WDDD 2006Fifth Annual Workshop on Duplicating, Deconstructing, and Debunking
Held in conjunction with the 33rd International Symposium on Computer
Architecture (ISCA-33) |
1:00 - 1:10 | |
Bryan Black and Trey Cain | |
1:10-3:00 | Session 1 | Duplicating and Deconstructing Virtual Load/Store Queues Invited Response |
Vikas Garg and Sonal Agarwal Aamer Jaleel |
Evaluating Dusty Caches on General Workloads | Praveen Krishnamurthy, Roger D. Chamberlain, Ron K. Cytron and Jason E. Fritts | ||
Validating a token coherence protocol for scientific workloads | Ricardo Fernández-Pascual, José M. García, and Manuel E. Acacio | ||
3:00 - 3:30 |
|
||
3:30 - 6:00 | Session 2 | An evaluation of HotSpot-3.0 block-based temperature model Invited Response |
Damien Fetis, Pierre Michaud Kevin Skadron |
Register Allocation: What does the NP-completeness Proof of Chaitin et al. Really Prove? | Florent Bouchez, Alain Darte, Christophe Guillon, and Fabrice Rastello | ||
Deconstructing Hardware Usage for General Purpose Computation on GPUs | Budyanto Himawan, Manish Vachharajani | ||
Defeating Buffer-Overflow Prevention Hardware | Krerk Piromsopa, Richard J. Enbody | ||
Deconstructing Hardware Architectures for Security Invited Response |
Michael Dalton, Hari Kannan, and Christos Kozyrakis Neil Vachharajani |
||
|