Effectiveness of microarchitecture test program generation - Design & Test of Computers, IEEE

نویسندگان

  • Noppanunt Utamaphethai
  • R. D. Shawn Blanton
  • John Paul Shen
چکیده

FSM Models As formulated in prior work, Figure 2 shows the FSM model for each of the 512 branch history table entries.15-17 A cold start initializes all entries in the branch history table to the start state, strong not taken. Any conditional branch whose address directly maps to the same branch history table entry will cause transitions in that entry’s FSM when the branch is resolved in the execution stage. The current state of the FSM is used to make predictions (possibly overriding branch target address cache predictions) for instructions in the decode and dispatch stages. States Weak Not Taken and Strong Not Taken make a branch prediction of Not Taken (T = 0) while states Weak Taken and Strong Taken predict taken (T = 1). Figure 3 shows the FSM model for a branch target address cache entry that corresponds to an unconditional branch. When a new unconditional branch is first encountered, the content of the branch target address cache entry at the position of the round-robin pointer is removed (remove transition) and the branch is predicted not taken (state, T = 0). This is the initialization that allocates branch target address cache entry and loads both the fetch and target address of the branch instruction. After the branch is executed, the FSM transitions to the predicted-taken state. If the same unconditional branch is encountered, it is predicted to be taken (T = 1), and the FSM responds by selflooping on the predicted taken state. Figure 4 shows a six-state FSM for a branch target address cache entry corresponding to a Microarchitecture Test Program Generation 42 IEEE Design & Test of Computers ST T = 1 WNT T = 0 WT T = 1

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Guest Editors' Introduction: Microprocessor Test and Verification

millions of transistors operating at extraordinarily high speeds. Test and verification of these high-performance devices continuously challenge engineers in every microprocessor design cycle. This special issue presents state-of-the-art techniques for microprocessor test and verification. It aims to provide innovative ideas and new methodologies to solve the difficult challenges facing enginee...

متن کامل

First CADathlon Programming Contest held at 2002 ICCAD

104 0740-7475/03/$17.00 © 2003 IEEE Copublished by the IEEE CS and the IEEE CASS IEEE Design & Test of Computers IN THE SPIRIT OF the long-running ACM programming contest, the Special Interest Group on Design Automation (SIGDA) organized an EDA programming contest, the CADathlon. SIGDA held the CADathlon on 10 November 2002, at the Double Tree Hotel in San Jose, Calif., as part of the Sunday pr...

متن کامل

Automating IEEE 1500 Core Test—An EDA Perspective

THE CURRENT TREND of SoC design has made conventional test methodologies increasingly difficult. Performing brute-force test pattern generation (ATPG) on the entire SoC is often infeasible, because the design can exceed the test pattern generator’s capabilities. At other times, some black-box third-party cores within the SoC might have their own test patterns generated at the core boundary. IEE...

متن کامل

Functional Verification and Testbench Generation

80 0740-7475/04/$20.00 © 2004 IEEE Copublished by the IEEE CS and the IEEE CASS IEEE Design & Test of Computers TO COMPETE IN THE MARKETPLACE, all semiconductor products have tight time-to-market requirements. With design complexity exploding, functional verification is now on the critical path to RTL signoff and relies mainly on extensive vector simulation. A typical microprocessor requires bi...

متن کامل

Guest Editors' Introduction: Special Section on Emerging Memory Technologies in Very Large Scale Computing and Storage Systems

THE overwhelmingly increasing demand for both storage and computation necessitates revisiting the traditional memory subsystems used in processors and storage systems to take advantage of emerging memory technologies. Dynamic Random Access Memory (DRAM) and Static Random Access Memory (SRAM) have been ubiquitously used for decades as main memory and as on-chip cache, respectively. Scaling and p...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2001