dc.creatorFelzmann, Isaías Bittencourt
dc.creatorFabrício Filho, João
dc.creatorWanner, Lucas Francisco
dc.date.accessioned5000-01-01
dc.date.accessioned2021-01-14T15:38:03Z
dc.date.accessioned2022-12-06T14:39:46Z
dc.date.available5000-01-01
dc.date.available2021-01-14T15:38:03Z
dc.date.available2022-12-06T14:39:46Z
dc.date.created5000-01-01
dc.date.created2021-01-14T15:38:03Z
dc.date.issued2020-11
dc.identifierFELZMANN, Isaías Bittencourt; FABRÍCIO FILHO, João; WANNER; Lucas Francisco. Risk-5: controlled approximations for RISC-V. IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, v. 39 n. 11, p. 4052-4063, nov. 2020. DOI: http://dx.doi.org/10.1109/TCAD.2020.3012312. Disponível em: https://ieeexplore.ieee.org/document/9211571. Acesso em: 22 dez. 2020.
dc.identifier0278-0070
dc.identifierhttp://repositorio.utfpr.edu.br/jspui/handle/1/23852
dc.identifierhttp://dx.doi.org/10.1109/TCAD.2020.3012312
dc.identifier.urihttps://repositorioslatinoamericanos.uchile.cl/handle/2250/5253542
dc.description.abstractApproximate Computing offers enhanced energy efficiency by exploring quality relaxation on applications. Application-agnostic hardware-level techniques can provide high benefits under certain scenarios, but their integration on a general-purpose architecture presents novel control challenges. We present Risk-5, an extension of the RISC-V architecture that implements control mechanisms to orchestrate multiple coexisting approximation techniques within an architecture. In Risk-5, approximate hardware capabilities are exposed to software through identification registers, data structures, and drivers that describe the nature and configuration parameters for each approximate design. This allows the software stack to control what and how much is approximated in an application. Control options range from activating or deactivating a certain approximation (e.g., approximating ALU operations), to configuring allowable error levels (e.g., for a configurable FPU), and configuring operation parameters that may lead to probabilistic errors (e.g., setting the refresh rate for an approximate SDRAM). Approximations may be dynamically configured and combined at runtime, allowing for simplified design space exploration. Finally, supervisor- and machine-level control allows for the use of certain approximations without requiring changes to applications. In this article, we discuss the implementation of different classes of approximation techniques, detailing and evaluating how they interact with each other. Risk-5 and the selected approximations are demonstrated in the functional level in a RISC-V ISA simulator augmented with an approximate computing framework. Our experiments evaluate how six applications from different computing domains behave when subjected to a combination of approximation techniques. Our results show how Risk-5 can bridge the gap between software and hardware approximations, allowing designers to easily evaluate energy-quality tradeoffs.
dc.publisherCampo Mourao
dc.publisherEstados unidos
dc.relationIEEE Transactions on Computer-Aided Design of Integrated Circuits & Systems
dc.relationhttps://ieeexplore.ieee.org/document/9211571
dc.rightshttps://journals.ieeeauthorcenter.ieee.org/choose-a-publishing-agreement/avoid-infringement-upon-ieee-copyright/
dc.rightsembargoedAccess
dc.subjectArquitetura de computador
dc.subjectEnergia - Consumo
dc.subjectCircuitos integrados
dc.subjectEstruturas de dados (Computação)
dc.subjectSoftware
dc.subjectComputer architecture
dc.subjectEnergy consumption
dc.subjectIntegrated circuits
dc.subjectData structures (Computer science)
dc.subjectComputer software
dc.titleRisk-5: controlled approximations for RISC-V
dc.typearticle


Este ítem pertenece a la siguiente institución