761926651001}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8402436375617981},{"id":"https://openalex.org/C141917322","wikidata":"https://www.wikidata.org/wiki/Q1025017","display_name":"Cache coherence","level":5,"score":0.7664541006088257},{"id":"https://openalex.org/C115537543","wikidata":"https://www.wikidata.org/wiki/Q165596","display_name":"Cache","level":2,"score":0.7079156637191772},{"id":"https://openalex.org/C120936851","wikidata":"https://www.wikidata.org/wiki/Q1408065","display_name":"MESI protocol","level":5,"score":0.685775637626648},{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.5945048332214355},{"id":"https://openalex.org/C199979278","wikidata":"https://www.wikidata.org/wiki/Q263221","display_name":"MESIF protocol","level":5,"score":0.5104912519454956},{"id":"https://openalex.org/C154474529","wikidata":"https://www.wikidata.org/wiki/Q1658917","display_name":"Soft error","level":2,"score":0.5096840858459473},{"id":"https://openalex.org/C51185590","wikidata":"https://www.wikidata.org/wiki/Q1017228","display_name":"Bus sniffing","level":5,"score":0.49024754762649536},{"id":"https://openalex.org/C2781181686","wikidata":"https://www.wikidata.org/wiki/Q4226068","display_name":"Coherence (philosophical gambling strategy)","level":2,"score":0.43853792548179626},{"id":"https://openalex.org/C25536678","wikidata":"https://www.wikidata.org/wiki/Q5015977","display_name":"Cache invalidation","level":5,"score":0.423652708530426},{"id":"https://openalex.org/C78766204","wikidata":"https://www.wikidata.org/wiki/Q555032","display_name":"Multi-core processor","level":2,"score":0.4211788773536682},{"id":"https://openalex.org/C2779343474","wikidata":"https://www.wikidata.org/wiki/Q3109175","display_name":"Context (archaeology)","level":2,"score":0.4165942668914795},{"id":"https://openalex.org/C113166858","wikidata":"https://www.wikidata.org/wiki/Q5015981","display_name":"Cache pollution","level":5,"score":0.4127744734287262},{"id":"https://openalex.org/C38556500","wikidata":"https://www.wikidata.org/wiki/Q13404475","display_name":"Cache algorithms","level":4,"score":0.38764166831970215},{"id":"https://openalex.org/C173608175","wikidata":"https://www.wikidata.org/wiki/Q232661","display_name":"Parallel computing","level":1,"score":0.3559797406196594},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.3264045715332031},{"id":"https://openalex.org/C189783530","wikidata":"https://www.wikidata.org/wiki/Q352090","display_name":"CPU cache","level":3,"score":0.3025369644165039},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.16274899244308472},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.06912761926651001},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C24326235","wikidata":"https://www.wikidata.org/wiki/Q126095","display_name":"Electronic engineering","level":1,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C151730666","wikidata":"https://www.wikidata.org/wiki/Q7205","display_name":"Paleontology","level":1,"score":0.0},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/dft.2014.6962071","is_oa":false,"landing_page_url":"https://doi.org/10.1109/dft.2014.6962071","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2014 IEEE International Symposium on Defect and Fault Tolerance in VLSI and Nanotechnology Systems (DFT)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Partnerships for the goals","score":0.4099999964237213,"id":"https://metadata.un.org/sdg/17"}],"awards":[],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320337392","display_name":"Division of Electrical, Communications and Cyber Systems","ror":"https://ror.org/01krpsy48"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":22,"referenced_works":["https://openalex.org/W1967835393","https://openalex.org/W2019393135","https://openalex.org/W2088706067","https://openalex.org/W2099569658","https://openalex.org/W2105145734","https://openalex.org/W2111664042","https://openalex.org/W2127859298","https://openalex.org/W2132991823","https://openalex.org/W2134309495","https://openalex.org/W2144512449","https://openalex.org/W2147657366","https://openalex.org/W2150011671","https://openalex.org/W2151612544","https://openalex.org/W2152452249","https://openalex.org/W2157468334","https://openalex.org/W2169213530","https://openalex.org/W2169875292","https://openalex.org/W2171175217","https://openalex.org/W3008392966","https://openalex.org/W3149410719","https://openalex.org/W4234582951","https://openalex.org/W4249144718"],"related_works":["https://openalex.org/W2290195868","https://openalex.org/W2584505417","https://openalex.org/W4285204597","https://openalex.org/W1555453305","https://openalex.org/W3193874149","https://openalex.org/W2987765027","https://openalex.org/W2047210963","https://openalex.org/W2379215066","https://openalex.org/W1907826018","https://openalex.org/W2057019356"],"abstract_inverted_index":{"Soft-error":[0],"induced":[1],"reliability":[2,47],"problems":[3],"have":[4],"become":[5],"a":[6],"major":[7],"challenge":[8],"in":[9,21,51,91,115,136,142,164],"designing":[10,143],"new":[11],"generation":[12],"microprocessors.":[13],"Due":[14],"to":[15,76,104,129,154,170],"the":[16,41,46,55,59,62,66,85,88,92,95,106,111,119,156,161,172],"on-chip":[17,67,89],"caches'":[18],"dominant":[19],"share":[20,64],"die":[22],"area":[23,63],"and":[24,43],"transistor":[25],"budget,":[26],"protecting":[27],"them":[28,73],"against":[29],"soft":[30,77,107],"errors":[31],"is":[32,152,167],"of":[33,48,65,87,94,110,121,160,174],"paramount":[34],"importance.":[35],"Recent":[36],"research":[37,81],"has":[38,83],"focused":[39],"on":[40],"characterization":[42],"optimization":[44],"for":[45],"data":[49,113,162],"caches":[50,68,90,163],"single-core":[52],"processors.":[53],"As":[54],"mainstream":[56],"processors":[57],"enter":[58],"multi-/many-core":[60],"era,":[61],"keeps":[69],"increasing,":[70],"which":[71],"makes":[72],"more":[74],"vulnerable":[75],"errors.":[78],"However,":[79],"few":[80],"work":[82],"studied":[84],"vulnerability":[86,109,134,158],"context":[93],"cache":[96,114,123,133,145],"coherence":[97,124,146],"protocols.":[98,125,147],"In":[99],"this":[100],"work,":[101],"we":[102],"propose":[103],"characterize":[105],"error":[108],"L1":[112],"chip-multiprocessors":[116],"(CMPs)":[117],"under":[118],"influence":[120],"different":[122],"This":[126],"study":[127],"aims":[128],"provide":[130],"insights":[131],"into":[132],"behaviors":[135],"CMPs":[137],"as":[138,140],"well":[139],"guidance":[141],"reliable":[144],"Furthermore,":[148],"an":[149],"early-invalidation":[150],"scheme":[151],"proposed":[153],"reduce":[155],"overall":[157],"factor":[159],"CMPs.":[165],"Benchmarking":[166],"carried":[168],"out":[169],"showcase":[171],"effectiveness":[173],"our":[175],"approach.":[176]},"counts_by_year":[{"year":2015,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
