Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 226,232,158 papers from all fields of science
Search
Sign In
Create Free Account
Lockstep (computing)
Known as:
Lockstep memory
, Double Device Data Correction
, Lockstep (disambiguation)
Expand
Lockstep systems are fault-tolerant computer systems that run the same set of operations at the same time in parallel. The redundancy allows error…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
25 relations
ARM Cortex-R
Chipkill
Cray-1
DIMM
Expand
Broader (1)
Classes of computers
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Review
2016
Review
2016
Using Organizational Science Research to Address U.S. Federal Agencies’ Management & Labor Needs
Herman Aguinis
,
Herm Davis
,
+11 authors
Herman Gerald F. James R. Mary Ann Susan E. Tom Ellen Ern Sutcliffe
Behavioral Science & Policy
2016
Corpus ID: 168509723
Employee performance often moves in lockstep with job satisfaction. Using the 2015 Federal Employee Viewpoint Survey we have…
Expand
2015
2015
Eliminating intra-warp conflict misses in GPU
Bin Wang
,
Zhuo Liu
,
Xinning Wang
,
Weikuan Yu
Design, Automation and Test in Europe
2015
Corpus ID: 17577883
Cache indexing functions play a key role in reducing conflict misses by spreading accesses evenly among all sets of cache blocks…
Expand
2015
2015
Low-cost checkpointing in automotive safety-relevant systems
Carles Hernández
,
J. Abella
Design, Automation and Test in Europe
2015
Corpus ID: 13009941
The use of checkpointing and roll-back recovery (CRR) schemes is common practice to increase the likelihood of a task completing…
Expand
2013
2013
Low-Power On-Chip Charge-Recycling DC-DC Conversion Circuit and System
Kazuhiro Ueda
,
F. Morishita
,
S. Okura
,
Leona Okamura
,
T. Yoshihara
,
K. Arimoto
IEEE Journal of Solid-State Circuits
2013
Corpus ID: 12064507
A charge-recycling circuit and system that reuses the energy between two or more stacked CPUs is proposed in order to double the…
Expand
2010
2010
On the effectiveness of multi-variant program execution for vulnerability detection and prevention
Todd Jackson
,
Babak Salamat
,
Gregor Wagner
,
Christian Wimmer
,
M. Franz
MetriSec '10
2010
Corpus ID: 6697258
Multi-variant program execution is an application of n-version programming, in which several slightly different instances of the…
Expand
2004
2004
Building personal digital photograph libraries: an approach with ontology-based MPEG-7 Dozen Dimensional Digital Content architecture
Pei-Jeng Kuo
,
T. Aoki
,
H. Yasuda
Proceedings Computer Graphics International, .
2004
Corpus ID: 17294577
The current trend of image retrieval is to incorporate the image visual features used in content based image retrieval (CBIR) and…
Expand
1997
1997
Practical Robotics: Principles and Applications
B. Davies
1997
Corpus ID: 189204820
From the Book: Building Sophisticated Robotic Projects This book is a response to requests from second year students enrolled…
Expand
1997
1997
Object Encapsulation of Multiscale Image Region Representations
M. Brelot
,
G. Privat
European Conference on Multimedia Applications…
1997
Corpus ID: 15596701
This paper attempts to evaluate quantitatively the performance tradeoffs involved in applying object-oriented software…
Expand
Highly Cited
1993
Highly Cited
1993
Unlocking the Lockstep High School Schedule
R. Canady
,
Michael D. Rettig
1993
Corpus ID: 140949480
We must view a schedule not simply as barrier blocking the path to school improvement, but as an untapped resource that can be…
Expand
1983
1983
The Stellar Content of Elliptical Nuclei
S. Faber
1983
Corpus ID: 73620522
New developments in understanding the stellar populations of ! elliptical nuclei are discussed. Variations in iron-peak spectral…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE