International Symposium on Code Generation and Optimization, 2003. CGO 2003.
DOI: 10.1109/cgo.2003.1191529
|View full text |Cite
|
Sign up to set email alerts
|

The Transmeta Code Morphing/spl trade/ Software: using speculation, recovery, and adaptive retranslation to address real-life challenges

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

1
228
0
6

Publication Types

Select...
4
3
2

Relationship

0
9

Authors

Journals

citations
Cited by 174 publications
(235 citation statements)
references
References 17 publications
1
228
0
6
Order By: Relevance
“…It is used to recover from branch misprediction and out-of-order execution [33,38], hardware faults [32,34], speculative memory-reordering in VLIW machines [13,18], optimistic dynamic binary translation and code optimization [11,14], and transactional memory [17,28]. In each of these cases, recovery is used Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page.…”
Section: Introductionmentioning
confidence: 99%
“…It is used to recover from branch misprediction and out-of-order execution [33,38], hardware faults [32,34], speculative memory-reordering in VLIW machines [13,18], optimistic dynamic binary translation and code optimization [11,14], and transactional memory [17,28]. In each of these cases, recovery is used Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page.…”
Section: Introductionmentioning
confidence: 99%
“…While in theory these run-time annotations hold only for a given input, in practice the dependency information tends to be fairly stable across inputs. We are not the first to make this observation: compiler researchers have proposed using runtime dependency information for profile-driven speculative optimizations [24] and run-time system builders have implemented some of these optimizations in production systems [8]. COMPASS, which does not have the same strong correctness criteria as compilers, will also stand to benefit from this kind of representation.…”
Section: Program Representationmentioning
confidence: 99%
“…Each micro-operation places its result in one resource, r ko , at most. Now, we are able to model W k , the operations of each instruction, i k over the interval T k , as a sequence of triplets shown in (14). Now,…”
Section: Formulating the Simple Modelmentioning
confidence: 99%
“…In a co-designed virtual machine the source architecture, that is the one visible to the binary applications running on the machine, is emulated on a target architecture. One of the most well-known co-designed virtual machines is the Transmeta Crusoe processor [13], which uses a "code morphing" (CMS) layer [14] to transparently run Intel IA-32-based software (source architecture) on an underlying VLIW (Very Long Instruction Word) architecture (target architecture). Using our model, this CMS layer can be implemented in 3 n I , in order to maximize performance or it can be implemented in 3 m R , in order to maximize design flexibility and postproduction maintenance.…”
Section: A Microprogrammingmentioning
confidence: 99%