[EN] Near Threshold Voltage (NTV) computing has been recently proposed as a technique to save energy, at the cost of incurring higher error rates including, among others, Silent Data Corruption (SDC). In this paper, we evaluate the energy efficiency of dense linear algebra routines using several low-power multicore processors and we analyze whether the potential energy reduction achieved when scaling the processor to operate at a low voltage compensates the cost of integrating a fault tolerance mechanism that tackles SDC. Our study targets algorithmic-based fault-tolerant versions of the dense matrix-vector and matrix(matrix) multiplication kernels (GEMV and GEMM, respectively), using the BLIS framework, as well as an implementation of the ...
International audienceWe propose a software-based approach using dynamic voltage overscaling to redu...
As the economies around the world are aligning more towards usage of computing systems, the global e...
In this paper, we show that the vulnerability of memory components due to data retention in the pres...
Near Threshold Voltage (NTV) computing has been recently proposed as a technique to save energy, at ...
The end of Dennard scaling has promoted low power consumption into a first-order concern for computi...
We analyze power dissipation and energy consumption during the execution of high-performance dense ...
In this paper we conduct a detailed analysis of the sources of power dissipation and energy consumpt...
As the exascale supercomputers are expected to embark around 2020, supercomputers nowadays expand ra...
Sparse and irregular computations constitute a large fraction of applications in the data-intensive ...
This paper addresses the efficient exploitation of task-level parallelism, present in many dense lin...
[EN] This paper analyzes the impact on power con- sumption of two DVFS-control strategies when appli...
As the semiconductor roadmap reaches smaller feature sizes and the end of Dennard Scaling, design go...
[EN] In this paper, we propose a model for the energy consumption of the concurrent execution of thr...
Thesis (Ph. D.)--University of Rochester. Dept. of Electrical and Computer Engineering, 2016.Energy ...
As the semiconductor roadmap reaches smaller feature sizes and the end of Dennard Scaling, design go...
International audienceWe propose a software-based approach using dynamic voltage overscaling to redu...
As the economies around the world are aligning more towards usage of computing systems, the global e...
In this paper, we show that the vulnerability of memory components due to data retention in the pres...
Near Threshold Voltage (NTV) computing has been recently proposed as a technique to save energy, at ...
The end of Dennard scaling has promoted low power consumption into a first-order concern for computi...
We analyze power dissipation and energy consumption during the execution of high-performance dense ...
In this paper we conduct a detailed analysis of the sources of power dissipation and energy consumpt...
As the exascale supercomputers are expected to embark around 2020, supercomputers nowadays expand ra...
Sparse and irregular computations constitute a large fraction of applications in the data-intensive ...
This paper addresses the efficient exploitation of task-level parallelism, present in many dense lin...
[EN] This paper analyzes the impact on power con- sumption of two DVFS-control strategies when appli...
As the semiconductor roadmap reaches smaller feature sizes and the end of Dennard Scaling, design go...
[EN] In this paper, we propose a model for the energy consumption of the concurrent execution of thr...
Thesis (Ph. D.)--University of Rochester. Dept. of Electrical and Computer Engineering, 2016.Energy ...
As the semiconductor roadmap reaches smaller feature sizes and the end of Dennard Scaling, design go...
International audienceWe propose a software-based approach using dynamic voltage overscaling to redu...
As the economies around the world are aligning more towards usage of computing systems, the global e...
In this paper, we show that the vulnerability of memory components due to data retention in the pres...