Sciweavers

285 search results - page 17 / 57
» Performance and Functional Verification of Microprocessors
Sort
View
134
Voted
DAC
2007
ACM
16 years 4 months ago
Trusted Hardware: Can It Be Trustworthy?
Processing and storage of confidential or critical information is an every day occurrence in computing systems. The trustworthiness of computing devices has become an important co...
Cynthia E. Irvine, Karl N. Levitt
117
Voted
DAC
2009
ACM
16 years 4 months ago
Speculation in elastic systems
Speculation is a well-known technique for increasing parallelism of the microprocessor pipelines and hence their performance. While implementing speculation in modern design pract...
Marc Galceran Oms, Jordi Cortadella, Michael Kishi...
139
Voted
DAC
2003
ACM
16 years 4 months ago
Death, taxes and failing chips
In the way they cope with variability, present-day methodologies are onerous, pessimistic and risky, all at the same time! Dealing with variability is an increasingly important as...
Chandu Visweswariah
107
Voted
ASAP
2008
IEEE
93views Hardware» more  ASAP 2008»
15 years 10 months ago
Memory copies in multi-level memory systems
Data movement operations, such as the C-style memcpy function, are often used to duplicate or communicate data. This type of function typically produces a significant amount of o...
Pepijn J. de Langen, Ben H. H. Juurlink
113
Voted
DATE
2007
IEEE
80views Hardware» more  DATE 2007»
15 years 10 months ago
Engineering trust with semantic guardians
The ability to guarantee the functional correctness of digital integrated circuits and, in particular, complex microprocessors, is a key task in the production of secure and trust...
Ilya Wagner, Valeria Bertacco