Proceedings of the 42nd Annual IEEE/ACM International Symposium on Microarchitecture 2009
DOI: 10.1145/1669112.1669128
|View full text |Cite
|
Sign up to set email alerts
|

Low Vccmin fault-tolerant cache with highly predictable performance

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
71
0

Year Published

2013
2013
2022
2022

Publication Types

Select...
5
2
2

Relationship

1
8

Authors

Journals

citations
Cited by 75 publications
(90 citation statements)
references
References 19 publications
0
71
0
Order By: Relevance
“…Larger cells have a lower probability of failure because non-uniformities in channel doping average out with larger transistors, resulting in more robust devices, but at the price of larger area, and higher energy consumption. Table 1 describes the six SRAM cells of Zhou's study (C1, C2, C3, C4, C5, and C6) with their areas relative to the smallest cell (C1), as well as the percentages of non-faulty entries of a cache implemented with the cells at 0.5 V, assuming 64-byte cache entries 1 . An entry is considered faulty if it contains at least one defective bit.…”
Section: Process Variation In Sram Cellsmentioning
confidence: 99%
See 1 more Smart Citation
“…Larger cells have a lower probability of failure because non-uniformities in channel doping average out with larger transistors, resulting in more robust devices, but at the price of larger area, and higher energy consumption. Table 1 describes the six SRAM cells of Zhou's study (C1, C2, C3, C4, C5, and C6) with their areas relative to the smallest cell (C1), as well as the percentages of non-faulty entries of a cache implemented with the cells at 0.5 V, assuming 64-byte cache entries 1 . An entry is considered faulty if it contains at least one defective bit.…”
Section: Process Variation In Sram Cellsmentioning
confidence: 99%
“…Word disabling tracks defects at word-level granularity, and then combines two consecutive cache entries into a single fault-free entry, halving both associativity and capacity [39]. Abella et al bypass faulty subentries rather than disabling full cache lines, but this technique is suitable only for the first-level cache, where accesses are word wide [1].…”
Section: Related Workmentioning
confidence: 99%
“…Schemes such as Replication Cache [24] and ZerehCache [25] use external spare caches. Similarly, variants of fault-grouping and fault remapping have been used to tolerate faulty cache blocks without adding any spare elements, but by using other parts of the cache, such as GRP2 [26], RDC-Cache [27], Abella [28], Archipelago [29], and FFT-Cache [36]. Wilkerson's scheme [21] also could be considered to fall under this category.…”
Section: Architecture-level Techniquesmentioning
confidence: 99%
“…Other cache disabling methods include cache way disabling, cache set disabling, and sub-block disabling [19,20]. For the cache way disabling technique, full cache ways will be disabled whenever they contain one or several faulty cells; cache set disabling technology disables full cache sets when they contain one or several faulty-cells; sub-block disabling technique only discards the faulty sub-block, while the reset faulty-free sub-block can still be used in the case of faulty cells.…”
Section: Hard Error Management Techniquesmentioning
confidence: 99%