Research Article

Detecting Silent Data Corruptions in Aerospace-Based Computing Using Program Invariants

Figure 5

The comparison of SDC coverages among full instruction duplication, Radish, and Radish_D.