Proceedings of the 10th Annual International Symposium on Computer Architecture - ISCA '83 1983
DOI: 10.1145/800046.801645
|View full text |Cite
|
Sign up to set email alerts
|

Architecture of a VLSI instruction cache for a RISC

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
21
0
1

Year Published

1988
1988
2011
2011

Publication Types

Select...
3
3
2

Relationship

0
8

Authors

Journals

citations
Cited by 46 publications
(22 citation statements)
references
References 8 publications
0
21
0
1
Order By: Relevance
“…Block-disabling has been proposed by [15], [19] to increase processor yield and is used by modern processors [13] to continue operation in the presence of permanent-errors. In this work we consider it for lowvoltage operation.…”
Section: Block-disabling and Victim Cachingmentioning
confidence: 99%
“…Block-disabling has been proposed by [15], [19] to increase processor yield and is used by modern processors [13] to continue operation in the presence of permanent-errors. In this work we consider it for lowvoltage operation.…”
Section: Block-disabling and Victim Cachingmentioning
confidence: 99%
“…An early proposal treated accesses to a faulty cache line as a miss [13], i.e. memory lines which mapped to faulty cache lines were never brought into the cache.…”
Section: Related Workmentioning
confidence: 99%
“…The Branch Target Buffer technique has been evaluated consistently as the most effective branch prediction strategy [Lee andSmith 1984, McFarling andHennessy 1986]: one observes that even in RISC machines, where the use of software techniques has been prevalent, the use of Branch Target Buffers has not been completely ruled out [Patterson et al 1983]. It has become the preferred prediction strategy in more recent high-performance machines such as the IBM 3090 [Tucker 1986] and NEC's SX machines [Watanabe, Katayama, and Iwaya 1986].…”
Section: '9mentioning
confidence: 99%
“…Their weakness is that not only do they require considerable ingenuity on the part of the compiler writer but also that in spite of this they are not always applicable; it is sometimes the case that compiler-generated code simply cannot be manipulated in the manner indicated by the above example. Indeed, the designers of the Berkley RISCs have not found the use of hardware techniques, in the form of an instruction cache with some branch prediction, to be unreasonable [Patterson et al 1983].…”
Section: '9mentioning
confidence: 99%