“…Other techniques reconfigure cache using computer software [43], while some techniques predict the program behaviour [3,41,42,[44][45][46]. Some techniques deal with instructions in the cache [3,15,16,41,[47][48][49][50][51][52]. Some techniques seek to leverage unused cache block words in order to reduce dynamic power consumption [18,36,53].…”