Abstract is missing.
- Execution-based prediction using speculative slicesCraig B. Zilles, Gurindar S. Sohi. 2-13 [doi]
- Speculative precomputation: long-range prefetching of delinquent loadsJamison D. Collins, Hong Wang 0003, Dean M. Tullsen, Christopher J. Hughes, Yong-Fong Lee, Daniel M. Lavery, John Paul Shen. 14-25 [doi]
- Dynamically allocating processor resources between nearby and distant ILPRajeev Balasubramonian, Sandhya Dwarkadas, David H. Albonesi. 26-37 [doi]
- Tolerating memory latency through software-controlled pre-execution in simultaneous multithreading processorsChi-Keung Luk. 40-51 [doi]
- Data prefetching by dependence graph precomputationMurali Annavaram, Jignesh M. Patel, Edward S. Davidson. 52-61 [doi]
- Concurrency, latency, or system overhead: which has the largest impact on uniprocessor DRAM-system performance?Vinodh Cuppu, Bruce L. Jacob. 62-71 [doi]
- Focusing processor policies via critical-path predictionBrian A. Fields, Shai Rubin, Rastislav Bodík. 74-85 [doi]
- Better exploration of region-level value locality with integrated computation reuse and value predictionYoufeng Wu, Dong-yuan Chen, Jesse Fang. 98-108 [doi]
- CryptoManiac: a fast flexible architecture for secure communicationLisa Wu, Christopher T. Weaver, Todd M. Austin. 110-119 [doi]
- QoS provisioning in clusters: an investigation of Router and NIC designKi Hwan Yum, Eun Jung Kim, Chita R. Das. 120-129 [doi]
- Locality vs. criticalitySrikanth T. Srinivasan, Roy Dz-Ching Ju, Alvin R. Lebeck, Chris Wilkerson. 132-143 [doi]
- Dead-block prediction & dead-block correlating prefetchersAn-Chow Lai, Cem Fide, Babak Falsafi. 144-154 [doi]
- Code layout optimizations for transaction processing workloadsAlex Ramírez, Luiz André Barroso, Kourosh Gharachorloo, Robert S. Cohn, Josep-Lluis Larriba-Pey, P. Geoffrey Lowney, Mateo Valero. 155-164 [doi]
- Exploring and exploiting wire-level pipelining in emerging technologiesMichael T. Niemier, Peter M. Kogge. 166-177 [doi]
- NanoFabrics: spatial computing using molecular electronicsSeth Copen Goldstein, Mihai Budiu. 178-191 [doi]
- A simple method for extracting models for protocol codeDavid Lie, Andy Chou, Dawson R. Engler, David L. Dill. 192-203 [doi]
- Removing architectural bottlenecks to the scalability of speculative parallelizationMilos Prvulovic, María Jesús Garzarán, Lawrence Rauchwerger, Josep Torrellas. 204-215 [doi]
- Power and energy reduction via pipeline balancingR. Iris Bahar, Srilatha Manne. 218-229 [doi]
- Energy-effective issue logicDaniele Folegnani, Antonio González. 230-239 [doi]
- Cache decay: exploiting generational behavior to reduce cache leakage powerStefanos Kaxiras, Zhigang Hu, Margaret Martonosi. 240-251 [doi]
- Variability in the execution of multimedia applications and implications for architectureChristopher J. Hughes, Praful Kaul, Sarita V. Adve, Rohit Jain, Chanik Park, Jayanth Srinivasan. 254-265 [doi]
- Rapid profiling via stratified samplingS. Subramanya Sastry, Rastislav Bodík, James E. Smith. 278-289 [doi]