Abstract is missing.
- Big Data Analytics and Intelligence at Alibaba CloudJingren Zhou. 1 [doi]
- Determining Application-specific Peak Power and Energy Requirements for Ultra-low Power ProcessorsHari Cherupalli, Henry Duwe, Weidong Ye, Rakesh Kumar 0002, John Sartori. 3-16 [doi]
- Prophet: Precise QoS Prediction on Non-Preemptive Accelerators to Improve Utilization in Warehouse-Scale ComputersQuan Chen, Hailong Yang, Minyi Guo, Ram Srivatsa Kannan, Jason Mars, Lingjia Tang. 17-32 [doi]
- Mallacc: Accelerating Memory AllocationSvilen Kanev, Sam Likun Xi, Gu-Yeon Wei, David M. Brooks. 33-45 [doi]
- REDSPY: Exploring Value Locality in SoftwareShasha Wen, Milind Chabbi, Xu Liu. 47-61 [doi]
- Translation-Triggered PrefetchingAbhishek Bhattacharjee. 63-76 [doi]
- Typed Architectures: Architectural Support for Lightweight ScriptingChannoh Kim, Jaehyeok Kim, Sungmin Kim, Doo-young Kim, Namho Kim, Gitae Na, Young H. Oh, Hyeon-Gyu Cho, Jae W. Lee. 77-90 [doi]
- Failure-Atomic Slotted Paging for Persistent MemoryJihye Seo, Wook-Hee Kim, Woongki Baek, Beomseok Nam, Sam H. Noh. 91-104 [doi]
- What Scalable Programs Need from Transactional MemoryDonald Nguyen, Keshav Pingali. 105-118 [doi]
- TriCheck: Memory Model Verification at the Trisection of Software, Hardware, and ISACaroline Trippel, Yatin A. Manerkar, Daniel Lustig, Michael Pellauer, Margaret Martonosi. 119-133 [doi]
- An Analysis of Persistent Memory Use with WHISPERSanketh Nalli, Swapnil Haria, Mark D. Hill, Michael M. Swift, Haris Volos, Kimberly Keeton. 135-148 [doi]
- ProRace: Practical Data Race Detection for Production UseTong Zhang, Changhee Jung, Dongyoon Lee. 149-162 [doi]
- Crossing Guard: Mediating Host-Accelerator Coherence InteractionsLena E. Olson, Mark D. Hill, David A. Wood. 163-176 [doi]
- An Architecture Supporting Formal and Compositional Binary AnalysisJoseph McMahan, Michael Christensen, Lawton Nichols, Jared Roesch, Sung-Yee Guo, Ben Hardekopf, Timothy Sherwood. 177-191 [doi]
- AsyncClock: Scalable Inference of Asynchronous Event CausalityChun-Hung Hsiao, Satish Narayanasamy, Essam Muhammad Idris Khan, Cristiano L. Pereira, Gilles A. Pokam. 193-205 [doi]
- Black-box Concurrent Data Structures for NUMA ArchitecturesIrina Calciu, Siddhartha Sen, Mahesh Balakrishnan, Marcos K. Aguilera. 207-221 [doi]
- CoRAL: Confined Recovery in Distributed Asynchronous Graph ProcessingKeval Vora, Chen Tian, Rajiv Gupta, Ziang Hu. 223-236 [doi]
- KickStarter: Fast and Accurate Computations on Streaming Graphs via Trimmed ApproximationsKeval Vora, Rajiv Gupta, Guoqing (Harry) Xu. 237-251 [doi]
- Browsix: Bridging the Gap Between Unix and the BrowserBobby Powers, John Vilk, Emery D. Berger. 253-266 [doi]
- Optimizing CNNs on Multicores for Scalability, Performance and GoodputSamyam Rajbhandari, Yuxiong He, Olatunji Ruwase, Michael Carbin, Trishul M. Chilimbi. 267-280 [doi]
- Locality Transformations for Nested Recursive Iteration SpacesKirshanthan Sundararajah, Laith Sakka, Milind Kulkarni. 281-295 [doi]
- Locality-Aware CTA Clustering for Modern GPUsAng Li, Shuaiwen Leon Song, Weifeng Liu 0002, Xu Liu, Akash Kumar 0001, Henk Corporaal. 297-311 [doi]
- Sound Loop Superoptimization for Google Native ClientBerkeley R. Churchill, Rahul Sharma 0001, J. F. Bastien, Alex Aiken. 313-326 [doi]
- Improving Datacenter EfficiencyRicardo Bianchini. 327 [doi]
- DudeTM: Building Durable Transactions with Decoupling for Persistent MemoryMengxing Liu, Mingxing Zhang, Kang Chen, Xuehai Qian, Yongwei Wu, Weimin Zheng, Jinglei Ren. 329-343 [doi]
- ReFlex: Remote Flash ≈ Local FlashAna Klimovic, Heiner Litz, Christos Kozyrakis. 345-359 [doi]
- Approximate Storage of Compressed and Encrypted VideosDjordje Jevdjic, Karin Strauss, Luis Ceze, Henrique S. Malvar. 361-373 [doi]
- Exploiting Intra-Request Slack to Improve SSD PerformanceNima Elyasi, Mohammad Arjomand, Anand Sivasubramaniam, Mahmut T. Kandemir, Chita R. Das, Myoungsoo Jung. 375-388 [doi]
- Graspan: A Single-machine Disk-based Graph System for Interprocedural Static Analyses of Large-scale Systems CodeKai Wang, Aftab Hussain, Zhiqiang Zuo, Guoqing (Harry) Xu, Ardalan Amiri Sani. 389-404 [doi]
- SC-DCNN: Highly-Scalable Deep Convolutional Neural Network using Stochastic ComputingAo Ren, Zhe Li, Caiwen Ding, Qinru Qiu, Yanzhi Wang, Ji Li, Xuehai Qian, Bo Yuan. 405-418 [doi]
- 3DGates: An Instruction-Level Energy Analysis and Optimization of 3D PrintersJerry Ajay, Chen Song, Aditya Singh Rathore, Chi Zhou, Wenyao Xu. 419-433 [doi]
- Efficient Address Translation for Architectures with Multiple Page SizesGuilherme Cox, Abhishek Bhattacharjee. 435-448 [doi]
- Page Fault Support for Network ControllersIlya Lesokhin, Haggai Eran, Shachar Raindel, Guy Shapiro, Sagi Grimberg, Liran Liss, Muli Ben-Yehuda, Nadav Amit, Dan Tsafrir. 449-466 [doi]
- Towards "Full Containerization" in Containerized Network Function VirtualizationYang Hu, Mingcong Song, Tao Li. 467-481 [doi]
- FLEP: Enabling Flexible and Efficient Preemption on GPUsBo Wu, Xu Liu, Xiaobo Zhou, Changjun Jiang. 483-496 [doi]
- SaberLDA: Sparsity-Aware Learning of Topic Models on GPUsKaiwei Li, Jianfei Chen, Wenguang Chen, Jun Zhu. 497-509 [doi]
- Moonwalk: NRE Optimization in ASIC CloudsMoein Khazraee, Lu Zhang, Luis Vega, Michael Bedford Taylor. 511-526 [doi]
- Dynamic Resource Management for Efficient Utilization of Multitasking GPUsJason Jong Kyu Park, Yongjun Park, Scott A. Mahlke. 527-540 [doi]
- Identifying Security Critical Properties for the Dynamic Verification of a ProcessorRui Zhang, Natalie Stanley, Christopher Griggs, Andrew Chi, Cynthia Sturton. 541-554 [doi]
- Verification of a Practical Hardware Security Architecture Through Static Information Flow AnalysisAndrew Ferraiuolo, Rui Xu, Danfeng Zhang, Andrew C. Myers, G. Edward Suh. 555-568 [doi]
- CHERI JNI: Sinking the Java Security Model into the CDavid Chisnall, Brooks Davis, Khilan Gudka, David Brazdil, Alexandre Joannou, Jonathan Woodruff, A. Theodore Markettos, J. Edward Maste, Robert Norton, Stacey D. Son, Michael Roe, Simon W. Moore, Peter G. Neumann, Ben Laurie, Robert N. M. Watson. 569-583 [doi]
- GRIFFIN: Guarding Control Flows Using Intel Processor TraceXinyang Ge, Weidong Cui, Trent Jaeger. 585-598 [doi]
- Bolt: I Know What You Did Last Summer... In The CloudChristina Delimitrou, Christos Kozyrakis. 599-613 [doi]
- Neurosurgeon: Collaborative Intelligence Between the Cloud and Mobile EdgeYiping Kang, Johann Hauswald, Cao Gao, Austin Rovinski, Trevor N. Mudge, Jason Mars, Lingjia Tang. 615-629 [doi]
- Thermostat: Application-transparent Page Management for Two-tiered Main MemoryNeha Agarwal, Thomas F. Wenisch. 631-644 [doi]
- Breaking the Boundaries in Heterogeneous-ISA DatacentersAntonio Barbalace, Robert Lyerly, Christopher Jelesnianski, Anthony Carno, Ho-Ren Chuang, Vincent Legout, Binoy Ravindran. 645-659 [doi]
- Automated Synthesis of Comprehensive Memory Model Litmus Test SuitesDaniel Lustig, Andrew Wright, Alexandros Papakonstantinou, Olivier Giroux. 661-675 [doi]
- DCatch: Automatically Detecting Distributed Concurrency Bugs in Cloud SystemsHaopeng Liu, Guangpu Li, Jeffrey F. Lukman, Jiaxin Li, Shan Lu, Haryadi S. Gunawi, Chen Tian. 677-691 [doi]
- Towards Practical Default-On Multi-Core Record/ReplayAli José Mashtizadeh, Tal Garfinkel, David Terei, David Mazières, Mendel Rosenblum. 693-708 [doi]
- Pallas: Semantic-Aware Checking for Finding Deep Bugs in Fast PathJian Huang, Michael Allen-Bond, Xuechen Zhang. 709-722 [doi]
- Hardware-Software Co-design to Mitigate DRAM Refresh Overheads: A Case for Refresh-Aware Process SchedulingJagadish B. Kotra, Narges Shahidi, Zeshan A. Chishti, Mahmut T. Kandemir. 723-736 [doi]
- Kill the Program Counter: Reconstructing Program Behavior in the Processor Cache HierarchyJinchun Kim, Elvira Teran, Paul V. Gratz, Daniel A. Jiménez, Seth H. Pugsley, Chris Wilkerson. 737-749 [doi]
- TETRIS: Scalable and Efficient Neural Network Acceleration with 3D MemoryMingyu Gao, Jing Pu, Xuan Yang, Mark Horowitz, Christos Kozyrakis. 751-764 [doi]
- History-Based Arbitration for Fairness in Processor-Interconnect of NUMA ServersWonJun Song, Gwangsun Kim, Hyungjoon Jung, Jongwook Chung, Jung Ho Ahn, Jae W. Lee, John Kim. 765-777 [doi]
- Enabling Lightweight Transactions with Precision TimePulkit A. Misra, Jeffrey S. Chase, Johannes Gehrke, Alvin R. Lebeck. 779-794 [doi]
- IncBricks: Toward In-Network Computation with an In-Network CacheMing Liu, Liang Luo, Jacob Nelson, Luis Ceze, Arvind Krishnamurthy, Kishore Atreya. 795-809 [doi]
- AMNESIAC: Amnesic Automatic ComputerIsmail Akturk, Ulya R. Karpuzcu. 811-824 [doi]
- Voltage Regulator Efficiency Aware Power ManagementYuxin Bai, Victor W. Lee, Engin Ipek. 825-838 [doi]