Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 228,554,473 papers from all fields of science
Search
Sign In
Create Free Account
General protection fault
Known as:
Unrecoverable Application Error
, Memory fault
, Illegal operation
Expand
A general protection fault (GPF) in the Intel x86 and AMD x86-64 types of computer microprocessor architectures, and other unrelated architectures…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
39 relations
Byte
Code segment
Computer memory
Control register
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2017
2017
Measuring the Impact of Memory Errors on Application Performance
Mark Gottscho
,
M. Shoaib
,
Sriram Govindan
,
Bikash Sharma
,
Di Wang
,
Puneet Gupta
IEEE computer architecture letters
2017
Corpus ID: 17652874
Memory reliability is a key factor in the design of warehouse-scale computers. Prior work has focused on the performance…
Expand
2014
2014
Scheduling policies based on dynamic throughput and fairness tradeoff control in LTE-A networks
I. Comsa
,
Mehmet Emin Aydin
,
Sijing Zhang
,
P. Kuonen
,
J. Wagen
,
Yao Lu
39th Annual IEEE Conference on Local Computer…
2014
Corpus ID: 2895532
In LTE-A cellular networks there is a fundamental trade-off between the cell throughput and fairness levels for preselected users…
Expand
2013
2013
Verified integrity properties for safe approximate program transformations
Michael Carbin
,
Deokhwan Kim
,
Sasa Misailovic
,
M. Rinard
ACM SIGPLAN Workshop on Partial Evaluation and…
2013
Corpus ID: 9423255
Approximate computations (for example, video, audio, and image processing, machine learning, and many scientific computations…
Expand
Review
2010
Review
2010
General review of fault diagnostic in wind turbines
M. A. Aziz
,
H. Noura
,
A. Fardoun
18th Mediterranean Conference on Control and…
2010
Corpus ID: 24965314
Global wind electricity-generating capacity increased by 28.7 percent in 2008 to 120,798 Gigawatts. This represents a twelve-fold…
Expand
2007
2007
A Bayesian Approach for Disturbance Detection and Classification and Its Application to State Estimation in Run-to-Run Control
Jin Wang
,
Q. He
IEEE transactions on semiconductor manufacturing
2007
Corpus ID: 40199943
With growing demand for effective management of abnormal situations in process industry, disturbance detection and classification…
Expand
2005
2005
An innate immune system for the protection of computer networks
A. Pagnoni
,
A. Visconti
2005
Corpus ID: 16442538
This paper presents design, implementation, and testing of NAIS, an artificial immune system for the protection of computer…
Expand
2002
2002
RAMSES-FT: a fault simulator for flash memory testing and diagnostics
Kuo-Liang Cheng
,
J. Yeh
,
Chih-Wea Wang
,
Chih-Tsun Huang
,
Cheng-Wen Wu
Proceedings 20th IEEE VLSI Test Symposium (VTS )
2002
Corpus ID: 26334303
In this paper we present a fault simulator for flash memory testing and diagnostics, called RAMSES-FT. The fault simulator is…
Expand
2002
2002
Introducing Reference Flow Control for Detecting Intrusion Symptoms at the OS Level
Jacob Zimmermann
,
L. Mé
,
C. Bidan
International Symposium on Recent Advances in…
2002
Corpus ID: 40511150
This paper presents a novel approach to policy-based detection of attacks by delegation. By exploiting unpredictable behaviour…
Expand
2002
2002
On the propagation of faults and their detection in a hardware implementation of the Advanced Encryption Standard
G. Bertoni
,
L. Breveglieri
,
I. Koren
,
P. Maistri
,
V. Piuri
Proceedings IEEE International Conference on…
2002
Corpus ID: 5638812
High reliability is a desirable property of any implementation of the Advanced Encryption Standard (AES). To achieve high…
Expand
Highly Cited
2001
Highly Cited
2001
Static and dynamic behavior of memory cell array opens and shorts in embedded DRAMs
Z. Al-Ars
,
A. V. Goor
Proceedings Design, Automation and Test in Europe…
2001
Corpus ID: 10747288
Fault analysis of memory devices using defect injection and simulation is becoming increasingly important as the complexity of…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE