Show simple item record

dc.contributor.authorStanley-Marbell, Phillip
dc.contributor.authorAlaghi, Armin
dc.contributor.authorCarbin, Michael James
dc.contributor.authorDarulova, Eva
dc.contributor.authorDolecek, Lara
dc.contributor.authorGerstlauer, Andreas
dc.contributor.authorGillani, Ghayoor
dc.contributor.authorJevdjic, Djordje
dc.contributor.authorMoreau, Thierry
dc.contributor.authorCacciotti, Mattia
dc.contributor.authorDaglis, Alexandros
dc.contributor.authorJerger, Natalie Enright
dc.contributor.authorFalsafi, Babak
dc.contributor.authorMisailovic, Sasa
dc.contributor.authorSampson, Adrian
dc.contributor.authorZufferey, Damien
dc.date.accessioned2022-11-22T17:29:13Z
dc.date.available2021-02-22T19:14:48Z
dc.date.available2022-11-22T17:29:13Z
dc.date.issued2020-07
dc.identifier.issn0360-0300
dc.identifier.issn1557-7341
dc.identifier.urihttps://hdl.handle.net/1721.1/129955.2
dc.description.abstractWhen a computational task tolerates a relaxation of its specification or when an algorithm tolerates the effects of noise in its execution, hardware, system software, and programming language compilers or their runtime systems can trade deviations from correct behavior for lower resource usage. We present, for the first time, a synthesis of research results on computing systems that only make as many errors as their end-to-end applications can tolerate. The results span the disciplines of computer-aided design of circuits, digital system design, computer architecture, programming languages, operating systems, and information theory. Rather than over-provisioning the resources controlled by each of these layers of abstraction to avoid errors, it can be more efficient to exploit the masking of errors occurring at one layer and thereby prevent those errors from propagating to a higher layer. We demonstrate the potential benefits of end-to-end approaches using two illustrative examples. We introduce a formalization of terminology that allows us to present a coherent view across the techniques traditionally used by different research communities in their individual layer of focus. Using this formalization, we survey tradeoffs for individual layers of computing systems at the circuit, architecture, operating system, and programming language levels as well as fundamental information-theoretic limits to tradeoffs between resource usage and correctness.en_US
dc.language.isoen
dc.publisherAssociation for Computing Machinery (ACM)en_US
dc.relation.isversionofhttp://dx.doi.org/10.1145/3394898en_US
dc.rightsArticle is made available in accordance with the publisher's policy and may be subject to US copyright law. Please refer to the publisher's site for terms of use.en_US
dc.sourceACMen_US
dc.titleExploiting Errors for Efficiency: A Survey from Circuits to Applicationsen_US
dc.title.alternativeA Survey from Circuits to Applicationsen_US
dc.typeArticleen_US
dc.identifier.citationStanley-Marbell, Phillip et al. "Exploiting Errors for Efficiency: A Survey from Circuits to Applications." ACM Computing Surveys 53, 3 (July 2020): dx.doi.org/10.1145/3394898 © 2020 ACMen_US
dc.contributor.departmentMassachusetts Institute of Technology. Computer Science and Artificial Intelligence Laboratoryen_US
dc.relation.journalACM Computing Surveysen_US
dc.eprint.versionFinal published versionen_US
dc.type.urihttp://purl.org/eprint/type/ConferencePaperen_US
eprint.statushttp://purl.org/eprint/status/NonPeerRevieweden_US
dc.date.updated2020-12-04T16:55:10Z
dspace.orderedauthorsStanley-Marbell, P; Alaghi, A; Carbin, M; Darulova, E; Dolecek, L; Gerstlauer, A; Gillani, G; Jevdjic, D; Moreau, T; Cacciotti, M; Daglis, A; Jerger, NE; Falsafi, B; Misailovic, S; Sampson, A; Zufferey, Den_US
dspace.date.submission2020-12-04T16:55:18Z
mit.journal.volume53en_US
mit.journal.issue3en_US
mit.licensePUBLISHER_POLICY
mit.metadata.statusCompleteen_US


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record

VersionItemDateSummary

*Selected version