This shows you the differences between two versions of the page.
Both sides previous revision Previous revision | Next revision Both sides next revision | ||
readings [2015/01/10 21:02] kevincha |
readings [2015/01/11 16:16] kevincha |
||
---|---|---|---|
Line 14: | Line 14: | ||
**Mentioned during lecture:** | **Mentioned during lecture:** | ||
+ | ===== Lecture 2 (1/14 Wed.) ===== | ||
+ | **Required:** | ||
+ | * {{00964437.pdf|Patt, Y. (2001). Requirements, bottlenecks, and good fortune: agents for microprocessor evolution. Proceedings of the IEEE.}} | ||
+ | * {{moscibroda.pdf|Moscibroda, T., & Mutlu, O. (2007). Memory performance attacks: denial of memory service in multi-core systems. Proceedings of 16th USENIX Security Symposium.}} | ||
+ | * (CMU WebISO) [[http://www.ece.cmu.edu/~ece447/cmu_only/PP_Chap1.pdf|P&P Chapter 1 (Fundamentals)]] | ||
+ | * P&H Chapters 1 and 2 (Intro, Abstractions, ISA, MIPS) | ||
+ | |||
+ | |||
+ | **Mentioned during lecture:** | ||