Join Us
Sign In
My Subscriptions
Magazines
Journals
Video Library
Conference Proceedings
Individual CSDL Subscriptions
Institutional CSDL Subscriptions
Resources
Career Center
Tech News
Resource Center
Press Room
Advertising
Librarian Resources
IEEE.org
Help
About Us
Career Center
Cart
Create Account
Sign In
Toggle navigation
My Subscriptions
Browse Content
Resources
All
Home
Proceedings
MICRO
MICRO 2016
Generate Citations
2016 49th Annual IEEE/ACM International Symposium on Microarchitecture (MICRO)
Oct. 15 2016 to Oct. 19 2016
Taipei, Taiwan
Table of Contents
Program
Freely available from IEEE.
pp. 1-4
MICRO-49 organizing committee
Freely available from IEEE.
pp. 1-1
MICRO-49 program committee
Freely available from IEEE.
pp. 1-2
MICRO-49 steering committee
Freely available from IEEE.
pp. 1-1
External reviewers
Freely available from IEEE.
pp. 1-6
Sponsors
Freely available from IEEE.
pp. 1-1
Message from the general chairs
Freely available from IEEE.
pp. 1-1
Message from the MICRO-49 program co-chairs
Freely available from IEEE.
pp. 1-2
Keynotes: Internet of Things: History and hype, technology and policy
Freely available from IEEE.
pp. 1-2
by
Margaret Martonosi
Dictionary sharing: An efficient cache compression scheme for compressed caches
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-12
by
Biswabandan Panda
,
André Seznec
Perceptron learning for reuse prediction
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-12
by
Elvira Teran
,
Zhe Wang
,
Daniel A. Jiménez
pTask: A smart prefetching scheme for OS intensive applications
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-12
by
Prathmesh Kallurkar
,
Smruti R. Sarangi
Register sharing for equality prediction
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-12
by
Arthur Perais
,
Fernando A. Endo
,
André Seznec
Data-centric execution of speculative parallel programs
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-13
by
Mark C. Jeffrey
,
Suvinay Subramanian
,
Maleen Abeydeera
,
Joel Emer
,
Daniel Sanchez
SABRes: Atomic object reads for in-memory rack-scale computing
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-13
by
Alexandras Daglis
,
Dmitrii Ustiugov
,
Stanko Novaković
,
Edouard Bugnion
,
Babak Falsafi
,
Boris Grot
A cloud-scale acceleration architecture
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-13
by
Adrian M. Caulfield
,
Eric S. Chung
,
Andrew Putnam
,
Hari Angepat
,
Jeremy Fowers
,
Michael Haselman
,
Stephen Heil
,
Matt Humphrey
,
Puneet Kaur
,
Joo-Young Kim
,
Daniel Lo
,
Todd Massengill
,
Kalin Ovtcharov
,
Michael Papamichael
,
Lisa Woods
,
Sitaram Lanka
,
Derek Chiou
,
Doug Burger
Towards efficient server architecture for virtualized network function deployment: Implications and implementations
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-12
by
Yang Hu
,
Tao Li
Bridging the I/O performance gap for big data workloads: A new NVDIMM-based approach
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-12
by
Renhai Chent
,
Zili Shao
,
Tao Li
NeSC: Self-virtualizing nested storage controller
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-12
by
Yonatan Gottesman
,
Yoav Etsion
MIMD synchronization on SIMT architectures
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-14
by
Ahmed ElTantawy
,
Tor M. Aamodt
Efficient kernel synthesis for performance portable programming
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-13
by
Li-Wen Chang
,
Izzat El Hajj
,
Christopher Rodrigues
,
Juan Gómez-Luna
,
Wen-mei Hwu
KLAP: Kernel launch aggregation and promotion for optimizing dynamic parallelism
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-12
by
Izzat El Hajj
,
Juan Gomez-Luna
,
Cheng Li
,
Li-Wen Chang
,
Dejan Milojicic
,
Wen-mei Hwu
Cache-emulated register file: An integrated on-chip memory architecture for high performance GPGPUs
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-12
by
Naifeng Jing
,
Jianfei Wang
,
Fengfeng Fan
,
Wenkang Yu
,
Li Jiang
,
Chao Li
,
Xiaoyao Liang
Zorua: A holistic approach to resource virtualization in GPUs
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-14
by
Nandita Vijaykumar
,
Kevin Hsieh
,
Gennady PekhimenW
,
Samira Khan
,
Ashish Shrestha
,
Saugata Ghose
,
Adwait Jog
,
Phillip B. Gibbons
,
Onur Mutlu
GRAPE: Minimizing energy for GPU applications with performance requirements
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-13
by
Muhammad Husni Santriaji
,
Henry Hoffmann
From high-level deep neural models to FPGAs
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-12
by
Hardik Sharma
,
Jongse Park
,
Divya Mahajan
,
Emmanuel Amaro
,
Joon Kyung Kim
,
Chenkai Shao
,
Asit Mishra
,
Hadi Esmaeilzadeh
vDNN: Virtualized deep neural networks for scalable, memory-efficient neural network design
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-13
by
Minsoo Rhu
,
Natalia Gimelshein
,
Jason Clemons
,
Arslan Zulfiqar
,
Stephen W. Keckler
Stripes: Bit-serial deep neural network computing
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-12
by
Patrick Judd
,
Jorge Albericio
,
Tayler Hetherington
,
Tor M. Aamodt
,
Andreas Moshovos
Cambricon-X: An accelerator for sparse neural networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-12
by
Shijin Zhang
,
Zidong Du
,
Lei Zhang
,
Huiying Lan
,
Shaoli Liu
,
Ling Li
,
Qi Guo
,
Tianshi Chen
,
Yunji Chen
NEUTRAMS: Neural network transformation and co-design under neuromorphic hardware constraints
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-13
by
Yu Ji
,
YouHui Zhang
,
ShuangChen Li
,
Ping Chi
,
CiHang Jiang
,
Peng Qu
,
Yuan Xie
,
WenGuang Chen
Fused-layer CNN accelerators
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-12
by
Manoj Alwani
,
Han Chen
,
Michael Ferdman
,
Peter Milder
Continuous shape shifting: Enabling loop co-optimization via near-free dynamic code rewriting
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-12
by
Animesh Jain
,
Michael A. Laurenzano
,
Lingjia Tang
,
Jason Mars
CrystalBall: Statically analyzing runtime behavior via deep sequence learning
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-12
by
Stephen Zekany
,
Daniel Rings
,
Nathan Harada
,
Michael A. Laurenzano
,
Lingjia Tang
,
Jason Mars
Low-cost soft error resilience with unified data verification and fine-grained recovery for acoustic sensor based detection
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-12
by
Qingrui Liu
,
Changhee Jung
,
Dongyoon Lee
,
Devesh Tiwarit
Lazy release consistency for GPUs
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-14
by
Johnathan Alsop
,
Marc S. Orr
,
Bradford M. Beckmann
,
David A. Wood
Improving energy efficiency of DRAM by exploiting half page row access
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-12
by
Heonjae Ha
,
Ardavan Pedram
,
Stephen Richardson
,
Shahar Kvatinsky
,
Mark Horowitz
OSCAR: Orchestrating STT-RAM cache traffic for heterogeneous CPU-GPU architectures
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-13
by
Jia Zhan
,
Onur Kayıran
,
Gabriel H. Loh
,
Chita R. Das
,
Yuan Xie
A unified memory network architecture for in-memory computing in commodity servers
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-14
by
Jia Zhan
,
Itir Akgun
,
Jishen Zhao
,
Al Davis
,
Paolo Faraboschi
,
Yuangang Wang
,
Yuan Xie
Contention-based congestion management in large-scale networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-13
by
Gwangsun Kim
,
Changhyun Kim
,
Jiyun Jeong
,
Mike Parker
,
John Kim
Dynamic error mitigation in NoCs using intelligent prediction techniques
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-12
by
Dominic DiTomaso
,
Travis Boraten
,
Avinash Kodi
,
Ahmed Louri
Reducing data movement energy via online data clustering and encoding
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-13
by
Shibo Wang
,
Engin Ipek
Racer: TSO consistency via race detection
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-13
by
Alberto Ros
,
Stefanos Kaxiras
Exploiting semantic commutativity in hardware speculation
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-12
by
Guowei Zhang
,
Virginia Chiu
,
Daniel Sanchez
CANDY: Enabling coherent DRAM caches for multi-node systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-13
by
Chiachen Chou
,
Aamer Jaleel
,
Moinuddin K. Qureshi
C3D: Mitigating the NUMA bottleneck via coherent DRAM caches
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-12
by
Cheng-Chieh Huang
,
Rakesh Kumar
,
Marco Elver
,
Boris Grot
,
Vijay Nagarajan
Quantifying and improving the efficiency of hardware-based mobile malware detectors
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-13
by
Mikhail Kazdagli
,
Vijay Janapa Reddi
,
Mohit Tiwari
PoisonIvy: Safe speculation for secure memory
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-13
by
Tamara Silbergleit Lehman
,
Andrew D. Hilton
,
Benjamin C. Lee
ReplayConfusion: Detecting cache-based covert channel attacks using record and replay
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-14
by
Mengjia Yan
,
Yasser Shalabi
,
Josep Torrellas
Jump over ASLR: Attacking branch predictors to bypass ASLR
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-13
by
Dmitry Evtyushkin
,
Dmitry Ponomarev
,
Nael Abu-Ghazaleh
Concise loads and stores: The case for an asymmetric compute-memory architecture for approximation
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-13
by
Animesh Jain
,
Parker Hill
,
Shih-Chieh Lin
,
Muneeb Khan
,
Md E. Haque
,
Michael A. Laurenzano
,
Scott Mahlke
,
Lingjia Tang
,
Jason Mars
Approxilyzer: Towards a systematic framework for instruction-level approximate computing and its application to hardware resiliency
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-14
by
Radha Venkatagiri
,
Abdulrahman Mahmoud
,
Siva Kumar Sastry Hari
,
Sarita V. Adve
The Bunker Cache for spatio-value approximation
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-12
by
Joshua San Miguel
,
Jorge Albericio
,
Natalie Enright Jerger
,
Aamer Jaleel
HARE: Hardware accelerator for regular expressions
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-12
by
Vaibhav Gogte
,
Aasheesh Kolli
,
Michael J. Cafarella
,
Loris D'Antoni
,
Thomas F. Wenisch
The microarchitecture of a real-time robot motion planning accelerator
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-12
by
Sean Murray
,
William Floyd-Jones
,
Ying Qi
,
George Konidaris
,
Daniel J. Sorin
Efficient data supply for hardware accelerators with prefetching and access/execute decoupling
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-12
by
Tao Chen
,
G. Edward Suh
An ultra low-power hardware accelerator for automatic speech recognition
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-12
by
Reza Yazdani
,
Albert Segura
,
Jose-Maria Arnau
,
Antonio Gonzalez
Co-designing accelerators and SoC interfaces using gem5-Aladdin
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-12
by
Yakun Sophia Shao
,
Sam Likun Xi
,
Vijayalakshmi Srinivasan
,
Gu-Yeon Wei
,
David Brooks
Chainsaw: Von-neumann accelerators to leverage fused instruction chains
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-14
by
Amirali Sharifian
,
Snehasish Kumar
,
Apala Guha
,
Arrvindh Shriraman
Chameleon: Versatile and practical near-DRAM acceleration architecture for large memory systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-13
by
Hadi Asghari-Moghaddam
,
Young Hoon Son
,
Jung Ho Ahn
,
Nam Sung Kim
A patch memory system for image processing and computer vision
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-13
by
Jason Clemons
,
Chih-Chi Cheng
,
Iuri Frosio
,
Daniel Johnson
,
Stephen W. Keckler
Evaluating programmable architectures for imaging and vision applications
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-13
by
Artem Vasilyev
,
Nikhil Bhagdikar
,
Ardavan Pedram
,
Stephen Richardson
,
Shahar Kvatinsky
,
Mark Horowitz
Redefining QoS and customizing the power management policy to satisfy individual mobile users
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-12
by
Kaige Yan
,
Xingyao Zhang
,
Jingweijia Tan
,
Xin Fu
Snatch: Opportunistically reassigning power allocation between processor and memory in 3D stacks
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-12
by
Dimitrios Skarlatos
,
Renji Thomas
,
Aditya Agrawal
,
Shibin Qin
,
Robert Pilawa-Podgurski
,
Ulya R. Karpuzcu
,
Radu Teodorescu
,
Nam Sung Kim
,
Josep Torrellas
Ti-states: Processor power management in the temperature inversion region
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-13
by
Yazhou Zu
,
Wei Huang
,
Indrani Paul
,
Vijay Janapa Reddi
Graphicionado: A high-performance and energy-efficient accelerator for graph analytics
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-13
by
Tae Jun Ham
,
Lisa Wu
,
Narayanan Sundaram
,
Nadathur Satish
,
Margaret Martonosi
Improving bank-level parallelism for irregular applications
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-12
by
Xulong Tang
,
Mahmut Kandemir
,
Praveen Yedlapalli
,
Jagadish Kotra
Delegated persist ordering
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-13
by
Aasheesh Kolli
,
Jeff Rosen
,
Stephan Diestelhorst
,
Ali Saidi
,
Steven Pelley
,
Sihang Liu
,
Peter M. Chen
,
Thomas F. Wenisch
Spectral profiling: Observer-effect-free profiling by monitoring EM emanations
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-11
by
Nader Sehatbakhsh
,
Alireza Nazari
,
Alenka Zajic
,
Milos Prvulovic
Path confidence based lookahead prefetching
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-12
by
Jinchun Kim
,
Seth H. Pugsley
,
Paul V. Gratz
,
A. L. Narasimha Reddy
,
Chris Wilkerson
,
Zeshan Chishti
Continuous runahead: Transparent hardware acceleration for memory intensive workloads
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-12
by
Milad Hashemi
,
Onur Mutlu
,
Yale N. Patt
Author index
Freely available from IEEE.
pp. 1-29
Showing 71 out of 71