Possible Origins, Identification, and Screening of Silent Data Corruption in Data Centers | IEEE Conference Publication | IEEE Xplore