Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
-
- ArticleMay 2001
Rapid profiling via stratified sampling
ISCA '01: Proceedings of the 28th annual international symposium on Computer architecturePages 278–289https://doi.org/10.1145/379240.379273Sophisticated binary translators and dynamic optimizers demand a program profiler with low overhead, high accuracy, and the ability to collect a variety of profile types. A profiling scheme that achieves these goals is proposed. Conceptually, the ...
Also Published in:
ACM SIGARCH Computer Architecture News: Volume 29 Issue 2 - ArticleMay 2001
Variability in the execution of multimedia applications and implications for architecture
ISCA '01: Proceedings of the 28th annual international symposium on Computer architecturePages 254–265https://doi.org/10.1145/379240.379270Multimedia applications are an increasingly important workload for general-purpose processors. This paper analyzes frame-level execution time variability for several multimedia applications on general-purpose architectures. There are two reasons for such ...
Also Published in:
ACM SIGARCH Computer Architecture News: Volume 29 Issue 2 - ArticleMay 2001
Cache decay: exploiting generational behavior to reduce cache leakage power
ISCA '01: Proceedings of the 28th annual international symposium on Computer architecturePages 240–251https://doi.org/10.1145/379240.379268Power dissipation is increasingly important in CPUs ranging from those intended for mobile use, all the way up to high-performance processors for high-end servers. While the bulk of the power dissipated is dynamic switching power, leakage power is also ...
Also Published in:
ACM SIGARCH Computer Architecture News: Volume 29 Issue 2 - ArticleMay 2001
Energy-effective issue logic
ISCA '01: Proceedings of the 28th annual international symposium on Computer architecturePages 230–239https://doi.org/10.1145/379240.379266The issue logic of a dynamically-scheduled superscalar processor is a complex mechanism devoted to start the execution of multiple instructions every cycle. Due to its complexity, it is responsible for a significant percentage of the energy consumed by ...
Also Published in:
ACM SIGARCH Computer Architecture News: Volume 29 Issue 2 - ArticleMay 2001
Power and energy reduction via pipeline balancing
ISCA '01: Proceedings of the 28th annual international symposium on Computer architecturePages 218–229https://doi.org/10.1145/379240.379265Minimizing power dissipation is an important design requirement for both portable and non-portable systems. In this work, we propose an architectural solution to the power problem that retains performance while reducing power. The technique, known as ...
Also Published in:
ACM SIGARCH Computer Architecture News: Volume 29 Issue 2 - ArticleMay 2001
Removing architectural bottlenecks to the scalability of speculative parallelization
ISCA '01: Proceedings of the 28th annual international symposium on Computer architecturePages 204–215https://doi.org/10.1145/379240.379264Speculative thread-level parallelization is a promising way to speed up codes that compilers fail to parallelize. While several speculative parallelization schemes have been proposed for different machine sizes and types of codes, the results so far ...
Also Published in:
ACM SIGARCH Computer Architecture News: Volume 29 Issue 2 - ArticleMay 2001
A simple method for extracting models for protocol code
ISCA '01: Proceedings of the 28th annual international symposium on Computer architecturePages 192–203https://doi.org/10.1145/379240.379263The use of model checking for validation requires that models of the underlying system be created. Creating such models is both difficult and error prone and as a result, verification is rarely used despite its advantages. In this paper, we present a ...
Also Published in:
ACM SIGARCH Computer Architecture News: Volume 29 Issue 2 - ArticleMay 2001
NanoFabrics: spatial computing using molecular electronics
ISCA '01: Proceedings of the 28th annual international symposium on Computer architecturePages 178–191https://doi.org/10.1145/379240.379262The continuation of the remarkable exponential increases in processing power over the recent past faces imminent challenges due in part to the physics of deep-submicron CMOS devices and the costs of both chip masks and future fabrication plants. A ...
Also Published in:
ACM SIGARCH Computer Architecture News: Volume 29 Issue 2 - ArticleMay 2001
Exploring and exploiting wire-level pipelining in emerging technologies
ISCA '01: Proceedings of the 28th annual international symposium on Computer architecturePages 166–177https://doi.org/10.1145/379240.379261Pipelining is a technique that has long since been considered fundamental by computer architects. However, the world of nanoelectronics is pushing the idea of pipelining to new and lower levels — particularly the device level. How this affects circuits ...
Also Published in:
ACM SIGARCH Computer Architecture News: Volume 29 Issue 2 - ArticleMay 2001
Dead-block prediction & dead-block correlating prefetchers
ISCA '01: Proceedings of the 28th annual international symposium on Computer architecturePages 144–154https://doi.org/10.1145/379240.379259Effective data prefetching requires accurate mechanisms to predict both “which” cache blocks to prefetch and “when” to prefetch them. This paper proposes the Dead-Block Predictors (DBPs), trace-based predictors that accurately identify “when” an Ll data ...
Also Published in:
ACM SIGARCH Computer Architecture News: Volume 29 Issue 2 - ArticleMay 2001
Locality vs. criticality
ISCA '01: Proceedings of the 28th annual international symposium on Computer architecturePages 132–143https://doi.org/10.1145/379240.379258Current memory hierarchies exploit locality of references to reduce load latency and thereby improve processor performance. Locality based schemes aim at reducing the number of cache misses and tend to ignore the nature of misses. This leads to a ...
Also Published in:
ACM SIGARCH Computer Architecture News: Volume 29 Issue 2 - ArticleMay 2001
QoS provisioning in clusters: an investigation of Router and NIC design
ISCA '01: Proceedings of the 28th annual international symposium on Computer architecturePages 120–129https://doi.org/10.1145/379240.379257Design of high performance cluster networks (routers) with Quality-of-Service (QoS) guarantees is becoming increasingly important to support a variety of multimedia applications, many of which have real-time constraints. Most commercial routers, which ...
Also Published in:
ACM SIGARCH Computer Architecture News: Volume 29 Issue 2 - ArticleMay 2001
CryptoManiac: a fast flexible architecture for secure communication
ISCA '01: Proceedings of the 28th annual international symposium on Computer architecturePages 110–119https://doi.org/10.1145/379240.379256The growth of the Internet as a vehicle for secure communication and electronic commerce has brought cryptographic processing performance to the forefront of high throughput system design. This trend will be further underscored with the widespread ...
Also Published in:
ACM SIGARCH Computer Architecture News: Volume 29 Issue 2 - ArticleMay 2001
Better exploration of region-level value locality with integrated computation reuse and value prediction
ISCA '01: Proceedings of the 28th annual international symposium on Computer architecturePages 98–108https://doi.org/10.1145/379240.379255Computation-reuse and value-prediction are two recent techniques for improving microprocessor performance by exploiting value localities. They both aim at breaking the data dependence limit in traditional processors. In this paper, we propose a ...
Also Published in:
ACM SIGARCH Computer Architecture News: Volume 29 Issue 2 - ArticleMay 2001
Automated design of finite state machine predictors for customized processors
ISCA '01: Proceedings of the 28th annual international symposium on Computer architecturePages 86–97https://doi.org/10.1145/379240.379254Customized processors use compiler analysis and design automation techniques to take a generalized architectural model and create a specific instance of it which is optimized to a given application or set of applications. These processors offer the ...
Also Published in:
ACM SIGARCH Computer Architecture News: Volume 29 Issue 2