Leveraging GPUs using cooperative loop speculation

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

GRIM: Leveraging GPUs for Kernel Integrity Monitoring

Kernel rootkits can exploit an operating system and enable future accessibility and control, despite all recent advances in software protection. A promising defense mechanism against rootkits is Kernel Integrity Monitor (KIM) systems, which inspect the kernel text and data to discover any malicious changes. A KIM can be implemented either in software, using a hypervisor, or using extra hardware...

متن کامل

Explorer Cooperative Caching for GPUs

General rights Copyright for the publications made accessible via the Edinburgh Research Explorer is retained by the author(s) and / or other copyright owners and it is a condition of accessing these publications that users recognise and abide by the legal requirements associated with these rights. Take down policy The University of Edinburgh has made every reasonable effort to ensure that Edin...

متن کامل

Methods for Approximating Loop Subdivision Using Tessellation Enabled GPUs

Subdivision surfaces provide a powerful alternative to polygonal rendering. The availability of tessellation supported hardware presents an opportunity to develop algorithms that can render subdivision surfaces in realtime. We discuss the performance of approximating Loop Subdivision surfaces using tessellation-enabled GPUs in terms of speed and quality of rendering for these methods as well as...

متن کامل

Loop Selection for Thread-Level Speculation

Thread-level speculation (TLS) allows potentially dependent threads to speculatively execute in parallel, thus making it easier for the compiler to extract parallel threads. However, the high cost associated with unbalanced load, failed speculation, and inter-thread value communication makes it difficult to obtain the desired performance unless the speculative threads are carefully chosen. In t...

متن کامل

Leveraging Altruism in Cooperative Services

When there is no central administrator to control the actions of nodes in a distributed system, the users may deviate for personal gain. The BAR model describes the three types of nodes in these environments: Byzantine nodes deviate arbitrarily, Altruistic nodes follow the protocol, and Rational nodes deviate for gain. Previous attempts at writing BAR-Tolerant protocols have relied on a form of...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: ACM Transactions on Architecture and Code Optimization

سال: 2014

ISSN: 1544-3566,1544-3973

DOI: 10.1145/2579617