Sciweavers

4810 search results - page 25 / 962
» Modeling Value Speculation
Sort
View
MICRO
1999
IEEE
136views Hardware» more  MICRO 1999»
15 years 2 months ago
Read-After-Read Memory Dependence Prediction
: We identify that typical programs exhibit highly regular read-after-read (RAR) memory dependence streams. We exploit this regularity by introducing read-after-read (RAR) memory d...
Andreas Moshovos, Gurindar S. Sohi
ISLPED
2003
ACM
77views Hardware» more  ISLPED 2003»
15 years 3 months ago
Microprocessor pipeline energy analysis
The increase in high-performance microprocessor power consumption is due in part to the large power overhead of wideissue, highly speculative cores. Microarchitectural speculation...
Karthik Natarajan, Heather Hanson, Stephen W. Keck...
ESORICS
2009
Springer
15 years 10 months ago
Super-Efficient Aggregating History-Independent Persistent Authenticated Dictionaries
Authenticated dictionaries allow users to send lookup requests to an untrusted server and get authenticated answers. Persistent authenticated dictionaries (PADs) add queries agains...
Scott A. Crosby, Dan S. Wallach
ASPDAC
2005
ACM
109views Hardware» more  ASPDAC 2005»
14 years 11 months ago
Fault tolerant nanoelectronic processor architectures
In this paper we propose a fault-tolerant processor architecture and an associated fault-tolerant computation model capable of fault tolerance in the nanoelectronic environment th...
Wenjing Rao, Alex Orailoglu, Ramesh Karri