Default Cover Image

2020 53rd Annual IEEE/ACM International Symposium on Microarchitecture (MICRO)

Oct. 17 2020 to Oct. 21 2020

Athens, Greece

ISBN: 978-1-7281-7383-2

Table of Contents

[Title page i]Freely available from IEEE.pp. 1-1
[Title page iii]Freely available from IEEE.pp. 2-2
[Copyright notice]Freely available from IEEE.pp. 3-3
Table of contentsFreely available from IEEE.pp. 4-15
Message from the MICRO 2020 General ChairFreely available from IEEE.pp. 16-17
Message from the MICRO 2020 Program Co-ChairsFreely available from IEEE.pp. 18-22
Organizing CommitteeFreely available from IEEE.pp. 23-24
Program CommitteeFreely available from IEEE.pp. 25-27
External Review CommitteeFreely available from IEEE.pp. 28-31
Steering CommitteeFreely available from IEEE.pp. 32-32
Additional External ReviewersFreely available from IEEE.pp. 33-33
MICRO-53 SponsorsFreely available from IEEE.pp. 34-34
KeynotesFull-text access may be available. Sign in or learn about subscription options.pp. 35-37
Graphene: Strong yet Lightweight Row Hammer ProtectionFull-text access may be available. Sign in or learn about subscription options.pp. 1-13
Persist Level Parallelism: Streamlining Integrity Tree Updates for Secure Persistent MemoryFull-text access may be available. Sign in or learn about subscription options.pp. 14-27
PThammer: Cross-User-Kernel-Boundary Rowhammer through Implicit AccessesFull-text access may be available. Sign in or learn about subscription options.pp. 28-41
Draco: Architectural and Operating System Support for System Call SecurityFull-text access may be available. Sign in or learn about subscription options.pp. 42-57
BranchNet: A Convolutional Neural Network to Predict Hard-To-Predict BranchesFull-text access may be available. Sign in or learn about subscription options.pp. 118-130
CHiRP: Control-Flow History Reuse PredictionFull-text access may be available. Sign in or learn about subscription options.pp. 131-145
Improving the Utilization of Micro-operation Caches in x86 ProcessorsFull-text access may be available. Sign in or learn about subscription options.pp. 160-172
Optimized Quantum Compilation for Near-Term Algorithms with OpenPulseFull-text access may be available. Sign in or learn about subscription options.pp. 186-200
Circuit Compilation Methodologies for Quantum Approximate Optimization AlgorithmFull-text access may be available. Sign in or learn about subscription options.pp. 215-228
Fast-BCNN: Massive Neuron Skipping in Bayesian Convolutional Neural NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 229-240
Ptolemy: Architecture Support for Robust Deep LearningFull-text access may be available. Sign in or learn about subscription options.pp. 241-255
Non-Blocking Simultaneous Multithreading: Embracing the Resiliency of Deep Neural NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 256-269
FIdelity: Efficient Resilience Analysis Framework for Deep Learning AcceleratorsFull-text access may be available. Sign in or learn about subscription options.pp. 270-281
PerpLE: Improving the Speed and Effectiveness of Memory Consistency TestingFull-text access may be available. Sign in or learn about subscription options.pp. 329-341
AQUOMAN: An Analytic-Query Offloading MachineFull-text access may be available. Sign in or learn about subscription options.pp. 386-399
Optimizing the Memory Hierarchy by Compositing Automatic Transformations on Computations and DataFull-text access may be available. Sign in or learn about subscription options.pp. 427-441
DiffTune: Optimizing CPU Simulator Parameters with Learned Differentiable SurrogatesFull-text access may be available. Sign in or learn about subscription options.pp. 442-455
Predicting Execution Times With Partial Simulations in Virtual Memory Research: Why and HowFull-text access may be available. Sign in or learn about subscription options.pp. 456-470
gem5-SALAM: A System Architecture for LLVM-based Accelerator ModelingFull-text access may be available. Sign in or learn about subscription options.pp. 471-482
Shaving Retries with Sentinels for Fast Read over High-Density 3D FlashFull-text access may be available. Sign in or learn about subscription options.pp. 483-495
Characterizing and Modeling Non-Volatile Memory SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 496-508
P-INSPECT: Architectural Support for Programmable Non-Volatile Memory FrameworksFull-text access may be available. Sign in or learn about subscription options.pp. 509-524
Unbounded Hardware Transactional Memory for a Hybrid DRAM/NVM Memory SystemFull-text access may be available. Sign in or learn about subscription options.pp. 525-538
(Almost) Fence-less Persist OrderingFull-text access may be available. Sign in or learn about subscription options.pp. 539-554
Speculative Enforcement of Store AtomicityFull-text access may be available. Sign in or learn about subscription options.pp. 555-567
Boosting Store Buffer Efficiency with Store-Prefetch BurstsFull-text access may be available. Sign in or learn about subscription options.pp. 568-580
D-SOAP: Dynamic Spatial Orientation Affinity Prediction for Caching in Multi-Orientation Memory SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 581-595
Pipette: Improving Core Utilization on Irregular Applications through Intra-Core Pipeline ParallelismFull-text access may be available. Sign in or learn about subscription options.pp. 596-608
RnR: A Software-Assisted Record-and-Replay Hardware PrefetcherFull-text access may be available. Sign in or learn about subscription options.pp. 609-621
ConfuciuX: Autonomous Hardware Resource Assignment for DNN Accelerators using Reinforcement LearningFull-text access may be available. Sign in or learn about subscription options.pp. 622-636
Gemini: Learning to Manage CPU Power for Latency-Critical Search EnginesFull-text access may be available. Sign in or learn about subscription options.pp. 637-349
Jumanji: The Case for Dynamic NUCA in the DatacenterFull-text access may be available. Sign in or learn about subscription options.pp. 665-680
VR-DANN: Real-Time Video Recognition via Decoder-Assisted Neural Network AccelerationFull-text access may be available. Sign in or learn about subscription options.pp. 698-710
Duplo: Lifting Redundant Memory Accesses of Deep Neural Networks for GPU Tensor CoresFull-text access may be available. Sign in or learn about subscription options.pp. 725-737
DUET: Boosting Deep Neural Network Efficiency on Dual-Module ArchitectureFull-text access may be available. Sign in or learn about subscription options.pp. 738-750
MatRaptor: A Sparse-Sparse Matrix Multiplication Accelerator Based on Row-Wise ProductFull-text access may be available. Sign in or learn about subscription options.pp. 766-780
GOBO: Quantizing Attention-Based NLP Models for Low Latency and Energy Efficient InferenceFull-text access may be available. Sign in or learn about subscription options.pp. 811-824
HyperPlane: A Scalable Low-Latency Notification Accelerator for Software Data PlanesFull-text access may be available. Sign in or learn about subscription options.pp. 852-867
A Benchmarking Framework for Interactive 3D Applications in the CloudFull-text access may be available. Sign in or learn about subscription options.pp. 881-894
A Locality-Aware Energy-Efficient Accelerator for Graph Mining ApplicationsFull-text access may be available. Sign in or learn about subscription options.pp. 895-907
GraphPulse: An Event-Driven Hardware Accelerator for Asynchronous Graph ProcessingFull-text access may be available. Sign in or learn about subscription options.pp. 908-921
Selective Replication in Memory-Side GPU CachesFull-text access may be available. Sign in or learn about subscription options.pp. 967-980
Deterministic Atomic BufferingFull-text access may be available. Sign in or learn about subscription options.pp. 981-995
BOW: Breathing Operand Windows to Exploit Bypassing in GPUsFull-text access may be available. Sign in or learn about subscription options.pp. 996-1008
MDM: The GPU Memory Divergence ModelFull-text access may be available. Sign in or learn about subscription options.pp. 1009-1021
Locality-Centric Data and Threadblock Management for Massive GPUsFull-text access may be available. Sign in or learn about subscription options.pp. 1022-1036
Mesorasi: Architecture Support for Point Cloud Analytics via Delayed-AggregationFull-text access may be available. Sign in or learn about subscription options.pp. 1037-1050
AutoScale: Energy Efficiency Optimization for Stochastic Edge Inference Using Reinforcement LearningFull-text access may be available. Sign in or learn about subscription options.pp. 1082-1096
CaSA: End-to-end Quantitative Security Analysis of Randomly Mapped CachesFull-text access may be available. Sign in or learn about subscription options.pp. 1110-1123
Hardware-based Always-On Heap Memory SafetyFull-text access may be available. Sign in or learn about subscription options.pp. 1153-1166
Author IndexFreely available from IEEE.pp. 1167-1172
Showing 96 out of 96