• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 354
Next 10 →

Modeling and Verification of Out-of-Order Microprocessors in UCLID

by Shuvendu K. Lahiri, Sanjit A. Seshia, Randal E. Bryant , 2002
"... In this paper, we describe the modeling and verification of out-of-order microprocessors with unbounded resources using an expressive, yet efficiently decidable, quantifier-free fragment of first order logic. This logic includes uninterpreted functions, equality, ordering, constrained lambda express ..."
Abstract - Cited by 54 (14 self) - Add to MetaCart
In this paper, we describe the modeling and verification of out-of-order microprocessors with unbounded resources using an expressive, yet efficiently decidable, quantifier-free fragment of first order logic. This logic includes uninterpreted functions, equality, ordering, constrained lambda

Deductive verification of advanced out-of-order microprocessors

by Shuvendu K. Lahiri, Randal E. Bryant - IN COMPUTER-AIDED VERIFICATION (CAV ’03), LNCS 2725 , 2003
"... ..."
Abstract - Cited by 20 (10 self) - Add to MetaCart
Abstract not found

Cherry: Checkpointed Early Resource Recycling in Out-of-Order Microprocessors

by José F. Martínez, Jose Renau, Michael C. Huang, Milos Prvulovic, Josep Torrellas - In Proceedings of the 35th Annual IEEE/ACM International Symposium on Microarchitecture , 2002
"... This paper presents CHeckpointed Early Resource RecYcling (Cherry), a hybrid mode of execution based on ROB and checkpointing that decouples resource recycling and instruction retirement. Resources are recycled early, resulting in a more efficient utilization. Cherry relies on state checkpointing an ..."
Abstract - Cited by 116 (12 self) - Add to MetaCart
to conventional out-of-order execution without rolling back to the checkpoint or flushing the pipeline. We present a Cherry implementation with early recycling at three different points of the execution engine: the load queue, the store queue, and the register file. We report average speedups of 1.06 and 1

Proactive NBTI Mitigation for Busy Functional Units in Out-of-Order Microprocessors

by Lin Li, Youtao Zhang, Jun Yang, Jianhua Zhao
"... Abstract—Due to fast technology scaling, negative bias temperature instability (NBTI) has become a major reliability concern in designing modern integrated circuits. In this paper, we present a simple and proactive NBTI recovery scheme targeting at critical and busy functional units with storage cel ..."
Abstract - Cited by 5 (0 self) - Add to MetaCart
cells in modern microprocessors. Existing schemes have limitations when recovering these functional units. By exploiting the idle time of busy functional units at per-buffer-entry level, our scheme achieves on average 5.57 × MTTF (Mean Time To Failure) improvement at the cost of <1 % IPC degradation

ABSTRACT Techniques for Fault Reduction in Out-of-Order Microprocessors

by Benjamin Gojman, Vladimir Stojanovic, R. Iris Bahar
"... This paper addresses the issue of reducing transient faults that affect instructions while they are in the instruction queue waiting to be executed. Previous work has shown that for an in-order processor, squashing instructions triggered by a cache miss can reduce the number of transient faults. Thi ..."
Abstract - Add to MetaCart
. This paper shows that for an outof-order processor, reducing the size of the instruction queue can have a bigger impact than more adaptive techniques such as fetch halting. Ongoing work will explore more effective techniques for selective fetch halting to provide a reduction in faults committed while having

Substituting Associative Load Queue with Simple Hash Table in Out-of-Order Microprocessors

by Alok Garg, O Castro, Michael Huang, Daniel Chaver, Luis Piñuel, Manuel Prieto - In International Symposium on Low-Power Electronics and Design , 2006
"... Buffering more in-flight instructions in an out-of-order microprocessor is a straightforward and effective method to help tolerate the long latencies generally associated with off-chip memory accesses. One of the main challenges of buffering a large number of instructions, however, is the implementa ..."
Abstract - Cited by 7 (4 self) - Add to MetaCart
Buffering more in-flight instructions in an out-of-order microprocessor is a straightforward and effective method to help tolerate the long latencies generally associated with off-chip memory accesses. One of the main challenges of buffering a large number of instructions, however

Using Rewriting Rules and Positive Equality to Formally Verify Wide-Issue Out-Of-Order Microprocessors with a Reorder Buffer

by Miroslav N. Velev , 2002
"... Rewriting rules and Positive Equality [4] are combined in an automatic way in order to formally verify out-of-order processors that have a Reorder Buffer, and can issue/retire multiple instructions per clock cycle. Only register-register instructions are implemented, and can be executed out-of-order ..."
Abstract - Cited by 15 (2 self) - Add to MetaCart
Rewriting rules and Positive Equality [4] are combined in an automatic way in order to formally verify out-of-order processors that have a Reorder Buffer, and can issue/retire multiple instructions per clock cycle. Only register-register instructions are implemented, and can be executed out-of-order

A framework for microprocessor correctness statements

by Mark D. Aagaard, Byron Cook, Nancy A. Day, Robert B. Jones - In Advanced Research Working Conference on Correct Hardware Design and Verification Methods (CHARME , 2001
"... Abstract Most verifications of out-of-order microprocessors compare state-machine-based implementations and specifications, where the specification is based on the instruction-set architecture. The different efforts use a variety of correctness statements, implementations, and verification approache ..."
Abstract - Cited by 23 (3 self) - Add to MetaCart
Abstract Most verifications of out-of-order microprocessors compare state-machine-based implementations and specifications, where the specification is based on the instruction-set architecture. The different efforts use a variety of correctness statements, implementations, and verification

Verifying Out-of-Order Executions

by W. Damm, A. Pnueli - Advances in Hardware Design and Verification: IFIP WG 10.5 Internatinal Conference on Correct Hardware Design and Verification Methods (CHARME , 1997
"... The paper presents an approach to the specification and verification of out-of-order execution in the design of micro-processors. Ultimately, the appropriate statement of correctness is that the out-of-order execution produces the same final state (and all relevant intermediate actions, such as writ ..."
Abstract - Cited by 24 (1 self) - Add to MetaCart
The paper presents an approach to the specification and verification of out-of-order execution in the design of micro-processors. Ultimately, the appropriate statement of correctness is that the out-of-order execution produces the same final state (and all relevant intermediate actions

Issue logic for a 600-MHz out-of-order execution microprocessor

by James A. Farrell, Timothy C. Fischer - IEEE J. Solid-State Circuits , 1998
"... Abstract—The logic and circuits are presented for a 20-entry instruction queue which scoreboards 80 registers and issues four instructions per cycle in a 600-MHz microprocessor. The request logic and arbiter circuits that control integer execution are described in addition to a novel compaction sche ..."
Abstract - Cited by 51 (0 self) - Add to MetaCart
scheme that maintains temporal order in the queue. The issue logic data path is implemented in 141 000 transistors, occupying 10 mm2 in a 0.35-m CMOS process. Index Terms—CMOS digital integrated circuit, issue, micro-processor, out-of-order, queue. I.
Next 10 →
Results 1 - 10 of 354
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University