Default Cover Image

37th International Symposium on Microarchitecture (MICRO-37'04)

Dec. 4 2004 to Dec. 8 2004

Portland,Oregon

ISSN: 1072-4451

ISBN: 0-7695-2126-6

Table of Contents

Message from the General and Program ChairsFreely available from IEEE.pp. ix
list-reviewerFreely available from IEEE.pp. xii,xiii
Session 1: Instruction Collapsing
Dynamic Strands: Collapsing Speculative Dependence Chains for Reducing Pipeline CommunicationFull-text access may be available. Sign in or learn about subscription options.pp. 7-17
Session 1: Instruction Collapsing
Dataflow Mini-Graphs: Amplifying Superscalar Capacity and BandwidthFull-text access may be available. Sign in or learn about subscription options.pp. 18-29
Session 1: Instruction Collapsing
Application-Specific Processing on a General-Purpose Core via Transparent Instruction Set CustomizationFull-text access may be available. Sign in or learn about subscription options.pp. 30-40
Session 2: Performance Evaluation
MicroLib: A Case for the Quantitative Comparison of Micro-Architecture MechanismsFull-text access may be available. Sign in or learn about subscription options.pp. 43-54
Session 2: Performance Evaluation
Automatic Synthesis of High-Speed Processor SimulatorsFull-text access may be available. Sign in or learn about subscription options.pp. 55-66
Session 2: Performance Evaluation
Thermal Modeling, Characterization and Management of On-Chip NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 67-78
Session 3: Trace Analysis
Pinpointing Representative Portions of Large Intel? Itanium? Programs with Dynamic InstrumentationFull-text access may be available. Sign in or learn about subscription options.pp. 81-92
Session 3: Trace Analysis
The Fuzzy Correlation between Code and Performance PredictabilityFull-text access may be available. Sign in or learn about subscription options.pp. 93-104
Session 3: Trace Analysis
Whole Execution TracesFull-text access may be available. Sign in or learn about subscription options.pp. 105-116
Session 4: Control Flow
Wrong Path Events: Exploiting Unusual and Illegal Program Behavior for Early Misprediction Detection and RecoveryFull-text access may be available. Sign in or learn about subscription options.pp. 119-128
Control Flow Optimization Via Dynamic Reconvergence PredictionFull-text access may be available. Sign in or learn about subscription options.pp. 129-140
Session 5: Adaptive Microarchitectures
A Case for Clumsy Packet ProcessorsFull-text access may be available. Sign in or learn about subscription options.pp. 147-156
Session 5: Adaptive Microarchitectures
Dynamically Trading Frequency for Complexity in a GALS MicroprocessorFull-text access may be available. Sign in or learn about subscription options.pp. 157-168
Session 6: Multithreaded/Multicore Processors
Dynamically Controlled Resource Allocation in SMT ProcessorsFull-text access may be available. Sign in or learn about subscription options.pp. 171-182
Session 6: Multithreaded/Multicore Processors
Balanced Multithreading: Increasing Throughput via a Low Cost Multithreading HierarchyFull-text access may be available. Sign in or learn about subscription options.pp. 183-194
Session 6: Multithreaded/Multicore Processors
Conjoined-Core Chip MultiprocessingFull-text access may be available. Sign in or learn about subscription options.pp. 195-206
Session 7: Security
Hardware and Binary Modification Support for Code Pointer Protection From Buffer OverflowFull-text access may be available. Sign in or learn about subscription options.pp. 209-220
Session 7: Security
Minos: Control Data Attack Prevention Orthogonal to Memory ModelFull-text access may be available. Sign in or learn about subscription options.pp. 221-232
Session 7: Security
A Hardware-Software Platform for Intrusion PreventionFull-text access may be available. Sign in or learn about subscription options.pp. 233-242
Session 8: Reliability
Efficient Resource Sharing in Concurrent Error Detecting Superscalar MicroarchitecturesFull-text access may be available. Sign in or learn about subscription options.pp. 257-268
Session 8: Reliability
AccMon: Automatically Detecting Memory-Related Bugs via Program Counter-Based InvariantsFull-text access may be available. Sign in or learn about subscription options.pp. 269-280
Session 9: Code Generation and Optimization
Optimal Superblock Scheduling Using EnumerationFull-text access may be available. Sign in or learn about subscription options.pp. 283-293
Session 9: Code Generation and Optimization
Compiler Optimizations for Transaction Processing Workloads on Itanium? Linux SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 294-303
Session 9: Code Generation and Optimization
Register Packing: Exploiting Narrow-Width Operands for Reducing Register File PressureFull-text access may be available. Sign in or learn about subscription options.pp. 304-315
Session 10: Caches and Memory
Managing Wire Delay in Large Chip-Multiprocessor CachesFull-text access may be available. Sign in or learn about subscription options.pp. 319-330
Session 10: Caches and Memory
Cache Refill/Access Decoupling for Vector MachinesFull-text access may be available. Sign in or learn about subscription options.pp. 331-342
Session 10: Caches and Memory
Adaptive History-Based Memory SchedulersFull-text access may be available. Sign in or learn about subscription options.pp. 343-354
Session 10: Caches and Memory
Memory Controller Optimizations for Web ServersFull-text access may be available. Sign in or learn about subscription options.pp. 355-366
Showing 33 out of 33