Sciweavers

415 search results - page 24 / 83
» On the energy-efficiency of speculative hardware
Sort
View
CF
2007
ACM
14 years 2 months ago
Accelerating memory decryption and authentication with frequent value prediction
This paper presents a novel architectural technique to hide fetch latency overhead of hardware encrypted and authenticated memory. A number of recent secure processor designs have...
Weidong Shi, Hsien-Hsin S. Lee
ISCA
2009
IEEE
144views Hardware» more  ISCA 2009»
14 years 4 months ago
Dynamic performance tuning for speculative threads
Yangchun Luo, Venkatesan Packirisamy, Wei-Chung Hs...
ICECCS
1995
IEEE
108views Hardware» more  ICECCS 1995»
14 years 1 months ago
Using speculative execution for fault tolerance in a real-time system
Achieving fault-tolerance using a primary-backup approach involves overhead of recovery such as activating the backup and propagating execution states, which may a ect the timelin...
Mohamed F. Younis, Grace Tsai, Thomas J. Marlowe, ...
ISCA
1995
IEEE
110views Hardware» more  ISCA 1995»
14 years 1 months ago
Instruction Cache Fetch Policies for Speculative Execution
Current trends in processor design are pointing to deeper and wider pipelines and superscalar architectures. The efficient use of these resources requires speculative execution, ...
Dennis Lee, Jean-Loup Baer, Brad Calder, Dirk Grun...