[PDF][PDF] Crom: Faster Web Browsing Using Speculative Execution.

JW Mickens, J Elson, J Howell, JR Lorch - NSDI, 2010 - usenix.org
… tag was a child of the enclosing <div> tree controlled by the … to speculatively fetch the CNN
home page, a complex page with … speculative execution is a natural optimization technique for …

iGPU: exception support and speculative execution on GPUs

J Menon, M De Kruijf, K Sankaralingam - ACM SIGARCH Computer …, 2012 - dl.acm.org
… for demand paging in virtual memory systems: to overlap pro… process could be cleanly
saved away and another process … -overhead technique to support exceptions and speculative

Hiding the long latency of persist barriers using speculative execution

S Shin, J Tuck, Y Solihin - … International Symposium on Computer …, 2017 - dl.acm.org
… stores and prevent them from updating memory, as … approach we take in designing SP.
First, we need to define the period of speculative execution, from the fence to the last speculative

Speculative dereferencing: Reviving foreshadow

M Schwarzl, T Schuster, M Schwarz… - … Cryptography and Data …, 2021 - Springer
… if the process filling the registers gets interrupted continuously. These hits occur during
speculative execution in … With the speculative memory access in the kernel, we can fetch arbitrary …

PoisonIvy: Safe speculation for secure memory

TS Lehman, AD Hilton, BC Lee - 2016 49th Annual IEEE/ACM …, 2016 - ieeexplore.ieee.org
… which speculatively uses data before its integrity has been verified while preserving security
and closing … One approach uses hashes to verify memory integrity. For every write, the …

Efficient runtime systems for speculative parallelization

C Hammacher - 2017 - publikationen.sulb.uni-saarland.de
… We also design two new systems utilizing virtual memory abstraction to track memory changed
… • We describe a novel approach to address the problem of coarse granularity of virtual-…

[PDF][PDF] In-memory check pointing in speculative parallel complex event processing

MU Sardar - 2018 - core.ac.uk
system follows pure speculative technique and if the speculation factor is “1”, the speculation
becomes 0% and the system follows pure buffering technique. … exploit the system resources …

Ileakage: Browser-based timerless speculative execution attacks on apple devices

J Kim, S van Schaik, D Genkin, Y Yarom - … Conference on Computer and …, 2023 - dl.acm.org
… We present a new speculative-execution technique to timerlessly distinguish cache hits … on
the page. We note that even if the target closes the opened page, the contents in memory are …

A survey of software techniques for using non-volatile memories for storage and main memory systems

S Mittal, JS Vetter - … on Parallel and Distributed Systems, 2015 - ieeexplore.ieee.org
… The scheduler speculatively divides the whole SSD space into many subregions and …
This brings the performance of a system with persistent support close to that of one without …

[PDF][PDF] Stride and global history based DRAM page management

M Khurshid, M Chainani, A Perugupalli… - … on Computer …, 2012 - users.cs.utah.edu
… /closing pages. This paper presents a memory scheduler, which is enhanced by speculative
… Our scheduler detects constant strides, using such techniques, in the memory requests in …