2008 20th International Symposium on Computer Architecture and High Performance Computing 2008
DOI: 10.1109/sbac-pad.2008.29
|View full text |Cite
|
Sign up to set email alerts
|

Transactional WaveCache: Towards Speculative and Out-of-Order DataFlow Execution of Memory Operations

Abstract: The WaveScalar is the first DataFlow Architecture that can efficiently provide the sequential memory semantics required by imperative languages. This work presents an alternative memory ordering mechanism for this architecture, the Transaction WaveCache. Our mechanism maintains the execution order of memory operations within blocks of code, called Waves, but adds the ability to speculatively execute, out-of-order, operations from different waves. This ordering mechanism is inspired by progress in supporting Tr… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0
1

Year Published

2009
2009
2021
2021

Publication Types

Select...
3
2
1

Relationship

3
3

Authors

Journals

citations
Cited by 12 publications
(7 citation statements)
references
References 29 publications
0
6
0
1
Order By: Relevance
“…In this case, the intention is to use a data fusion algorithm written in Gamma 1 to be converted into a dataflow graph. After that, It will be applied studies related to speculative and out‐of‐order dataflow execution 3 and reuse of instruction traces 4 . Another interesting research thread left unexplored is the exploitation of interest‐based communication protocols, like Information Centric Networks (ICN), in the development of an Internet of Things (IoT) environment, via the implementation of Gamma distributed multisets.…”
Section: Discussionmentioning
confidence: 99%
See 1 more Smart Citation
“…In this case, the intention is to use a data fusion algorithm written in Gamma 1 to be converted into a dataflow graph. After that, It will be applied studies related to speculative and out‐of‐order dataflow execution 3 and reuse of instruction traces 4 . Another interesting research thread left unexplored is the exploitation of interest‐based communication protocols, like Information Centric Networks (ICN), in the development of an Internet of Things (IoT) environment, via the implementation of Gamma distributed multisets.…”
Section: Discussionmentioning
confidence: 99%
“…The equivalence study makes it possible to transform a dataflow graph into Gamma code and vice versa. Hence, the Gamma model would take advantage of studies developed for dataflow model, for instance, speculative and out‐of‐order dataflow execution 3 and reuse of instruction traces 4 . On the other hand, a program represented initially by a dataflow graph can be exploited in an execution environment quite suitable, for instance, to an Internet of Things (IoT) environment, after its conversion to Gamma.…”
Section: Introductionmentioning
confidence: 99%
“…For instance, considering the problem of choosing the smaller element in a some multiset. In the Gamma paradigm, this operation can be performed through a unique reaction, as depicted in Equation (2). We use the syntax of Gamma reactions based on the Gamma implementation provided by Juarez Muylaert [13].…”
Section: B Gammamentioning
confidence: 99%
“…Through empirical and formal tests we show that these models are equivalent, making it possible to transform a dataflow graph into Gamma code and vice versa. This way, it is possible to provide the scientific community with a series of benefits that comprise exploring and analyzing, in a code written in Gamma, speculative and out-of-order dataflow execution [2], performing instructions trace reuse [3], among others. In addition, a program initially represented by a dataflow graph can be exploited in an execution environment quite suitable, for instance, to an Internet of Things (IoT) environment.…”
Section: Introductionmentioning
confidence: 99%
“…The Transactional WaveCache [6] is a mechanism that allows speculative out-of-order execution of memory operations in WaveScalar. In this mechanism, memory instructions in a loop iteration are treated as a transaction, which is nested inside transactions of previous iterations.…”
Section: Related Workmentioning
confidence: 99%