A Primer on Memory Consistency and Cache CoherenceSnooping Coherence Protocols
A Primer on Memory Consistency and Cache Coherence: Snooping Coherence Protocols
Nagarajan, Vijay; Sorin, Daniel J.; Hill, Mark D.; Wood, David A.
2020-01-01 00:00:00
[In this chapter, we present snooping coherence protocols. Snooping protocols were the first widely deployed class of protocols and they continue to be used in a variety of systems. Snooping protocols offer many attractive features, including low-latency coherence transactions and a conceptually simpler design than the alternative, directory protocols (Chapter 8).]
http://www.deepdyve.com/assets/images/DeepDyve-Logo-lg.pnghttp://www.deepdyve.com/lp/springer-journals/a-primer-on-memory-consistency-and-cache-coherence-snooping-coherence-MxQ0WdLsOu
A Primer on Memory Consistency and Cache CoherenceSnooping Coherence Protocols
[In this chapter, we present snooping coherence protocols. Snooping protocols were the first widely deployed class of protocols and they continue to be used in a variety of systems. Snooping protocols offer many attractive features, including low-latency coherence transactions and a conceptually simpler design than the alternative, directory protocols (Chapter 8).]
To get new article updates from a journal on your personalized homepage, please log in first, or sign up for a DeepDyve account if you don’t already have one.
All DeepDyve websites use cookies to improve your online experience. They were placed on your computer when you launched this website. You can change your cookie settings through your browser.