skip to main content
Skip header Section
The cache memory bookSeptember 1993
Publisher:
  • Academic Press Professional, Inc.
  • 525 B Street Suite 1900 San Diego, CA
  • United States
ISBN:978-0-12-322985-4
Published:01 September 1993
Pages:
269
Skip Bibliometrics Section
Bibliometrics
Abstract

No abstract available.

Cited By

  1. Handy J, Coughlin T and Coughlin T (2023). Semiconductor Architectures Enable Compute in Memory, Computer, 56:5, (126-129), Online publication date: 1-May-2023.
  2. Di Girolamo S, Kurth A, Calotoiu A, Benz T, Schneider T, Beránek J, Benini L and Hoefler T A RISC-V in-network accelerator for flexible high-performance low-power packet processing Proceedings of the 48th Annual International Symposium on Computer Architecture, (958-971)
  3. ACM
    Shimizu A, Townley D, Joshi M and Ponomarev D EA-PLRU Proceedings of the 8th International Workshop on Hardware and Architectural Support for Security and Privacy, (1-8)
  4. ACM
    Lee M, Green B, Xie F and Tabellion E Vectorized production path tracing Proceedings of High Performance Graphics, (1-11)
  5. Souvignet J, Declerck G, Asfari H, Jaulent M and Bousquet C (2016). OntoADR a semantic resource describing adverse drug reactions to support searching, coding, and information retrieval, Journal of Biomedical Informatics, 63:C, (100-107), Online publication date: 1-Oct-2016.
  6. ACM
    Griffin D, Lesage B, Burns A and Davis R Lossy Compression for Worst-Case Execution Time Analysis of PLRU Caches Proceedings of the 22nd International Conference on Real-Time Networks and Systems, (203-212)
  7. ACM
    Panda P, Roy S, Chandrasekaran S, Sharma N, Kaur J, Kandalam S and N. N High level energy modeling of controller logic in data caches Proceedings of the 24th edition of the great lakes symposium on VLSI, (45-50)
  8. ACM
    Jiménez D Insertion and promotion for tree-based PseudoLRU last-level caches Proceedings of the 46th Annual IEEE/ACM International Symposium on Microarchitecture, (284-296)
  9. Bortnikov E, Lempel R and Vornovitsky K Caching for realtime search Proceedings of the 33rd European conference on Advances in information retrieval, (104-116)
  10. Bortnikov E, Lempel R and Vornovitsky K Caching for Realtime Search Proceedings of the 33rd European Conference on Advances in Information Retrieval - Volume 6611, (104-116)
  11. Chen Y, Clarke E, Farzan A, He F, Tsai M, Tsay Y, Wang B and Zhu L Comparing learning algorithms in automated assume-guarantee reasoning Proceedings of the 4th international conference on Leveraging applications of formal methods, verification, and validation - Volume Part I, (643-657)
  12. Janapsatya A, Ignjatović A, Peddersen J and Parameswaran S Dueling CLOCK Proceedings of the Conference on Design, Automation and Test in Europe, (920-925)
  13. ACM
    Aciiçmez O Yet another MicroArchitectural Attack: Proceedings of the 2007 ACM workshop on Computer security architecture, (11-18)
  14. Baek N and Lee H A performance analysis for microprocessor architectures Proceedings of the 6th Conference on WSEAS International Conference on Applied Computer Science - Volume 6, (436-440)
  15. ACM
    Shindi R and Cooper S (2006). Evaluate the performance changes of processor simulator benchmarks When context switches are incorporated, ACM SIGAda Ada Letters, XXVI:3, (9-14), Online publication date: 17-Nov-2006.
  16. ACM
    Shindi R and Cooper S Evaluate the performance changes of processor simulator benchmarks When context switches are incorporated Proceedings of the 2006 annual ACM SIGAda international conference on Ada, (9-14)
  17. Emerson E and Kahlon V Rapid parameterized model checking of snoopy cache coherence protocols Proceedings of the 9th international conference on Tools and algorithms for the construction and analysis of systems, (144-159)
  18. Theelen B, Verschueren A, Suárez V, Stevens M and Nuñez A (2003). A scalable single-chip multi-processor architecture with on-chip RTOS kernel, Journal of Systems Architecture: the EUROMICRO Journal, 49:12-15, (619-639), Online publication date: 1-Dec-2003.
  19. Delzanno G (2003). Constraint-Based Verification of Parameterized Cache Coherence Protocols, Formal Methods in System Design, 23:3, (257-301), Online publication date: 1-Nov-2003.
  20. A 2-Way Thrashing-Avoidance Cache (TAC) Proceedings of the 2000 IEEE International Conference on Computer Design: VLSI in Computers & Processors
  21. Sears C The elements of cache programming style Proceedings of the 4th annual Linux Showcase & Conference - Volume 4, (18-18)
  22. ACM
    Ghose K and Kamble M Reducing power in superscalar processor caches using subbanking, multiple line buffers and bit-line segmentation Proceedings of the 1999 international symposium on Low power electronics and design, (70-75)
  23. ACM
    Machanick P, Salverda P and Pompe L (1998). Hardware-software trade-offs in a direct Rambus implementation of the RAMpage memory hierarchy, ACM SIGOPS Operating Systems Review, 32:5, (105-114), Online publication date: 1-Dec-1998.
  24. ACM
    Machanick P, Salverda P and Pompe L Hardware-software trade-offs in a direct Rambus implementation of the RAMpage memory hierarchy Proceedings of the eighth international conference on Architectural support for programming languages and operating systems, (105-114)
  25. ACM
    Machanick P, Salverda P and Pompe L (1998). Hardware-software trade-offs in a direct Rambus implementation of the RAMpage memory hierarchy, ACM SIGPLAN Notices, 33:11, (105-114), Online publication date: 1-Nov-1998.
  26. Mak P, Blake M, Jones C, Strait G and Turgeon P (1997). Shared-cache clusters in a system with a fully shared memory, IBM Journal of Research and Development, 41:4-5, (429-448), Online publication date: 1-Jul-1997.
Contributors

Recommendations

Shanthi Ambalavanan

The book gives a thorough understanding of cache concepts and design. Explanations of cache concepts using metaphors such as a clerk's desk next to filing cabinets make understanding concepts easy for a beginner. The figures in the book are very descriptive. Highlighting cache-specific buzz words, along with a glossary at the end, makes the book an easy reference for cache-related terms. The coherency protocols are explained well. Finally, the design examples at the end give the reader an in-depth understanding of the cache design process. Exercise problems would be a welcome addition.

Access critical reviews of Computing literature here

Become a reviewer for Computing Reviews.