Sciweavers

1045 search results - page 140 / 209
» Improving SHA-2 Hardware Implementations
Sort
View
ATS
2000
IEEE
98views Hardware» more  ATS 2000»
14 years 3 days ago
Embedded core testing using genetic algorithms
Testing of embedded cores is very difficult in SOC (system-on-a-chip), since the core user may not know the gate level implementation of the core, and the controllability and obse...
Ruofan Xu, Michael S. Hsiao
MICRO
2000
IEEE
80views Hardware» more  MICRO 2000»
14 years 2 days ago
Silent stores for free
Silent store instructions write values that exactly match the values that are already stored at the memory address that is being written. A recent study reveals that significant ...
Kevin M. Lepak, Mikko H. Lipasti
ISCA
1999
IEEE
87views Hardware» more  ISCA 1999»
13 years 12 months ago
Memory Forwarding: Enabling Aggressive Layout Optimizations by Guaranteeing the Safety of Data Relocation
By optimizing data layout at run-time, we can potentially enhance the performance of caches by actively creating spatial locality, facilitating prefetching, and avoiding cache con...
Chi-Keung Luk, Todd C. Mowry
MICRO
1999
IEEE
104views Hardware» more  MICRO 1999»
13 years 12 months ago
Control Independence in Trace Processors
Branch mispredictions are a major obstacle to exploiting instruction-level parallelism, at least in part because all instructions after a mispredicted branch are squashed. However...
Eric Rotenberg, James E. Smith
MTDT
1999
IEEE
68views Hardware» more  MTDT 1999»
13 years 12 months ago
Unbalanced Cache Systems
The new concept of an unbalanced, hierarchicallydivided cache memory system is introduced and analyzed. This approach generalizes existing cache structures by allowing different m...
David L. Rhodes, Wayne Wolf