• IEEE.org
  • IEEE CS Standards
  • Career Center
  • About Us
  • Subscribe to Newsletter

0

IEEE
CS Logo
  • MEMBERSHIP
  • CONFERENCES
  • PUBLICATIONS
  • EDUCATION & CAREER
  • VOLUNTEER
  • ABOUT
  • Join Us
CS Logo

0

IEEE Computer Society Logo
Sign up for our newsletter
IEEE COMPUTER SOCIETY
About UsBoard of GovernorsNewslettersPress RoomIEEE Support CenterContact Us
COMPUTING RESOURCES
Career CenterCourses & CertificationsWebinarsPodcastsTech NewsMembership
BUSINESS SOLUTIONS
Corporate PartnershipsConference Sponsorships & ExhibitsAdvertisingRecruitingDigital Library Institutional Subscriptions
DIGITAL LIBRARY
MagazinesJournalsConference ProceedingsVideo LibraryLibrarian Resources
COMMUNITY RESOURCES
GovernanceConference OrganizersAuthorsChaptersCommunities
POLICIES
PrivacyAccessibility StatementIEEE Nondiscrimination PolicyIEEE Ethics ReportingXML Sitemap

Copyright 2025 IEEE - All rights reserved. A public charity, IEEE is the world’s largest technical professional organization dedicated to advancing technology for the benefit of humanity.

  • Home
  • /Digital Library
  • /Magazines
  • /Mi
  • Home
  • / ...
  • /Magazines
  • /Mi

CLOSED: Special Issue on Silent Data Corruptions

IEEE Micro seeks submissions for this upcoming special issue.

Submission Deadline: 2 October 2025 (extended)

Publication: January-February 2026


Silent data corruption (SDC) has been a long-known effect of defects in silicon: a defect impacts the result of a computation, but no hardware or software mechanism has been provided or was able to detect it – the computing system is fully operational, and no exception was raised, nothing unexpected was logged. This definition of SDC itself points to something extremely rare. Given the engineering effort and the hardware and software resources that the computing industry puts during design, manufacturing, and operational time to minimize the impact of silicon defects, it has always been a common belief that silicon chips either work correctly or malfunction for good and need to be replaced – an SDC was never an option.

To everyone’s surprise operators of large-scale systems (cloud computing datacenters) – bravely for some or selfishly for others – openly reported an unimaginable number of detected CPUs, GPUs, and AI Accelerator (AIA) chips in the vicinity of one on a thousand. The erroneous result may affect subsequent computations of the same or other programs still silently for hours, weeks, or forever in the same machine or a large cluster of machines used for cloud workloads or machine learning training and inference workloads. The reports mobilized the industry and the academia towards understanding the problem and providing solutions. 

This Special Issue of the IEEE Micro Magazine is dedicated to “Silent Data Corruptions” and aims to gather the significant computing community efforts in tackling this very important problem and to capture a snapshot of the progress till the initial disclosures. The focus of the Special Issue on “Silent Data Corruptions” is on defective computing chips (CPUs, GPUs, AIAs) deployed at large scale, and particularly defects that are likely to produce silently corrupted data and program results as opposed to other types of behaviors that are more easily detected and observed. 

The Special Issue will provide answers to the following (non-exclusive list of) questions:

  • How severe is the problem of SDCs?
  • Which types of computing chips (CPUs, GPUs, AIAs, all) are more likely to produce SDCs?
  • What is an SDC at different domains (cloud, HPC, AI training/inference)?
  • Which workload types are more likely to produce SDCs?
  • Are new types of silicon defects or known ones responsible for SDCs?
  • What kind of design, microarchitectural, architectural techniques can reduce SDCs?
  • What kind of compilation and system software techniques can reduce SDCs?
  • At which level of abstraction is SDC mitigation more cost-effective?
  • What do CPU, GPU, AIA vendors do to mitigate SDCs?
  • What do foundries and the EDA industry do to mitigate SDCs?
  • What do hyperscalers do to minimize SDCs likelihood in customer workloads?

Submission Guidelines

For author information and guidelines on submission criteria, please visit the Author Information page. Please submit papers through the Author Portal, and be sure to select the special-issue name (“Silent Data Corruptions”). Manuscripts should not be published or currently submitted for publication elsewhere. Please submit only full papers intended for review, not abstracts, to the Author Portal.

In addition to submitting your paper to IEEE Micro, you are also encouraged to upload the data related to your paper to IEEE DataPort. IEEE DataPort is IEEE's data platform that supports the storage and publishing of datasets while also providing access to thousands of research datasets. Uploading your dataset to IEEE DataPort will strengthen your paper and will support research reproducibility. Your paper and the dataset can be linked, providing a good opportunity for you to increase the number of citations you receive. Data can be uploaded to IEEE DataPort prior to submitting your paper or concurrent with the paper submission. Thank you!


Guest Editor

Dimitris Gizopoulos, University of Athens, Greece

Contact Guest Editor at dgizop@di.uoa.gr or the Editor-in-Chief, Hsien-Hsin Sean Lee at lee.sean@gmail.com.

LATEST NEWS
IEEE Uganda Section: Tackling Climate Change and Food Security Through AI and IoT
IEEE Uganda Section: Tackling Climate Change and Food Security Through AI and IoT
Blockchain Service Capability Evaluation (IEEE Std 3230.03-2025)
Blockchain Service Capability Evaluation (IEEE Std 3230.03-2025)
Autonomous Observability: AI Agents That Debug AI
Autonomous Observability: AI Agents That Debug AI
Disaggregating LLM Infrastructure: Solving the Hidden Bottleneck in AI Inference
Disaggregating LLM Infrastructure: Solving the Hidden Bottleneck in AI Inference
Copilot Ergonomics: UI Patterns that Reduce Cognitive Load
Copilot Ergonomics: UI Patterns that Reduce Cognitive Load
Read Next

IEEE Uganda Section: Tackling Climate Change and Food Security Through AI and IoT

Blockchain Service Capability Evaluation (IEEE Std 3230.03-2025)

Autonomous Observability: AI Agents That Debug AI

Disaggregating LLM Infrastructure: Solving the Hidden Bottleneck in AI Inference

Copilot Ergonomics: UI Patterns that Reduce Cognitive Load

The Myth of AI Neutrality in Search Algorithms

Gen AI and LLMs: Rebuilding Trust in a Synthetic Information Age

How AI Is Transforming Fraud Detection in Financial Transactions

FacebookTwitterLinkedInInstagramYoutube
Get the latest news and technology trends for computing professionals with ComputingEdge
Sign up for our newsletter