


default search action
IEEE Micro, Volume 46
Volume 46, Number 1, January - February 2026
- Hsien-Hsin S. Lee

:
Silicon Pact: Reshoring the Supply Chain as Geopolitical Insurance. 4-5 - Dimitris Gizopoulos

:
Special Issue on Silent Data Corruptions - From Silicon to Cloud Data Centers and AI Systems of Huge Scale. 6-9 - Nirmal Saxena

, Saurabh Hukerikar
, Siva Hari
:
Silent Data Corruption: Optimal Mitigation Strategies for Data Center Computing. 10-18 - Nikos Karystinos

, George-Marios Fragkoulis
, Odysseas Chatzopoulos
, Dimitris Gizopoulos
, Sudhanva Gurumurthi
:
Harpocrates++: Automated Functional Program Generation Against CPU Faults and Silent Data Corruptions. 19-28 - Pradip Bose

, Ramon Bertran
, Alper Buyuktosunoglu
, Hans M. Jacobson
, Karthik Swaminathan
, Matthias Pflanz
, Charles F. Webb
, Tobias Webel
, Christian Jacobi
:
Robust Power Management: A Key Aspect of Silent Data Corruption-Free Systems. 29-33 - Manu Shamsa

, David P. Lerner
, Arani Sinha
, Thiago Macieira
, Yogesh Varma
:
Methodical Detection of Silent Data Errors From Foundry to Fleet. 34-43 - Hengzhi Pei

, Leonard Lausen
, George Karypis
:
Connecting the Impact of Silent Data Corruption With Different Training Characteristics: An Empirical Study. 44-51 - Carlos Vallin

, Rama Bhimanadhuni
, Robert S. Chappell
:
Silent Data Corruption Challenges in Modern AI Public Cloud Deployments. 52-54 - Odysseas Chatzopoulos

, Maria Trakosa
, Harish Dattatraya Dixit
, Sriram Sankar
, Dimitris Gizopoulos
:
Phoebe: Measuring the Unmeasurable - Demystifying Silent Data Corruptions in AI Accelerators Through Microarchitectural Modeling. 55-65 - Nishant George

, Sudhanva Gurumurthi
, Vilas Sridharan
, Harish Dattatraya Dixit
, Emel Goksu
, Bharath Parthasarathy
, Amber Huffman
, Thiago Macieira
, Arani Sinha
, Dean Liberty
, Lisa Minwell
, Robert S. Chappell
:
Silent Data Corruption in Artificial Intelligence: A Growing Challenge for Large-Scale Machine Learning. 66-72 - Xuan-Jun Chen

, Chia-Lin Yang
:
CIMNet: Joint Search for Neural Network and Computing-in-Memory Architectures. 73-85 - Gadi Singer

:
Emerging Technology and Engineering Challenges of Artificial Intelligence Deep Scheming: New Requirements for Containing Artificial Intelligence Misalignment. 86-91 - Jianming Tong

:
Breaking Rules, Building Trust: A Fireside Chat With Prof. Todd Austin. 92-97 - Ruby B. Lee

, Charles Neuhauser
, Timothy M. Pinkston
:
Michael J. Flynn: Founder of ISCA, TCCA and SIGARCH. 98-101 - Joshua J. Yi

:
A Review of Wisconsin Alumni Research Foundation v. Apple - Part VIII. 102-106 - Shane Greenstein

:
Frontier Pick-and-Shovel Markets. 107-109

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














