The gem5 simulator
暂无分享,去创建一个
Somayeh Sardashti | David A. Wood | Derek Hower | Mark D. Hill | Tushar Krishna | Muhammad Shoaib Bin Altaf | Bradford M. Beckmann | Ali G. Saidi | Steven K. Reinhardt | Joel Hestness | Korey Sewell | Nathan L. Binkert | Arkaprava Basu | Rathijit Sen | Nilay Vaish | Gabriel Black | J. Hestness | O. Ergin | Arkaprava Basu | M. Hill | S. Reinhardt | D. Wood | Yaman Cakmakci | Rathijit Sen | Derek Hower | N. Binkert | T. Krishna | A. Saidi | Gabriel Black | S. Sardashti | Korey Sewell | Muhammad Shoaib Bin Altaf | Nilay Vaish | Joel Hestness | N. Vaish
[1] Frank Stewart,et al. June , 1890, The Hospital.
[2] James L. Walsh,et al. IBM experiments in soft fails in computer electronics (1978-1994) , 1996, IBM J. Res. Dev..
[3] Shubhendu S. Mukherjee,et al. A systematic methodology to compute the architectural vulnerability factors for a high-performance microprocessor , 2003, Proceedings. 36th Annual IEEE/ACM International Symposium on Microarchitecture, 2003. MICRO-36..
[4] Arijit Biswas,et al. Computing architectural vulnerability factors for address-based structures , 2005, 32nd International Symposium on Computer Architecture (ISCA'05).
[5] Robert Baumann,et al. Soft errors in advanced computer systems , 2005, IEEE Design & Test of Computers.
[6] S. Asano,et al. The design and implementation of a first-generation CELL processor , 2005, ISSCC. 2005 IEEE International Digest of Technical Papers. Solid-State Circuits Conference, 2005..
[7] Michael F. P. O'Boyle,et al. Evaluating the Effects of Compiler Optimisations on AVF , 2008 .
[8] Todd M. Austin,et al. Exploiting selective placement for low-cost memory protection , 2008, TACO.
[9] Aviral Shrivastava,et al. Static analysis to mitigate soft errors in register files , 2009, 2009 Design, Automation & Test in Europe Conference & Exhibition.
[10] Bradford M. Beckmann,et al. The gem5 simulator , 2011, CARN.