Don't Use the Page Number, but a Pointer to It

ثبت نشده
چکیده

Most newly announced high performance microprocessors support 64-bit virtual addresses and the width of physical addresses is also growing. As a result, the size of the address tags in the L1 cache is increasing. The impact of on chip area is particularly dramatic when small block sizes are used. At the same time, the performance of high performance microprocessors depends more and more on the accuracy of branch prediction and for reasons similar to those in the case of caches the size of the Branch Target Buuer is also increasing linearly with the address width. In this paper, we apply the simple principle stated in the title for limitingthe tag size of on-chip caches. In the resulting indirect-tagged cache, the duplication of the page number in processors (in TLB and in cache tags) is removed. The tag check is then simpliied and the tag cost does not depend on the address width. Applying the same principle to Branch Target Buuers, we propose the Reduced Branch Target Buuer. The storage size in a Reduced Branch Target Buuer does not depend on the address width and is dramatically smaller than the size of the conventional implementation of a Branch Target Buuer. all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for proot or commercial advantage and that new copies bear this notice and the full citation on the rst page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, to republish, to post on servers or to redistribute to lists, requires prior speciic permission and/or a fee. Request Permissions from Publications Dept, ACM Inc., Fax +1 (212) 869-0481, or [email protected].

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Depth-first Copying Garbage Collection without Extra Stack Space

In this paper, we propose two copying garbage collection methods. These two methods copy data structures in depthrst order, while conventional method copies in breadthrst order. This modi cation greatly improves memory access locality during both garbage collection and computation after. Restriction on data structure representation is also relaxed because the proposed methods don't require that...

متن کامل

A Novel Architecture for Detecting Phishing Webpages using Cost-based Feature Selection

Phishing is one of the luring techniques used to exploit personal information. A phishing webpage detection system (PWDS) extracts features to determine whether it is a phishing webpage or not. Selecting appropriate features improves the performance of PWDS. Performance criteria are detection accuracy and system response time. The major time consumed by PWDS arises from feature extraction that ...

متن کامل

STUDY ON CHANGES OF PROTEINS, ENZYMES AND CHROMOSOME NUMBER IN REGENERATED PLANTS OF WHEAT (TRITICUM AESTIVUM L.)

Somaclonal variation is one of the possible sources of variation in plant breeding. To evaluate the usefulness of somaclonal variation for creating variation in Iranian cultivars of wheat, proteins, enzymes and chromosome number of regenerated and seed-produced plants of wheat (Alamout, Hyrmand and Maroon) were studied. Plantlets obtained from the immature embryos and seed culture were collecte...

متن کامل

XML Pointer Language

XPath, described in detail in the previous chapter, provides a common foundation for other standards that need to address into XML documents. One such standard, and the most interesting with regard to implementing hypermedia based on XML technologies, is the XML Pointer Language (XPointer) [DeRose+ 01a], which is used for fragment identifiers for XML resources. According to RFC 3023 [Murata+ 01...

متن کامل

بررسی عادات رفتاری دانشجویان مونث دانشکده پرستاری و مامائی همدان در مورد عفونت مجاری ادراری

Introduction & Objective: Urinary tract infection is one of the most common reasons a among people who refer to doctors .This disease involves women more than men. In such a way that one woman among five suffers from it during her life.  The main aim of this research was to determine the behavioral habits of female students in faculty of nursing and midwifery of Hamadan city, 2006. Mat...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 1996