by Kathryn S. McKinley on Feb 19, 2018 | Tags: Conference, Diversity, Opinion
Inclusiveness is not limited to gender and race. The more our community can limit bias in all its aspects, the more inclusive our community will be, and the more people will want to join it and stay. All of us, our research, and society will benefit.
Read more...
by Mark Hill on Feb 15, 2018 | Tags: Architecture, Security
As previously reported in the Computing Community Consortium (CCC) Blog, two major hardware security design flaws—dubbed Meltdown and Spectre—were broadly revealed to the public in early January 2018. These flaws are described in detail by the discoverers in research...
Read more...
by Yan Pei, Swarnendu Biswas, Don Fussell, and Keshav Pingali on Jan 29, 2018 | Tags: Data fusion, Kalman filters, Measurements, State estimation in linear systems
This is the second of a multi-part post that introduces Kalman filtering in an accessible way to computer systems researchers. In the previous post, we described how two noisy estimates of a scalar quantity such as temperature can be fused using the optimal linear...
Read more...
by Scott Mahlke and Onur Mutlu on Jan 25, 2018 | Tags: Conference, Diversity
As part of the MICRO-50 business meeting, there was a session devoted to discussing diversity in MICRO and more broadly computer architecture conferences. One of the decisions the SC co-chairs made (in consultation with many members of the MICRO community) was to get...
Read more...
by Reetuparna Das on Jan 22, 2018 | This blog is a part of a two-part series on the subject of architectural evaluation methodology. The first blog was a collection of opinions from experts on the question “When to Prototype? When to Simulate?”. For those who missed part-I, the picture below is a...
Read more...
by Spyros Blanas on Jan 18, 2018 | Tags: Databases, Datacenters, Distributed Systems, Memory, Networking, Operating Systems
Fast, RDMA-capable networks present a “network wall” for data-intensive applications in a data center. Software developers are facing two unpalatable choices: either communicate using messages and re-implement features of TCP/IP in their application, or...
Read more...
by Wen-mei Hwu on Jan 11, 2018 | Tags: Opinion
I am running for Chair of TCuARCH because I have been part of the microarchitecture community for 32 years, appreciate greatly all the good that TCuARCH has done during that period, but recognize there is still much work to be done, and would like to lead it. TCuARCH,...
Read more...
by Alvin Lebeck on Jan 8, 2018 | Tags: ACM SIGARCH
The Year in Review The new year is upon us and it’s time to reflect on 2017 and to look ahead for 2018. We launched Computer Architecture Today with our first Welcome post on March 19, 2017. Since launch there have been 44 posts from 22 contributors, both our...
Read more...
by Simha Sethumadhavan on Jan 4, 2018 | Tags: Architecture, Hardware, Security
Two high impact microarchitectural timing attacks were disclosed yesterday. (https://nyti.ms/2EOX03d). 10000 ft overview: This is a very intricate attack but the root cause is unflushed speculative state from the cache resulting in a timing variations. Apparently the...
Read more...
by T. N. Vijaykumar on Dec 21, 2017 | Tags: Conference, Opinion
I discuss some key issues with our review process and give some suggestions for the PC chairs and PC members.
Read more...