Zobrazeno 1 - 8
of 8
pro vyhledávání: '"Krishnendra Nathella"'
Publikováno v:
IEEE Transactions on Computers. 71:2858-2871
Temporal prefetchers are powerful because they can prefetch irregular sequences of memory accesses, but temporal prefetchers are commercially infeasible because they store large amounts of metadata in DRAM. This paper presents Triage, the first tempo
Autor:
Divya Prasad, Manoj Vangala, Mudit Bhargava, Arnout Beckers, Alexander Grill, Davide Tierno, Krishnendra Nathella, Thanusree Achuthan, David Pietromonaco, James Myers, Matthew Walker, Bertrand Parvais, Brian Cline
Publikováno v:
2022 International Electron Devices Meeting (IEDM).
Autor:
Tanvir Ahmed Khan, Muhammed Ugur, Krishnendra Nathella, Dam Sunwoo, Heiner Litz, Daniel A. Jimenez, Baris Kasikci
Publikováno v:
2022 55th IEEE/ACM International Symposium on Microarchitecture (MICRO).
Publikováno v:
IEEE Computer Architecture Letters. 19:147-150
Instruction prefetching can play a pivotal role in improving the performance of workloads with large instruction footprints and frequent, costly frontend stalls. In particular, Fetch Directed Prefetching (FDP) is an effective technique to mitigate fr
Publikováno v:
ISPASS
Instruction prefetching can play a pivotal role in improving the performance of workloads with large instruction footprints and frequent, costly frontend stalls. In particular, Fetch Directed Prefetching (FDP) is an effective technique to mitigate fr
Publikováno v:
MICRO
Temporal prefetching offers great potential, but this potential is difficult to achieve because of the need to store large amounts of prefetcher metadata off chip. To reduce the latency and traffic of off-chip metadata accesses, recent advances in te
Publikováno v:
ISCA
Temporal prefetchers have the potential to prefetch arbitrary memory access patterns, but they require large amounts of metadata that must typically be stored in DRAM. In 2013, the Irregular Stream Buffer (ISB), showed how this metadata could be cach
Publikováno v:
International Journal of Computer Applications. 3:11-18
In a highly digitalized world we live today, the data to be transmitted are confidential at times, and in such cases there are many malicious intruders who try to access this information. Steganography is one recent method to provide reliable securit