DX100: Programmable Data Access Accelerator for IndirectionIndirect memory accesses frequently appear in applications where memory bandwidth is a critical bottleneck. Prior indirect memory access proposals, such as indirect prefetchers, runahead execution, fetchers, and decoupled access/execute architectures... | ISCA-2025 | A | 3 | 2025-11-04 06:02:06.035Z |
| ISCA-2025 | A | 3 | 2025-11-04 06:01:34.006Z |
| ISCA-2025 | A | 3 | 2025-11-04 06:01:01.837Z |
| ISCA-2025 | A | 3 | 2025-11-04 06:00:29.551Z |
| ISCA-2025 | A | 3 | 2025-11-04 05:59:57.390Z |
| ISCA-2025 | A | 3 | 2025-11-04 05:59:25.218Z |
| ISCA-2025 | A | 3 | 2025-11-04 05:58:53.050Z |
| ISCA-2025 | A | 3 | 2025-11-04 05:58:20.878Z |
| ISCA-2025 | A | 3 | 2025-11-04 05:57:48.877Z |
| ISCA-2025 | A | 3 | 2025-11-04 05:57:16.881Z |
| Explain icons... |
Synchronization for Fault-Tolerant Quantum ComputersQuantum Error Correction (QEC) codes store information reliably in logical qubits by encoding them in a larger number of less reliable qubits. The surface code, known for its high resilience to physical errors, is a leading candidate for fault-tolera... | ISCA-2025 | A | 3 | 2025-11-04 05:56:44.805Z |
| ISCA-2025 | A | 3 | 2025-11-04 05:56:12.796Z |
Nyx: Virtualizing dataflow execution on shared FPGA platformsAs FPGAs become more widespread for improving computing performance within cloud infrastructure, researchers aim to equip them with virtualization features to enable resource sharing in both temporal and spatial domains, thereby improving hardware ..... | ISCA-2025 | A | 3 | 2025-11-04 05:55:40.624Z |
| ISCA-2025 | A | 3 | 2025-11-04 05:55:08.292Z |
Neoscope: How Resilient Is My SoC to Workload Churn?The lifetime of hardware is increasing, but the lifetime of software is not. This leads to devices that, while performant when released, have fall-off due to changing workload suitability. To ensure that performance is maintained, computer architects... | ISCA-2025 | A | 3 | 2025-11-04 05:54:36.233Z |
| ISCA-2025 | A | 3 | 2025-11-04 05:54:04.041Z |
Chip Architectures Under Advanced Computing SanctionsThe rise of large scale machine learning models has generated unprecedented requirements and demand on computing hardware to enable these trillion parameter models. However, the importance of these bleeding-edge chips to the global economy, technolog... | ISCA-2025 | A | 3 | 2025-11-04 05:53:31.881Z |
| ISCA-2025 | A | 3 | 2025-11-04 05:52:59.684Z |
| ISCA-2025 | A | 3 | 2025-11-04 05:52:27.672Z |
| ISCA-2025 | A | 3 | 2025-11-04 05:51:55.660Z |
| ISCA-2025 | A | 3 | 2025-11-04 05:51:23.483Z |
RAP: Reconfigurable Automata ProcessorRegular pattern matching is essential for applications such as text processing, malware detection, network security, and bioinformatics. Recent in-memory automata processors have significantly advanced the energy and memory efficiency over convention... | ISCA-2025 | A | 3 | 2025-11-04 05:50:51.133Z |
| ISCA-2025 | A | 3 | 2025-11-04 05:50:19.010Z |
| ISCA-2025 | A | 3 | 2025-11-04 05:49:46.820Z |
| ISCA-2025 | A | 3 | 2025-11-04 05:49:14.808Z |
| ISCA-2025 | A | 3 | 2025-11-04 05:48:42.797Z |
| ISCA-2025 | A | 3 | 2025-11-04 05:48:10.786Z |
| ISCA-2025 | A | 3 | 2025-11-04 05:47:38.612Z |
The Sparsity-Aware LazyGPU ArchitectureGeneral- Purpose Graphics Processing Units (GPUs) are essential accelerators in data-parallel applications, including machine learning, and physical simulations. Although GPUs utilize fast wavefront context switching to hide memory access latency, me... | ISCA-2025 | A | 3 | 2025-11-04 05:47:06.605Z |
Light-weight Cache Replacement for Instruction Heavy WorkloadsThe last-level cache (LLC) is the last chance for memory accesses from the processor to avoid the costly latency of accessing the main memory. In recent years, an increasing number of instruction heavy workloads have put pressure on the last-level ca... | ISCA-2025 | A | 3 | 2025-11-04 05:46:34.595Z |
| ISCA-2025 | A | 3 | 2025-11-04 05:46:02.427Z |
| ISCA-2025 | A | 3 | 2025-11-04 05:45:30.244Z |
| ISCA-2025 | A | 3 | 2025-11-04 05:44:58.208Z |
| ISCA-2025 | A | 3 | 2025-11-04 05:44:25.983Z |
Single Spike Artificial Neural NetworksSpiking neural networks (SNNs) circumvent the need for large scale arithmetic using techniques inspired by biology. However, SNNs are designed with fundamentally different algorithms from ANNs, which have benefited from a rich history of theoretical ... | ISCA-2025 | A | 3 | 2025-11-04 05:43:53.956Z |
ATiM: Autotuning Tensor Programs for Processing-in-DRAMProcessing- in-DRAM (DRAM-PIM) has emerged as a promising technology for accelerating memory-intensive operations in modern applications, such as Large Language Models (LLMs). Despite its potential, current software stacks for DRAM-PIM face significa... | ISCA-2025 | A | 3 | 2025-11-04 05:43:21.855Z |
| ISCA-2025 | A | 3 | 2025-11-04 05:42:49.771Z |
| ISCA-2025 | A | 3 | 2025-11-04 05:42:17.293Z |
| ISCA-2025 | A | 3 | 2025-11-04 05:41:45.275Z |
| ISCA-2025 | A | 3 | 2025-11-04 05:41:13.012Z |