2022
DOI: 10.1109/tcad.2022.3146204
|View full text |Cite
|
Sign up to set email alerts
|

Flatfish: A Reinforcement Learning Approach for Application-Aware Address Mapping

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2023
2023
2023
2023

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(3 citation statements)
references
References 32 publications
0
3
0
Order By: Relevance
“…When accessing DDR4, the Burst Length 8 (BL8) mode is commonly used, which means that each memory access command can read or write a sequence of 8 bytes as a group [15]. For a fixed set of data, there are two DDR4 characters [16] that result in different access latency values depending on the memory access sequence:…”
Section: A Ddr Access Latency and Row Conflictsmentioning
confidence: 99%
See 2 more Smart Citations
“…When accessing DDR4, the Burst Length 8 (BL8) mode is commonly used, which means that each memory access command can read or write a sequence of 8 bytes as a group [15]. For a fixed set of data, there are two DDR4 characters [16] that result in different access latency values depending on the memory access sequence:…”
Section: A Ddr Access Latency and Row Conflictsmentioning
confidence: 99%
“…Summarizing these characters, it is recommended to avoid making consecutive accesses to different rows within a single bank as far as possible. It helps minimize the occurrence of row conflicts within the same bank [16]. The address of a data group can be represented as (row, bank, bank group, first column: last column).…”
Section: A Ddr Access Latency and Row Conflictsmentioning
confidence: 99%
See 1 more Smart Citation