Skip to main content

Showing 1–9 of 9 results for author: Lowe-Power, J

  1. arXiv:2404.14617  [pdf, other

    cs.AR

    TDRAM: Tag-enhanced DRAM for Efficient Caching

    Authors: Maryam Babaie, Ayaz Akram, Wendy Elsasser, Brent Haukness, Michael Miller, Taeksang Song, Thomas Vogelsang, Steven Woo, Jason Lowe-Power

    Abstract: As SRAM-based caches are hitting a scaling wall, manufacturers are integrating DRAM-based caches into system designs to continue increasing cache sizes. While DRAM caches can improve the performance of memory systems, existing DRAM cache designs suffer from high miss penalties, wasted data movement, and interference between misses and demand requests. In this paper, we propose TDRAM, a novel DRAM… ▽ More

    Submitted 22 April, 2024; originally announced April 2024.

  2. arXiv:2404.03155  [pdf, other

    cs.ET

    TEGRA -- Scaling Up Terascale Graph Processing with Disaggregated Computing

    Authors: William Shaddix, Mahyar Samani, Marjan Fariborz, S. J. Ben Yoo, Jason Lowe-Power, Venkatesh Akella

    Abstract: Graphs are essential for representing relationships in various domains, driving modern AI applications such as graph analytics and neural networks across science, engineering, cybersecurity, transportation, and economics. However, the size of modern graphs are rapidly expanding, posing challenges for traditional CPUs and GPUs in meeting real-time processing demands. As a result, hardware accelerat… ▽ More

    Submitted 3 April, 2024; originally announced April 2024.

    Comments: Presented at the 3rd Workshop on Heterogeneous Composable and Disaggregated Systems (HCDS 2024)

  3. arXiv:2307.00143  [pdf, other

    cs.CR

    Centauri: Practical Rowhammer Fingerprinting

    Authors: Hari Venugopalan, Kaustav Goswami, Zainul Abi Din, Jason Lowe-Power, Samuel T. King, Zubair Shafiq

    Abstract: Fingerprinters leverage the heterogeneity in hardware and software configurations to extract a device fingerprint. Fingerprinting countermeasures attempt to normalize these attributes such that they present a uniform fingerprint across different devices or present different fingerprints for the same device each time. We present Centauri, a Rowhammer fingerprinting approach that can build a unique… ▽ More

    Submitted 30 June, 2023; originally announced July 2023.

  4. arXiv:2303.13029  [pdf, other

    cs.AR cs.PF

    Enabling Design Space Exploration of DRAM Caches in Emerging Memory Systems

    Authors: Maryam Babaie, Ayaz Akram, Jason Lowe-Power

    Abstract: The increasing growth of applications' memory capacity and performance demands has led the CPU vendors to deploy heterogeneous memory systems either within a single system or via disaggregation. For instance, systems like Intel's Knights Landing and Sapphire Rapids can be configured to use high bandwidth memory as a cache to main memory. While there is significant research investigating the design… ▽ More

    Submitted 23 March, 2023; originally announced March 2023.

  5. arXiv:2303.13026  [pdf, other

    cs.AR cs.PF

    A Cycle-level Unified DRAM Cache Controller Model for 3DXPoint Memory Systems in gem5

    Authors: Maryam Babaie, Ayaz Akram, Jason Lowe-Power

    Abstract: To accommodate the growing memory footprints of today's applications, CPU vendors have employed large DRAM caches, backed by large non-volatile memories like Intel Optane (e.g., Intel's Cascade Lake). The existing computer architecture simulators do not provide support to model and evaluate systems which use DRAM devices as a cache to the non-volatile main memory. In this work, we present a cycle-… ▽ More

    Submitted 23 March, 2023; originally announced March 2023.

  6. arXiv:2012.04105  [pdf, other

    cs.LG cs.AR

    The Tribes of Machine Learning and the Realm of Computer Architecture

    Authors: Ayaz Akram, Jason Lowe-Power

    Abstract: Machine learning techniques have influenced the field of computer architecture like many other fields. This paper studies how the fundamental machine learning techniques can be applied towards computer architecture problems. We also provide a detailed survey of computer architecture research that employs different machine learning methods. Finally, we present some future opportunities and the outs… ▽ More

    Submitted 7 December, 2020; originally announced December 2020.

  7. arXiv:2010.13216  [pdf, other

    cs.DC cs.AR cs.CR

    Performance Analysis of Scientific Computing Workloads on Trusted Execution Environments

    Authors: Ayaz Akram, Anna Giannakou, Venkatesh Akella, Jason Lowe-Power, Sean Peisert

    Abstract: Scientific computing sometimes involves computation on sensitive data. Depending on the data and the execution environment, the HPC (high-performance computing) user or data provider may require confidentiality and/or integrity guarantees. To study the applicability of hardware-based trusted execution environments (TEEs) to enable secure scientific computing, we deeply analyze the performance impa… ▽ More

    Submitted 25 October, 2020; originally announced October 2020.

  8. arXiv:2007.03152  [pdf, other

    cs.AR

    The gem5 Simulator: Version 20.0+

    Authors: Jason Lowe-Power, Abdul Mutaal Ahmad, Ayaz Akram, Mohammad Alian, Rico Amslinger, Matteo Andreozzi, Adrià Armejach, Nils Asmussen, Brad Beckmann, Srikant Bharadwaj, Gabe Black, Gedare Bloom, Bobby R. Bruce, Daniel Rodrigues Carvalho, Jeronimo Castrillon, Lizhong Chen, Nicolas Derumigny, Stephan Diestelhorst, Wendy Elsasser, Carlos Escuin, Marjan Fariborz, Amin Farmahini-Farahani, Pouya Fotouhi, Ryan Gambord, Jayneel Gandhi , et al. (53 additional authors not shown)

    Abstract: The open-source and community-supported gem5 simulator is one of the most popular tools for computer architecture research. This simulation infrastructure allows researchers to model modern computer hardware at the cycle level, and it has enough fidelity to boot unmodified Linux-based operating systems and run full applications for multiple architectures including x86, Arm, and RISC-V. The gem5 si… ▽ More

    Submitted 29 September, 2020; v1 submitted 6 July, 2020; originally announced July 2020.

    Comments: Source, comments, and feedback: https://github.com/darchr/gem5-20-paper

  9. arXiv:1608.07485  [pdf, ps, other

    cs.AR cs.DB

    When to use 3D Die-Stacked Memory for Bandwidth-Constrained Big Data Workloads

    Authors: Jason Lowe-Power, Mark D. Hill, David A. Wood

    Abstract: Response time requirements for big data processing systems are shrinking. To meet this strict response time requirement, many big data systems store all or most of their data in main memory to reduce the access latency. Main memory capacities have grown, and systems with 2 TB of main memory capacity available today. However, the rate at which processors can access this data--the memory bandwidth--… ▽ More

    Submitted 26 August, 2016; originally announced August 2016.

    Comments: Originally presented The Seventh workshop on Big Data Benchmarks, Performance Optimization, and Emerging Hardware (BPOE-7). http://www.bafst.com/events/asplos16/bpoe7/