Proceedings of the 2006 International Conference on Compilers, Architecture and Synthesis for Embedded Systems 2006
DOI: 10.1145/1176760.1176782
|View full text |Cite
|
Sign up to set email alerts
|

Power efficient branch prediction through early identification of branch addresses

Abstract: ABSTRACT

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
8
0

Year Published

2008
2008
2018
2018

Publication Types

Select...
6
1
1

Relationship

0
8

Authors

Journals

citations
Cited by 15 publications
(8 citation statements)
references
References 18 publications
0
8
0
Order By: Relevance
“…By using a larger buffer size, their BP can make 77,103 Storing history in modulo-N manner 21,54,94 Power-gating based on temporal or spatial locality 48,57,60,104 Avoiding access to BP for biased branches, 68 Reducing BP size by intelligently managing global history [40][41][42][43] Banked-design of BP 68,104 Reducing BP complexity 21 Analog designs 45,46,53 Use of memristor 45,53 FIGURE 37 Pipelined gshare implementation. If a branch was fetched in stage 2, its "new history" bit is shifted from stage 2, and "branch present" bit is set; else, "branch present" bit is reset.…”
Section: Techniques For Reducing Bp Latency and Energymentioning
confidence: 99%
“…By using a larger buffer size, their BP can make 77,103 Storing history in modulo-N manner 21,54,94 Power-gating based on temporal or spatial locality 48,57,60,104 Avoiding access to BP for biased branches, 68 Reducing BP size by intelligently managing global history [40][41][42][43] Banked-design of BP 68,104 Reducing BP complexity 21 Analog designs 45,46,53 Use of memristor 45,53 FIGURE 37 Pipelined gshare implementation. If a branch was fetched in stage 2, its "new history" bit is shifted from stage 2, and "branch present" bit is set; else, "branch present" bit is reset.…”
Section: Techniques For Reducing Bp Latency and Energymentioning
confidence: 99%
“…Yang and Orailoglu [34] present a technique to eliminate the wastefulness of accessing the branch predictor every cycle. They do this by statically calculating the length of each basic block in order to know which instructions need branch prediction.…”
Section: Micro-architecturementioning
confidence: 99%
“…We believe that this article's proposals are complementary to both of these techniques and could be advantageous in combination, as the number of accesses are reduced and thus more targets are available for activation of drowsy mode. Yang and Orailoglu [2006] proposed a small branch identification unit and avoided accessing the BTB until the next branch is encountered. However, this approach requires changing executables to store branch distance information and also requires the use of a counter to detect the next branch.…”
Section: Related Workmentioning
confidence: 99%