Incremental computation strives for efficient successive runs of applications by re-executing only those parts of the computation that are affected by a given input change instea...
Pramod Bhatotia, Pedro Fonseca 0001, Umut A. Acar,...
Information security can be compromised by leakage via lowlevel hardware features. One recently prominent example is cache probing attacks, which rely on timing channels created b...
Danfeng Zhang, Yao Wang, G. Edward Suh, Andrew C. ...
As user demand scales for intelligent personal assistants (IPAs) such as Apple’s Siri, Google’s Google Now, and Microsoft’s Cortana, we are approaching the computational lim...
Johann Hauswald, Michael A. Laurenzano, Yunqi Zhan...
There have been several recent efforts to improve the performance of fences. The most aggressive designs allow postfence accesses to retire and complete before the fence completes...
Systems from smartphones to supercomputers are increasingly heterogeneous, being composed of both CPUs and GPUs. To maximize cost and energy efficiency, these systems will increa...
Neha Agarwal, David W. Nellans, Mark Stephenson, M...