This invention relates generally to reducing energy and power consumption and improving performance in a microprocessor and, more particularly, to reducing energy and power consumption and improving performance by controlling branch prediction and branch prediction related activities in a processor. This is accomplished by the use of a combined hardware and static prediction mechanism assisted by compiler information inserted into the application code, that allows a branch target to be predicted energy efficiently and with the prediction of target addresses often preceding the fetch or decode of a branch.
Microprocessors (referred to herein simply as “processors”) consume energy/power during their operation. It is advantageous to reduce the amount of energy consumed, particularly in the case of devices that run off limited power supplies.
Various factors affect the amount of energy that a processor consumes. For example, the frequency at which the processor operates, the voltage level that powers the processor, as well as the load capacitances, affect processor energy consumption. Reducing the frequency of the processor or the voltage supply may decrease processor energy consumption, however, doing so may also adversely affect the performance of the processor.
Other techniques to reduce energy consumption, by for example reducing load capacitances, may include changes to processor architectures and processor circuits. Some other techniques rely on modifying the application itself, or any other system layer, to improve energy efficiency.
Branch prediction relates to activities that determine the target address of an instruction that changes the control-flow of a program at runtime such as a branch instruction.
As noted in the literature, branch prediction mechanisms related energy consumed is a significant fraction of a processor's energy consumption. In addition, branch prediction accuracy affects both performance and overall processor energy consumption.
Various factors affect the energy impact of branch prediction. In the following paragraphs, we provide an introduction into various branch prediction mechanisms.
There are different prediction approaches in place today to determine the target of a branch in time, i.e., to avoid the penalty of fetching from the wrong address in the case of a taken branch.
One such approach is static prediction that assumes that a branch behaves uniformly, i.e., it is either taken or not taken, during the entire execution of a program.
Static predictors require typically no hardware-table lookup; they need to find the direction of a branch. This can be easily accommodated in many conditional branch instructions.
For forward-pointing branches such a predictor would typically predict “not taken” as branch outcome, and for backward-pointing it would predict a “taken” target. This seemingly arbitrary rule is based on statistical branch outcomes in programs. For example, it is known that backward-pointing branches are taken 90% of the time and forward-pointing ones are not taken 56% of the time for integer programs such as in the SPEC benchmark suite.
If the prediction is that the branch will be taken, the target address would be calculated at runtime and the next instruction-group fetched from the target address, rather than sequentially. A correctly predicted branch provides, typically, an execution with no performance penalty. Moreover, in architectures such as ARM9 or ARM10 a branch can be folded (e.g., pulled or removed) from the pipeline resulting in what is called zero-cycle branches.
A part of the energy cost of a static prediction is related to pre-decoding instructions in a fetch-buffer, or prefetch buffer, to find out if a fetched instruction is a branch. Pre-decoding is required to determine changes in control-flow before a branch instruction enters the pipeline. In addition, checking the direction of a branch, i.e., to determine if a branch is forward- or backward-pointing, is necessary. The direction of a branch can be often determined by decoding the sign bit of the branch offset. Negative offsets represent backward-pointing branches while positive ones correspond to forward-pointing ones.
If a branch is predicted taken, the target address is typically calculated by performing an arithmetic operation. This is often an addition of the program counter and the constant offset decoded from the branch instruction itself.
Static prediction schemes are often limited to conditional branches where the offset is a constant. Branches that use registers to calculate the address, or indirect branches, cannot typically be predicted before the register content is available in the pipeline. Other complementary schemes such as a return stack would be used for branching related to procedure calls and returns.
While the energy consumed by static prediction is relatively low, such prediction is often not preferred or used, due to its low prediction accuracy. Static predictors rarely exceed 60%-65% prediction accuracy, although in some cases, e.g., for some branch instructions, they can do much better.
During a branch misprediction, there is a high performance and energy penalty. This is due to the extra unnecessary instruction fetches and decodes: a result of fetching from incorrect execution paths. The performance and energy penalty of a misprediction depends on the pipeline depth of the processor and especially the number of stages between the fetch and execute stages and the size of the prefetch buffers, that determine the extra fetches resulting from a mispredicted branch. Even in relatively short pipelines, the branch prediction penalty is significant, e.g., can be as high as 4-5 cycles in modern processors.
A variant of static prediction is based on compile-time static prediction. In such a scheme, a bit in each branch instruction is set by the compiler and determines the direction of a branch. As no hardware lookup is required in either case, the power cost of a runtime static predictor and a compile-time static predictor are similar.
Due to increasing performance requirements of emerging applications, e.g., emerging applications require both wireless and internet capabilities, processor vendors generally prefer dynamic branch predictors.
Dynamic predictors improve the accuracy of branch prediction, and therefore performance, for most applications.
Dynamic predictors are based on runtime mechanisms. Branch history tables or similar auxiliary hardware tables are used to predict the direction of a branch for each branch instruction occurrence. At runtime these tables are continuously updated to better reflect likely branch outcome.
A key difference between static and dynamic prediction is that the same branch instruction can be predicted differently depending on its execution context in the dynamic case. Branch target address caches are often used to store the target address, in addition to the prediction outcome information. This can speed up the process as the target address is readily available after the table lookup.
There are many different dynamic predictors available. For example, depending on whether only local branch-related information is used or if local branch information is combined with global information about the program context in which the branch occurs, at a given time, one can build various dynamic predictors. Many predictors are multi-level requiring lookup of multiple large hardware tables. These tables are implemented similar to caches, with search tags and data array segments. The search is done through an associative lookup mechanism.
Dynamic predictors are typically more accurate than the static predictors, as they capture the dynamic behavior of branches rather than predicting a branch outcome always taken or not taken. Therefore, they are almost always preferred in processor designs that issue multiple instructions per cycle, where the misprediction penalty due to branch misses is fairly large due to the high instruction fetch rates.
Predicting a branch with a dynamic predictor require looking up branch history tables to determine the prediction. The hardware complexity, table size, and associativity of these tables, as well as the lookup frequency, are key determining factors in the ultimate energy efficiency achieved.
A key challenge with branch prediction is, however, not only to determine a likely target address or predict a change of control, i.e., if a branch is taken, but to predict it before the branch is decoded in the pipeline. Otherwise, potentially unnecessary instructions are already fetched on the sequential path adding to the energy consumption and imposing a performance penalty.
A typical solution, often used in today's processors, is to predict branches in parallel with the instruction fetch. In this case, however, branch prediction is performed with almost every instruction fetch, regardless of whether a fetched instruction is a branch or not. This is very energy inefficient as many more table lookups are performed than actual branch instructions would require in a program. For example, assuming that there is one branch instruction per five regular (non-branch) instructions, this would roughly mean five times more branch table lookups and five times more energy consumed.
The compiler-architecture interaction based processor framework described herein addresses the foregoing need to reduce energy consumption due to branch predictions without impacting performance. In fact, the framework in its preferred embodiment improves branch prediction accuracy and performance and significantly reduces energy costs.
Some of the key factors that determine the energy efficiency of branch prediction mechanisms include: percentage of branches predicted, prediction accuracy, branch prediction related hardware table complexity and number of hardware tables, and frequency of lookups.
The framework, in one of its embodiments, uses static instructions to control branch predictions. Static instructions are control instructions containing compile time information such as hints or other information that might be used at runtime to control execution more efficiently. This is, however, not meant to be limiting. Other embodiments might use solutions that require no added instructions, e.g., static information could be fetched with each program block, such as a basic block, from a dedicated address space and possibly stored separately with dedicated hardware support.
Assuming an embodiment with static instructions, a preferred solution would support many other compiler-enabled energy optimizations encoded within the same instruction. This would amortize the cost of static information related fetch overhead across many energy reduction related techniques.
The framework, in one aspect, is based on making static information about a branch available at runtime some time before the branch is fetched. In one embodiment, every critical basic block that ends with a branch would have such information inserted at the beginning of the block. Whether a given block is critical or not is determined with static analysis and profiling.
In one embodiment, this static information is then decoded and pulled out from the prefetch buffer, not allowing the static control to enter the pipeline. A prefetch buffer is a buffer where many of the instructions are fetched before entering the processor pipeline.
The control information inserted can be used to control a branch at the end of the block by providing information about the branch's position, the mechanism used for prediction, such as static or different dynamic ones, and branch outcome if a branch is predicted statically. This is not intended to be limiting. Additional branch related information could be encoded in a similar manner.
When the static information suggests one of the dynamic predictions, a branch prediction can take place right after the static instruction is pre-decoded in a prefetch buffer. This way, a branch instruction target is often predicted before the branch even enters the fetch stage. This is due to the fact that static instructions are inserted some number of instructions ahead of a branch instruction, or typically at the beginning of a basic block.
As mentioned, static instructions are removed in the prefetch buffer to avoid causing pipeline bubbles. However, even if a static instruction would not be caught in the prefetch buffer, and would enter the pipeline, e.g., that can happen after a pipeline flush in some embodiments, the static instruction would be decoded in the decode stage: this would still allow time for the branch prediction to take place, as the branch would follow several instructions behind and there would still be time to predict the branch before entering the pipeline.
In one aspect, the framework allows branches to be predicted early and the predictions to occur sufficiently early to avoid any penalty due to missed or skipped branches entering the pipeline or predicted too late. Note that a skipped branch, even if predicted in or after the decode stage, would already have caused several unnecessary instruction fetches in case of a taken branch.
Because branch instructions are predicted with static instructions, there is no need to pre-decode or lookup dynamic tables, for each instruction fetch, in basic blocks that use static control for directing prediction. This reduces the frequency of table lookups and their energy costs typically by factor of five or so.
In addition, in a preferred embodiment, not all branch instructions would be predicted dynamically. This could reduce the size of the hardware prediction tables, further reducing the energy requirements of branch predictions.
There are many instructions that can be predicted very well statically and those instructions could instead be predicted by compile time static techniques. Many of the backward-pointing branches for example, would be predicted statically. Backward-pointing branches that are not predictable well statically, would be, however, predicted dynamically.
In addition, in many cases with static and profiling information, even some fraction of the forward-pointing branches could be deemed to have good static predictability, i.e., they would be always taken or not taken. Mapping these branches statically reduces the capacity requirements of hardware prediction tables and saves additional energy without performance impact.
In addition, there are branches that are not predictable, neither statically or dynamically. The framework, in one embodiment, would encode static information to stall the fetch and let these branches execute before additional fetches would occur.
The framework, in one aspect, could be utilized to perform optimizations that are not limited to energy reduction. Examples of optimizations performed may include, but are not limited to, energy, power, and performance. In general, in one aspect, the framework could be used to improve an application's performance or improve the application's energy-delay product or any other metric that is a combination of execution time and power consumption.
If the control bits refer to controlling several instructions during runtime, such as in a basic block, one control instruction inserted before the block can include control information for a variety of optimizations amortizing its added overhead across many optimizations. In one aspect, the performance overhead of control instructions could be avoided with early folding/removal in processor pipelines, accomplished with simple static instruction related pre-decoding logic added to prefetch buffers and instruction fetching buffers. In many predicated architectures, a similar early folding is used, for example, to achieve zero-cycle branches.
The invention can be used to save energy on any type of device that includes a processor. For example, the invention can be used to save energy on personal computers, devices containing embedded controllers, sensor networks, network appliances, and hand-held devices, cellular telephones, and/or emerging applications based on other device technologies.
Unless otherwise defined, all technical and scientific terms used herein have the same meaning as commonly understood by one of ordinary skill in the art to which this invention belongs. Although methods and materials similar or equivalent to those described herein can be used in practice or testing of the present invention, suitable methods and materials are described below. In addition, the materials, methods, and examples are illustrative only and not intended to be limiting.
Other features and advantages of the invention will become apparent from the following description, including the drawings.
In the embodiments described herein, a processor framework uses compile-time information to reduce or enable reduction of energy or power consumption, and/or improve performance in a processor.
Referring to
Compile-time refers to the time during which the program is translated from a high-level programming language into a machine-specific stream of instructions, and it is not part of execution or runtime. Runtime is the time it takes to execute translated machine instructions on the machine. Compilation is typically performed on a different host machine than execution and it is done on the source program.
In following sections we describe a preferred embodiment of the framework.
Overview of Compiler-Assisted Branch Control with Global Lookahead
The compiler-architecture interaction based processor embodiment described herein address the foregoing need to reduce energy consumption due to branch predictions, without impacting performance. In fact, in its preferred embodiment it improves branch prediction accuracy and performance and significantly reduces energy costs.
Some of the key factors that determine the energy efficiency of branch prediction mechanisms include: percentage of branches predicted, prediction accuracy, branch prediction related hardware table complexity and number of hardware tables, and frequency of lookups.
The framework, in this embodiment, uses static instructions to control branch predictions. This is, however, not meant to be limiting. Other embodiments might use solutions that require no added instructions, e.g., static information could be fetched with each program block, such as a basic block, from a dedicated address space and possibly stored separately with dedicated hardware support. Other embodiments would add information to the control-flow changing instructions.
An example of static instruction 20 is shown in
Assuming an embodiment with static instructions, such as shown in
The embodiment, in one aspect, is based on making static information about a branch available at runtime some time before the branch is fetched. Critical basic blocks that end with a branch would have such information inserted at the beginning of the block. What is a critical block is determined with static analysis and profiling and as a function of other factors at compile time.
In this embodiment, this static information is then decoded and pulled in the prefetch buffer. A prefetch buffer is a buffer where instructions are fetched before entering the processor pipeline.
The control information inserted can be used to control a branch at the end of the block by providing information about the branch's position, the mechanism used for prediction, such as static or dynamic, branch outcome if a branch is predicted statically, and control to stall the pipeline.
Capturing Branches and Branch Predecoding
The fraction of branches captured is increased as branches are predicted at the time the static control instructions are pre-decoded in the prefetch buffer or decoded later in the pipeline. This allows prediction of more branches that is typically possible with the current state-of-the-art, where branches need to be caught before entering processor pipelines. This often improves performance as more branches are predicted, and fewer unnecessary fetches and decodes are performed as a results of less pipeline flushes.
No branch predecoding is required in the prefetch buffer, in any of the instructions or program blocks that are preceded by related static control information. Such instructions would encode the position of a branch relative to the current program counter. This reduces the energy overhead of branch predecoding that exists in many embedded processors today.
There are often branches with prediction patterns that would require more complex dynamic predictors such as based on global history information. In one embodiment a small such predictor can be added in the microarchitecture to complement several other simpler dynamic predictors, like the binomial predictor. At compile time, one would in that case select the right predictor or prediction mechanism for each control-flow changing instruction. All branches that would not need a sophisticated predictor or that are not critical during execution would simply not be directed to such a sophisticated predictor. Because the size of such global history based predictor in this framework could be kept to very small, for example limiting it to 16 branches rather than 1,000s of branches in current solutions, it would not affect the energy consumption significantly, but it could help improve the prediction accuracy overall that in fact would reduce overall processor energy consumption due to fewer fetched executed instructions.
Reducing the Frequency of Branch Prediction
Because branch instructions are predicted with static instructions, there is no need for looking up dynamic branch history tables in parallel with every instruction fetch, in basic blocks that use static control for directing prediction. This reduces the frequency of table lookups and their energy costs typically by factor of five or so.
Another factor that reduces the branch lookup frequency is because not all branches are directed by the control instruction to be predicted dynamically.
There are many branch instructions that can be predicted very well statically and those instructions are instead being predicted by compile time static techniques. Many of the backward-pointing branches, for example, would be predicted statically. Backward-pointing branches that are not predictable well statically, would be predicted dynamically by setting the branch control-related bits in the static control instruction accordingly. This combined approach achieves a good balance between reducing the energy cost of dynamic prediction without affecting prediction accuracy.
In addition, in many cases, by using static and profiling information, even some fraction of the forward-pointing branches could be deemed to have good static predictability, i.e., if they would be consistently taken or not taken at runtime.
In addition, there are branches that are not predictable, neither statically or dynamically. This embodiment would encode static information to stall the execution and let these branches execute before additional fetches would occur. This would remove the energy penalty due to the frequent misprediction of these branches.
Reducing the Size of Branch Prediction Tables
Mapping a large fraction of branches to be predicted statically reduces the capacity requirements of hardware prediction tables, used for the dynamic prediction cases, and saves additional energy without impacting performance. In this embodiment most of the backward-pointing branches and some of the forward-pointing branches are predicted fully statically. The size of the hardware tables could therefore be reduced to half for the same or better equivalent dynamic prediction accuracy. Difficult critical branches could be directed to small global predictors such as gshare.
This aspect significantly reduces energy consumed whenever a dynamic prediction lookup is performed as the branch lookup tables could be implemented more energy efficiently.
Prediction Accuracy
Prediction accuracy of branch predictions has a significant energy impact. The embodiment described here uses a small binomial predictor of 64 entry and a small gshare predictor of 16 entry, that captures global branch context information, for the dynamic part. Nevertheless, the framework works with any type of dynamic predictor or any number of predictors.
This embodiment often improves prediction accuracy while reducing energy consumption significantly, as compared to the prediction accuracy of a particular dynamic predictor used alone. As described before, this is accomplished by having more branches predicted; branches that are highly predictable statically are predicted statically; branches that require more sophisticated prediction would use such a predictor, branches that are not predictable dynamically or statically are controlled by stalling the fetch until the branch is resolved.
If energy reduction is not the primary concern, and the dynamic prediction tables could be made equal between the compiler-assisted prediction and the dynamic predictor when used alone, then, additional prediction accuracy improvement could result. This is because the dynamic prediction tables would be used for the branches that could be best predicted dynamically and less capacity and conflict misses in branch tables such as branch address caches would be incurred.
Compiler and Profiling Support
Compiler support is used to determine the position of the branches in the control-flow graph of the program relative to the static instruction's position. In addition, compiler support is used to analyze the outcome of branches. For backward-pointing branches static analysis is performed to determine a confidence in the percentage of time the branch is taken. Profiling information can be added to the compiler for any branch that is selected not to be predicted neither statically or with one of the dynamic mechanisms. Forward-pointing branches are selected for static prediction similarly based on profile information. At the code generation phase, a compiler inserts the static instructions and adds the corresponding control decided for branches controlled into the static control instruction.
Encoding
Control information is added per a sequence of instructions, such as a basic block that ends in a branch, such that the code dilution overhead of static control could be amortized across several other compiler-assisted energy optimizations. The sequence where optimization is applied can be determined with static analysis or other means such as profiling. A control instruction is typically inserted before the controlled instruction sequence but other solutions are also possible. Energy increase due to the extra fetches related to static control information can be often minimized with similar compiler-driven instruction memory energy optimizations. Its performance overhead is minimized with removing the control instructions before entering the pipeline. In addition, multiple-issue processors would help hide this overhead further.
Branch prediction control as well as other optimizations not described in this embodiment could be integrated into a processor-wide solution and controlled with one or more control instructions per sequence of instructions. This reduces the control energy overhead as the code-dilution overhead would be amortized across many different energy optimizations, and is the preferred embodiment of the framework.
In one aspect, the control bits could be added as data to an executable. This data can be accessed through a dedicated hardware mechanism that would associate branch targets to addresses where control bits are located in the data memory, for example through a hashing mechanism, to fetch the corresponding control bits.
Independent from how the static bits are added, a static decode unit would decode these bits and generate the control signals for the associated sequence of instructions. During execution, a sequencing mechanism would control both processor resources and select appropriate energy efficient access mechanisms corresponding to the encodings decoded from the compiler-generated control bits.
The control information can also be incorporated as regular extensions to the instruction set or as coprocessor instructions.
Referring to
This BSI allows static information related to energy focused execution, in a sequence of instructions, to be exposed to the runtime architecture. The BSI instruction provides compiler information for chip-wide energy management, not only branch related. This BSI is used for fine-grained control. Additional instructions, could be used for more coarse-grained optimizations.
The BSI shown in
Referring to
The position of the branch instruction is encoded in bits 34. This tells the position of the branch relative to the BSI. Different embodiments could encode this information differently. These bits would indicate the occurrence of a branch and, together with the prediction type bits, allow dynamic prediction ahead of fetching the branch instruction. Bits 22,24,26,28 represent encodings of other optimizations that are compiler assisted in other processor domains. This BSI shows a preferred embodiment where the overhead of static control is amortized across different compiler-enabled energy optimizations. Another version of a BSI could encode short branches and allow removal of the branch instruction from the binary. Such an embodiment would remove the dilution overhead of adding static compiler information to a binary entirely as for each such instruction added a branch instruction would be removed.
The invention is not limited to the specific embodiments described herein. The invention is not limited to reducing energy consumption or improving performance. It could also be used, in other contexts where control flow prediction is necessary.
Other types of compiler analyses and/or architecture support may be used. The invention may be applied to control any appropriate component of a processor. The optimizations and/or analyses may be performed in a different order and combined with other techniques, in other embodiments.
There are different forms of energy consumption, for example such as dynamic or leakage power related. The invention is not limited to one source of energy consumption.
Other embodiments not described herein are also within the scope of the following claims.
This application is a continuation of and claims priority under 35 U.S.C. §120 to U.S. patent application Ser. No. 14/097,879, filed Dec. 5, 2013, now U.S. Pat. No. 9,244,689, which is a continuation of and claims priority under 35 U.S.C. §120 to U.S. patent application Ser. No. 11/037,663, filed Jan. 18, 2005, now U.S. Pat. No. 8,607,209, which claims the benefits of U.S. Provisional Application 60/541,875, filed on Feb. 4, 2004. The entire contents of U.S. patent application Ser. No. 14/097,879, U.S. patent application Ser. No. 11/037,663, and U.S. Provisional Application 60/541,875 are hereby incorporated into this application by reference.
Number | Name | Date | Kind |
---|---|---|---|
3603934 | Heath | Sep 1971 | A |
4003033 | O'Keefe | Jan 1977 | A |
4037090 | Raymond, Jr. | Jul 1977 | A |
4042972 | Gruner | Aug 1977 | A |
4050058 | Garlic | Sep 1977 | A |
4067059 | Derchak | Jan 1978 | A |
4079455 | Ozga | Mar 1978 | A |
4101960 | Stokes | Jul 1978 | A |
4110822 | Porter | Aug 1978 | A |
4125871 | Martin | Nov 1978 | A |
4128873 | Lamiaux | Dec 1978 | A |
4138720 | Chu | Feb 1979 | A |
4181942 | Forster | Jan 1980 | A |
4255785 | Chamberlin | Mar 1981 | A |
4354228 | Moore | Oct 1982 | A |
4376977 | Bruinshorst | Mar 1983 | A |
4382279 | Ugon | May 1983 | A |
4403303 | Howes | Sep 1983 | A |
4410939 | Kawakami | Oct 1983 | A |
4434461 | Puhl | Feb 1984 | A |
4435758 | Lorie | Mar 1984 | A |
4450519 | Guttag | May 1984 | A |
4463421 | Laws | Jul 1984 | A |
4538239 | Magar | Aug 1985 | A |
4541045 | Kromer, III | Sep 1985 | A |
4562537 | Barnett | Dec 1985 | A |
4577282 | Caudel | Mar 1986 | A |
4592013 | Prame | May 1986 | A |
4604695 | Widen | Aug 1986 | A |
4607332 | Goldberg | Aug 1986 | A |
4626988 | George | Dec 1986 | A |
4649471 | Briggs | Mar 1987 | A |
4665495 | Thaden | May 1987 | A |
4679140 | Gotou | Jul 1987 | A |
4709329 | Hecker | Nov 1987 | A |
4713749 | Magar | Dec 1987 | A |
4714994 | Oklobdzija | Dec 1987 | A |
4720812 | Kao | Jan 1988 | A |
4772888 | Kimura | Sep 1988 | A |
4773038 | Hillis | Sep 1988 | A |
4777591 | Chang | Oct 1988 | A |
4787032 | Culley | Nov 1988 | A |
4803621 | Kelly | Feb 1989 | A |
4860198 | Takenaka | Aug 1989 | A |
4870562 | Kimoto | Sep 1989 | A |
4873626 | Gifford | Oct 1989 | A |
4931986 | Daniel | Jun 1990 | A |
4992933 | Taylor | Feb 1991 | A |
5021993 | Matoba | Jun 1991 | A |
5036460 | Takahira | Jul 1991 | A |
5038282 | Gilbert | Aug 1991 | A |
5045995 | Levinthal | Sep 1991 | A |
5070451 | Moore | Dec 1991 | A |
5111389 | McAuliffe | May 1992 | A |
5121498 | Gilbert | Jun 1992 | A |
5127091 | Boufarah | Jun 1992 | A |
5136697 | Johnson | Aug 1992 | A |
5193202 | Jackson | Mar 1993 | A |
5224214 | Rosich | Jun 1993 | A |
5230079 | Grondalski | Jul 1993 | A |
5276895 | Grondalski | Jan 1994 | A |
5361367 | Fijany | Nov 1994 | A |
5410669 | Biggs | Apr 1995 | A |
5430854 | Sprague | Jul 1995 | A |
5440749 | Moore | Aug 1995 | A |
5454087 | Narita | Sep 1995 | A |
5479624 | Lee | Dec 1995 | A |
5481684 | Richter | Jan 1996 | A |
5481693 | Blomgren | Jan 1996 | A |
5497478 | Murata | Mar 1996 | A |
5507028 | Liu | Apr 1996 | A |
5524223 | Lazaravich | Jun 1996 | A |
5542059 | Blomgren | Jul 1996 | A |
5542074 | Kim | Jul 1996 | A |
5551039 | Weinberg | Aug 1996 | A |
5555386 | Nomura | Sep 1996 | A |
5555428 | Radigan | Sep 1996 | A |
5560028 | Sachs | Sep 1996 | A |
5579520 | Bennett | Nov 1996 | A |
5590283 | Hillis | Dec 1996 | A |
5590356 | Gilbert | Dec 1996 | A |
5598546 | Blomgren | Jan 1997 | A |
5604913 | Koyanagi | Feb 1997 | A |
5608886 | Blomgren | Mar 1997 | A |
5630143 | Maher | May 1997 | A |
5637932 | Koreeda | Jun 1997 | A |
5638525 | Hammond | Jun 1997 | A |
5638533 | Law | Jun 1997 | A |
5652894 | Hu | Jul 1997 | A |
5655122 | Wu | Aug 1997 | A |
5655124 | Lin | Aug 1997 | A |
5659722 | Blaner | Aug 1997 | A |
5659778 | Gingold | Aug 1997 | A |
5664950 | Lawrence | Sep 1997 | A |
5666519 | Hayden | Sep 1997 | A |
5684973 | Sullivan | Nov 1997 | A |
5696958 | Mowry | Dec 1997 | A |
5704053 | Santhanam | Dec 1997 | A |
5717440 | Katsura | Feb 1998 | A |
5721893 | Holler | Feb 1998 | A |
5727229 | Kan | Mar 1998 | A |
5737572 | Nunziata | Apr 1998 | A |
5737749 | Patel | Apr 1998 | A |
5742804 | Yeh | Apr 1998 | A |
5752068 | Gilbert | May 1998 | A |
5752069 | Roberts | May 1998 | A |
5758112 | Yeager | May 1998 | A |
5758176 | Agarwal | May 1998 | A |
5774685 | Dubey | Jun 1998 | A |
5774686 | Hammond | Jun 1998 | A |
5778241 | Bindloss | Jul 1998 | A |
5781750 | Blomgren | Jul 1998 | A |
5790877 | Nishiyama | Aug 1998 | A |
5794062 | Baxter | Aug 1998 | A |
5805907 | Loper | Sep 1998 | A |
5805915 | Wilkinson | Sep 1998 | A |
5812811 | Dubey | Sep 1998 | A |
5822606 | Morton | Oct 1998 | A |
5848290 | Yoshida | Dec 1998 | A |
5854934 | Hsu | Dec 1998 | A |
5857104 | Natarjan | Jan 1999 | A |
5864697 | Shiell | Jan 1999 | A |
5864707 | Tran | Jan 1999 | A |
5870581 | Redford | Feb 1999 | A |
5872987 | Wade | Feb 1999 | A |
5875324 | Tran | Feb 1999 | A |
5875464 | Kirk | Feb 1999 | A |
5884057 | Blomgren | Mar 1999 | A |
5887166 | Mallick | Mar 1999 | A |
5903750 | Yeh | May 1999 | A |
5924117 | Luick | Jul 1999 | A |
5930490 | Bartkowiak | Jul 1999 | A |
5930509 | Yates | Jul 1999 | A |
5933650 | van Hook | Aug 1999 | A |
5933860 | Emer | Aug 1999 | A |
5946222 | Redford | Aug 1999 | A |
5949995 | Freeman | Sep 1999 | A |
5960467 | Mahalingaiah | Sep 1999 | A |
5966544 | Sager | Oct 1999 | A |
5991857 | Koetje | Nov 1999 | A |
5996061 | Lopez-Aguado | Nov 1999 | A |
6006328 | Drake | Dec 1999 | A |
6021484 | Park | Feb 2000 | A |
6044469 | Horstmann | Mar 2000 | A |
6049330 | Redford | Apr 2000 | A |
6052703 | Redford | Apr 2000 | A |
6058469 | Baxter | May 2000 | A |
6067609 | Meeker | May 2000 | A |
6067622 | Moore | May 2000 | A |
6076158 | Sites | Jun 2000 | A |
6078745 | De Greef | Jun 2000 | A |
6089460 | Hazama | Jul 2000 | A |
6105139 | Dey | Aug 2000 | A |
6108775 | Shiell | Aug 2000 | A |
6119205 | Wicki | Sep 2000 | A |
6121905 | Redford | Sep 2000 | A |
6130631 | Redford | Oct 2000 | A |
6175892 | Sazzad | Jan 2001 | B1 |
6178498 | Sharangpani | Jan 2001 | B1 |
6211864 | Redford | Apr 2001 | B1 |
6212542 | Kahle | Apr 2001 | B1 |
6216223 | Revilla | Apr 2001 | B1 |
6219796 | Bartley | Apr 2001 | B1 |
6256743 | Lin | Jul 2001 | B1 |
6263427 | Cummins | Jul 2001 | B1 |
6272512 | Golliver | Aug 2001 | B1 |
6272676 | Haghighat | Aug 2001 | B1 |
6282623 | Halahmi | Aug 2001 | B1 |
6282628 | Dubey | Aug 2001 | B1 |
6282639 | Puziol | Aug 2001 | B1 |
6286135 | Santhanam | Sep 2001 | B1 |
6289505 | Goebel | Sep 2001 | B1 |
6292879 | Fong | Sep 2001 | B1 |
6301705 | Doshi | Oct 2001 | B1 |
6327661 | Kocher | Dec 2001 | B1 |
6334175 | Chih | Dec 2001 | B1 |
6341371 | Tandri | Jan 2002 | B1 |
6381668 | Lunteren | Apr 2002 | B1 |
6385720 | Tanaka | May 2002 | B1 |
6393520 | Yoshikawa | May 2002 | B2 |
6404439 | Coulombe | Jun 2002 | B1 |
6412105 | Maslennikov | Jun 2002 | B1 |
6430674 | Trivedi | Aug 2002 | B1 |
6430693 | Lin | Aug 2002 | B2 |
6446181 | Ramagopal | Sep 2002 | B1 |
6452864 | Condemi | Sep 2002 | B1 |
6473339 | De Ambroggi | Oct 2002 | B2 |
6477646 | Krishna | Nov 2002 | B1 |
6487640 | Lipasti | Nov 2002 | B1 |
6487651 | Jackson | Nov 2002 | B1 |
6502188 | Zuraski, Jr. | Dec 2002 | B1 |
6523110 | Bright | Feb 2003 | B1 |
6529943 | Ohi | Mar 2003 | B1 |
6539543 | Guffens | Mar 2003 | B1 |
6550004 | Henry | Apr 2003 | B1 |
6560776 | Breggin | May 2003 | B1 |
6571331 | Henry | May 2003 | B2 |
6574740 | Odaohhara | Jun 2003 | B1 |
6601161 | Rappoport | Jul 2003 | B2 |
6604190 | Tran | Aug 2003 | B1 |
6611910 | Sharangpani | Aug 2003 | B2 |
6625740 | Datar | Sep 2003 | B1 |
6643739 | Van de Waerdt | Nov 2003 | B2 |
6658578 | Laurenti | Dec 2003 | B1 |
6671762 | Soni | Dec 2003 | B1 |
6671798 | Puziol | Dec 2003 | B1 |
6675305 | Mohammad | Jan 2004 | B1 |
6687838 | Orenstien | Feb 2004 | B2 |
6732253 | Redford | May 2004 | B1 |
6772323 | Krishnan | Aug 2004 | B2 |
6795781 | Aldridge | Sep 2004 | B2 |
6813693 | Chilimbi | Nov 2004 | B2 |
6823447 | Hay | Nov 2004 | B2 |
6826652 | Chauvel | Nov 2004 | B1 |
6931518 | Redford | Aug 2005 | B1 |
6934865 | Moritz | Aug 2005 | B2 |
6970985 | Moritz | Nov 2005 | B2 |
6988183 | Wong | Jan 2006 | B1 |
7024393 | Peinado | Apr 2006 | B1 |
7036118 | Ulery | Apr 2006 | B1 |
7080366 | Kramskoy | Jul 2006 | B2 |
7089594 | Lal | Aug 2006 | B2 |
7162617 | Ota | Jan 2007 | B2 |
7185215 | Cook | Feb 2007 | B2 |
7278136 | Moritz | Oct 2007 | B2 |
7293164 | DeWitt, Jr. | Nov 2007 | B2 |
7299500 | Klebe | Nov 2007 | B1 |
7367022 | Lueh | Apr 2008 | B2 |
7430670 | Horning | Sep 2008 | B1 |
7467377 | Wu | Dec 2008 | B2 |
7487340 | Luick | Feb 2009 | B2 |
7493607 | Moritz | Feb 2009 | B2 |
7564345 | Devadas | Jul 2009 | B2 |
7600265 | Davydov | Oct 2009 | B2 |
7613921 | Scaralata | Nov 2009 | B2 |
7639805 | Li | Dec 2009 | B2 |
7676661 | Mohan | Mar 2010 | B1 |
7996671 | Chheda | Aug 2011 | B2 |
8607209 | Chheda | Dec 2013 | B2 |
9244689 | Chheda | Jan 2016 | B2 |
20010032309 | Henry | Oct 2001 | A1 |
20010044891 | McGrath | Nov 2001 | A1 |
20010056531 | McFarling | Dec 2001 | A1 |
20020073301 | Kahle | Jun 2002 | A1 |
20020095566 | Sharangpani | Jul 2002 | A1 |
20020104077 | Charnell | Aug 2002 | A1 |
20020116578 | Sakai | Aug 2002 | A1 |
20020157000 | Hay | Oct 2002 | A1 |
20030014742 | Seth | Jan 2003 | A1 |
20030041230 | Rappoport | Feb 2003 | A1 |
20030066061 | Wu | Apr 2003 | A1 |
20030200421 | Crook | Oct 2003 | A1 |
20030204705 | Oldfield | Oct 2003 | A1 |
20040003217 | Ukai | Jan 2004 | A1 |
20040010679 | Moritz | Jan 2004 | A1 |
20040010782 | Moritz | Jan 2004 | A1 |
20040010783 | Moritz | Jan 2004 | A1 |
20040015923 | Hemsing | Jan 2004 | A1 |
20040049769 | Lueh | Mar 2004 | A1 |
20040139340 | Johnson | Jul 2004 | A1 |
20040154011 | Wang | Aug 2004 | A1 |
20040158691 | Redford | Aug 2004 | A1 |
20040162964 | Ota | Aug 2004 | A1 |
20040205740 | Lavery | Oct 2004 | A1 |
20050055678 | Sakai | Mar 2005 | A1 |
20050066153 | Sharangpani | Mar 2005 | A1 |
20050108507 | Chheda | May 2005 | A1 |
20050114850 | Chheda | May 2005 | A1 |
20050154867 | DeWitt, Jr. | Jul 2005 | A1 |
20050172277 | Chheda | Aug 2005 | A1 |
20050210249 | Lee | Sep 2005 | A1 |
20050262332 | Rappoport | Nov 2005 | A1 |
20060179329 | Terechko | Aug 2006 | A1 |
20060190710 | Rychlik | Aug 2006 | A1 |
20070294181 | Chheda | Dec 2007 | A1 |
20080126766 | Moritz | May 2008 | A1 |
20090300590 | Moritz | Dec 2009 | A1 |
20140173262 | Chheda | Jun 2014 | A1 |
Number | Date | Country |
---|---|---|
0314277 | Mar 1989 | EP |
0552816 | Jul 1993 | EP |
0679991 | Nov 1995 | EP |
0681236 | Nov 1995 | EP |
0945783 | Sep 1999 | EP |
2201015 | Aug 1988 | GB |
10-289305 | Oct 1998 | JP |
2002-7359 | Jan 2002 | JP |
8700318 | Jan 1987 | WO |
9119269 | Dec 1991 | WO |
9304438 | Mar 1993 | WO |
9914685 | Mar 1999 | WO |
0239271 | May 2002 | WO |
0239272 | May 2002 | WO |
0244895 | Jun 2002 | WO |
0246885 | Jun 2002 | WO |
2004006060 | Jan 2004 | WO |
Entry |
---|
Abraham et al., “Automatic and Efficient Evaluation of Memory Hierarchies for Embedded Systems,” micro, p. 114, 32nd Annual IEEE/ACM International Symposium on Microarchitecture (MICRO '99); 1999. |
Abstract search, “SIMD Processor” dated Mar. 21, 2003; 484 pages. |
Actel Corporation, “Design Security in Nonvolatile Flash and Antifuse FPGAs Security Backgrounder”, [online] Retrieved from the Internet: URL <http://www.actel.com/documents/DesignSecurity—WP .pdf> [retrieved on Feb. 22, 2011] (2002). |
Advanced Micro Devices, Inc., “Quantispeed Architecture”, AMD White Paper, Sunnyvale, CA, (2001). |
Aho et al., Compilers: Principles, Techniques and Tools, Addison-Wesley, Reading, MA; 1988. |
Al-Tawil, K. et al. “Performance Modeling and Evaluation of MPI”, Journal of Parallel and Distributed Computing, vol. 61, pp. 202-223; 2001. |
Akkar et al., “An Implementation of DES and AES, Secure Against Some Attacks”, CHES2001, LNCS 2162, pp. 309-318 (2001). |
Albonesi et al., “Selective Cache Ways: On-Demand Cache Resource Allocation”, 85 Proceedings of the 32nd International Symposium on Microarchitecture, pp. 248-259 (Nov. 1999). |
Andersen, L., “Program Analysis and Specialization for the C Programming Language”, Ph.D. Thesis, DIKU, Univ. of Copenhagen (May 1994). |
Anderson et al., “Physical Design of a Fourth-Generation POWER GHz Microprocessor”, Digest of Technical Papers, IEEE Int'l Solid State Circuits Conf.; p. 232-233 and 451 (2001). |
ANSI x9.17, “American national standard for financial institution key management (wholesale)”, Tech. Rep., American Bankers Assoc. (1985). |
Antoniou, A., “Digital Filters: Analysis, Design & Applications”, McGraw-Hill, New York, NY (1993). |
Aragon, et al., “Power-aware Control Speculation Through Selective Throttling,” Proceedings of 9th International Symposium on High Performance Computer Architecture (HPCA), 2003. |
ARM Architecture Reference Manual—ARM DDI 0100E, pp. A4-28 and A4-82 ((c) 1996-2000). |
Ashok et al., “Cool-Mem: Combining Statically Speculative Memory Accessing with Selective Address Translation for Energy Efficiency”, in Proceedings of the 10th international conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS 2002), pp. 133-143, San Jose, CA; Oct. 2002. |
Ashok et al., “Coupling Compiler-Enabled and Conventional Memory Accessing for Energy Efficiency”, ACM Transactions on Computer Systems (TOGS), vol. 22, No. 2, pp. 180-213; May 2004. |
Athanas et al., “Processor Reconfiguration Through Instruction-Set Metamorphosis”, IEEE / Computer Magazine, v. 26(3), pp. 11-18 (1993). |
Babb et al., “Parallelizing Applications into Silicon”, The 7th Annual IEEE Symposium on Field-Programmable Custom Computing Machines, FCCM '99, Napa, CA (Apr. 1999). |
Bahar et al., “Power and Energy Reduction Via Pipeline Balancing”, IEEE, 12 pgs., (2001). |
Banerjee et al., “Fast execution of loops with IF statements”, IEEE vol. 84, pp. 126-132 (1984). |
Baniasadi et al., “Instruction Flow-Based Front-end Throttling for Power-Aware Hi-Performance Processors”, (ISLPED '01), ACM, pp. 16-21, (2001). |
Bechade et al., “A 32b 66MHz 1.8W Microprocessor”, Digest of Technical Papers, IEEE; pp. 208-209, (1994). |
Bellas et al., “Architectural and Compiler Techniques for Energy Reduction in High-Performance Microprocessors”, IEEE Trans. On Very Large Scale Integration Systems, vol. 8(3), pp. 317-326 (2000). |
Bellas et al., Using Dynamic Cache Management Technique to Reduce Energy in General Purpose Processors; 2000, pp. 693-708. |
Ben Naser et al., “A Step-by-Step Design and Analysis of Low Power Caches for Embedded Processors”, Boston Area Architecture Workshop (BARC-2005); Jan. 2005. |
Ben Naser, M., “Data Memory Subsystem Resilient to Process Variations”, PHD Thesis, Jan. 2008. |
Ben Naser, M., “Designing Memory Subsystems Resilient to Process Variations”, IEEE Computer Society Annual Symposium on VLSI (ISVLSI 2007), Brazil; May 2007. |
Ben Naser, M., “Power and Failure Analysis of Cam Cells Due to Process Variations”, Proc. of 13th IEEE International Conference on Electronics, Circuits and Systems (ICECS '06), Nice, France; Dec. 2006. |
Benini, et al., “A Recursive Algorithm for Low-Power Memory Partitioning”, (ISLPED'OO), ACM pp. 78-83 (2000). |
Biham et al., “Differential Cryptanalysis of DES-like Cryptosystems”, J. Cryptology, vol. 4, pp. 3-72 (1991). |
Brooks et al., “Wattch: A Framework for Architectural-Level Power Analysis and 101 Optimizations”, Proceedings of the 27th International Symposium on Computer Architecture (ISCA '00); ACM, pp. 83-94, (2000). |
Burger et al., “The SimpleScalar Tool Set, Version 2.0”, Computer Sciences Dept., Univ. of Wisconsin-Madison, Technical Report 1342, pp. 13-25 (1997). |
Bursky, D., “Advanced DRAM architectures overcome data bandwidth limits”, Electron. Des., vol. 45, pp. 73-88 (1997). |
Burtscher et al., “Static Load Classification for Improving the value Predictability of Data-Cache Misses”, ACM (2000), pp. 222-233. |
Buyuktosunoglu et al., “An Adaptive Issue Queue for Reduced Power at High Performance” Power-Aware Computer Systems, First International Workshop, PACS 2000, pp. 25-39 (2000). |
Calder et al. “Next Cache Line and Set Prediction.” Proceedings of the 1995 International Computer Symposium on Computer Architecture, ACM, pp. 287-296 (1995). |
Calder et al., “Fast & Accurate Instruction Fetch and Branch Prediction”, IEEE, pp. 2-11 (1994). |
Cantin et al., “Cache Performance for Selected SPEC CPU2000 Benchmarks” Computer Architecture News, 29( 4 ): 13-18 (2001). |
Chang et al., “Protecting Software Code by Guards”, Proc. ACM Workshop on Security and Privacy in Digital Rights management (SPDRM), LNCS 2320, pp. 160-175 (2002). |
Chase et al., “Lightweight Shares Objects in a 64-Bit Operating System”, Univ. of Washington, Dept. of Computer Science & Engineering, Technical Report 92-03-09, Seattle, WA (Jun. 1992). |
Chheda et al., “Combining compiler and runtime IPC predictions to reduce energy in next generation architectures”, Proceedings of the First Conference on Computing Frontiers, pp. 240-254, Italy, Apr. 2004. |
Chheda et al., “Memory Systems: Overview and Trends”, Encyclopedia of Life Support Systems; 2001. |
Chiou et al., “Application-Specific Memory Management for Embedded Systems Using Software-Controlled Caches”, (DAC'00), ACM, pp. 416-419 (2000). |
Cohn et al., “Optimizing Alpha Executables on Windows NT with Spike”, Digital Tech. Jour., vol. 9(1), pp. 2-20 (1997). |
Collins, L. “Power drops focus the minds at ARM”, EE Times (2002), [online] Retrieved from the internet: <URL: http://eetimes.eu/uk/16505609> [retrieved on Aug. 28, 2008]. |
Compaq Computer Corporation, “Compiler Writer's Guide for the Alpha 21264”, Digital Equipment Corporation © 1999. |
Cooper et al., “Compiler-Controlled Memory”, ASPLOS VIII; ACM, 33(11):2-11 (1998). |
Cortadella et al., “Evaluation of A+B=K Conditions Without Carry Propagation”, IEEE Trans. On Computers, vol. 41(11), pp. 1484-1488 (Nov. 1992). |
Cosoroba, A., “Double Data Rate Synchronous DRAMS in High Performance Applications”, WESCON'97 IEEE Conference Proceedings, (1997) pp. 387-391. |
Cowell et al., “Improved Modeling and Data-Migration for Dynamic Non-Uniform Cache Access”, In WDD2 2003 organized in conjunction with ISCA; 2003. |
Daemen et al., “The Rijndael Block Cipher—AES Proposal”, [online] Tech. Rep., Mar. 9, 1999 [retrieved on Apr. 1, 2008], Retrieved from the internet: < U RL: http:/ /csrc. nist.gov/encryption/aes/rou nd2/r2algs.htm>. |
Deitrich et al., “Speculative Hedge: Regulating Compile-Time Speculation Against Profile Variations”, IEEE (1996), pp. 70-79. |
Delaluz et al., “Energy-Oriented Compiler Optimizations for Partitioned Memory Architectures”, International Conference on Compilers, Architecture and Synthesis for Embedded Systems, Proceedings of the 2000 international conference on Compilers, architecture, and synthesis for embedded systems, San Jose, CA, 10 pgs., (2000). |
Desmet et al., “Improved Static Branch Prediction for Weak Dynamic Predictions”, retrieved from <http://escher.elis.ugent.be/pubi/Edocs/DOC/P1 03—085.pdf>, available on line database on Sep. 24, 2003, p. 1-3. |
Folegnani et al., “Energy-Effective Issue Logic”, IEEE, 10 pgs. (2001). |
Frank et al., “SUDS: Primitive Mechanisms for Memory Dependence Speculation”, Technical Report. LCS-TM-591, Oct. 1998. |
Furber et al., “ARM3-32b RISC Processor with 4 KByte On-Chip Cache”, VLSI'89, Elsevier, pp. 35-44 (1989). |
Furber et al., “Power Saving Features in AMULET2e”, In Power Driven Microarchitecture Workshop at 25th Annual International Symposium on Computer Architecture, Barcelona, Spain, 4 pgs. (Jun. 1998). |
Gandolfi et al., “Electromagnetic Analysis: Concrete Results”, Workshop of Cryptographic Hardware and Embedded Systems (CHES'01), LNCS 2162, pp. 251-261 (2001). |
Gassend et al., “Controlled Physical Random Functions”, Proc. 18th Ann. Computer Security Applications Conf. [online] Retrieved from the Internet:URL:http://csg.csail.mit.edu/pubs/memos/Memo-457/memo-457.pdf [retrieved on Feb. 22, 2011] (2002). |
Ghiasi et al., “Using I PC Variation in Workloads with Externally Specified Rates to Reduce Power Consumption”, In Workshop on Complexity Effective Design, Vancouver, Canada, pp. 1-10 (Jun. 2000). |
Gilmont et al., “An Architecture of security management unit for safe hosting of multiple agents”, Proc. Of the Int'l Workshop on Intelligent Communications and Multimedia Terminals, [online] Retrieved from the Internet:<URL:http://citeseerx.ist.psu.edu/viewdoc/download?doi=1 0.1.1.140.6346 &rep=rep1&type=pdf> [retrieved on Feb. 22, 2011] (Nov. 1998). |
Gilmont et al., “Hardware Security for Software Privacy Support”, Electronics Lett., vol. 35(24 ), pp. 2096-2097 (1999). |
Gowan et al., “Power Considerations in the Design of the Alpha 21264 Microprocessor”, (DAC 98), ACM, pp. 726-731 (1998). |
Grand, J., “Attacks on and Countermeasures for USB Hardware Token Devices”, Proc. Fifth Nordic Workshop on Secure IT Systems [online] Retrieved from the Internet:URL:http://citeseerx.ist.psu.edu/viewdoc/download;jsessionid=98145A98 9FOA335F16702C1 EA12F0819?doi=1 0.1.1.16.540&rep=rep1&type= pdf [retrieved on Feb. 22, 2011] (2000). |
Grant et al., “Annotation-Directed Run-Time Specialization in C”, ACM (1997), pp. 163-178. |
Guo et al., “Compiler-Enabled Cache Management for Pointer-Intensive Programs”, Boston Area Architecture Workshop (BARC-2003), Jan. 2003. |
Guo et al., “Energy Characterization of Hardware-Based Data Prefetching”, Proc. 127 of the IEEE Inti. Conference on Computer Design (ICCD'04 ), pp. 518-523, Oct. 2004. |
Guo et al., “Energy-Aware Data Prefetching for General-Purpose Programs”, Proc. of PACS'04 Workshop on Power-Aware Computer Systems, Micro-37, Dec. 2004; to be appeared on Lecture Notes in Computer Science. |
Guo et al., “PARE: A Power-Aware Data Prefetching Engine”, Proc. of International Symposium on Low Power Electronics and Design (ISLPED'05), San Diego, CA; Aug. 2005. |
Guo et al., “Runtime Biased Pointer Analysis and Its Application on Energy Efficiency”, Proc. of Workshop on Power-Aware Computer Systems (PACS'03), Micro-36, Dec. 2003, San Diego, CA; also in Lecture Notes in Computer Science, vol. 3164, pp. 1-12, Springer 2004, ISBN 3-540-24031-4. |
Guo et al., “Synchronization Coherence: A Transparent Hardware Mechanism for Cache Coherence and Fine-Grained Synchronization”, accepted by Journal of Parallel and Distributed Computing (JPDC), 2007. |
Guo, Y., “Compiler-Assisted Hardware-Based Data Prefetching for Next Generation Processors”, PhD Thesis, May 2007. |
Gutmann, P., “Data Remanence in Semiconductor Devices”, Proc. Of the 10th USENIX Security Symposium, 17 pgs. (2001). |
Gutmann, P., “Secure Deletion of Data from Magnetic and Solid-State Memory”, Proc. of the 6th USENIX Security Symposium, 18 pgs. (1996). |
Harvard University / Michael D. Smith's Research Group on Compilation and Computer Architecture; [online] Retrieved from the internet: URL:http://www.eecs.harvard.edu/hube/software/software.html [retrieved on May 4, 2004]. |
Heinrich, J., MIPS R10000 Microprocessor's User Manual, 2nd Ed., MIPS Technologies, Inc. (1996). |
Heinrich, J., MIPS R4000 Microprocessor User's Manual, 2nd Ed., MIPS Technologies, Inc. (1994). |
Hennessey et al., “Enhancing Vector Performance”, Computer Architecture, a Qualitative Approach, Second Edition, Section 5, pp. B23-B29 (1996). |
Henry et al., “Circuits for Wide-Window SuperScalar Processors” (ISCA'OO), ACM, pp. 236-247 (2000). |
Hinton et al., “The Microarchitecture of the Pentium 4 Processor”, Intel Technology Journal 01, pp. 1-12 (2001). |
Huang et al., “L 1 Data Cache Decomposition for Energy Efficiency”, (ISLPED'01 ), ACM, pp. 10-15 (2001). |
Huang et al., “Speculative Disambiguation: A Compilation Technique for Dynamic Memory Disambiguation”, IEEE (1994), pp. 200-210. |
IBM, “Single-Bit Processor Enable Scheme”, IBM Technical Disclosure Bulletin, vol. 29, No. 11, pp. 5016-5017 (Apr. 1987). |
Inoue et al., “Way-Predicting Set-Associative Cache for High Performance and Low Energy Consumption”, (ISLPED'99), ACM, pp. 273-275 (1999). |
Intel 80386 Programmer's Reference Manual (1986). |
Intel, “Intel StrongARM* SA-1110 Microprocessor”, SA-1110 Brief Datasheet, pp. 1-9 (2000). |
International Preliminary Examination Report in application PCT/US2003/21076, Mailed Sep. 10, 2004. |
International Search Report for Application PCT/US03/21120, dated Jul. 30, 2004. |
International Search Report in Application No. PCT/US03/20999, dated Oct. 10, 2003. |
Jain et al., “A 1.2Ghz Alpha Microprocessor with 44.8GB/s Chip Pin Bandwidth”, IEEE, pp. 240-241 (2001). |
Kaxiras et al., “Cache Decay: Exploiting Generational Behavior to Reduce Cache Leakage Power”, IEEE, pp. 240-251 (2001). |
Kean, T., “Secure Configuration of Field-Programmable Gate Arrays”, Proc. Of the 11th Int'l Conf. on Field-Programmable Logic and Applications [online] Retrieved 10 from the internet: <URL: http://citeseerx.ist.psu.edu/viewdoc/download?doi=1 0.1.1.86.2017&rep=rep1&type =pdf> [retrieved on Feb. 22, 2011] (2001). |
Kelsey et al., “Side Channel Cryptanalysis of Product Ciphers”, Proc. ESORICS'98, pp. 97-110 (1998). |
Kever et al., “A 200M Hz RISC Microprocessor with 128kB On-Chip Caches”, IEEE, pp. 410, 411 and 495 (1997). |
Kim et al., “Partitioned Instruction Cache Architecture for Energy Efficiency”, ACM Trans. On Embedded Computing Systems, v.2(2), pp. 163-185 (May 2003). |
Kim et al., “Predictive Precharging for Bitline Leakage Energy Reduction”, 15th Ann. IEEE Int'l. ASIC/SOC Conf., pp. 36-40 (2002). |
Kin et al., “The Filter Cache: An Energy Efficient Memory Structure”, IEEE, pp. 184-193 (1997). |
Kocher et al., “Differential Power Analysis”, CRYPT0'99, LNCS 1666, 10 pgs. (1999). |
Kocher et al., “Timing Attacks on Implementations of Diffie-Hellmann, RSA, DSS and Other Systems”, Adv. In Cryptology (CRYPT0'96), 10 pgs. (1996). |
Kommerling et al., “Design Principles for Tamper-Resistant Smartcard Processors”, USENIX Workshop on Smartcard Technology, 12 pgs. (1999). |
Kowalczyk et al., “First-Generation MAJC Dual Processor”, IEEE, pp. 236-237 and 451 (2001). |
Kuhn et al., “Soft Tempest: Hidden Data Transmission Using Electromagnetic Emanations”, Proc. Of 2nd Int'l Workshop on Information Hiding [online] Retrieved from the internet: URL:http://www.cl.cam.ac.uk/-mgk25/ih98-tempest.pdf [retrieved on Feb. 22, 2011] (1998). |
Kuhn et al., “Tamper Resistance—A Cautionary Note”, Proc. Of the 2nd USENIX Workshop on Electronics Commerce, 11 pgs. (1996). |
Kuhn, M., “Optical Time-Domain Eavesdropping Risks of CRT Displays”, Proc. Of the 2002 IEEE Symp. On Security and Privacy [online] Retrieved from the internet: <URL:http://www.cl.cam.ac.uk/-mgk25/ieee02-optical.pdf> [retrieved on Feb. 22, 2011] (May 2002). |
Kulkarni et al., “Advanced Data Layout Optimization for Multimedia Applications”, Lecture Notes in Computer Science; vol. 1800, Proceedings of the 15 IPDPS 2000 Workshops on Parallel and Distributed Processing 8 pgs. (2000). |
Lam et al., “Limits of Control Flow on Parallelism”, ACM, pp. 46-57 (1992). |
Larsen et al., “Exploiting Superword Level Parallelism With Multimedia Instruction Sets”, (PLDI'OO), ACM, pp. 145-156 (2000). |
Lee et al., “MediaBench: A Tool for Evaluating and Synthesizing Multimedia and Communications Systems”, International Symposium on Microarchitecture, pp. 330-335 (1997). |
Lee et al., “Region-Based Caching: An Energy-Delay Efficient Memory Architecture for Embedded Processors.” (CASES '00) ACM, pp. 120-127 (2000). |
Leenstra et al., “A 1.8 GHz Instruction Buffer”, IEEE, pp. 314-315 and 459 (2001). |
Levinthal et al., “Chap—A SIMD Graphics Processor”, Computer Graphics, vol. 18(3), (Jul. 1984). |
Lie et al., “Architectural Support for Copy and Tamper Resistant Software”, Proc. Of the 6th Int'l Conf. Architectural Support for Programming Languages and Operating Systems, ACM, 10 pgs. (2000). |
Loughry et al., “Information Leakage from optical Emanations”, ACM Trans. On Information and System Security, vol. 5(3), 28 pgs. (2002). |
Itoh et al., “DPA Countermeasure Based on ‘Masking Method’”, ICICS 2001, LNCS 2288, pp. 440-456 (2002). |
MAC OS Runtime Architectures for System 7 Through MAC OS 9, Ch. 7, (Pub. Jan. 31, 1997 (c) Apple Inc.) [online] Retrieved from the Internet: < U RL: http:/ /developer .apple.com/documentation/mac/pdf/MacOS RT Architectures.pdf> [retrieved on Aug. 13, 2009]. |
Manne et al., “Pipeline Gating: Speculation Control for Energy Reduction”, IEEE, pp. 132-141 (1998). |
Marculescu, D., “Profile-Driven Code Execution for Low Power Dissipation”, (ISPLED'OO) ACM, pp. 253-255 (2000). |
Maro et al., “Dynamically Reconfiguring Processor Resources to Reduce Power Consumption in High-Performance Processors, Workshop on Power-Aware Computer Systems”, (PACS '00/LNCS 2008) ACM, pp. 97-111 (2001). |
Memik et al., “A Selective Hardware/Compiler Approach for Improving Cache Locality”, Center for Parallel and Distributed Computing, Northwestern University; pp. 1-21 (2000). |
Menezes et al., “Handbook of Applied Cryptography”, CRC Press (CRC Press Series on Discrete Mathematics and Its Applications), (1997). |
Messerges et al., “Examining Smart Card Security Under the Threat of Power Analysis Attacks”, IEEE Trans. On Computers, val. 51(5), pp. 541-552 (2002). |
Michaud et al. “Data-Flow Prescheduling for Large Instructions Windows in Out-of-Order Processors, 7th International”, IEEE, pp. 27-36 (2001). |
MICR0'34 2001, 34th Annual Acm/IEEE International Symposium on Microarchitecture (2001). |
Milutinovic et al., “The Split Temporal/Spatial Cache: Initial Performance Analysis”, Proceedings of the SCizzL-5, 8 pgs. (1996). |
Mirsky et al., “MATRIX: A Reconfigurable Computing Architecture with Configurable Instruction Distribution and Deployable Resources”, Proc. Of the IEEE Symposium on FPGSs for Custom Computing Machines, pp. 157-166 (1996). |
Montanaro et al., “A 160 MHz, 32b, 0.5-W CMOS RISC Microprocessor”, IEEE, 31(11):1703-1714 (1996). |
Moritz et al., “Adaptive Distributed Software Virtual Memory for Raw”, Laboratory for Computer Science, Raw group, MIT, Cambridge; Jan. 1999. |
Moritz et al., “Exploring Cost-Performance Optimal Designs of Raw Microprocessors”, The 6th Annual IEEE Symposium on Field-Programmable Custom Computing Machines FCCM '98., Apr. 1998, Napa, California. |
Moritz et al., “Fault-Tolerant Nanoscale Processors on Semiconductor Nanowire Grids”, IEEE Transactions on Circuits and Systems I, special issue on Nanoelectronic Circuits and Nanoarchitectures, vol. 54, iss. 11, pp. 2422-2437, Nov. 2007. |
Moritz et al., “FiexCache: A Framework for Flexible Compiler Generated Data 164 Caching”, Proc. of the 2nd Intelligent Memory Workshop, IRAMOO, Cambridge, MA, Nov. 2000. |
Moritz et al., “Hot Pages: Design and Implementation of Software Caching for Raw”, IBM Research Lab Austin, May 1999. |
Moritz et al., “Hot Pages: Software Caching for Raw Microprocessors”, International Symposium for Computer Architecture (ISCA-27), Massachusetts Institute of Technology, Cambridge, MA, pp. 1-12 (1999). |
Moritz et al., “Latching on the Wire and Pipelining in Nanoscale Designs”, 3rd Workshop on Non-Silicon Computation (NSC-3), ISCA'04, Germany, Jun. 2004. |
Moritz et al., “LoGPC: Modeling Network Contention in Message-Passing Programs”, ACM Joint International Conference on Measurement and Modeling of Computer Systems, ACM Sigmetrics/Performance 98 Wisconsin Madison, Jun. 1998, also in ACM Performance Evaluation Review Special Issue vol. 26 No. 1. |
Moritz et al., “LOGPC: Modeling Network Contention in Message-Passing Programs”, IEEE Transactions on Parallel and Distributed Systems, vol. 12, No. 4, pp. 404-415, Apr. 2001. |
Moritz et al., “Security Tradeoffs in NEST”, DARPA Presentation, Dec. 2003. |
Moritz et al., “SimpleFit: a Framework for Analyzing Design Tradeoffs in Raw Architectures”, IEEE Transactions on Parallel and Distributed Systems, vol. 12, No. 7, pp. 730-742, Jul. 2001. |
Moritz et al., “Towards Defect-tolerant Nanoscale Architectures”, Invited Paper, IEEE Nano2006, 2006. |
Mueller et al., “Predicting Instruction Cache Behavior”, ACM SIGPLAN Workshop on Language, Compiler* Tool Support for Real-Time Systems (Jun. 2004). |
Narayanan et al., “CMOS Control Enabled Single-Type FET NASIC”, Best Paper Award, IEEE Computer Society Annual Symposium on VLSI 2008, 2008. |
Narayanan et al., “Comparison of Analog and Digital Nano-Systems: Issues for the Nano-Architect”, IEEE International Nanoelectronics Conference (INEC), 2008. |
Narayanan et al., “Image Processing Architecture for Semiconductor Nanowire based Fabrics”, accepted by IEEE 8th International Conference on Nanotechnology, 2008. |
National Bureau of Standards, “Data Encryption Standard”, Tech. Rep. NBS FIPS Pub. 46, Nat'l Bur. Standards, US Dept. of Commerce (Jan. 1977). |
Nicolau et al., “Measuring the Parallelism Available for Very Long Instruction Word Architectures”, IEEE Transactions on Computers, 33(11):968-976 (1984). |
Oppenheim, A. et al., “Discrete-Time Signal Processing”, Prentice-Hall, Upper Saddle River, NJ (1999). |
Ors et al., “Power-Analysis Attack on an ASIC AES Implementation”, Proc. Of Int'l Symp. On Information Tech. [online] Retrieved from the Internet<URL:http://citeseerx.ist.psu.edu/viewdoc/download?doi=1 0.1.1.88.2697&rep=rep1 &type= pdf> [retrieved on Feb. 22, 2011] (ITCC 2004). |
Palacharla et al., “Complexity-Effective Superscalar Processors”, (ISCA'97) ACM, pp. 206-218 (1997). |
Panda et al., “Efficient Utilization of Scratch-Pad Memory in Embedded Processor Applications”, IEEE, pp. 7-11 (1997). |
Parikh et al., “Power Issues Related to Branch Prediction”, (HPCA'02) IEEE, 12 pgs. (2002). |
Pering et al., “Dynamic Voltage Scaling and the Design of a Low-Power Microprocessor System”, In Power Driven Microarchitecture Workshop, attached to ISCA98, (Jun. 1998). |
Ponomarev et al., “Reducing Power Requirements of Instruction Scheduling Through Dynamic Allocation of Multiple Datapath Resources”, IEEE, pp. 90-101 (2001). |
Postiff et al., “The Limits of Instruction Level Parallelism in SPEC95 Applications”, Computer Architecture News, vol. 217(1). 10 pgs. (1999). |
Powell et al., “Reducing Set-Associative Cache Energy via Way-Prediction and Selective Direct-Mapping”, IEEE, pp. 54-65 (2001). |
PowerPC Upgrade FAQ Powerbook 500 Series PPC Upgrade from IMAX (dated Jan. 28, 1997) [online], Retrieved from the Internet: URL:http://www.darryl.com/ppcfaq.html [retrieved on Aug. 13, 2009]. |
Prasad et al., “Efficient Search Techniques in the Billion Transistor Era”, Invited paper, appears in PDPTA, Las Vegas, NV, 2001. |
Qi et al., “A Unified Cache Coherence and Synchronization Protocol”, Boston Area Architecture Workshop (BARC-2004), Jan. 2004. |
Quisquater et al., “Electromagnetic Analysis (EMA) Measures and Counter-Measures for Smart Cards”, E-smart 2001, LNCS 2140, pp. 200-210 (2001). |
Ramirez et al., “Branch Prediction Using Profile Data”, Springer-Verlag Berlin Heidelberg (2001), pp. 386-394. |
Ranganathan et al., “Reconfigurable Caches and their Application to Media Processing”, (ISCA'OO) ACM, pp. 214-224 (2000). |
Rao et al., “EMPowering Side-Channel Attacks”, IBM Research Ctr. [online] Retrieved from the internet: <URL:http://eprint.iacr.org/2001/037.pdf> [retrieved on Feb. 22, 2011] (May 2001). |
Reinman et al., “An Integrated Cache Timing and Power Model”, COMPAQ Western Research Lab, pp. 1-20 (1999). |
Rugina et al., “Pointer Analysis for Multithreaded Programs”, Proc. Of SIGPLAN'99 Conf. on Program Language Design and Implementations (May 1999). |
Sair et al., “Memory Behavior of the SPEC2000 Benchmark Suite”, IBM Thomas J. Watson Research Center Technical Report RC-21852, pp. 1-8, (Oct. 2000). |
Sanchez et al., Static Locality Analysis for Cache Management, pp. 261-271 (1997). |
Schlansker et al., “Achieving High Levels of Instruction-Level Parallelism with Reduced Hardware Complexity”, Hewlett Packard Laboratories (HP-96-120), pp. 1-85 (1994). |
Schneier et al., “Applied Cryptography, 2nd Ed.”, pp. 13 and 270-278, John Wiley & Sons, Inc., (pub.), (1996). |
Schwartz et al., “Disassembly of Executable Code Revisited”, Proc. 9th Working Conf. on Reverse Engineering (WCRE'02), 10 pgs. (2002). |
Simunie et al., “Source Code Optimization and Profiling of Energy Consumption in Embedded Systems”, Proc. 13th Int'l Symposium on System Synthesis (2000), pp. 193-198. |
Singh et al., “Short Range Wireless Connectivity for Next Generation Architectures”, Invited paper, appears in PDPTA, Las Vegas, NV, 2001. |
Skorobogatov et al., “Optical Fault Induction Attacks”, Proc. Of Cryptographic Hardware and Embedded Systems (CHES'02), LNCS 2523, pp. 2-12 (2003). |
Skorobogatov, S., “Breaking Copy Protection in Microcontrollers”, [online] Retrieved from the internet: URL: http://www.cl.cam.ac.uk/-sps32/mcu—lock.html [retrieved on Feb. 22, 2011] (2000). |
Skorobogatov, S., “Data Remanence in Flash Memory Devices”, Proc. Of Cryptog. Hardware and Embedded Systems (CHES2005) [online] Retrieved from the internet: <URL:http://s3.amazonaws.com/ppt-download/data-remanence-in-flash-memory-devices 1949.pdf?response-contentdisposition=attachment&Signature=p51Xjx2Qcu760LiE02JwBVQHYCo%3D&Expires=1298390877&AWSAccessKeyId=AKIAJLIT267DEGKZDHEQ> [retrieved on Feb. 22, 2011] (2005). |
Skorobogatov, S., “Tamper Resistance and Physical Attacks”, Summer School on Cryptographic Hardware, Side-Channel and Fault Attacks (ECRYPT-2006), Jun. 12-15, 2006, Louvain-la-Neuve [online] Retrieved from the internet: <URL: http://www.cl.cam.ac.uk/-sps32/#Publications> [retrieved on Feb. 22, 2011] (2006). |
Sohi et al., “Instruction Issue Logic for High-Performance, Interruptible Pipelined Processors”, ACM, pp. 27-34 (1987). |
Srivastava et al., “Atom: A System for Building Customized Program Analysis Tools”, Proc. Of ACM SIGPLAN'94 Conf. on Programming Languages Design and Implementation, pp. 196-205 (1994). |
Stanford University SUIF Compiler Group [online] Retrieved from the internet: <URL: http://suif.stanford.edu/> [retrieved on May 4, 2004]. |
Steensgard, B., “Points-to Analysis in Almost Linear Time”, POPL96 (1996). |
Steinke et al., “Reducing Energy Consumption by Dynamic Copying of Instructions 12 onto Onchip Memory”, Proc. Of the 15th Int'l Symposium on System Synthesis, PQS. 213-218 (2002). |
Telikepalli, A., “Is Your FPGA Design Secure?”, XCELL Journal, [online] Retrieved from the Internet<URL:http://cdserv1.wbut.ac.in/81-312-0257-7 /Xilinx/files/Xceii%20Journai%20Articles/xcell—4 7 /xc—secure4 7 .pdf> [retrieved on Feb. 22, 2011] (2003). |
The Standard Performance Evaluation Corporation, http://www.spec.org, (© 2002). |
Trichina et al., “Secure AES Hardware Module for Resource Constrained Devices”, ESAS 2004, Lee. Notes in CompSci 3313, [online] Retrieved from the internet: <URL:http://citeseerx.ist.psu.edu/viewdoc/download?doi=1 0.1.1.95.6712&rep=rep1 &type= pdf> [retrieved on Feb. 22, 2011] (2005). |
Tune et al., “Dynamic Predictions of Critical Path Instructions”, IEEE, pp. 185-195 (2001). |
Tygar et al., “Dyad: A System for Using Physically Secure Coprocessors”, Tech. Rep. CMU-CS-91-140R, Carnegie Mellon University, 38 pgs. (1991). |
Unnikrishnan et al., “Dynamic Compilation for Energy Adaption”, IEEE/ACM Int'l. Conf. on Computer Aided Design (2002). |
Unsal et al., “An Analysis of Scalar Memory Accesses in Embedded and Multimedia Systems,” High Performance Memory Systems, Springer-Verlag, 2003. |
Unsal et al., “Cool-Cache for Hot Multimedia”, in Proc. of the 34th Annual 200 International Symposium on Microarchitecture (MICR0-34), Austin, TX, pp. 274-283, Dec. 2001. |
Unsal et al., “Cool-Cache: A compiler-enabled energy efficient data caching 201 framework for embedded/multimedia processors”, ACM Transactions on Embedded Computing Systems (TECS), vol. 2(3):373-392, Aug. 2003. |
Unsal et al., “Cool-Fetch: A Compiler-Enabled IPC Estimation Based Framework 202 for Energy Reduction”, Proc. of the 8th Annual Workshop on Interaction between Compilers and Computer Architecture (INTERACT-S), pp. 43-52, Feb. 2004. |
Unsal et al., “Cool-Fetch: Compiler-Enabled Power-Aware Fetch Throttling,” IEEE Computer Architecture Letters, vol. 1, 2002. |
Unsal et al., “On Memory Behavior of Scalars in Embedded Multimedia Systems”, Workshop on Memory Performance Issues, ISCA, Goteborg, Sweden, Jun. 2001. |
Unsal et al., “The Minimax Cache: An Energy Efficient Framework for Media Processors,” IEEE, pp. 131-140 (2002). |
Unsal et al., High-Level Power-Reduction Heuristics for Embedded Real-Time Systems, University of Massachusetts, pp. 1-6, (2000). |
Unsal et al., Power-Aware Replication of Data Structures in Distributed Embedded Real-Time Systems, IPDPS 2000 Workshops, pp. 839-846. |
Van Eck, W., “Electronic Radiation from Video Display Units: An Eavesdropping risk?”, Computers & Security [online] Retrieved from the internet<URL:http://jya.com/emr.pdf>, [retrieved on Feb. 22, 2011] (1985). |
Vinciguerra et al., “An Experimentation Framework for Evaluating Disassembly and Decompilation Tools for C++ and Java”, IEEE Proc. Of the 1Oth Working Conf. on Reverse Engineering (WCRE'03), 10 pgs. (2003). |
Voronin, A. “Data Storage on Hard Disks” [online] Retrieved from the internet: <URL:http://www.digit-life.com/articles/bootman/index.html> [retrieved on Aug. 27, 2008]. |
Wall, David W., “Limits of Instruction-Level Parallelism”, ACM, pp. 176-188 (1991). |
Wang et al., “Combining 2-level Logic Families in Grid-based Nanoscale Fabrics”, accepted by IEEE/ACM Symposium on Nanoscale Architectures (NanoArch'07), Oct. 2007. |
Wang et al., “Combining Circuit Level and System Level Techniques for Defect-Tolerant Nanoscale Architectures”, 2nd IEEE International Workshop on Defect and Fault Tolerant Nanoscale Architectures (NanoArch 2006), Boston, MA, Jun. 2006. |
Wang et al., “Compiler-Based Adaptive Fetch Throttling for Energy Efficiency”, Proc. of the 2006 IEEE International Symposium on Performance Analysis of Systems and Software(ISPASS'06), Austin, TX, Mar. 2006. |
Wang et al., “NASICs: A Nanoscale Fabric for Nanoscale Microprocessors”, IEEE International Nanoelectronics Conference (INEC), 2008. |
Wang et al., “Opportunities and Challenges in Application-Tuned Circuits and Architectures Based on Nanodevices”, Proceedings of the First Conference on Computing Frontiers, pp. 503-511, Italy, Apr. 2004. |
Wang et al., “Self-Healing Wire-Streaming Processors on 2-D Semiconductor 216 Nanowire Fabrics”, NSTI (Nano Science and Technology Institute) Nanotech 2006, Boston, MA, May 2006. |
Wang et al., “Wire-Streaming Processors on 2-D Nanowire Fabrics”, NSTI (Nano Science and Technology Institute) Nanotech 2005, California, May 2005. |
Wang, T., “Exploring Nanoscale Application-Specific ICs and Architectures”, Boston Area Architecture Workshop (BARC-2004), Jan. 2004. |
Weber “Hammer: The Architecture AMD's of Next-Generation Processors”, Microprocessor Forum, (2001). |
Weingart et al., “Physical Security Devices for Computer Subsystems: A Survey of Attacks and Defenses”, Workshop on Cryptographic Hardware and Embedded Systems (CHES2000), LNCS 1965, pp. 302-317 (2000). |
White, R., “How Computers Work”, Millennium Edition, Que Corporation, p. 36 (1999). |
Wikipedia entry for “context switch”, (Pub. Oct. 26, 2001) [online] Retrieved from the Internet: <URL:http://en.wikipedia.org/w/index.php?title=Context—switch&oldid=244184> [retrieved on Aug. 13, 2009]. |
Wilson et al., “Efficient Context-Sensitive Pointer Analysis for C Programs”, Proc. 220 ACM SIGPLAN'95 Conf. on Programming Language Design and Implementation, (Jun. 1995). |
Wilton et al., “CACTI: An Enhanced Cache Access and Cycle Time Model”, IEEE Journal of Solid-State Circuits, 31(5):677-688 (1996). |
Witchel, E., “Direct Addressed Caches for Reduced Power Consumption”, IEEE, pp. 124-133 (2001). |
Wollinger et al., “How Secure are FPGAs in Cryptographic Applications”, Proc. Of the 13th Int'l Conf. on Field-Programmable Logic and Applications (FPL-2003), 11 pgs. (2003). |
Wollinger et al., “Security on FPGAs: State of the Art Implementations and Attacks”, ACM Transactions on Embedded Computing Systems (TECS) TECS Homepage archive vol. 3 Issue 3, [online] Retrieved from the internet: <URL:http://www.wollinger.org/papers/Wollingeretai—ACMTransEmbeddedSysFPGACryptoOverviewpdf> [retrieved on Feb. 22, 2011] (Aug. 2004). |
Yang et al., “An Integrated Circuit/Architecture Approach to Reducing Leakage in Deep-Submicron High-Performance 1-Caches”, IEEE, pp. 147-157 (2001). |
Young et al., “Improving the Accuracy of Static Branch Prediction Using Branch Correlation”, ACM (1994), pp. 232-241. |
Zhang et al., “Compiler Support for Reducing Leakage Energy Consumption”, 225 Proc. Of the Design, Automation and Test in Europe Conference and Exhibition [DATE'03] (Mar. 2003). |
Zhang et al., “Highly-Associative Caches for Low-Power Processors”, Kool Chips Workshop, 33rd International Symposium on Microarchitecture, 6 pgs. (2000). |
Zyuban et al., “Inherently Lower-Power High-Super-Performance Superscalar Architectures”, IEEE Transactions on Computers, 50(3):268-285 (2001). |
Number | Date | Country | |
---|---|---|---|
20160085554 A1 | Mar 2016 | US |
Number | Date | Country | |
---|---|---|---|
60541875 | Feb 2004 | US |
Number | Date | Country | |
---|---|---|---|
Parent | 14097879 | Dec 2013 | US |
Child | 14963975 | US | |
Parent | 11037663 | Jan 2005 | US |
Child | 14097879 | US |