1994
DOI: 10.1109/mdt.1994.303847
|View full text |Cite
|
Sign up to set email alerts
|

The counterflow pipeline processor architecture

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
50
0
3

Year Published

1995
1995
2013
2013

Publication Types

Select...
4
3
3

Relationship

0
10

Authors

Journals

citations
Cited by 115 publications
(53 citation statements)
references
References 5 publications
0
50
0
3
Order By: Relevance
“…By doing so, we can over-clock circuits to achieve higher throughput or scale down supply voltage for lower power consumption. Razor technique [4] is one of the most representative timing speculation techniques, which detects timing errors and conducts error recovery based on counterflow pipelining techniques [22]. During the error recovery phase, the pipeline is stopped for instruction replay.…”
Section: A Timing Speculationmentioning
confidence: 99%
“…By doing so, we can over-clock circuits to achieve higher throughput or scale down supply voltage for lower power consumption. Razor technique [4] is one of the most representative timing speculation techniques, which detects timing errors and conducts error recovery based on counterflow pipelining techniques [22]. During the error recovery phase, the pipeline is stopped for instruction replay.…”
Section: A Timing Speculationmentioning
confidence: 99%
“…This technique made it easier to implement operand forward, register renaming, and most importantly pipeline flushing [13,17]. In order to modify this technique for error recovery, a traditional pipeline is modified such that only the flush signals are bi-directional.…”
Section: Counterflow Pipeliningmentioning
confidence: 99%
“…This period is exploited by each stage to re-compute its result using the correct data of the shadow latches. The second approach used in Razor is the counterflow pipelining which is based on the namesake processor architecture [12]. This technique is illustrated in Figure 4 and is characterized by negligible timing constraints in the pipeline operation at the expense of few cycles, depending on the pipeline depth, for error recovery.…”
Section: Ls2mentioning
confidence: 99%