Skip to main content

and
  1. Chapter

    Dependable Software Generation and Execution on Embedded Systems

    For generating and executing dependable software, the effects of hardware layer faults at the software layer have to be accurately analyzed and modeled. This requires relevant information from the hardware and...

    Florian Kriebel, Kuan-Hsun Chen, Semeen Rehman, Jörg Henkel in Dependable Embedded Systems (2021)

  2. Chapter

    Robust Computing for Machine Learning-Based Systems

    The drive for automation and constant monitoring has led to rapid development in the field of Machine Learning (ML). The high accuracy offered by the state-of-the-art ML algorithms like Deep Neural Networks (D...

    Muhammad Abdullah Hanif, Faiq Khalid in Dependable Embedded Systems (2021)

  3. Chapter

    Power-Aware Fault-Tolerance for Embedded Systems

    Power-constrained fault-tolerance has emerged as a key challenge in the deep sub-micron technology. Multi-/many-core chips can support different hardening modes considering variants of redundant multithreading (R...

    Mohammad Salehi, Florian Kriebel, Semeen Rehman in Dependable Embedded Systems (2021)

  4. Chapter

    RAP Model—Enabling Cross-Layer Analysis and Optimization for System-on-Chip Resilience

    The Resilience Articulation Point (RAP) model aims to provision a probabilistic fault abstraction and error propagation concept for various forms of variability related faults in deep sub-micron CMOS technolog...

    Andreas Herkersdorf, Michael Engel, Michael Glaß in Dependable Embedded Systems (2021)

  5. Chapter

    Fault-Tolerant Computing with Heterogeneous Hardening Modes

    Fault-tolerance using (full-scale) redundancy-based techniques has been employed to detect and correct reliability errors (i.e., soft errors), but they pose significant area and power overhead. On the other ha...

    Florian Kriebel, Faiq Khalid, Bharath Srinivas Prabakaran in Dependable Embedded Systems (2021)

  6. No Access

    Chapter

    Overview of Security for Smart Cyber-Physical Systems

    The tremendous growth of interconnectivity and dependencies of physical and cyber domains in cyber-physical systems (CPS) makes them vulnerable to several security threats like remote cyber-attacks, hardware, ...

    Faiq Khalid, Semeen Rehman, Muhammad Shafique in Security of Cyber-Physical Systems (2020)

  7. No Access

    Chapter

    Approximate Multi-Accelerator Tiled Architecture for Energy-Efficient Motion Estimation

    Video processing applications are inherently error resilient. This resilience comes from the fact that: (1) inputs obtained are noisy and highly correlated in the spatial and temporal domains, (2) probabilisti...

    Bharath Srinivas Prabakaran, Walaa El-Harouni, Semeen Rehman in Approximate Circuits (2019)

  8. No Access

    Chapter

    Hardware–Software Approximations for Deep Neural Networks

    Neural networks (NNs) are the state of the art for many artificial intelligence (AI) applications. However, in order to facilitate the training process, most of the neural networks are over-parameterized and r...

    Muhammad Abdullah Hanif, Muhammad Usama Javed, Rehan Hafiz in Approximate Circuits (2019)

  9. No Access

    Chapter

    Energy-Efficient Design of Advanced Machine Learning Hardware

    The exponentially growing rates of data production in the current era of internet of things (IoT), cyber-physical systems (CPS), and big data pose ever-increasing demands for massive data processing, storage, ...

    Muhammad Abdullah Hanif, Rehan Hafiz in Machine Learning in VLSI Computer-Aided De… (2019)

  10. No Access

    Chapter

    Heterogeneous Approximate Multipliers: Architectures and Design Methodologies

    Multipliers are an integral block of a wide range of error-resilient applications like audio, image, and video processing, and machine learning. However, these multiplier architectures are computationally comp...

    Semeen Rehman, Bharath Srinivas Prabakaran, Walaa El-Harouni in Approximate Circuits (2019)

  11. No Access

    Book

  12. No Access

    Chapter

    Summary and Conclusions

    Scaling down the transistor dimensions has led modern systems to become more and more susceptible towards various types of reliability threats such as soft errors, design-time process variation, and run-time a...

    Semeen Rehman, Muhammad Shafique, Jörg Henkel in Reliable Software for Unreliable Hardware (2016)

  13. No Access

    Chapter

    Background and Related Work

    This chapter presents the background knowledge regarding different sources of the emerging reliability threats (i.e., soft errors, process variation, and aging-induced effects), the related work on soft error ...

    Semeen Rehman, Muhammad Shafique, Jörg Henkel in Reliable Software for Unreliable Hardware (2016)

  14. No Access

    Chapter

    Software Program-Level Reliability Modeling and Estimation

    In order to estimate the reliability at the software program- level while accounting for the knowledge from the underlying hardware layers, this chapter presents different reliability estimation models that ar...

    Semeen Rehman, Muhammad Shafique, Jörg Henkel in Reliable Software for Unreliable Hardware (2016)

  15. No Access

    Chapter

    Dependable Code Execution Using Reliability-Driven System Software

    The multiple compiled function versions generated in Chap. 5 are leveraged by the reliability-driven system software to exploit the vulnerability vs. performance tradeof...

    Semeen Rehman, Muhammad Shafique, Jörg Henkel in Reliable Software for Unreliable Hardware (2016)

  16. No Access

    Chapter

    Introduction

    Embedded computing systems are ubiquitous and have been widely deployed in many application domains like security, consumer, internet-of-things, mission-critical, and airborne applications. The current and eme...

    Semeen Rehman, Muhammad Shafique, Jörg Henkel in Reliable Software for Unreliable Hardware (2016)

  17. No Access

    Chapter

    Cross-Layer Reliability Analysis, Modeling, and Optimization

    The main problem targeted in this manuscript is to reduce the software programs’ susceptibility to soft errors on unreliable or partially reliable hardware, and to improve the reliability of the overall system...

    Semeen Rehman, Muhammad Shafique, Jörg Henkel in Reliable Software for Unreliable Hardware (2016)

  18. No Access

    Chapter

    Software Program-Level Reliability Optimization for Dependable Code Generation

    State-of-the-art has primarily exploited the compiler-level techniques for improving the performance and energy. This chapter aims at enabling reliability-driven compilation enabled by the instruction-level re...

    Semeen Rehman, Muhammad Shafique, Jörg Henkel in Reliable Software for Unreliable Hardware (2016)

  19. No Access

    Chapter

    Results and Discussion

    This chapter presents reliability improvement results of the proposed cross-layer reliability optimization flow (integrating all the novel contributions of this manuscript) compared to state-of-the-art single-...

    Semeen Rehman, Muhammad Shafique, Jörg Henkel in Reliable Software for Unreliable Hardware (2016)