|
|
1 | (12) |
|
|
1 | (2) |
|
1.1.1 Requirements of Large Memory and High Bandwidth |
|
|
1 | (1) |
|
1.1.2 Increasing Power Consumption |
|
|
2 | (1) |
|
1.1.3 Vulnerability to Soft Errors |
|
|
3 | (1) |
|
1.2 Background of Emerging Memory Technologies |
|
|
3 | (4) |
|
|
4 | (2) |
|
|
6 | (1) |
|
1.3 Challenges and Prior Related Work |
|
|
7 | (1) |
|
|
8 | (1) |
|
1.5 The Organization of this Book |
|
|
9 | (4) |
|
|
9 | (4) |
|
2 Replacing Different Levels of the Memory Hierarchy with NVMs |
|
|
13 | (56) |
|
|
13 | (1) |
|
2.2 3D Stacked STTRAM L2 Caches |
|
|
14 | (20) |
|
2.2.1 Modeling an STTRAM Based Cache |
|
|
15 | (1) |
|
2.2.2 Configurations and Assumptions |
|
|
16 | (3) |
|
2.2.3 Replacing SRAM with STTRAM as L2 Caches |
|
|
19 | (3) |
|
2.2.4 Novel 3D-Stacked Cache Architecture |
|
|
22 | (11) |
|
2.2.5 DRAM Caches Versus MRAM Caches |
|
|
33 | (1) |
|
2.3 Frequent-Value Based PCM Memory |
|
|
34 | (13) |
|
2.3.1 Concept of Frequent-Value |
|
|
34 | (1) |
|
2.3.2 Frequent-Value Based PRAM Memory |
|
|
35 | (4) |
|
2.3.3 Profiling and Management of Frequent Values |
|
|
39 | (3) |
|
2.3.4 Complementing with Available Techniques |
|
|
42 | (1) |
|
|
43 | (4) |
|
2.4 Hybrid SSD Using NAND-Flash and PCM |
|
|
47 | (17) |
|
|
48 | (3) |
|
2.4.2 Overview of the Hybrid Architecture |
|
|
51 | (2) |
|
2.4.3 Management Policy of PRAM Log Region |
|
|
53 | (3) |
|
2.4.4 Endurance of the Hybrid Architecture |
|
|
56 | (2) |
|
2.4.5 Experimental Results |
|
|
58 | (6) |
|
|
64 | (5) |
|
|
65 | (4) |
|
3 Moguls: A Model to Explore the Memory Hierarchy for Throughput Computing |
|
|
69 | (24) |
|
|
69 | (2) |
|
|
71 | (5) |
|
3.2.1 Problem Description |
|
|
71 | (1) |
|
3.2.2 Moguls Memory Model |
|
|
72 | (3) |
|
3.2.3 Generation of Provided CB curve |
|
|
75 | (1) |
|
3.3 Designing a Memory Hierarchy with Moguls |
|
|
76 | (5) |
|
3.3.1 Approximations Used to Apply the Moguls Model |
|
|
76 | (1) |
|
3.3.2 Cache Hierarchy Optimized for Energy-Efficiency |
|
|
77 | (3) |
|
3.3.3 Throughput with Power Consumption Budget |
|
|
80 | (1) |
|
3.3.4 Throughput with Peak Bandwidth Constraint |
|
|
80 | (1) |
|
3.4 Memory Hierarchy Design with Hybrid Technologies |
|
|
81 | (2) |
|
3.5 Experiments and Validation |
|
|
83 | (8) |
|
|
84 | (2) |
|
3.5.2 Validation of Moguls Model |
|
|
86 | (3) |
|
3.5.3 The Analysis of 2-to-2 Approximation |
|
|
89 | (1) |
|
3.5.4 Improvements from Hybrid Memory Technologies |
|
|
90 | (1) |
|
|
91 | (1) |
|
|
91 | (2) |
|
|
92 | (1) |
|
4 Exploring the Vulnerability of CMPs to Soft Errors with 3D Stacked Non-Volatile Memory |
|
|
93 | (26) |
|
|
93 | (1) |
|
|
94 | (3) |
|
|
94 | (1) |
|
4.2.2 Soft Errors of STT-RAM |
|
|
95 | (2) |
|
4.3 Architecture Modification |
|
|
97 | (8) |
|
4.3.1 Baseline Architecture |
|
|
97 | (1) |
|
4.3.2 Replacing L2 and L3 Caches with STT-RAM |
|
|
98 | (1) |
|
4.3.3 Replacing L1 Caches with STT-RAM |
|
|
99 | (1) |
|
4.3.4 Replacing In-Pipeline Memory Components with STT-RAM |
|
|
100 | (3) |
|
4.3.5 Improving Reliability of Logic |
|
|
103 | (1) |
|
4.3.6 Tag Array of Caches |
|
|
104 | (1) |
|
|
105 | (2) |
|
|
105 | (1) |
|
4.4.2 Metric for Soft Error Vulnerability |
|
|
105 | (2) |
|
|
107 | (8) |
|
4.5.1 Performance Evaluation |
|
|
107 | (2) |
|
4.5.2 Soft Error Vulnerability Analysis |
|
|
109 | (2) |
|
|
111 | (2) |
|
|
113 | (2) |
|
|
115 | (4) |
|
|
115 | (4) |
|
|
119 | (2) |
Index |
|
121 | |