Use este identificador para citar ou linkar para este item:
http://repositorio.utfpr.edu.br/jspui/handle/1/23852
Título: | Risk-5: controlled approximations for RISC-V |
Autor(es): | Felzmann, Isaías Bittencourt Fabrício Filho, João Wanner, Lucas Francisco |
Palavras-chave: | Arquitetura de computador Energia - Consumo Circuitos integrados Estruturas de dados (Computação) Software Computer architecture Energy consumption Integrated circuits Data structures (Computer science) Computer software |
Data do documento: | Nov-2020 |
Câmpus: | Campo Mourao |
Citação: | FELZMANN, Isaías Bittencourt; FABRÍCIO FILHO, João; WANNER; Lucas Francisco. Risk-5: controlled approximations for RISC-V. IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, v. 39 n. 11, p. 4052-4063, nov. 2020. DOI: http://dx.doi.org/10.1109/TCAD.2020.3012312. Disponível em: https://ieeexplore.ieee.org/document/9211571. Acesso em: 22 dez. 2020. |
Abstract: | Approximate Computing offers enhanced energy efficiency by exploring quality relaxation on applications. Application-agnostic hardware-level techniques can provide high benefits under certain scenarios, but their integration on a general-purpose architecture presents novel control challenges. We present Risk-5, an extension of the RISC-V architecture that implements control mechanisms to orchestrate multiple coexisting approximation techniques within an architecture. In Risk-5, approximate hardware capabilities are exposed to software through identification registers, data structures, and drivers that describe the nature and configuration parameters for each approximate design. This allows the software stack to control what and how much is approximated in an application. Control options range from activating or deactivating a certain approximation (e.g., approximating ALU operations), to configuring allowable error levels (e.g., for a configurable FPU), and configuring operation parameters that may lead to probabilistic errors (e.g., setting the refresh rate for an approximate SDRAM). Approximations may be dynamically configured and combined at runtime, allowing for simplified design space exploration. Finally, supervisor- and machine-level control allows for the use of certain approximations without requiring changes to applications. In this article, we discuss the implementation of different classes of approximation techniques, detailing and evaluating how they interact with each other. Risk-5 and the selected approximations are demonstrated in the functional level in a RISC-V ISA simulator augmented with an approximate computing framework. Our experiments evaluate how six applications from different computing domains behave when subjected to a combination of approximation techniques. Our results show how Risk-5 can bridge the gap between software and hardware approximations, allowing designers to easily evaluate energy-quality tradeoffs. |
Descrição: | Depositado neste repositório o arquivo contendo a versão Preprint do artigo publicado pela IEEE |
URI: | http://repositorio.utfpr.edu.br/jspui/handle/1/23852 |
ISSN: | 0278-0070 |
Aparece nas coleções: | PCS - Artigos |
Arquivos associados a este item:
Arquivo | Descrição | Tamanho | Formato | |
---|---|---|---|---|
controlledapproximationsrisc.pdf Disponível a partir de 5000-01-01 | 2,1 MB | Adobe PDF | Visualizar/Abrir |
Os itens no repositório estão protegidos por copyright, com todos os direitos reservados, salvo quando é indicado o contrário.