Want People to Read Your Paper? Consider the Worst-Case Reviewer.
Inspired by T. N. Vijaykumar’s recent (and excellent) guidance for program committee members, I wanted to share my thoughts about crafting papers to survive the reviewing process and (more important) in the real world. A research paper’s task is to convey...
ISCA’18 Review Process Reflections
MICRO 2018 Summary
If you needed proof that the Golden Age of Computer Architecture is here, MICRO 51 was it. The technical program was a glowing reflection of the community as we venture forward into new and familiar computing territories. This year MICRO was in Japan, led by general...
Looking Ahead Beyond CMOS
Over the last decade, flagship processors from Intel and AMD have been eking out only marginal cross-generational single threaded (ST) performance gains. Instead, the focus has been on boosting aggregate performance by increasing core count. While throughput...
What’s the future of technology scaling?
It isn’t every day that a major company throws in the towel on Moore’s Law, so it is worth noting the announcement by GLOBALFOUNDRIES (GF) to halt development of the 7nm process node. With this announcement, there are now only three major vendors —...
Hybrid Quantum-Classical Computing
Quantum and classical computing will work together to solve currently intractable problems.
Approaches to System Security: Using Cryptographic Techniques to Minimize Trust
This is the first post in a series of posts on different approaches to systems security especially as they apply to hardware and architectural security. In this post, we will consider the use of mathematics/cryptography as an approach to improving systems security....
Reflections on trusting SGX
The security community will remember the year of 2018 as the year of speculative execution attacks. Meltdown and Spectre, the recent Foreshadow (L1TF in Intel’s terminology), and their variants demonstrate how the immense processor design complexity, perpetual...
