1. Conduct research on the IEEE or ACM journal articles or conference proceedings,  published within the last one-year period, about the pipelining concepts. Submit a total of  two-page summary for three important publications (along with the original paper  complete reference information only). 

2. This problem aims to investigate the major perspectives of RISC and CISC architectures  in both a written report and a fun mock debate format.  a. There are different hypothetical real-life roles: a.1) Local City Mayor, a.2) Tier-1  Research University Biology Professor, a.3) Industrial Businessman, a.4)  Hardware developer, a.5) Software developer, and, a.6) NASA Director. b. Conduct research on major journal articles, conference proceedings, or real-life  implementations about the RISC and CISC concepts and develop at least three fact-based debate arguments for both to defend and to destroy each architecture  for each of the hypothetical roles. (You need to find strong as well as convincing  arguments that go well beyond the fundamental class coverage) c. Submit the report including your arguments for and against each architectural  approach (as part of the project-2). d. During the project due date, the hypothetical roles for RISC and CISC teams (to  perform each role one at a time) and groups to promote each architecture will be  randomly assigned in the class. (Satisfactory performance at each role is required  for successful project completion)  

3. Conduct research and explain the following concepts (with proper references): Gelsinger Hennessy debates, SPEC benchmarks, Spectre and meltdown vulnerabilities (concise  concepts and most recent developments), Blue gene supercomputers and corresponding  architectures, Top-6 most powerful supercomputers, and Macro-op fusion. 

4. Conduct research on recent processors from Intel, IBM, and ARM. Describe their specifications, obtain their figures, and compare their pipeline operations in terms of  strengths/weaknesses, etc. Also, propose one new idea to improve the existing pipeline  operations (make sure to include original source complete references) 

Leave a Reply

Your email address will not be published. Required fields are marked *