Abstract is missing.
- Impact of virtualization on computer architecture and operating systemsMendel Rosenblum. 1 [doi]
- A comparison of software and hardware techniques for x86 virtualizationKeith Adams, Ole Agesen. 2-13 [doi]
- Geiger: monitoring the buffer cache in a virtual machine environmentStephen T. Jones, Andrea C. Arpaci-Dusseau, Remzi H. Arpaci-Dusseau. 14-24 [doi]
- Temporal search: detecting hidden malware timebombs with virtual machinesJedidiah R. Crandall, Gary Wassermann, Daniela A. S. de Oliveira, Zhendong Su, Shyhtsun Felix Wu, Frederic T. Chong. 25-36 [doi]
- AVIO: detecting atomicity violations via access interleaving invariantsShan Lu, Joseph Tucek, Feng Qin, Yuanyuan Zhou. 37-48 [doi]
- A regulated transitive reduction (RTR) for longer memory race recordingMin Xu, Mark D. Hill, Rastislav Bodík. 49-60 [doi]
- Bell: bit-encoding online memory leak detectionMichael D. Bond, Kathryn S. McKinley. 61-72 [doi]
- Ultra low-cost defect protection for microprocessor pipelinesSmitha Shyam, Kypros Constantinides, Sujay Phadke, Valeria Bertacco, Todd M. Austin. 73-82 [doi]
- Understanding prediction-based partial redundant threading for low-overhead, high- coverage fault toleranceVimal K. Reddy, Eric Rotenberg, Sailashri Parthasarathy. 83-94 [doi]
- SlicK: slice-based locality exploitation for efficient redundant multithreadingAngshuman Parashar, Anand Sivasubramaniam, Sudhanva Gurumurthi. 95-105 [doi]
- Mercury and freon: temperature emulation and management for server systemsTaliver Heath, Ana Paula Centeno, Pradeep George, Luiz Ramos, Yogesh Jaluria. 106-116 [doi]
- PicoServer: using 3D stacking technology to enable a compact energy efficient chip multiprocessorTaeho Kgil, Shaun D Souza, Ali G. Saidi, Nathan L. Binkert, Ronald G. Dreslinski, Trevor N. Mudge, Steven K. Reinhardt, Krisztián Flautner. 117-128 [doi]
- A spatial path scheduling algorithm for EDGE architecturesKatherine E. Coons, Xia Chen, Doug Burger, Kathryn S. McKinley, Sundeep K. Kushwaha. 129-140 [doi]
- Instruction scheduling for a tiled dataflow architectureMartha Mercaldi, Steven Swanson, Andrew Petersen, Andrew Putnam, Andrew Schwerin, Mark Oskin, Susan J. Eggers. 141-150 [doi]
- Exploiting coarse-grained task, data, and pipeline parallelism in stream programsMichael I. Gordon, William Thies, Saman P. Amarasinghe. 151-162 [doi]
- Tartan: evaluating spatial computation for whole program executionMahim Mishra, Timothy J. Callahan, Tiberiu Chelcea, Girish Venkataramani, Seth Copen Goldstein, Mihai Budiu. 163-174 [doi]
- A performance counter architecture for computing accurate CPI componentsStijn Eyerman, Lieven Eeckhout, Tejas Karkhanis, James E. Smith. 175-184 [doi]
- Accurate and efficient regression modeling for microarchitectural performance and power predictionBenjamin C. Lee, David M. Brooks. 185-194 [doi]
- Efficiently exploring architectural design spaces via predictive modelingEngin Ipek, Sally A. McKee, Rich Caruana, Bronis R. de Supinski, Martin Schulz. 195-206 [doi]
- Comprehensively and efficiently protecting the heapMazen Kharbutli, Xiaowei Jiang, Yan Solihin, Guru Venkataramani, Milos Prvulovic. 207-218 [doi]
- HeapMD: identifying heap-based bugs using anomaly detectionTrishul M. Chilimbi, Vinod Ganapathy. 219-228 [doi]
- Recording shared memory dependencies using strataSatish Narayanasamy, Cristiano Pereira, Brad Calder. 229-240 [doi]
- A defect tolerant self-organizing nanoscale SIMD architectureJaidev P. Patwardhan, Vijeta Johri, Chris Dwyer, Alvin R. Lebeck. 241-251 [doi]
- A program transformation and architecture support for quantum uncomputationEthan Schuchman, T. N. Vijaykumar. 252-263 [doi]
- Introspective 3D chipsShashidhar Mysore, Banit Agrawal, Navin Srivastava, Sheng-Chih Lin, Kaustav Banerjee, Timothy Sherwood. 264-273 [doi]
- Stealth prefetchingJason F. Cantin, Mikko H. Lipasti, James E. Smith. 274-282 [doi]
- Computation spreading: employing hardware migration to specialize CMP cores on-the-flyKoushik Chakraborty, Philip M. Wells, Gurindar S. Sohi. 283-292 [doi]
- Software-based instruction caching for embedded processorsJason E. Miller, Anant Agarwal. 293-302 [doi]
- Mapping esterel onto a multi-threaded embedded processorXin Li, Marian Boldt, Reinhard von Hanxleden. 303-314 [doi]
- Integrated network interfaces for high-bandwidth TCP/IPNathan L. Binkert, Ali G. Saidi, Steven K. Reinhardt. 315-324 [doi]
- Accelerator: using data parallelism to program GPUs for general-purpose usesDavid Tarditi, Sidd Puri, Jose Oglesby. 325-335 [doi]
- Hybrid transactional memoryPeter Damron, Alexandra Fedorova, Yossi Lev, Victor Luchangco, Mark Moir, Daniel Nussbaum. 336-346 [doi]
- Unbounded page-based transactional memoryWeihaw Chuang, Satish Narayanasamy, Ganesh Venkatesh, Jack Sampson, Michael Van Biesbrouck, Gilles Pokam, Brad Calder, Osvaldo Colavin. 347-358 [doi]
- Supporting nested transactional memory in logTMMichelle J. Moravan, Jayaram Bobba, Kevin E. Moore, Luke Yen, Mark D. Hill, Ben Liblit, Michael M. Swift, David A. Wood. 359-370 [doi]
- Tradeoffs in transactional memory virtualizationJaeWoong Chung, Chi Cao Minh, Austen McDonald, Travis Skare, Hassan Chafi, Brian D. Carlstrom, Christos Kozyrakis, Kunle Olukotun. 371-381 [doi]
- A new idiom recognition framework for exploiting hardware-assist instructionsMotohiro Kawahito, Hideaki Komatsu, Takao Moriyama, Hiroshi Inoue, Toshio Nakatani. 382-393 [doi]
- Automatic generation of peephole superoptimizersSorav Bansal, Alex Aiken. 394-403 [doi]
- Combinatorial sketching for finite programsArmando Solar-Lezama, Liviu Tancau, Rastislav Bodík, Sanjit A. Seshia, Vijay A. Saraswat. 404-415 [doi]
- A probabilistic pointer analysis for speculative optimizationsJeff Da Silva, J. Gregory Steffan. 416-425 [doi]