Hazard (computer architecture)

Known as: Pipeline break, Hazard (digital circuit), Pipeline flush 
In the domain of central processing unit (CPU) design, hazards are problems with the instruction pipeline in CPU microarchitectures when the next… (More)
Wikipedia

Topic mentions per year

Topic mentions per year

1954-2017
05010015019542016

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2010
Highly Cited
2010
Participatory sensing is the process whereby individuals and communities use ever-more-capable mobile phones and cloud services… (More)
Is this relevant?
Highly Cited
2008
Highly Cited
2008
The growing use of computers to control critical functions of complex systems brings with it concerns over dependability of the… (More)
  • figure 1
  • figure 2
  • figure 3
  • table I
  • figure 4
Is this relevant?
Highly Cited
2005
Highly Cited
2005
Exposure to high concentrations of radon progeny (radon) produces lung cancer in both underground miners and experimentally… (More)
  • figure 1
  • table 1
  • table 2
  • table 3
  • table 4
Is this relevant?
Highly Cited
2003
Highly Cited
2003
To achieve high instruction throughput, instruction schedulers must be capable of producing high-quality schedules that maximize… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • table 1
Is this relevant?
Highly Cited
2002
Highly Cited
2002
The purpose of this paper is to present a tentative conceptual framework for studies of vulnerability and adaptation to climate… (More)
  • table 1
Is this relevant?
Highly Cited
1996
Highly Cited
1996
In the paper a new machine description language is presented. The new language LISA, and its generic machine model are able to… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • table 1
Is this relevant?
Highly Cited
1995
Highly Cited
1995
Unfoldings of Petri nets provide a method of searching the state space of concurrent systems without considering all possible… (More)
Is this relevant?
Highly Cited
1995
Highly Cited
1995
Recently designed machines contain pipelines and caches. While both features provide significant performance advantages, they… (More)
  • figure 1
  • figure 2
  • table 1
  • table 2
  • figure 4
Is this relevant?
Highly Cited
1990
Highly Cited
1990
In a recent paper [1], Burrows, Abadi and Needham propose a logic for the analysis of authentication protocols. Formulated as a… (More)
Is this relevant?
Highly Cited
1979
Highly Cited
1979
This paper considers a periodic preventive maintenance (pm) policy with ``minimal repair'' at failure; pm is imperfect. A special… (More)
Is this relevant?