2011
DOI: 10.1016/j.procs.2011.09.081
|View full text |Cite
|
Sign up to set email alerts
|

TERAFLUX: Exploiting Tera-device Computing Challenges

Abstract: The number of cores per chip keeps increasing in order to improve performance while controlling the power. According to semiconductor roadmaps, future computing systems while reach the scale of 10^12;Tera devices in a single package. Firstly, such Tera-device systems will expose a large amount of parallelism that cannot be easily and efficiently exploited by current applications and programming models. Secondly, the reliability of Tera-device systems will become a critical issue. Finally, we need to simplify t… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
5
0

Year Published

2012
2012
2021
2021

Publication Types

Select...
5
4

Relationship

3
6

Authors

Journals

citations
Cited by 15 publications
(5 citation statements)
references
References 5 publications
0
5
0
Order By: Relevance
“…The pleading sessions in the courts witness a lot of tension between the litigants and even between the lawyers themselves, and each party tries to benefit from the mistakes of the other that appear before the judge. Yet, there are tricks that the parties to the conflict exploit in an unfair manner against the lawyers themselves, which can affect them and make them lose the case (Portero et al, 2011;Quah, 1994).…”
Section: Legal Fiction Exploited By the Respondent's Attorney To Drop The Divorced Woman's Shari'i And Legal Rightsmentioning
confidence: 99%
“…The pleading sessions in the courts witness a lot of tension between the litigants and even between the lawyers themselves, and each party tries to benefit from the mistakes of the other that appear before the judge. Yet, there are tricks that the parties to the conflict exploit in an unfair manner against the lawyers themselves, which can affect them and make them lose the case (Portero et al, 2011;Quah, 1994).…”
Section: Legal Fiction Exploited By the Respondent's Attorney To Drop The Divorced Woman's Shari'i And Legal Rightsmentioning
confidence: 99%
“…ere are parameters which make simulators preferable to reach a certain level of performance, scalability, and accuracy as well as reproducibility and observability. Based on the experience of previous projects such as TERAFLUX [6,7], ERA [8,9], AXIOM [4, [10][11][12][13], and SARC [14,15], we choose to rely on the HP-Labs COTSon simulation infrastructure [16]. e key feature of COTSon that is useful in HLS design is its "functional-directed" approach, which separates the functional simulation from the timing one.…”
Section: Introductionmentioning
confidence: 99%
“…Research works proposed several ways to formalize this model of computation [1,9]. Recently, the architectural exploitation has been investigated as well [2][3][4]. This paper proposes the enhancement of a x86 64 multi-core Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page.…”
Section: Introductionmentioning
confidence: 99%