2020 ACM/IEEE 47th Annual International Symposium on Computer Architecture (ISCA) 2020
DOI: 10.1109/isca45697.2020.00016
|View full text |Cite
|
Sign up to set email alerts
|

Xuantie-910: A Commercial Multi-Core 12-Stage Pipeline Out-of-Order 64-bit High Performance RISC-V Processor with Vector Extension : Industrial Product

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
31
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
6
3
1

Relationship

0
10

Authors

Journals

citations
Cited by 70 publications
(37 citation statements)
references
References 18 publications
0
31
0
Order By: Relevance
“…Furthermore, the comparison in this work omits proprietary implementations, namely the RV64GC multi-core within the PolarFire SoC (Microsemi, [9]), customized A25 and AX25 SoCs (Andes Technology, [1]), the SCR5 and SCR7 (Syntacore, [11]), several core complexes from CloudBear [3], and the Bk7 from Codasip [4]. T-head of the Alibaba Group claims to outperform any other RISC-V implementation with its XuanTie-910 processor [20]; however, it is also not available as open source.…”
Section: Analysis Of Risc-v Implementationsmentioning
confidence: 99%
“…Furthermore, the comparison in this work omits proprietary implementations, namely the RV64GC multi-core within the PolarFire SoC (Microsemi, [9]), customized A25 and AX25 SoCs (Andes Technology, [1]), the SCR5 and SCR7 (Syntacore, [11]), several core complexes from CloudBear [3], and the Bk7 from Codasip [4]. T-head of the Alibaba Group claims to outperform any other RISC-V implementation with its XuanTie-910 processor [20]; however, it is also not available as open source.…”
Section: Analysis Of Risc-v Implementationsmentioning
confidence: 99%
“…The goal of RISC-V is to become a general instruction set architecture. RISC-V has been used in low-power Internet of Things [108], storage controllers [4,109], artificial intelligence machine learning [110][111][112], wireless sensor networks, data centers [113], high-performance computing [114], and many other application scenarios. Table 1 lists the representative RISC-V boards on the market, and summarizes the processor models, security features, and target application scenarios.…”
Section: Security Requirements Of General Platformsmentioning
confidence: 99%
“…Blocking instructions are also supported with minor modification. CAS cas0(clk, net[0], net [1], net [4], net [5]); 29 CAS cas1(clk, net[2], net [3], net [6], net [7]); 30 31 CAS cas2(clk, net [4], net [7], net [8], net [11]); 32 CAS cas3(clk, net [5], net [6], net [9], net [10]); 33 34 CAS cas4(clk, net [8], net [9], net [12], net [13]); 35 CAS cas5(clk, net [10], net [11], net [14], net [15]); 36 37 // Assigning input and output to wires in the sorting network 38 // (only using 1 input and 1 output reg. for this instruction) 39 for (i=0; i<4; i=i+i) assign net[i]=in_vdata1[32*(i+1)-1-:32]; 40 assign out_vdata1={net [12], net [13], net [14], net [15]}; The example instruction implementation in Algorithm 1 is a bitonic sorter of 4 inputs.…”
Section: Instruction Templatesmentioning
confidence: 99%