Publication:

Possible Origins, Identification, and Screening of Silent Data Corruption in Data Centers

 
cris.virtual.department#PLACEHOLDER_PARENT_METADATA_VALUE#
cris.virtual.department#PLACEHOLDER_PARENT_METADATA_VALUE#
cris.virtual.department#PLACEHOLDER_PARENT_METADATA_VALUE#
cris.virtual.department#PLACEHOLDER_PARENT_METADATA_VALUE#
cris.virtual.department#PLACEHOLDER_PARENT_METADATA_VALUE#
cris.virtual.department#PLACEHOLDER_PARENT_METADATA_VALUE#
cris.virtual.department#PLACEHOLDER_PARENT_METADATA_VALUE#
cris.virtual.orcid0000-0002-5058-8303
cris.virtual.orcid#PLACEHOLDER_PARENT_METADATA_VALUE#
cris.virtual.orcid0000-0002-1016-8654
cris.virtual.orcid#PLACEHOLDER_PARENT_METADATA_VALUE#
cris.virtual.orcid0000-0002-0402-8225
cris.virtual.orcid0000-0002-1484-4007
cris.virtual.orcid0000-0002-1435-3275
cris.virtualsource.department8a303854-e9b4-460a-b79d-03df3b3c4394
cris.virtualsource.department34c59f3a-5b4c-42cc-aac3-f7242ce5bdf6
cris.virtualsource.department60ce54ef-35ba-48e5-a960-8f77078d8828
cris.virtualsource.departmentde93b028-9708-4f3a-99f0-5edbf35f1ef2
cris.virtualsource.departmentf2e648b4-91e6-42de-bb5d-66326414095e
cris.virtualsource.department812f2909-a81b-4593-9b32-75331cffa35c
cris.virtualsource.department1e7f123f-5354-480d-abe4-78f1539d11ff
cris.virtualsource.orcid8a303854-e9b4-460a-b79d-03df3b3c4394
cris.virtualsource.orcid34c59f3a-5b4c-42cc-aac3-f7242ce5bdf6
cris.virtualsource.orcid60ce54ef-35ba-48e5-a960-8f77078d8828
cris.virtualsource.orcidde93b028-9708-4f3a-99f0-5edbf35f1ef2
cris.virtualsource.orcidf2e648b4-91e6-42de-bb5d-66326414095e
cris.virtualsource.orcid812f2909-a81b-4593-9b32-75331cffa35c
cris.virtualsource.orcid1e7f123f-5354-480d-abe4-78f1539d11ff
dc.contributor.authorSangani, Dishant
dc.contributor.authorKaczer, Ben
dc.contributor.authorWeckx, Pieter
dc.contributor.authorRoussel, Philippe
dc.contributor.authorMishra, Subrat
dc.contributor.authorMarinissen, Erik Jan
dc.contributor.authorGielen, Georges
dc.contributor.imecauthorSangani, D.
dc.contributor.imecauthorKaczer, B.
dc.contributor.imecauthorWeckx, P.
dc.contributor.imecauthorRoussel, Ph. J.
dc.contributor.imecauthorMishra, S.
dc.contributor.imecauthorMarinissen, E. J.
dc.contributor.imecauthorGielen, G.
dc.date.accessioned2024-08-16T18:29:16Z
dc.date.available2024-08-16T18:29:16Z
dc.date.issued2024
dc.identifier.doi10.1109/IRPS48228.2024.10529436
dc.identifier.eisbn979-8-3503-6976-2
dc.identifier.isbn979-8-3503-6977-9
dc.identifier.issn1541-7026
dc.identifier.urihttps://imec-publications.be/handle/20.500.12860/44331
dc.publisherIEEE
dc.source.conferenceInternational Reliability Physics Symposium (IRPS)
dc.source.conferencedate2024-04-14
dc.source.conferencelocationGrapevine
dc.source.numberofpages7
dc.subject.keywordsPHYSICS
dc.title

Possible Origins, Identification, and Screening of Silent Data Corruption in Data Centers

dc.typeProceedings paper
dspace.entity.typePublication
Files
Publication available in collections: