2015 10th International Symposium on Reconfigurable Communication-Centric Systems-on-Chip (ReCoSoC) 2015
DOI: 10.1109/recosoc.2015.7238080
|View full text |Cite
|
Sign up to set email alerts
|

Configurable cache tuning with a victim cache

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2017
2017
2019
2019

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 10 publications
(2 citation statements)
references
References 14 publications
0
2
0
Order By: Relevance
“…The cache tuning algorithm/heuristic can result in time and energy overheads, since the processor must stall during the tuning process. Much previous work (e.g., [2], [33], [36], [71], [104]) have proposed different algorithms/heuristics for cache tuning to minimize the potential of overhead and maximize the cache tuning benefits. These works offer a valuable foundation for IoT microprocessors.…”
Section: A Configurable/adaptable Architecturesmentioning
confidence: 99%
See 1 more Smart Citation
“…The cache tuning algorithm/heuristic can result in time and energy overheads, since the processor must stall during the tuning process. Much previous work (e.g., [2], [33], [36], [71], [104]) have proposed different algorithms/heuristics for cache tuning to minimize the potential of overhead and maximize the cache tuning benefits. These works offer a valuable foundation for IoT microprocessors.…”
Section: A Configurable/adaptable Architecturesmentioning
confidence: 99%
“…In-memory processing-or processing in memory-has been studied in relation to big data and distributed com- [27], [28], [33], [36], [53], [71], [104] Distributed heterogeneous architectures Extensibility, efficiency, future-proof [56], [68], [88] Energy harvesting and non-volatile processors Efficiency [18], [31], [35], [60], [62], [77], [97], [22], [63], [65], [72], [92], [99], [102], [108] Approximate computing Efficiency [21], [26], [38], [42], [54], [64], [81], [96], [17], [55], [58], [82], [86], [87] In-memory processing Efficiency, extensibility [5], [24], [41], [44]- [46], [103], [105] Secure microarchitectures Security …”
Section: E In-memory Processingmentioning
confidence: 99%