261 results on '"Stefanos Kaxiras"'
Search Results
102. Managing leakage for transient data: decay and quasi-static 4T memory cells.
103. Timekeeping in the Memory System: Predicting and Optimizing Memory Behavior.
104. Efficient inter-core power and thermal balancing for multicore processors.
105. Comparing power consumption of an SMT and a CMP DSP for mobile phone workloads.
106. Cache decay: exploiting generational behavior to reduce cache leakage power.
107. Cache-Line Decay: A Mechanism to Reduce Cache Leakage Power.
108. Coherence Communication Prediction in Shared-Memory Multiprocessors.
109. Leakage-efficient design of value predictors through state and non-state preserving techniques.
110. SARC Coherence: Scaling Directory Cache Coherence in Performance and Power.
111. POSTER: Efficient Self-Invalidation/Self-Downgrade for Critical Sections with Relaxed Semantics.
112. Improving CC-NUMA Performance Using Instruction-Based Prediction.
113. Recruiting Decay for Dynamic Power Reduction in Set-Associative Caches.
114. Understanding Selective Delay as a Method for Efficient Secure Speculative Execution
115. A Study of Three Dynamic Approaches to Handle Widely Shared Data in Shared-memory Multiprocessors.
116. Non deterministic caches: a simple and effective defense against side channel attacks.
117. Profiling-Assisted Decoupled Access-Execute.
118. Mending Fences with Self-Invalidation and Self-Downgrade.
119. Power-Efficient Computer Architectures: Recent Advances
120. DataScalar Architectures.
121. Kiloprocessor Extensions to SCI.
122. The GLOW Cache Coherence Protocol Extensions for Widely Shared Data.
123. Implementing branch-predictor decay using quasi-static memory cells.
124. Let caches decay: reducing leakage energy via exploitation of cache generational behavior.
125. Computer Architecture Techniques for Power-Efficiency
126. Distributed vector architectures.
127. A tunable cache for approximate computing.
128. DataScalar: A memory-centric approach to computing.
129. Embedded reconfigurable architectures.
130. Splash-4: Improving Scalability with Lock-Free Constructs
131. Seeds of SEED: Preventing Priority Inversion in Instruction Scheduling to Disrupt Speculative Interference
132. Early Address Prediction : Efficient Pipeline Prefetch and Reuse
133. Reorder Buffer Contention: A Forward Speculative Interference Attack for Speculation Invariant Instructions
134. Do Not Predict – Recompute! How Value Recomputation Can Truly Boost the Performance of Invisible Speculation
135. TSOPER: Efficient Coherence-Based Strict Persistency
136. PSM: software tool for simulating, prototyping, and monitoring of multiprocessor systems.
137. A Prolog-based design environment for the high-level synthesis of application-specific architectures.
138. SWOOP: software-hardware co-design for non-speculative, execute-ahead, in-order cores
139. Automatic Detection of Large Extended Data-Race-Free Regions with Conflict Isolation
140. Fix the code. Don't tweak the hardware: A new compiler approach to Voltage-Frequency scaling.
141. Power-Efficient Computer Architectures : Recent Advances
142. Poster: DVFS management in real-processors.
143. Implementing Decay Techniques using 4T Quasi-Static Memory Cells.
144. Transcending Hardware Limits with Software Out-of-Order Processing
145. Non-Speculative Load-Load Reordering in TSO
146. Clearing the Shadows: Recovering Lost Performance for Invisible Speculative Execution through HW/SW Co-Design
147. Delay and Bypass: Ready and Criticality Aware Instruction Scheduling in Out-of-Order Processors
148. Topic 18: Embedded Parallel Systems.
149. FIFOrder MicroArchitecture: Ready-Aware Instruction Scheduling for OoO Processors
150. Ghost Loads : What is the cost of invisible speculation?
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.