Research Article

Detecting Silent Data Corruptions in Aerospace-Based Computing Using Program Invariants

Figure 2

The workflow of Radish.