Skip to main content

A Comparison Study of the Behavior of Equivalent Algorithms in Fault Injection Experiments in Parallel Superscalar Architectures

  • Conference paper
  • First Online:
Computer Safety, Reliability and Security (SAFECOMP 2001)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 2187))

Included in the following conference series:

  • 657 Accesses

Abstract

This work describes an experimental comparison study of the behaviour of a set of algorithms in the presence of faults. The algorithms have the characteristic that they belong to the same problem class and a number of comparison studies exist in bibliography, with respect to their numerical, conversion and time and space complexity.

The class of the used algorithms solve the matrix exponentiation problem. This is a well studied numerical problem encountered in the area of linear differential equation, with a number of solving algorithms. For this study we use Fault Injection techniques at the compile time, namely software based script fault injection method based on random bit inversion assumption. The experiments are performed on a fully operating, parallel architecture machine with two superscalar processors.

The algorithms are studied for their fault tolerance in the presence of an elementary fault detection method based on command duplication and exploiting the parallel architecture.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. B. Littlewood, L. Stringini “Validation of Ultrahigh Dependability for Software Based Systems”, Communications of the ACM Vol. 36, No. 11 Nov. 1993 pg. 69–80

    Article  Google Scholar 

  2. M.-C. Hsueh, T.K. Tsai, R. K. Iyer “Fault Injection Techniques and Tools”, IEEE Computer, Apr. 1997 pp. 75–82

    Google Scholar 

  3. J. Carreira, H. Madeira, J. Silva, “Xception: Software Fault Injection and Monitoring in Processor Functional Units” DCCA-5, Conference on Dependable Computing for Critical Applications, Urbana-Champaign,USA, September 1995, pp. 135–149

    Google Scholar 

  4. J. Arlat, M. Aguera, L. Amat, Y. Crouzet, J.C. Fabre, J.-C. Laprie, E. Martins, D. Powell “Fault Injection for Dependability Validation: A Methodology and some Applications”, IEEE Transactions on Software Engineering, Vol. 16, No. 2, February 1990, pp. 166–182

    Google Scholar 

  5. T.A. Delong, B.W. Johnson, J.A. Profeta III, A Fault Injection Technique for VHDL Behavioral-LevelModels, IEEE Design & Test of Computers, Winter 1996, pp. 24–33

    Google Scholar 

  6. G.A. Kanawati, N.A. Kanawati, J.A. Abraham, “FERRARI: A Flexible Software-Based Fault and Error Injection System”, IEEE Trans. on Computers, Vol 44, N. 2, February 1995, pp. 248–260

    Google Scholar 

  7. A. Benso, P. Prinetto, M. Rebaudengo, M. Sonza Reorda, A Fault Injection Environment for Microprocessor-based Boards, to be presented to IEEE International Test Conference, Washington (USA), October 1998

    Google Scholar 

  8. A. Benso, M. Rebaudengo, L. Impagliazzo, P. Marmo, Fault-list collapsing for fault injection experiments, Proc. Ann. Reliability & Maintainability Symp., 1998, pp. 383–388

    Google Scholar 

  9. D.K. Pradhan, Fault-Tolerant Computer System Design, Prentice Hall PTR, 1996

    Google Scholar 

  10. M. Zenha Rela, H. Madeira, J. G. Silva, Experimental Evaluation of the Fail-Silent Behavior inPrograms with Consistency Checks, Proc. FTCS-26, 1996, pp. 394–403

    Google Scholar 

  11. K. H. Huang, J. A. Abraham “Algorithm-Based Fault Tolerance for Matrix Operations”, IEEE Trans. Computers, vol. 33, Dec 1984, pp. 518–528

    Article  MATH  Google Scholar 

  12. S. Yau, F. Chen, An Approach to Concurrent Control Flow Checking, IEEE Transactions on Software Engineering, Vol. SE-6, No. 2, March 1980, pp. 126–13

    Article  MathSciNet  Google Scholar 

  13. A. Benso, P.L. Civera, M. Rebaudengo, M. Sonza Reorda, “An integrated HW and SW Fault Injection environment for real-time systems”, Proc. IEEE International Symposium on Defect and FaultTolerance in VLSI Systems, 1998, pp. 117–122

    Google Scholar 

  14. M. Zagha, B. Larson, S. Turner, M. Itzkowitz “Performance Analysis Using the MIPS R10000 Performance Counters”, IEEE Conference Proceedings Supercomputing’96, November 1996, Pittsburgh, PA

    Google Scholar 

  15. C. Moler, C. Van Loan “Nineteen dubious ways to compute the exponential of a matrix” SIAM Review Vol. 20 No. 4, October 1978 pg. 801–836

    Article  MATH  MathSciNet  Google Scholar 

  16. M. Rebaudengo, M. Sonza Reorda, M. Violante, P. Cheynet, B. Nicolescu, R. Velazco “Evaluating the effectiveness of a Software Fault-Tolerance technique on RISC-and CISC-based architectures” IOLTW2000: International On-Line Test Workshop, July 2000

    Google Scholar 

  17. M. Rebaudengo, M. Sonza Reorda, M. Torchiano, M. Violante “Soft-error Detection through Software Fault-Tolerance techniques” DFT’99: IEEE International Symposium on Defect and Fault Tolerance in VLSI Systems, November 1-3-1999 Albuquerque, New Mexico, USA

    Google Scholar 

  18. L. T. Young, R. Iyer, K. K. Goswami, “A Hybrid Monitor Assisted Fault injection Experiment”, Proc. DCCA-3, 1993, pp. 163–174

    Google Scholar 

  19. N. Oh, P. P. Shirvani and E. J. McCluskey “Error Detection By Duplicated Instructions in Super-scalar Processors”, (To appear )

    Google Scholar 

  20. G. H. Golub, C.F. van Loan “Matrix Computations” The John Hopkins University Press, 3rd Edition, 1996.

    Google Scholar 

  21. MIPS R10000 Microprocessor User’s manual. V. 2.0 October 10,1996.

    Google Scholar 

  22. MIPS Open RISC Technology, R10000 Microprocessor. Product Overview October 1994.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2001 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Vakalis, I. (2001). A Comparison Study of the Behavior of Equivalent Algorithms in Fault Injection Experiments in Parallel Superscalar Architectures. In: Voges, U. (eds) Computer Safety, Reliability and Security. SAFECOMP 2001. Lecture Notes in Computer Science, vol 2187. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-45416-0_15

Download citation

  • DOI: https://doi.org/10.1007/3-540-45416-0_15

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-42607-3

  • Online ISBN: 978-3-540-45416-8

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics