This shows you the differences between two versions of the page.
readings [2013/12/05 09:29] hongyi [Module 7-5] |
readings [2013/12/05 11:43] (current) hongyi [Module 7-5] |
||
---|---|---|---|
Line 457: | Line 457: | ||
* {{mutlu_ieee_micro03.pdf|Onur Mutlu, Jared Stark, Chris Wilkerson, and Yale N. Patt, "Runahead Execution: An Effective Alternative to Large Instruction Windows," IEEE Micro Top Picks 2003.}} **[due 12/4]** | * {{mutlu_ieee_micro03.pdf|Onur Mutlu, Jared Stark, Chris Wilkerson, and Yale N. Patt, "Runahead Execution: An Effective Alternative to Large Instruction Windows," IEEE Micro Top Picks 2003.}} **[due 12/4]** | ||
* {{mutlu_ieee_micro06.pdf|Onur Mutlu, Hyesoon Kim, and Yale N. Patt, "Efficient Runahead Execution: Power-Efficient Memory Latency Tolerance," IEEE Micro Top Picks 2006.}} **[due 12/4]** | * {{mutlu_ieee_micro06.pdf|Onur Mutlu, Hyesoon Kim, and Yale N. Patt, "Efficient Runahead Execution: Power-Efficient Memory Latency Tolerance," IEEE Micro Top Picks 2006.}} **[due 12/4]** | ||
- | * {{mutlu_micro05.pdf|Onur Mutlu, Hyesoon Kim, and Yale N. Patt, "Address-Value Delta (AVD) Prediction: Increasing the Effectiveness of Runahead Execution by Exploiting Regular Memory Allocation Patterns," MICRO 2005.}} **Optional** | + | * {{mutlu_micro05.pdf|Onur Mutlu, Hyesoon Kim, and Yale N. Patt, "Address-Value Delta (AVD) Prediction: Increasing the Effectiveness of Runahead Execution by Exploiting Regular Memory Allocation Patterns," MICRO 2005.}} **Optional due 12/6** |
**Mentioned during module:** | **Mentioned during module:** | ||
* {{:mutlu_runahead.pdf|Mutlu et al., “Runahead Execution: An Alternative to Very Large Instruction Windows for Out-of-order Processors,” HPCA 2003.}} | * {{:mutlu_runahead.pdf|Mutlu et al., “Runahead Execution: An Alternative to Very Large Instruction Windows for Out-of-order Processors,” HPCA 2003.}} | ||
* {{wrongpath.pdf|Armstrong et al., "Wrong Path Events: Exploiting Unusual and Illegal Program Behavior for Early Misprediction Detection and Recovery," MICRO 2004.}} | * {{wrongpath.pdf|Armstrong et al., "Wrong Path Events: Exploiting Unusual and Illegal Program Behavior for Early Misprediction Detection and Recovery," MICRO 2004.}} |