Lecture | Date | Topic (notes) | Reading | Comments |
1 | 1/20 | Introduction and Policies | | |
2 | 1/25 | GPP binary compatibility | J. Denhert et al., “The Transmeta Code Morphing™ Software: using speculation, recovery, and adaptive retranslation to address real-life challenges,” CGO’03 | |
3 + 4 | 1/27 | Reliability and Power | D. Ernst et al., “Razor: A Low-Power Pipeline Based on Circuit-Level Timing Speculation”, MICRO-36, 2003
A related white paper (I suggest you read it), and a Short Explanation on Metastability | |
3 + 4 | 2/1 | Continue from 3 | | |
5 | 2/3 | Security | Background-ish paper: M. Steil, “17 Mistakes Microsoft Made in the Xbox Security System”, Chaos Communication Congress, 2005
Research paper: G. E. Suh et al., “AEGIS: Architecture for Tamper-Evident and Tamper-Resistant Processing”, ICS’03 | |
6 | 2/8 | Security II | A. Baumann et al., “Shielding Applications from an Untrusted Cloud with Haven,” OSDI 2014
Some background: Background tutorial slides / Primer writeup with more links | |
7 | 2/10 | Approximate computing | S. Venkataramani et al., “Quality Programmable Vector Processors for Approximate Computing,” MICRO 2013 (UTexas ezproxy) | |
8+9 | 2/15 | GPP source compatibility | S. Swanson et al., “WaveScalar,” MICRO 2003 | |
8+9 | 2/17 | Continue from 8 | | |
10 | 2/22 | HW Active Messages | M. Noakes et al., “The J-Machine Multicomputer: An Architecural Evaluation”, ISCA 20, 1993.
PLEASE ALSO READ THIS OVERVIEW WITH PICTURES: W. J. Dally et al., “The J-Machine: A Retrospective”, 1998. | |
11 | 2/24 | Fine-grained Threads | D. Culler et al., “Fine-Grain Parralelism with Minimal Hardware Support: A Compiler-Controlled Threaded Abstract Machine,” ASPLOS 1991 (UTexas ezproxy) | |
12 | 2/29 | Continued | | |
13 | 2/29 | Continued | Please read but don’t submit a writeup: Spertus, Ellen, et al. “Evaluation of mechanisms for fine-grained parallel programs in the J-machine and the CM-5”, ISCA 1993. | |
14 | 3/7 | Cache Coherence | S. Reinhardt et al., “Tempest and Typhoon: User-Level Shared Memory” | |
15 | 3/9 | Continued | | |
16 | 3/21 | Datacenters (I) | Background: J. Dean and L. Barroso, “The Tail at Scale,” CACM 56(2), 2013
Discussion paper: D. Lo et al., “Toward Energy Proportionality for Large-Scale Latency-Critical Workloads,” ISCA 2014 | |
17 | 3/23 | Datacenters (continued) | C. Hsu et al., “Adrenaline: Pinpointing and Reining in Tail Queries with Quick Voltage Boosting,” HPCA 2015 | |
18 | 3/28 | Datacetners (II) | A. Putnam et al., “A Reconfigurable Fabric for Accelerating Large-Scale Datacenter Applications, “ ISCA 2014 | |
19 | 3/30 | Project prep | No paper | |
20 | 4/4 | Datacenters (III) | Lighter reading: V. Jimenez et al., “Energy-Aware Accounting and Billing in Large-Scale Computing Facilities”, IEEE Micro May/Jun 2011
Research: J. Chang et al., “A Limits Study of Benefits from Nanostore-Based Future Data-Centric System Architectures”, CF 2012 | |
21 | 4/6 | Exam 1 | No paper | |
22 | 4/11 | Distributed storage | J. C. Corbett et al., “Spanner: Google’s Globally-Distributed Database”, OSDI 2012 | |
23 | 4/13 | Mem Management (I) | E. Witchel et al., “Mondrian Memory Protection”, ASPLOS 2002 | |
24 | 4/18 | Mobile? | M. Halpern et al., “Mobile CPU’s Rise to Power: Quantifying the Impact of Generational Mobile CPU Design Trends on Performance, Energy, and User Satisfaction”, HPCA 2016 | |
25 | 4/20 | NVM Reliability? | DH Yoon et al., FREE-p: Protecting Non-Volatile Memory against both Hard and Soft Errors”, HPCA 2011 | |
26 | 4/25 | GPU and Virt. Mem. | S. Shahar et al., “ActivePointers: the case for software address translation on GPUs”, ISCA 2016
Background: “CUDA Manual”, Sections 1 and 2
Background: K. Fatahalian and M. Houston, “GPUs a closer look”, ACM Queue March/April 2008 | |
27 | 4/27 | More mem management | V. Karakostas et al., “Redundant Memory Mappings for Fast Access to Large Memories”, ISCA 2015 | |
28 | 5/2 | Molecular Computing | D. Doty, “Theory of algorithmic self-assembly”, CACM 55(12), Dec. 2012
Short video | |
29 | 5/4 | Wrapup | Project presentations and wrapup | |