Default Cover Image

2015 ACM/IEEE 42nd Annual International Symposium on Computer Architecture (ISCA)

June 13 2015 to June 17 2015

Portland, OR, USA

Table of Contents

Front mattersFreely available from IEEE.pp. 1-1
BlueDBM: An appliance for Big Data analyticsFull-text access may be available. Sign in or learn about subscription options.pp. 1-13
Towards sustainable in-situ server systems in the big data eraFull-text access may be available. Sign in or learn about subscription options.pp. 14-26
Harmonia: Balancing compute and memory power in high-performance GPUsFull-text access may be available. Sign in or learn about subscription options.pp. 54-65
ShiDianNao: Shifting vision processing closer to the sensorFull-text access may be available. Sign in or learn about subscription options.pp. 92-104
A scalable processing-in-memory accelerator for parallel graph processingFull-text access may be available. Sign in or learn about subscription options.pp. 105-117
Efficient execution of memory access phases using dataflow specializationFull-text access may be available. Sign in or learn about subscription options.pp. 118-130
Data reorganization in memory using 3D-stacked DRAMFull-text access may be available. Sign in or learn about subscription options.pp. 131-143
Profiling a warehouse-scale computerFull-text access may be available. Sign in or learn about subscription options.pp. 158-169
Computer performance microscopy with ShimFull-text access may be available. Sign in or learn about subscription options.pp. 170-184
BEAR: Techniques for mitigating bandwidth bloat in gigascale DRAM cachesFull-text access may be available. Sign in or learn about subscription options.pp. 198-210
A fully associative, tagless DRAM cacheFull-text access may be available. Sign in or learn about subscription options.pp. 211-222
Multiple Clone Row DRAM: A low latency and area optimized DRAMFull-text access may be available. Sign in or learn about subscription options.pp. 223-234
Flexible auto-refresh: Enabling scalable and energy-efficient DRAM refresh reductionsFull-text access may be available. Sign in or learn about subscription options.pp. 235-246
Cost-effective speculative scheduling in high performance processorsFull-text access may be available. Sign in or learn about subscription options.pp. 247-259
LaZy SuperscalarFull-text access may be available. Sign in or learn about subscription options.pp. 260-271
The Load Slice Core microarchitectureFull-text access may be available. Sign in or learn about subscription options.pp. 272-284
Semantic locality and context-based prefetching using reinforcement learningFull-text access may be available. Sign in or learn about subscription options.pp. 285-297
Exploring the potential of heterogeneous Von Neumann/dataflow execution modelsFull-text access may be available. Sign in or learn about subscription options.pp. 298-310
SHRINK: Reducing the ISA complexity via instruction recyclingFull-text access may be available. Sign in or learn about subscription options.pp. 311-322
Branch vanguard: Decomposing branch functionality into prediction and resolution instructionsFull-text access may be available. Sign in or learn about subscription options.pp. 323-335
PIM-enabled instructions: A low-overhead, locality-aware processing-in-memory architectureFull-text access may be available. Sign in or learn about subscription options.pp. 336-348
SLIP: Reducing wire energy in the memory hierarchyFull-text access may be available. Sign in or learn about subscription options.pp. 349-361
CloudMonatt: An architecture for security health monitoring and attestation of virtual machines in cloud computingFull-text access may be available. Sign in or learn about subscription options.pp. 362-374
Reducing world switches in virtualized environment with flexible cross-world callsFull-text access may be available. Sign in or learn about subscription options.pp. 375-387
Clean: A race detector with cleaner semanticsFull-text access may be available. Sign in or learn about subscription options.pp. 401-413
MiSAR: Minimalistic synchronization accelerator with resource overflow managementFull-text access may be available. Sign in or learn about subscription options.pp. 414-426
Callback: Efficient synchronization without invalidation with a directory just for spin-waitingFull-text access may be available. Sign in or learn about subscription options.pp. 427-438
Heracles: Improving resource efficiency at scaleFull-text access may be available. Sign in or learn about subscription options.pp. 450-462
A variable warp size architectureFull-text access may be available. Sign in or learn about subscription options.pp. 489-501
Warped-Compression: Enabling power efficient GPUs through register compressionFull-text access may be available. Sign in or learn about subscription options.pp. 502-514
DynaSpAM: Dynamic spatial architecture mapping using Out of Order instruction schedulesFull-text access may be available. Sign in or learn about subscription options.pp. 541-553
Rumba: An online quality management system for approximate computingFull-text access may be available. Sign in or learn about subscription options.pp. 554-566
Manycore Network Interfaces for in-memory rack-scale computingFull-text access may be available. Sign in or learn about subscription options.pp. 567-579
Unified address translation for memory-mapped SSDs with FlashMapFull-text access may be available. Sign in or learn about subscription options.pp. 580-591
FASE: Finding Amplitude-modulated Side-channel EmanationsFull-text access may be available. Sign in or learn about subscription options.pp. 592-603
Probable cause: The deanonymizing effects of approximate DRAMFull-text access may be available. Sign in or learn about subscription options.pp. 604-615
PrORAM: Dynamic prefetcher for Oblivious RAMFull-text access may be available. Sign in or learn about subscription options.pp. 616-628
Accelerating asynchronous programs through Event Sneak PeekFull-text access may be available. Sign in or learn about subscription options.pp. 642-654
FaultHound: Value-locality-based soft-fault toleranceFull-text access may be available. Sign in or learn about subscription options.pp. 668-681
COP: To compress and protect main memoryFull-text access may be available. Sign in or learn about subscription options.pp. 682-693
Fusion: Design tradeoffs in coherent cache hierarchies for acceleratorsFull-text access may be available. Sign in or learn about subscription options.pp. 733-745
Author indexFreely available from IEEE.pp. 1-3
Showing 60 out of 60