Sciweavers

ISCA
1998
IEEE
113views Hardware» more  ISCA 1998»
14 years 1 months ago
Computer Structures: What Have We Learned from the PDP-11?
Gordon Bell, William D. Strecker
ISCA
1998
IEEE
123views Hardware» more  ISCA 1998»
14 years 1 months ago
An Evaluation of Directory Schemes for Cache Coherence
Anant Agarwal, Richard Simoni, John L. Hennessy, M...
ISCA
1998
IEEE
129views Hardware» more  ISCA 1998»
14 years 1 months ago
Memory System Characterization of Commercial Workloads
Commercial applications such as databases and Web servers constitute the largest and fastest-growing segment of the market for multiprocessor servers. Ongoing innovations in disk ...
Luiz André Barroso, Kourosh Gharachorloo, E...
ISCA
1998
IEEE
114views Hardware» more  ISCA 1998»
14 years 1 months ago
The MIT Alewife Machine: Architecture and Performance
Alewife is a multiprocessor architecture that supports up to 512 processing nodes connected over a scalable and cost-effective mesh network at a constant cost per node. The MIT Al...
Anant Agarwal, Ricardo Bianchini, David Chaiken, K...
ISCA
1998
IEEE
123views Hardware» more  ISCA 1998»
14 years 1 months ago
Weak Ordering - A New Definition
A memory model for a shared memory, multiprocessor commonly and often implicitly assumed by programmers is that of sequential consistency. This model guarantees that all memory ac...
Sarita V. Adve, Mark D. Hill
ICECCS
1998
IEEE
123views Hardware» more  ICECCS 1998»
14 years 1 months ago
Applying Slicing Technique to Software Architectures
Software architecture is receiving increasingly attention as a critical design level for software systems. As software architecture design resources (in the form of architectural ...
Jianjun Zhao
ICECCS
1998
IEEE
168views Hardware» more  ICECCS 1998»
14 years 1 months ago
The Architecture Tradeoff Analysis Method
This paper presents the Architecture Tradeoff Analysis Method (ATAM), a structured technique for understanding the tradeoffs inherent in design. This method was developed to provi...
Rick Kazman, Mark H. Klein, Mario Barbacci, Thomas...
ICECCS
1998
IEEE
110views Hardware» more  ICECCS 1998»
14 years 1 months ago
Risk Assessment and Integrity in System Design
All systems, regardless of how carefully they have been constructed, suffer failures. This paper focuses on developing a formal understanding of failure with respect to system imp...
Raymond Berg, Victor L. Winter
ICECCS
1998
IEEE
161views Hardware» more  ICECCS 1998»
14 years 1 months ago
A Method and a Technique to Model and Ensure Timeliness in Safety Critical Real-Time Systems
The main focus of this paper is the problem of ensuring timeliness in safety critical systems. First, we introduce a method and its associated technique to model both real-time ta...
Christophe Aussaguès, Vincent David
ICCAD
1998
IEEE
90views Hardware» more  ICCAD 1998»
14 years 1 months ago
Technology mapping for domino logic
Domino logic is a popular con guration for implementing high-speed circuits. An algorithm for domino logic mapping, under a parameterized library style, is presented here. Practic...
Min Zhao, Sachin S. Sapatnekar