Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- ArticleMay 2001
Cache decay: exploiting generational behavior to reduce cache leakage power
ISCA '01: Proceedings of the 28th annual international symposium on Computer architecturePages 240–251https://doi.org/10.1145/379240.379268Power dissipation is increasingly important in CPUs ranging from those intended for mobile use, all the way up to high-performance processors for high-end servers. While the bulk of the power dissipated is dynamic switching power, leakage power is also ...
Also Published in:
ACM SIGARCH Computer Architecture News: Volume 29 Issue 2 - ArticleMay 2001
A simple method for extracting models for protocol code
ISCA '01: Proceedings of the 28th annual international symposium on Computer architecturePages 192–203https://doi.org/10.1145/379240.379263The use of model checking for validation requires that models of the underlying system be created. Creating such models is both difficult and error prone and as a result, verification is rarely used despite its advantages. In this paper, we present a ...
Also Published in:
ACM SIGARCH Computer Architecture News: Volume 29 Issue 2 - ArticleMay 2001
NanoFabrics: spatial computing using molecular electronics
ISCA '01: Proceedings of the 28th annual international symposium on Computer architecturePages 178–191https://doi.org/10.1145/379240.379262The continuation of the remarkable exponential increases in processing power over the recent past faces imminent challenges due in part to the physics of deep-submicron CMOS devices and the costs of both chip masks and future fabrication plants. A ...
Also Published in:
ACM SIGARCH Computer Architecture News: Volume 29 Issue 2 - ArticleMay 2001
Dead-block prediction & dead-block correlating prefetchers
ISCA '01: Proceedings of the 28th annual international symposium on Computer architecturePages 144–154https://doi.org/10.1145/379240.379259Effective data prefetching requires accurate mechanisms to predict both “which” cache blocks to prefetch and “when” to prefetch them. This paper proposes the Dead-Block Predictors (DBPs), trace-based predictors that accurately identify “when” an Ll data ...
Also Published in:
ACM SIGARCH Computer Architecture News: Volume 29 Issue 2 - ArticleMay 2001
Locality vs. criticality
ISCA '01: Proceedings of the 28th annual international symposium on Computer architecturePages 132–143https://doi.org/10.1145/379240.379258Current memory hierarchies exploit locality of references to reduce load latency and thereby improve processor performance. Locality based schemes aim at reducing the number of cache misses and tend to ignore the nature of misses. This leads to a ...
Also Published in:
ACM SIGARCH Computer Architecture News: Volume 29 Issue 2 - ArticleMay 2001
Concurrency, latency, or system overhead: which has the largest impact on uniprocessor DRAM-system performance?
ISCA '01: Proceedings of the 28th annual international symposium on Computer architecturePages 62–71https://doi.org/10.1145/379240.379252Given a fixed CPU architecture and a fixed DRAM timing specification, there is still a large design space for a DRAM system organization. Parameters include the number of memory channels, the bandwidth of each channel, burst sizes, queue sizes and ...
Also Published in:
ACM SIGARCH Computer Architecture News: Volume 29 Issue 2 - ArticleMay 2001
Tolerating memory latency through software-controlled pre-execution in simultaneous multithreading processors
ISCA '01: Proceedings of the 28th annual international symposium on Computer architecturePages 40–51https://doi.org/10.1145/379240.379250Hardly predictable data addresses in many irregular applications have rendered prefetching ineffective. In many cases, the only accurate way to predict these addresses is to directly execute the code that generates them. As multithreaded architectures ...
Also Published in:
ACM SIGARCH Computer Architecture News: Volume 29 Issue 2