Research Article

Detecting Silent Data Corruptions in Aerospace-Based Computing Using Program Invariants

Figure 6

The comparison of SDC detection efficiencies among full instruction duplication, Radish, and Radish_D.