Local bypass for in memory computing

作者: Martin Ohmacht , Krishnan Sugavanam , Bruce M. Fleischer , Ravi Nair , Hans M. Jacobson

DOI:

关键词:

摘要: Embodiments include a method for bypassing data in an active memory device. The includes requestor determining number of transfers to grantor that have not been communicated the grantor, requesting interconnect network bypass path be used based on meeting threshold and communicating via request, granting control response request. also event delayed from other requestors, being due previously controlled by requestor, changed back network.

参考文章(15)
Blaise Fanning, Ioannis T. Schoinas, Quang T. Le, Ravishankar Iyer, Ramadass Nagarajan, Jose S. Niell, Ravi Kolagotla, Daniel F. Cutter, Method, Apparatus, System For Representing, Specifying And Using Deadlines ,(2013)
Johannes Boonstra, Pieter Van Der Wolf, Marc Jeroen Geuzebroek, Memory arbiter with latency guarantees for multiple ports ,(2011)
Devereaux C. Chen, Jeffrey R. Zimmer, Low latency request dispatcher ,(2010)
Patrick Digamon Bugayong, Joel Alonzo Baylon, Rey H. Bruce, Ricardo H. Bruce, Multiple chip module and package stacking method for storage devices ,(2006)
Joseph M. Jeddeloh, Memory hub bypass circuit and method ,(2002)
Robert T. Golla, Christopher H. Olson, Gregory F. Grohoski, Apparatus and method for local operand bypassing for cryptographic instructions ,(2009)
Ravish Kapasi, Jeffrey Schulz, Ching-Chi Chang, Caroline Ssu-Min Chen, Systems and methods for providing memory controllers with scheduler bypassing capabilities ,(2011)
Blaise Fanning, Deepak Limaye, Ioannis T. Schoinas, Ravishankar Iyer, Ramadass Nagarajan, Debra Bernstein, Jose S. Niell, Daniel F. Cutter, Arbitrating memory accesses via a shared memory fabric ,(2014)