IEEE Computer Architecture Letters

Early Access Articles

Early Access articles are made available in advance of the final electronic or print versions. Early Access articles are peer reviewed but may not be fully edited. They are fully citable from the moment they appear in IEEE Xplore.

Filter Results

Displaying Results 1 - 3 of 3
  • RETROFIT: Fault-aware Wear Leveling

    Publication Year: 2018, Page(s): 1
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (388 KB)

    Phase-change memory (PCM) and resistive memory (RRAM) are promising alternatives to traditional memory technologies. However, both PCM and RRAM suffer from limited write endurance and due to process variation from scaling, increasing number of early cell failures continue to put pressure on wear-leveling and fault tolerance techniques. In this paper, we propose RETROFIT, which leverages the spare ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The Architectural Implications of Cloud Microservices

    Publication Year: 2018, Page(s): 1
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1036 KB)

    Cloud services have recently undergone a shift from monolithic applications to microservices, with hundreds or thousands of loosely-coupled microservices comprising the end-to-end application. Microservices present both opportunities and challenges when optimizing for quality of service (QoS) and cloud utilization. In this paper we explore the implications cloud microservices have on system bottle... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Distributed Memory Integrity Trees

    Publication Year: 2018, Page(s): 1
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (702 KB)

    Ensuring the correct execution of a program running on untrusted computing platforms, wherein the OS, hypervisor, and all off-CPU-chip hardware, including memory, are untrusted, (also) requires protecting the integrity of the memory content against replay attacks. This requires dedicated tracking structures and in-chip state storage. For this purpose, integrity trees are used in various forms, var... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.

Aims & Scope

IEEE Computer Architecture Letters is a rigorously peer-reviewed forum for publishing early, high-impact results in the areas of uni- and multiprocessor computer systems, computer architecture, microarchitecture, workload characterization, performance evaluation and simulation techniques, and power-aware computing. 

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
Daniel J. Sorin
Duke University
Electrical & Computer Engineering
PO Box 90291
Durham, NC 27708
e-mail: sorin@ee.duke.edu