-
1
-
-
0037331006
-
Simulating a $2M commercial server on a %$2K PC
-
Feb.
-
A. R. Alameldeen, M. M. K. Martin, C. J. Mauer, K. E. Moore, M. Xu, D. J. Sorin, M. D. Hill, and D. A. Wood. Simulating a $2M Commercial Server on a %$2K PC. IEEE Computer, 36(2):50-57, Feb. 2003.
-
(2003)
IEEE Computer
, vol.36
, Issue.2
, pp. 50-57
-
-
Alameldeen, A.R.1
Martin, M.M.K.2
Mauer, C.J.3
Moore, K.E.4
Xu, M.5
Sorin, D.J.6
Hill, M.D.7
Wood, D.A.8
-
8
-
-
0003657593
-
-
Addison-Wesley, Reading, Massachusetts, third edition
-
D. E. Knuth. Seminumerical Algorithms, volume 2 of The Art of Computer Programming. Addison-Wesley, Reading, Massachusetts, third edition, 1997.
-
(1997)
Seminumerical Algorithms, Volume 2 of the Art of Computer Programming
-
-
Knuth, D.E.1
-
9
-
-
0018518477
-
How to make a multiprocessor computer that correctly executes multiprocess Programs
-
Sept.
-
L. Lamport. How to Make a Multiprocessor Computer that Correctly Executes Multiprocess Programs. IEEE Transactions on Computer, C-28(9):690-691, Sept. 1979.
-
(1979)
IEEE Transactions on Computer
, vol.C-28
, Issue.9
, pp. 690-691
-
-
Lamport, L.1
-
11
-
-
0036469676
-
Simics: A full system simulation platform
-
Feb.
-
P. S. Magnusson et al. Simics: A Full System Simulation Platform. IEEE Computer, 35(2):50-58, Feb. 2002.
-
(2002)
IEEE Computer
, vol.35
, Issue.2
, pp. 50-58
-
-
Magnusson, P.S.1
-
12
-
-
33745130597
-
Bandwidth adaptive snooping
-
Feb.
-
M. M. K. Martin D. J. Sorin, M. D. Hill, and D. A. Wood, Bandwidth Adaptive Snooping. In Proceedings of the Eighth IEEE Symposium on High-Performance Computer Architecture, pages 251-262, Feb. 2002.
-
(2002)
Proceedings of the Eighth IEEE Symposium on High-Performance Computer Architecture
, pp. 251-262
-
-
Martin, M.M.K.1
Sorin, D.J.2
Hill, M.D.3
Wood, D.A.4
-
13
-
-
84948992629
-
Cherry: Checkpointed early resource recycling in out-of-order microprocessors
-
J. Martinez, J. Renau, M. Huang, M. Prvulovic, and J. Torrellas. Cherry: Checkpointed Early Resource Recycling in Out-of-order Microprocessors. In Proceedings of the 35th Annual IEEE/ACM International Symposium on Microarchitecture, Nov. 2002.
-
Proceedings of the 35th Annual IEEE/ACM International Symposium on Microarchitecture, Nov. 2002
-
-
Martinez, J.1
Renau, J.2
Huang, M.3
Prvulovic, M.4
Torrellas, J.5
-
17
-
-
0004015896
-
Recovery-oriented computing (ROC): Motivation, definition, techniques, and case studies
-
Technical report, UC Berkeley Computer Science Technical Report UCB//CSD-02-1175
-
D. A. Patterson, et al. Recovery-Oriented Computing (ROC): Motivation, Definition, Techniques, and Case Studies. Technical report, UC Berkeley Computer Science Technical Report UCB//CSD-02-1175, 2002.
-
(2002)
-
-
Patterson, D.A.1
-
22
-
-
0031272525
-
Eraser: A dynamic data race detector for multithreaded programs
-
Nov.
-
S. Savage, M. Burrows, G. Nelson, P. Sobalvarro, and T. Anderson. Eraser: A Dynamic Data Race Detector for Multithreaded Programs. ACM Transactions on Computer Systems, 15(4):391-411, Nov. 1997.
-
(1997)
ACM Transactions on Computer Systems
, vol.15
, Issue.4
, pp. 391-411
-
-
Savage, S.1
Burrows, M.2
Nelson, G.3
Sobalvarro, P.4
Anderson, T.5
-
23
-
-
0038702996
-
Access ordering and coherence in shared memory multiprocessors
-
Technical report, University of Southern California, Computer Engineering Division Technical Report No. CENG 89-19, May
-
C. E. Scheurich. Access Ordering and Coherence in Shared Memory Multiprocessors. Technical report, University of Southern California, Computer Engineering Division Technical Report No. CENG 89-19, May 1989.
-
(1989)
-
-
Scheurich, C.E.1
-
24
-
-
0023994389
-
Efficient and correct execution of parallel programs that share memory
-
Apr.
-
D. Shasha and M. Snir. Efficient and Correct Execution of Parallel Programs that Share Memory. ACM Transactions on Programming Languages and Systems, 10(2):282-312, Apr. 1988.
-
(1988)
ACM Transactions on Programming Languages and Systems
, vol.10
, Issue.2
, pp. 282-312
-
-
Shasha, D.1
Snir, M.2
-
25
-
-
0003745936
-
Fast checkpoint/recovery to support kilo-instruction speculation and hardware fault tolerance
-
Technical Report 1420, Computer Sciences Department, University of Wisconsin-Madison, Oct.
-
D. J. Sorin, M. M. K. Martin, M. D. Hill, and D. A. Wood. Fast Checkpoint/Recovery to Support Kilo-Instruction Speculation and Hardware Fault Tolerance. Technical Report 1420, Computer Sciences Department, University of Wisconsin-Madison, Oct. 2000.
-
(2000)
-
-
Sorin, D.J.1
Martin, M.M.K.2
Hill, M.D.3
Wood, D.A.4
-
26
-
-
0036292677
-
Safety net: Improving the availability of shared memory multiprocessors with global checkpoint/recovery
-
May
-
D. J. Sorin, M. M. K. Martin, M. D. Hill, and D. A. Wood. Safety Net: Improving the Availability of Shared Memory Multiprocessors with Global Checkpoint/Recovery. In Proceedings of the 29th Annual International Symposium on Computer Architecture, pages 123-134, May 2002.
-
(2002)
Proceedings of the 29th Annual International Symposium on Computer Architecture
, pp. 123-134
-
-
Sorin, D.J.1
Martin, M.M.K.2
Hill, M.D.3
Wood, D.A.4
-
27
-
-
0035266001
-
IBM memory expansion technology (MXT)
-
Mar.
-
R. Tremaine, P. Franaszek, J. Robinson, C. Schulz, T. Smith, M. Wazlowski, and P. Bland. IBM Memory Expansion Technology (MXT). IBM Journal of Research and Development, 45(2):271-285, Mar. 2001.
-
(2001)
IBM Journal of Research and Development
, vol.45
, Issue.2
, pp. 271-285
-
-
Tremaine, R.1
Franaszek, P.2
Robinson, J.3
Schulz, C.4
Smith, T.5
Wazlowski, M.6
Bland, P.7
-
28
-
-
0025470393
-
Verifying a multiprocessor cache controller using random test generation
-
Aug.
-
D. A. Wood, G. A. Gibson, and R. H. Katz. Verifying a Multiprocessor Cache Controller Using Random Test Generation. IEEE Design and Test of Computers, pages 13-25, Aug. 1990.
-
(1990)
IEEE Design and Test of Computers
, pp. 13-25
-
-
Wood, D.A.1
Gibson, G.A.2
Katz, R.H.3
-
29
-
-
0017493286
-
A universal algorithm for sequential data compression
-
May
-
J. Ziv and A. Lempel. A Universal Algorithm for Sequential Data Compression. IEEE Transactions on Information Theory, 23(3):337-343, May 1977.
-
(1977)
IEEE Transactions on Information Theory
, vol.23
, Issue.3
, pp. 337-343
-
-
Ziv, J.1
Lempel, A.2
|