Extensive research has been done in prefetching techniques that hide memory latency in microprocessors leading to performance improvements. However, the energy aspect of prefetching is relatively unknown. While aggressive prefetching techniques often help to improve performance, they increase energy consumption by as much as 30% in the memory system. This paper provides a detailed evaluation on the energy impact of hardware data prefetching and then presents a set of new energy-aware techniques to overcome prefetching energy overhead of such schemes. These include compiler-assisted and hardware-based energy-aware techniques and a new power-aware prefetch engine that can reduce hardware prefetching related energy consumption by 7-11x. Combin...
As the trends of process scaling make memory system even more crucial bottleneck, the importance of ...
Recent technological advances are such that the gap between processor cycle times and memory cycle t...
Prefetching, i.e., exploiting the overlap of processor com-putations with data accesses, is one of s...
Extensive research has been done in prefetching techniques that hide memory latency in microprocesso...
Prefetching has emerged as one of the most successful techniques to bridge the gap between modern pr...
There has been intensive research on data prefetching focusing on performance improvement, however, ...
An energy-efficient architecture should jointly optimize energy consumption and throughput, as captu...
Performance-enhancement techniques improve CPU speed, but at higher cost to other valuable system re...
As data prefetching is used in embedded processors, it is crucial to reduce the wasted energy for im...
Processor performance has increased far faster than memories have been able to keep up with, forcing...
Performance-enhancement techniques improve CPU speed, but at higher cost to other valuable system r...
Computing system power consumption is a concern as it has financial and environmental implications. ...
The end of Dennard scaling has brought energy savings to the forefront of processor design. When cou...
A well known performance bottleneck in computer architecture is the so-called memory wall. This term...
A major performance limiter in modern processors is the long latencies caused by data cache misses. ...
As the trends of process scaling make memory system even more crucial bottleneck, the importance of ...
Recent technological advances are such that the gap between processor cycle times and memory cycle t...
Prefetching, i.e., exploiting the overlap of processor com-putations with data accesses, is one of s...
Extensive research has been done in prefetching techniques that hide memory latency in microprocesso...
Prefetching has emerged as one of the most successful techniques to bridge the gap between modern pr...
There has been intensive research on data prefetching focusing on performance improvement, however, ...
An energy-efficient architecture should jointly optimize energy consumption and throughput, as captu...
Performance-enhancement techniques improve CPU speed, but at higher cost to other valuable system re...
As data prefetching is used in embedded processors, it is crucial to reduce the wasted energy for im...
Processor performance has increased far faster than memories have been able to keep up with, forcing...
Performance-enhancement techniques improve CPU speed, but at higher cost to other valuable system r...
Computing system power consumption is a concern as it has financial and environmental implications. ...
The end of Dennard scaling has brought energy savings to the forefront of processor design. When cou...
A well known performance bottleneck in computer architecture is the so-called memory wall. This term...
A major performance limiter in modern processors is the long latencies caused by data cache misses. ...
As the trends of process scaling make memory system even more crucial bottleneck, the importance of ...
Recent technological advances are such that the gap between processor cycle times and memory cycle t...
Prefetching, i.e., exploiting the overlap of processor com-putations with data accesses, is one of s...