<--- Back to Details
First PageDocument Content
Concurrency control / Threads / Concurrent computing / Computer architecture / Speculative multithreading / Heuristic / Speculative execution / Automatic parallelization / Speedup / Computing / Parallel computing / Computer programming
Date: 2007-04-01 19:35:00
Concurrency control
Threads
Concurrent computing
Computer architecture
Speculative multithreading
Heuristic
Speculative execution
Automatic parallelization
Speedup
Computing
Parallel computing
Computer programming

Heuristics for Profile-driven Method-level Speculative Parallelization John Whaley and Christos Kozyrakis Computer Systems Laboratory Stanford University {jwhaley,kozyraki}@stanford.edu

Add to Reading List

Source URL: suif.stanford.edu

Download Document from Source Website

File Size: 198,76 KB

Share Document on Facebook

Similar Documents

FROM THE EDITOR  Spectre, the Deep Firmware Threat Born before silicon-level security was deemed necessary, speculative execution is now something

FROM THE EDITOR Spectre, the Deep Firmware Threat Born before silicon-level security was deemed necessary, speculative execution is now something

DocID: 1xTgt - View Document

SgxPectre Attacks: Stealing Intel Secrets from SGX Enclaves via Speculative Execution arXiv:1802.09085v3 [cs.CR] 3 JunGuoxing Chen, Sanchuan Chen, Yuan Xiao, Yinqian Zhang, Zhiqiang Lin, Ten H. Lai

SgxPectre Attacks: Stealing Intel Secrets from SGX Enclaves via Speculative Execution arXiv:1802.09085v3 [cs.CR] 3 JunGuoxing Chen, Sanchuan Chen, Yuan Xiao, Yinqian Zhang, Zhiqiang Lin, Ten H. Lai

DocID: 1vf6q - View Document

Spectre and Meltdown: Data leaks during speculative execution Speaker: Jann Horn (Google Project Zero) Paul Kocher (independent) Daniel Genkin (University of Pennsylvania and

Spectre and Meltdown: Data leaks during speculative execution Speaker: Jann Horn (Google Project Zero) Paul Kocher (independent) Daniel Genkin (University of Pennsylvania and

DocID: 1us8U - View Document

Spectre Attacks: Exploiting Speculative Execution  3 Paul Kocher1 , Jann Horn2 , Anders Fogh3 , Daniel Genkin4 , Daniel Gruss5 , Werner Haas6 , Mike Hamburg7 , Moritz Lipp5 ,

Spectre Attacks: Exploiting Speculative Execution 3 Paul Kocher1 , Jann Horn2 , Anders Fogh3 , Daniel Genkin4 , Daniel Gruss5 , Werner Haas6 , Mike Hamburg7 , Moritz Lipp5 ,

DocID: 1u7Wz - View Document

Intel Analysis of Speculative Execution Side Channels White Paper Revision 1.0 January 2018

Intel Analysis of Speculative Execution Side Channels White Paper Revision 1.0 January 2018

DocID: 1tObq - View Document