2000
DOI: 10.1145/350853.350856
|View full text |Cite
|
Sign up to set email alerts
|

Value-based clock gating and operation packing

Abstract: The large address space needs of many current applications have pushed processor designs toward 64-bit word widths. Although full 64-bit addresses and operations are indeed sometimes needed, arithmetic operations on much smaller quantities are still more common. In fact, another instruction set trend has been the introduction of instructions geared toward subword operations on 16-bit quantities. For example, most major processors now include instruction set support for multimedia operations allowing parallel e… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
18
0

Year Published

2005
2005
2016
2016

Publication Types

Select...
5
3
1

Relationship

0
9

Authors

Journals

citations
Cited by 49 publications
(18 citation statements)
references
References 27 publications
0
18
0
Order By: Relevance
“…Both Brooks and Martonosi [4] and Ghose et al [8] demonstrate that many operands do not require the full width of the datapath. To save dynamic energy, datapath hardware detects these bytes and gates the logic from performing unnecessary work.…”
Section: Related Workmentioning
confidence: 99%
“…Both Brooks and Martonosi [4] and Ghose et al [8] demonstrate that many operands do not require the full width of the datapath. To save dynamic energy, datapath hardware detects these bytes and gates the logic from performing unnecessary work.…”
Section: Related Workmentioning
confidence: 99%
“…In addition to hardware multi-threading, clock-gating [21] in the pipeline stages enables us to minimize power dissipation by canceling the dynamic power in the idle stages compared to active blocks which consumes both dynamic and leakage power. Long latency operations in a hardware thread are typically blocking in nature.…”
Section: Processor Micro-architecturementioning
confidence: 99%
“…After presenting these optimization techniques, we focus on dynamic optimizations for WSNs. There exists much previous work on dynamic optimizations e.g., (Brooks & Martonosi, 2000); (Hamed et al, 2006); (Hazelwood & Smith, 2006); (Hu et al, 2006), but most previous work targets the processor or cache subsystem in computing systems. WSN dynamic optimizations present additional challenges due to a unique design space, stringent design constraints, and varying operating environments.…”
mentioning
confidence: 99%