Verifying quantitative reliability for programs that execute on unreliable hardware

Michael Carbin, Sasa Misailovic, Martin C. Rinard

Research output: Contribution to journalArticlepeer-review

Abstract

Emerging high-performance architectures are anticipated to contain unreliable components that may exhibit soft errors, which silently corrupt the results of computations. Full detection and masking of soft errors is challenging, expensive, and, for some applications, unnecessary. For example, approximate computing applications (such as multimedia processing, machine learning, and big data analytics) can often naturally tolerate soft errors. We present Rely, a programming language that enables developers to reason about the quantitative reliability of an application - namely, the probability that it produces the correct result when executed on unreliable hardware. Rely allows developers to specify the reliability requirements for each value that a function produces. We present a static quantitative reliability analysis that verifies quantitative requirements on the reliability of an application, enabling a developer to perform sound and verified reliability engineering. The analysis takes a Rely program with a reliability specification and a hardware specification that characterizes the reliability of the underlying hardware components and verifies that the program satisfies its reliability specification when executed on the underlying unreliable hardware platform. We demonstrate the application of quantitative reliability analysis on six computations implemented in Rely. © Copyright is held by the owner/author(s).

Original languageEnglish (US)
Pages (from-to)33-52
Number of pages20
JournalACM SIGPLAN Notices
Volume48
Issue number10
DOIs
StatePublished - Oct 2013
Externally publishedYes

Keywords

  • Approximate computing

ASJC Scopus subject areas

  • Computer Science(all)

Fingerprint Dive into the research topics of 'Verifying quantitative reliability for programs that execute on unreliable hardware'. Together they form a unique fingerprint.

Cite this