1992
DOI: 10.1109/12.123399
|View full text |Cite
|
Sign up to set email alerts
|

Increased memory performance during vector accesses through the use of linear address transformations

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
28
0

Year Published

2007
2007
2013
2013

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 29 publications
(28 citation statements)
references
References 12 publications
0
28
0
Order By: Relevance
“…The drawback of these systems is the modulo operation on prime numbers which is difficult to implement efficiently in hardware. An example of the second category is represented by the skewing memory systems including the widely used row rotation schemes and XOR schemes [18][19][20][21][22][23][24].…”
Section: Background and Related Workmentioning
confidence: 99%
“…The drawback of these systems is the modulo operation on prime numbers which is difficult to implement efficiently in hardware. An example of the second category is represented by the skewing memory systems including the widely used row rotation schemes and XOR schemes [18][19][20][21][22][23][24].…”
Section: Background and Related Workmentioning
confidence: 99%
“…Row rotation schemes [7] with N=2 n was used. Another Harper_s approach concerning arbitrary stride accesses utilizes XOR-schemes [16]. XOR-schemes allow simpler computation since merely logic gates are demanded and no carry bits are used for computation [8,43].…”
Section: Arbitrary Stride Accessmentioning
confidence: 99%
“…However, CPMA is relatively complex architecture to be used only for stride accesses. A more dedicated memory system for changeable constant stride access utilizes dynamic storage schemes that allow multiple stride specific schemes to be used within a single system [15,16]. Nevertheless, the memory module count is restricted to a power of two and only interleaved memory system is considered in [15] and [16].…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…To cope with bank conflicts of vector access across stride families, several techniques have been proposed, including the use of buffers [24], dynamic memory schemes [25][26][27][28], memory modules clustering [24], and intra-stream out-oforder access [29], just to name a few. Some of the existing techniques may be complementary to our Elastic Pipeline proposal, however subject to certain limitations.…”
Section: Related Workmentioning
confidence: 99%