Sciweavers

ISCA
1999
IEEE
98views Hardware» more  ISCA 1999»
14 years 1 months ago
Multicast Snooping: A New Coherence Method Using a Multicast Address Network
This paper proposes a new coherence method called "multicast snooping" that dynamically adapts between broadcast snooping and a directory protocol. Multicast snooping is...
E. Ender Bilir, Ross M. Dickson, Ying Hu, Manoj Pl...
ISCA
1999
IEEE
105views Hardware» more  ISCA 1999»
14 years 1 months ago
The Program Decision Logic Approach to Predicated Execution
Modern compilers must expose sufficient amounts of Instruction-Level Parallelism (ILP) to achieve the promised performance increases of superscalar and VLIW processors. One of the...
David I. August, John W. Sias, Jean-Michel Puiatti...
ISCA
1999
IEEE
90views Hardware» more  ISCA 1999»
14 years 1 months ago
Correlated Load-Address Predictors
As microprocessors become faster, the relative performance cost of memory accesses increases. Bigger and faster caches significantly reduce the absolute load-to-use time delay. Ho...
Michael Bekerman, Stéphan Jourdan, Ronny Ro...
ISCA
1999
IEEE
218views Hardware» more  ISCA 1999»
14 years 1 months ago
Maps: A Compiler-Managed Memory System for Raw Machines
Rajeev Barua, Walter Lee, Saman P. Amarasinghe, An...
CHARME
1999
Springer
83views Hardware» more  CHARME 1999»
14 years 1 months ago
Model Checking TLA+ Specifications
Yuan Yu, Panagiotis Manolios, Leslie Lamport
CHARME
1999
Springer
130views Hardware» more  CHARME 1999»
14 years 1 months ago
Program Slicing of Hardware Description Languages
Hardware description languages (HDLs) are used today to describe circuits at all levels. In large HDL programs, there is a need for source code reduction techniques to address a my...
Edmund M. Clarke, Masahiro Fujita, Sreeranga P. Ra...
CHARME
1999
Springer
61views Hardware» more  CHARME 1999»
14 years 1 months ago
A Systematic Incrementalization Technique and Its Application to Hardware Design
Steven D. Johnson, Yanhong A. Liu, Yuchen Zhang
CHARME
1999
Springer
100views Hardware» more  CHARME 1999»
14 years 1 months ago
Xs are for Trajectory Evaluation, Booleans are for Theorem Proving
Abstract. This paper describes a semantic connection between the symbolic trajectory evaluation model-checking algorithm and relational verification in higher-order logic. We prov...
Mark Aagaard, Thomas F. Melham, John W. O'Leary
CAV
1999
Springer
85views Hardware» more  CAV 1999»
14 years 1 months ago
Optimizing Symbolic Model Checking for Constraint-Rich Models
Bwolen Yang, Reid G. Simmons, Randal E. Bryant, Da...