<?xml version="1.0" encoding="UTF-8"?>
<?xml-stylesheet type="text/xsl" href="https://feeds.feedblitz.com/feedblitz_rss.xslt"?>
<rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	 xmlns:feedburner="http://rssnamespace.org/feedburner/ext/1.0">
<channel>
	<title>Computer Architecture Today</title>
	<atom:link href="https://www.sigarch.org/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.sigarch.org</link>
	<description>Informing the broad computing community about current activities, advances and future directions in computer architecture.</description>
	<lastBuildDate>Tue, 19 May 2026 14:00:32 -0400</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>1</sy:updateFrequency>
	
<image>
	<url>https://www.sigarch.org/wp-content/uploads/2017/03/logo_rgb.png</url>
	<title>Computer Architecture Today</title>
	<link>https://www.sigarch.org</link>
</image> 
<site xmlns="com-wordpress:feed-additions:1">125883397</site>
<meta xmlns="http://www.w3.org/1999/xhtml" name="robots" content="noindex" />
<item>
<feedburner:origLink>https://www.sigarch.org/architecture-systems-are-changing-the-architects-role-in-the-era-of-agentic-co-design/</feedburner:origLink>
		<title>Architecture &#038; Systems are Changing: The Architect&#8217;s Role in the Era of Agentic Co-Design</title>
		<link>https://feeds.feedblitz.com/~/956665028/0/sigarch-cat~Architecture-Systems-are-Changing-The-Architects-Role-in-the-Era-of-Agentic-CoDesign/</link>
		<comments>https://feeds.feedblitz.com/~/956665028/0/sigarch-cat~Architecture-Systems-are-Changing-The-Architects-Role-in-the-Era-of-Agentic-CoDesign/#respond</comments>
		<pubDate>Tue, 19 May 2026 14:00:32 +0000</pubDate>
		<dc:creator><![CDATA[Dimitrios Skarlatos]]></dc:creator>
		<category><![CDATA[ACM SIGARCH]]></category>
		<category><![CDATA[AI Agents]]></category>
		<category><![CDATA[Hardware-Software Co-design]]></category>
		<guid isPermaLink="false">https://www.sigarch.org/?p=104529</guid>
		<description><![CDATA[<div><img width="300" xheight="200" src="https://www.sigarch.org/wp-content/uploads/2026/05/feature-300x200.png" class="attachment-medium size-medium wp-post-image" alt="" style="max-width:100% !important;height:auto !important;margin-bottom:15px;margin-left:15px;float:right;"  fetchpriority="high" /></div>Architecture &#38; Systems are Changing: The Architect&#8217;s Role in the Era of Agentic Co-Design The AI datacenter stack is built on hardware-software contracts and abstractions that were never designed for the workloads datacenters now serve. Memory systems strain under terabyte-scale capacity. Heterogeneous accelerators have been pressed into deployment. With datacenters projected to consume over 1,000 [&#8230;]]]>
</description>
				<content:encoded><![CDATA[<div><img width="300" height="200" src="https://www.sigarch.org/wp-content/uploads/2026/05/feature-300x200.png" class="attachment-medium size-medium wp-post-image" alt="" style="margin-bottom:15px;margin-left:15px;float:right;" decoding="async" loading="lazy" /></div><h1><b>Architecture &amp; Systems are Changing: The Architect&#8217;s Role in the Era of Agentic Co-Design</b></h1>
<p><span style="font-weight: 400;">The AI datacenter stack is built on hardware-software contracts and abstractions that were never designed for the workloads datacenters now serve. Memory systems strain under terabyte-scale capacity. Heterogeneous accelerators have been pressed into deployment. With datacenters projected to consume over 1,000 TWh annually, surpassing Japan (the world&#8217;s fourth-largest economy), renegotiating the hardware-software contract is no longer optional.</span></p>
<p><span style="font-weight: 400;">AI was enabled by decades of hardware and software efficiency gains. The next leap requires two orders of magnitude more, on a stack whose workloads, infrastructure, and economics bear little resemblance to the one the contract was written for.</span></p>
<p><span style="font-weight: 400;">That is not a problem any single layer of the stack can solve. It is a co-design problem, and it is unfolding while the design process itself is changing across systems and architecture.</span></p>
<h2><b>The contract so far</b></h2>
<p><span style="font-weight: 400;">Computer architecture has long been guided by a quiet contract with three commitments: </span><b>abstractions, interfaces, and transparency</b><span style="font-weight: 400;">. Layers that hide hardware complexity from programmers; interfaces like the x86 ISA that let decades-old binaries still run on Linux today; and microarchitectural state largely hidden behind a model programmers can keep in their heads. Together, these commitments deliver the property programmers care about most: </span><b>programmability</b><span style="font-weight: 400;">.</span></p>
<p><span style="font-weight: 400;">This contract is not arbitrary: it is what lets billions of lines of legacy software keep running while architects rebuild underneath. But the contract was negotiated for a world where humans wrote all of the code and humans designed all of the hardware. Both halves of that world are changing at the same time, and the architect&#8217;s job is evolving with them.</span></p>
<h2><b>Plenty of room at the Top</b></h2>
<p><span style="font-weight: 400;">In 2020, Leiserson, Thompson, Emer, Kuszmaul, Lampson, Sanchez, and Schardl argued in </span><i><span style="font-weight: 400;">Science</span></i><span style="font-weight: 400;"> that post-Moore performance gains would have to come from the</span><a href="https://feeds.feedblitz.com/~/t/0/0/sigarch-cat/~https://doi.org/10.1126/science.aam9744"> <span style="font-weight: 400;">&#8220;Top&#8221; of the computing stack</span></a><span style="font-weight: 400;">: software, algorithms, and hardware architecture, rather than from the &#8220;Bottom&#8221; of semiconductor physics. They were right, and the half-decade since has only sharpened the point.</span></p>
<p><span style="font-weight: 400;">The harder claim in that paper is the one we want to dwell on. The Top has plenty of room, but the gains are </span><i><span style="font-weight: 400;">&#8220;opportunistic, uneven, and sporadic,&#8221;</span></i><span style="font-weight: 400;"> subject to diminishing returns. The Top has historically been mined by hand, one paper and one design cycle at a time. What is changing now is the rate at which it is </span><i><span style="font-weight: 400;">mineable</span></i><span style="font-weight: 400;">. The two directions we describe next change that rate. Same Top, mined faster, mined more systematically, and mined by tools the field did not have until recently.</span></p>
<h2><b>Two directions are reshaping the design loop</b></h2>
<p><span style="font-weight: 400;">Two complementary directions are converging on how we build system software and hardware: </span><b>embedding learning inside low-level mechanisms</b><span style="font-weight: 400;">, and </span><b>using AI agents to explore the architectural design space itself</b><span style="font-weight: 400;">.</span></p>
<p><span style="font-weight: 400;">The first direction has a deep history. Perceptron-based</span><a href="https://feeds.feedblitz.com/~/t/0/0/sigarch-cat/~https://ieeexplore.ieee.org/document/903263"> <span style="font-weight: 400;">branch predictors</span></a><span style="font-weight: 400;"> put a lightweight learning model on the critical path more than two decades ago, and the catalog has steadily grown since. On the cache-hierarchy side,</span><a href="https://feeds.feedblitz.com/~/t/0/0/sigarch-cat/~https://ieeexplore.ieee.org/document/9773195"> <span style="font-weight: 400;">Mockingjay</span></a><span style="font-weight: 400;"> uses a trained reuse-distance predictor to imitate Belady&#8217;s optimal replacement policy. On the prefetching side,</span><a href="https://feeds.feedblitz.com/~/t/0/0/sigarch-cat/~https://arxiv.org/abs/1803.02329"> <span style="font-weight: 400;">Hashemi et al.</span></a><span style="font-weight: 400;"> framed memory access patterns as an LSTM prediction task,</span><a href="https://feeds.feedblitz.com/~/t/0/0/sigarch-cat/~https://dl.acm.org/doi/10.1145/3466752.3480114"> <span style="font-weight: 400;">Pythia</span></a><span style="font-weight: 400;"> recast the entire prefetcher as an online reinforcement-learning agent, and</span><a href="https://feeds.feedblitz.com/~/t/0/0/sigarch-cat/~https://dl.acm.org/doi/10.1145/3613424.3623780"> <span style="font-weight: 400;">Micro-Armed Bandit</span></a><span style="font-weight: 400;"> showed that lightweight bandit-based RL can match more complex agents at a fraction of the storage cost. Outside the cache hierarchy, reinforcement learning has been applied to</span><a href="https://feeds.feedblitz.com/~/t/0/0/sigarch-cat/~https://www.nature.com/articles/s41586-021-03544-w"> <span style="font-weight: 400;">chip floorplanning</span></a><span style="font-weight: 400;">, learning-based</span><a href="https://feeds.feedblitz.com/~/t/0/0/sigarch-cat/~https://dl.acm.org/doi/abs/10.1145/3373376.3378525"> <span style="font-weight: 400;">memory allocation</span></a><span style="font-weight: 400;"> replaced hand-tuned allocator heuristics with predictors trained on real telemetry, and</span><a href="https://feeds.feedblitz.com/~/t/0/0/sigarch-cat/~https://dl.acm.org/doi/10.1145/3297858.3304004"> <span style="font-weight: 400;">Seer</span></a><span style="font-weight: 400;"> applied deep learning to predict QoS violations in cloud microservices before they materialize. Most recently, our work on learned virtual memory (</span><a href="https://feeds.feedblitz.com/~/t/0/0/sigarch-cat/~https://dl.acm.org/doi/10.1145/3725843.3756093"><span style="font-weight: 400;">LVM</span></a><span style="font-weight: 400;">) eliminated address-translation overhead with a learned index that fits in two cycles of integer arithmetic. The principle generalizes: fixed designs are being replaced with principled, hardware-realizable models that adapt to workload shifts in ways hand-tuned heuristics cannot.</span></p>
<p><span style="font-weight: 400;">The second direction is newer, and arguably more disruptive.</span><a href="https://feeds.feedblitz.com/~/t/0/0/sigarch-cat/~https://arxiv.org/abs/2506.13131"> <span style="font-weight: 400;">AlphaEvolve</span></a><span style="font-weight: 400;"> demonstrated that LLMs paired with evolutionary search can discover algorithms across domains, from mathematical constructions to data-center scheduling.</span><a href="https://feeds.feedblitz.com/~/t/0/0/sigarch-cat/~https://arxiv.org/abs/2510.06189"> <span style="font-weight: 400;">ADRS</span></a><span style="font-weight: 400;"> extended the idea to broader systems research, and</span><a href="https://feeds.feedblitz.com/~/t/0/0/sigarch-cat/~https://arxiv.org/abs/2602.22425"> <span style="font-weight: 400;">recent work from Google</span></a><span style="font-weight: 400;"> has applied the same approach to cache replacement. The same paradigm has reached the software side of the machine: agentic systems that generate and tune CUDA and Triton kernels, including NVIDIA’s </span><a href="https://feeds.feedblitz.com/~/t/0/0/sigarch-cat/~https://arxiv.org/pdf/2603.24517"><span style="font-weight: 400;">AVO</span></a><span style="font-weight: 400;"> and Meta&#8217;s</span><a href="https://feeds.feedblitz.com/~/t/0/0/sigarch-cat/~https://arxiv.org/abs/2512.23236"> <span style="font-weight: 400;">KernelEvolve</span></a><span style="font-weight: 400;">, are now in use across heterogeneous accelerators. Sankaralingam captured the bigger picture in</span><a href="https://feeds.feedblitz.com/~/t/0/0/sigarch-cat/~https://arxiv.org/abs/2604.03312"> <i><span style="font-weight: 400;">Computer Architecture&#8217;s AlphaZero Moment</span></i></a><span style="font-weight: 400;">, arguing that the field is approaching a regime where architectural </span><i><span style="font-weight: 400;">discovery itself</span></i><span style="font-weight: 400;"> becomes a search problem, beyond per-mechanism tuning. In our own recent work,</span><a href="https://feeds.feedblitz.com/~/t/0/0/sigarch-cat/~https://arxiv.org/abs/2604.25083"> <i><span style="font-weight: 400;">Agentic Architect</span></i></a><span style="font-weight: 400;">, we coupled LLM-driven code evolution with cycle-accurate simulation to explore microarchitectural design spaces, and found that the loop matches or exceeds state-of-the-art designs on cache replacement, prefetching, and branch prediction. </span></p>
<p><span style="font-weight: 400;">These two directions are not alternatives. They differ in what they decide and when. The first decides </span><b>how a fixed mechanism behaves at runtime</b><span style="font-weight: 400;">: a branch predictor that learns its own weights, a cache policy that adapts to the workload. The second decides </span><b>what the mechanism looks like in the first place</b><span style="font-weight: 400;">: the predictor, the policy, the prefetcher itself, evolved before deployment. Both move judgment that used to live in tight loops written by experts into search problems that can be scored and re-evaluated.</span></p>
<div id="attachment_104533" style="width: 2570px" class="wp-caption aligncenter"><img loading="lazy" decoding="async" aria-describedby="caption-attachment-104533" class="wp-image-104533 size-full" src="https://www.sigarch.org/wp-content/uploads/2026/05/framework-scaled.png" alt="" width="2560" height="784" srcset="https://www.sigarch.org/wp-content/uploads/2026/05/framework-scaled.png 2560w, https://www.sigarch.org/wp-content/uploads/2026/05/framework-1280x392.png 1280w, https://www.sigarch.org/wp-content/uploads/2026/05/framework-980x300.png 980w, https://www.sigarch.org/wp-content/uploads/2026/05/framework-480x147.png 480w" sizes="(min-width: 0px) and (max-width: 480px) 480px, (min-width: 481px) and (max-width: 980px) 980px, (min-width: 981px) and (max-width: 1280px) 1280px, (min-width: 1281px) 2560px, 100vw" /><p id="caption-attachment-104533" class="wp-caption-text">Figure 1. Agentic Architect, a framework for Computer Architecture Design Space Exploration and Optimization.</p></div>
<h2><b>Why the loop closes here</b></h2>
<p><span style="font-weight: 400;">Computer architecture has a structural advantage that is easy to take for granted: from the beginning, the field has organized itself around shared, quantitative empirical evaluation.</span><a href="https://feeds.feedblitz.com/~/t/0/0/sigarch-cat/~https://www.spec.org/cpu2026/"><span style="font-weight: 400;"> SPEC</span></a><span style="font-weight: 400;">,</span><a href="https://feeds.feedblitz.com/~/t/0/0/sigarch-cat/~https://www.cs.princeton.edu/techreports/2008/811.pdf"><span style="font-weight: 400;"> PARSEC</span></a><span style="font-weight: 400;">,</span><a href="https://feeds.feedblitz.com/~/t/0/0/sigarch-cat/~https://www.cloudsuite.ch/"> <span style="font-weight: 400;">CloudSuite</span></a><span style="font-weight: 400;">,</span><a href="https://feeds.feedblitz.com/~/t/0/0/sigarch-cat/~https://www.csl.cornell.edu/~delimitrou/papers/2019.asplos.microservices.pdf"><span style="font-weight: 400;"> DeathStarBench</span></a><span style="font-weight: 400;">, and a long list of others encode a community-wide agreement about what a &#8220;fair comparison&#8221; looks like. The metrics are equally well established: IPC, MPKI, miss rates, area, power, energy-delay product. Every paper in the field is, in effect, a measurement against an agreed instrument.</span></p>
<p><span style="font-weight: 400;">An agentic loop needs exactly this kind of discipline to close. The loop&#8217;s productivity is bounded by the cost and clarity of its fitness signal: how cheaply can a candidate be evaluated, and how reliably does the resulting score reflect the property we actually care about? In domains where evaluation is subjective, expensive, or contested, agentic exploration struggles. In computer architecture, the cycle-accurate simulator gives the loop reproducibility: controlled-environment evaluation against well-defined metrics. Production profiling, hardware performance counters, tracing, and system telemetry give it realism: behavior under load and access patterns that synthetic benchmarks cannot reproduce. The two together are what close the loop.</span></p>
<p><span style="font-weight: 400;">That has a practical consequence. It means the field does not have to invent its evaluation infrastructure to take advantage of agentic co-design; it has to </span><i><span style="font-weight: 400;">connect</span></i><span style="font-weight: 400;"> it. The benchmarks, the simulators, and the metric vocabulary are already in place. What is missing is the throughput and the integration: simulators that can serve hundreds of evaluations per study, fitness functions that compose IPC with area and power as primary terms, and training/evaluation splits that let us measure generalization instead of overfitting. We will return to this agenda below.</span></p>
<h2><b>When code is co-authored, what does &#8220;programmable&#8221; mean?</b></h2>
<p><span style="font-weight: 400;">Some of the architectural conservatism we aimed to maintain was justified, decades ago, by a single phrase: </span><i><span style="font-weight: 400;">but no one will program it</span></i><span style="font-weight: 400;">. The Cell processor&#8217;s programmer-managed SPEs and local stores are an example: an elegant design that proved very hard to program in practice.</span></p>
<p><span style="font-weight: 400;">The cost of programmability used to be borne almost entirely by humans. That is no longer true, and it changes the calculation.</span></p>
<p><span style="font-weight: 400;">In April 2025, Satya Nadella reported that</span><a href="https://feeds.feedblitz.com/~/t/0/0/sigarch-cat/~https://techcrunch.com/2025/04/29/microsoft-ceo-says-up-to-30-of-the-companys-code-was-written-by-ai/"> <span style="font-weight: 400;">20% to 30% of Microsoft&#8217;s code</span></a><span style="font-weight: 400;"> was AI-generated, with internal acceptance rates rising monotonically. Google sits in a similar regime:</span><a href="https://feeds.feedblitz.com/~/t/0/0/sigarch-cat/~https://fortune.com/2024/10/30/googles-code-ai-sundar-pichai/"> <span style="font-weight: 400;">a quarter in Q3 2024</span></a><span style="font-weight: 400;">, half by fall 2025, and</span><a href="https://feeds.feedblitz.com/~/t/0/0/sigarch-cat/~https://blog.google/innovation-and-ai/infrastructure-and-cloud/google-cloud/cloud-next-2026-sundar-pichai/"> <span style="font-weight: 400;">75% of Google&#8217;s code by April 2026</span></a><span style="font-weight: 400;">, with Sundar Pichai describing the shift as &#8220;truly agentic workflows&#8221; in which engineers orchestrate fleets of AI agents rather than writing each line themselves.</span></p>
<p><span style="font-weight: 400;">These numbers describe authorship of characters, not accountability. But they should change how we evaluate the programmability constraint. When agents can routinely program across ISAs, generate platform-specific code paths, write test harnesses, and bridge unfamiliar interfaces given a clear specification, the cost on the programmer is no longer a sufficient veto on a hardware design choice. Designs that were dismissed because they imposed too high a cost on human programmers warrant a fresh look when most of that cost falls on agents instead.</span></p>
<p><span style="font-weight: 400;">Programmability still matters. Clarity, debuggability, verifiability, and predictable performance remain real properties humans need, and increasingly properties </span><i><span style="font-weight: 400;">agents</span></i><span style="font-weight: 400;"> need too. Abstractions still matter, perhaps more than ever. Deciding which to expose, which to hide, and which to make machine-checkable is now a question for the programming-languages and systems community alongside architects. But the most consequential lever may not be what we add; it may be what we remove. Many of the layers in today&#8217;s stack exist to hide hardware from human programmers and cost cycles and area to maintain. When agents absorb that complexity, the layers come off, and the performance and efficiency we have been paying to abstract away come back.</span></p>
<h2><b>A widening design space</b></h2>
<p><span style="font-weight: 400;">Reshaping the loop only matters if the space it has to cover is tractable. Increasingly, it isn&#8217;t.</span></p>
<p><span style="font-weight: 400;">A modern AI datacenter spans CPUs, GPUs, AI accelerators, a widening memory landscape (DRAM, CXL, HBM, HBF, SSD), and rack-scale integration with NVLink and optical interconnects. The software and hardware layers have not caught up: a single agentic query may dispatch dozens of model invocations across heterogeneous devices and tool calls on CPUs, all with different abstractions. </span><b>The operating system (OS), the layer that has historically reconciled such mismatches, must evolve at an unprecedented pace to keep up with growing hardware capabilities and software demands. </b><span style="font-weight: 400;">For example, it only has partial visibility into the GPU, despite its prominent role in AI workloads. Our recent work </span><a href="https://feeds.feedblitz.com/~/t/0/0/sigarch-cat/~https://dl.acm.org/doi/10.1145/3731569.3764818"><span style="font-weight: 400;">LithOS</span></a><span style="font-weight: 400;"> has established a beachhead for OS-level control over GPUs, but extending that contract to coordinate the full heterogeneous stack is open. At every level of that stack, energy and power are hardening from secondary considerations into primary constraints.</span></p>
<p><span style="font-weight: 400;">Each of these pressures is, individually, a multi-year research program. </span><i><span style="font-weight: 400;">Together</span></i><span style="font-weight: 400;">, they describe a design space defined by heterogeneous compute, evolving memory hierarchies, rack-scale integration, software-level coordination, and workload regimes that did not exist five years ago. Covering this space by hand is increasingly difficult, even for a large team of architects.</span></p>
<p><span style="font-weight: 400;">That is the practical case for agentic co-design. The space is outgrowing human-only exploration, and the tools to cover it are finally here.</span></p>
<h2><b>A proof point</b></h2>
<p><span style="font-weight: 400;">In our recent work, we introduce the</span><a href="https://feeds.feedblitz.com/~/t/0/0/sigarch-cat/~https://arxiv.org/abs/2604.25083"> <span style="font-weight: 400;">Agentic Architect</span></a><span style="font-weight: 400;">, an agentic framework for architecture design space exploration and optimization. We evaluate it across three of the most studied microarchitectural domains: cache replacement, data prefetching, and branch prediction. We chose them precisely </span><i><span style="font-weight: 400;">because</span></i><span style="font-weight: 400;"> they are mature. They have decades of literature, well-understood baselines, and limited remaining headroom; if the loop produces gains in these domains, the result is meaningful. The evolved cache replacement policy matched and slightly exceeded Mockingjay; the evolved prefetcher beat SOTA by 17%; the evolved branch predictor improved over Hashed Perceptron on workloads where branch behavior is the bottleneck.</span></p>
<div id="attachment_104534" style="width: 779px" class="wp-caption aligncenter"><img loading="lazy" decoding="async" aria-describedby="caption-attachment-104534" class="wp-image-104534 " src="https://www.sigarch.org/wp-content/uploads/2026/05/prefetch_scatter_final-3840x1566.png" alt="" width="769" height="314" /><p id="caption-attachment-104534" class="wp-caption-text">Figure 2. Storage versus performance for data prefetchers. The evolved prefetcher (87 KB) is Pareto-optimal: it delivers the highest geomean speedup over no prefetching at a smaller storage budget than the next-best design.</p></div>
<p><span style="font-weight: 400;">The more interesting result is what the loop discovered, and what it didn&#8217;t. The components in the evolved designs are almost entirely known techniques: stride engines and delta correlators for prefetching, reuse-distance predictors and signature tables for replacement, perceptron variants for branch prediction. None of these primitives is new.</span></p>
<p><span style="font-weight: 400;">What is new is the </span><i><span style="font-weight: 400;">coordination</span></i><span style="font-weight: 400;">. The evolved prefetcher continuously re-evaluates each predictive engine and throttles speculative ones under memory pressure. The evolved replacement policy arbitrates between three independent predictors based on their recent accuracy. The recurring structure across all three domains is the same: preserve the seed&#8217;s core, add orthogonal known features, integrate them through new coordination, and adapt at runtime. The novelty lies in the coordination. The loop refines the foundation; the architect still chooses it.</span></p>
<h2><b>The infrastructure needs to evolve</b></h2>
<p><span style="font-weight: 400;">If agentic co-design is going to do useful work across this design space, the bottleneck moves to infrastructure. The benchmarks and metrics are already there. What we need to build is throughput, multi-objective scoring, and cross-layer reach. The agenda is concrete:</span></p>
<ul>
<li style="font-weight: 400;"><b>New tools for agentic architecture design space exploration.</b><span style="font-weight: 400;"> Cycle-accurate simulators were built for human-paced experimentation; an agentic loop wants hundreds of evaluations per study, with storage, area, power, and timing as terms in the score rather than afterthoughts that disqualify the result later. We need simulators, search strategies, and metrics purpose-built for this regime: search loops that respect hardware constraints and balance exploration against exploitation, and composite metrics that combine performance, area cost, and generalization into signals the search can rank against.</span></li>
<li style="font-weight: 400;"><b>Cross-component and cross-layer co-evolution.</b><span style="font-weight: 400;"> Co-design across the OS/hardware boundary is now the norm rather than the exception. Taking virtual memory as an example, TLB design, page-table walkers, translation footprint in the caches, and huge-page promotion in the kernel are tightly coupled, and optimizing any one in isolation may capture only a fraction of the available improvement. RTL backends, full-system simulators, and formal verification each let the loop close around a different surface.</span></li>
<li style="font-weight: 400;"><b>Open source has to evolve.</b><span style="font-weight: 400;"> Releasing code is no longer enough. We need structured artifacts that span the full stack, from prompt, seed, and scoring function down to traces, simulator and system configurations, and where applicable RTL, packaged so an agent can clone a repo, re-run the search that produced a published result, and compare new candidates against the same baseline.</span></li>
</ul>
<p><span style="font-weight: 400;">The architecture and systems communities are uniquely positioned to drive that work.</span></p>
<h2><b>Renegotiating computer architecture and systems</b></h2>
<p><span style="font-weight: 400;">A stack co-authored by humans and agents needs renegotiation along the three axes of the old contract. Each is now reweighed against a new deliverable: </span><b>programmability</b><span style="font-weight: 400;"> for agents and humans alike, rather than humans alone.</span></p>
<p><i><span style="font-weight: 400;"><strong>Abstractions</strong>.</span></i><span style="font-weight: 400;"> Many layers exist precisely to hide hardware from human programmers, and they cost cycles and area to maintain. With agents absorbing that complexity, some of those layers can come off; performance and efficiency we have been paying to abstract away come back.</span></p>
<p><i><span style="font-weight: 400;"><strong>Interfaces</strong>.</span></i><span style="font-weight: 400;"> The boundary between hardware and software was drawn for human programmers. As agents become the primary author of low-level code, the interface that carries the contract forward needs redrawing: machine-checkable, composable, and accessible to tools rather than only to humans.</span></p>
<p><i><span style="font-weight: 400;"><strong>Transparency</strong>.</span></i><span style="font-weight: 400;"> The property that lets a programmer model the CPU in their head gives way to a stricter need: </span>explainability<span style="font-weight: 400;">. The architect must verify the result against intent, explain why it works, and check that it generalizes beyond the workloads it was trained on. None of these come for free; the field needs methods, metrics, and tooling that make them routine.</span></p>
<p><span style="font-weight: 400;">Leiserson and colleagues told us in 2020 that there was plenty of room at the Top of the computing stack. The half-decade since has been about confirming they were right; the next half-decade will be about whether we build the tools to actually live there. Agentic co-design, paired with learning embedded inside the system itself, is a strong candidate for addressing the &#8220;opportunistic, uneven, sporadic&#8221; character that delivered those gains so far.</span></p>
<p><span style="font-weight: 400;">Architecture is changing. The contract still holds, but the terms are up for negotiation. The next generation of the stack will be defined as much by what we remove as by what we add. The people best positioned to make those calls are the ones who understand both the hardware and the software. That is, by definition, our community.</span></p>
<p><b>Acknowledgments</b></p>
<p><span style="font-weight: 400;">Thanks to the Computer Architecture &amp; Operating System (</span><a href="https://feeds.feedblitz.com/~/t/0/0/sigarch-cat/~https://www.cs.cmu.edu/~caos/"><span style="font-weight: 400;">CAOS</span></a><span style="font-weight: 400;">) group at Carnegie Mellon and to Prof. Alex Daglis and Prof. Todd Mowry for feedback on this post.</span></p>
<p><b>About the Author</b></p>
<p><a href="https://feeds.feedblitz.com/~/t/0/0/sigarch-cat/~https://www.cs.cmu.edu/~dskarlat/"><span style="font-weight: 400;">Dimitrios Skarlatos</span></a><span style="font-weight: 400;"> is an assistant professor in the Computer Science Department at Carnegie Mellon University. His research bridges computer architecture and operating systems with a focus on AI datacenter efficiency, privacy, and scalability. His work has been deployed in production datacenters and upstreamed into the Linux kernel. He has received the IEEE CS TCCA Young Computer Architect Award, the NSF CAREER Award, the Intel Rising Star Award, a Linux Foundation Faculty Award, an ISCA Best Paper Award, two ASPLOS Best Paper Awards, a CACM Research Highlight, four IEEE MICRO Top Picks, the joint ACM SIGARCH &amp; IEEE CS TCCA Outstanding Dissertation Award, the David J. Kuck Outstanding PhD Thesis Award, and over a dozen industry faculty awards from Amazon, AMD, Intel, Meta, Oracle, and VMware. His recent work led to the founding of </span><a href="https://feeds.feedblitz.com/~/t/0/0/sigarch-cat/~https://lithosai.com/"><span style="font-weight: 400;">LithosAI</span></a><span style="font-weight: 400;">.</span></p>
<p>&nbsp;</p>
<p class="disclaim"><strong>Disclaimer:</strong> <em>These posts are written by individual contributors to share their thoughts on the Computer Architecture Today blog for the benefit of the community. Any views or opinions represented in this blog are personal, belong solely to the blog author and do not represent those of ACM SIGARCH or its parent organization, ACM.</em></p><Img align="left" border="0" height="1" width="1" alt="" style="border:0;float:left;margin:0;padding:0;width:1px!important;height:1px!important;" hspace="0" src="https://feeds.feedblitz.com/~/i/956665028/0/sigarch-cat">
]]>
</content:encoded>
			<wfw:commentRss>https://feeds.feedblitz.com/~/956665028/0/sigarch-cat~Architecture-Systems-are-Changing-The-Architects-Role-in-the-Era-of-Agentic-CoDesign/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
	<post-id xmlns="com-wordpress:feed-additions:1">104529</post-id></item>
<item>
<feedburner:origLink>https://www.sigarch.org/from-control-to-data-to-value-a-third-axis-of-parallelism/</feedburner:origLink>
		<title>From Control to Data to Value: A Third Axis of Parallelism</title>
		<link>https://feeds.feedblitz.com/~/955857566/0/sigarch-cat~From-Control-to-Data-to-Value-A-Third-Axis-of-Parallelism/</link>
		<comments>https://feeds.feedblitz.com/~/955857566/0/sigarch-cat~From-Control-to-Data-to-Value-A-Third-Axis-of-Parallelism/#respond</comments>
		<pubDate>Wed, 13 May 2026 15:00:29 +0000</pubDate>
		<dc:creator><![CDATA[Di Wu, Zhewen Pan, Joshua San Miguel]]></dc:creator>
		<category><![CDATA[ACM SIGARCH]]></category>
		<category><![CDATA[AI hardware]]></category>
		<category><![CDATA[Parallelism]]></category>
		<guid isPermaLink="false">https://www.sigarch.org/?p=104410</guid>
		<description><![CDATA[<div><img width="300" xheight="176" src="https://www.sigarch.org/wp-content/uploads/2026/05/vlp-sigarch-blog-3-300x176.png" class="attachment-medium size-medium wp-post-image" alt="" style="max-width:100% !important;height:auto !important;margin-bottom:15px;margin-left:15px;float:right;"  loading="lazy" /></div>TL;DR: The history of parallel computing is a history of shifting what we put at the center of the computer. The first axis, control-level parallelism (CLP), is control-centric and schedules around the program counter: it gave us the high-performance computing (HPC) era. The second axis, data-level parallelism (DLP), is data-centric and schedules around tensors: it [&#8230;]]]>
</description>
				<content:encoded><![CDATA[<div><img width="300" height="176" src="https://www.sigarch.org/wp-content/uploads/2026/05/vlp-sigarch-blog-3-300x176.png" class="attachment-medium size-medium wp-post-image" alt="" style="margin-bottom:15px;margin-left:15px;float:right;" decoding="async" loading="lazy" /></div><p><strong>TL;DR:</strong> <span style="font-weight: 400;">The history of parallel computing is a history of shifting what we put at the center of the computer. The first axis, control-level parallelism (CLP), is control-centric and schedules around the program counter: it gave us the high-performance computing (HPC) era. The second axis, data-level parallelism (DLP), is data-centric and schedules around tensors: it gave us the artificial intelligence (AI) era. A third axis is now emerging: </span><i><span style="font-weight: 400;">value-level parallelism (VLP)</span></i><span style="font-weight: 400;">, where narrow data bitwidth exposes a small number of unique values and lets the architecture deduplicate redundant computation. Two recent works, Carat (ASPLOS &#8217;24) and Mugi (ASPLOS &#8217;26), make the case concretely: VLP eliminates redundant computation in both linear and nonlinear operations on AI workloads. This article argues that VLP is not a point of optimization but the beginning of a </span><i><span style="font-weight: 400;">value-centric computing</span></i><span style="font-weight: 400;"> paradigm, one that is crucial for addressing the escalating energy demands of next-generation intelligent systems.</span></p>
<p>&nbsp;</p>
<h1><strong>Traditional Parallel Computing</strong></h1>
<h3><strong>The First Axis: Control-Level Parallelism</strong></h3>
<p><span style="font-weight: 400;">The HPC era saw a diverse set of workloads. The metric of success made the goal explicit: instructions per cycle (IPC) normalizes performance to </span><i><span style="font-weight: 400;">how fast instructions are consumed</span></i><span style="font-weight: 400;">, not to what data the instructions are operating on. Therefore, computer architecture in the HPC era was control-centric. Michael Flynn formalized the design space in 1966 with his taxonomy </span><a href="https://feeds.feedblitz.com/~/t/0/0/sigarch-cat/~https://dl.acm.org/doi/10.5555/333067.333226"><span style="font-weight: 400;">[1]</span></a><span style="font-weight: 400;">: SISD, SIMD, MISD, MIMD, outlining the orthogonality of instruction and data. For decades, this was the right framing: transistors were scarce, control logic was expensive, and the most valuable thing an architect could do was to issue one more instruction per cycle. </span></p>
<p><span style="font-weight: 400;">The actual implementation to exploit the CLP to execute multiple instructions in parallel arose from the independence between instructions. We enjoyed the technology evolution from pipelining, branch prediction for SISD, superscalar issue, out-of-order execution, simultaneous multithreading, chip multiprocessors for MIMD and beyond.</span></p>
<h3><strong>The Second Axis: Data-Level Parallelism</strong></h3>
<p><span style="font-weight: 400;">Entering the AI era, powered by large language models (LLMs), transistors became plentiful but the memory bandwidth became scarce due to the large data volume in AI tensors. Consequently, we hit the memory wall and turned to data-centric architectures, expanding more along the data dimension in Flynn&#8217;s taxonomy. Success is now measured by </span><i><span style="font-weight: 400;">how well we apply one operation to many data elements while feeding them efficiently from memory</span></i><span style="font-weight: 400;"> (e.g., throughput, goodput, and arithmetic intensity). TPUs with systolic arrays and GPUs with tensor cores are renowned examples to exploit the rich DLP opportunities from high-dimensional tensors.</span></p>
<p><span style="font-weight: 400;">Diving deeper, we see that compute arrays, i.e., dataflow architecture, are becoming the first class citizens. Dataflow architecture follows the philosophy of </span><i><span style="font-weight: 400;">letting data drive control</span></i><span style="font-weight: 400;">, with early works from MIT </span><a href="https://feeds.feedblitz.com/~/t/0/0/sigarch-cat/~https://dl.acm.org/doi/10.1145/642089.642111"><span style="font-weight: 400;">[2]</span></a> <a href="https://feeds.feedblitz.com/~/t/0/0/sigarch-cat/~https://dl.acm.org/doi/10.1109/12.48862"><span style="font-weight: 400;">[3]</span></a><span style="font-weight: 400;">. With regular compute and memory patterns in AI tensors, dataflow architecture builds massively parallel compute arrays to maximize the computational density and minimize the control overhead. </span></p>
<p><span style="font-weight: 400;">Another line of research to exploit DLP for AI workloads targets the von Neumann bottleneck, envisioned by John Backus as early as 1978 </span><a href="https://feeds.feedblitz.com/~/t/0/0/sigarch-cat/~https://dl.acm.org/doi/10.1145/359576.359579"><span style="font-weight: 400;">[4]</span></a><span style="font-weight: 400;">. These solutions move the computation closer to the memory (e.g., in/near-memory/storage processing) by attaching additional compute logic next to the memory blocks, unlocking massive DLP on the already wide enough memory blocks.</span></p>
<p>&nbsp;</p>
<h1><strong>The Third Axis: Value-Level Parallelism</strong></h1>
<p><span style="font-weight: 400;">Though Flynn’s taxonomy, with dimensions of </span><i><span style="font-weight: 400;">instructions</span></i><span style="font-weight: 400;"> and </span><i><span style="font-weight: 400;">data</span></i><span style="font-weight: 400;">,</span> <span style="font-weight: 400;">has been followed for decades, there are untouched landscapes. While CLP and DLP focus on concurrency and parallelism, neither asks the next question about the </span><i><span style="font-weight: 400;">content</span></i><span style="font-weight: 400;"> of the data: </span><i><span style="font-weight: 400;">can the patterns in data values benefit the computation efficiency? </span></i><span style="font-weight: 400;">VLP is value-centric and the third axis in this regard, i.e., it targets </span><i><span style="font-weight: 400;">computational redundancy </span></i><span style="font-weight: 400;">inherent to the data patterns of workloads. It recognizes that when identical values flow through a pipeline, the arithmetic becomes deterministic and, therefore, avoidable. Consequently, we move from executing every instruction and data to computing only each unique data value.</span></p>
<h3><strong>Origins for GEMM</strong></h3>
<p><b>Carat (Pan, San Miguel, Wu — ASPLOS &#8217;24)</b> <a href="https://feeds.feedblitz.com/~/t/0/0/sigarch-cat/~https://dl.acm.org/doi/10.1145/3620665.3640364"><span style="font-weight: 400;">[5]</span></a><span style="font-weight: 400;"> is the paper that coined VLP and materialized it in hardware architecture. The insight is simple. As deep learning inference moves to larger batches and lower precisions (e.g., FP8 being the de-facto data format in DeepSeek v3), the number of </span><i><span style="font-weight: 400;">unique</span></i><span style="font-weight: 400;"> values shrinks rapidly while the frequency of each grows. Here, we give an example. For a scalar-vector multiplication for an arbitrary scale weight </span><i><span style="font-weight: 400;">w</span></i><span style="font-weight: 400;"> and 1k UINT4 inputs, conventional hardware would compute 1k multiplications for the weight </span><i><span style="font-weight: 400;">w </span></i><span style="font-weight: 400;">and each UINT4 vector element. Looking closely, there are only 16 unique products, i.e., 0 x </span><i><span style="font-weight: 400;">w</span></i><span style="font-weight: 400;">, 1 x </span><i><span style="font-weight: 400;">w, </span></i><span style="font-weight: 400;">2 x </span><i><span style="font-weight: 400;">w, …, </span></i><span style="font-weight: 400;">15 x </span><i><span style="font-weight: 400;">w.</span></i><span style="font-weight: 400;"> Thus, conventional hardware would compute 1k/16=64 times more than needed.</span></p>
<p><img loading="lazy" decoding="async" class="alignnone wp-image-104478" src="https://www.sigarch.org/wp-content/uploads/2026/05/vlp-sigarch-blog-1-scaled.png" alt="" width="515" height="289" /></p>
<p><span style="font-weight: 400;">Figure 1. Overview of VLP for scalar-vector multiplication.</span></p>
<p><span style="font-weight: 400;">Figure 1 above outlines how VLP is constructed in Carat. In Figure 1 (a), VLP consists of value reuse, which accumulates the weight </span><i><span style="font-weight: 400;">w</span></i><span style="font-weight: 400;"> over time, each accumulation result, called a partial product, is used to compute the next partial product. Then each input just </span><i><span style="font-weight: 400;">subscribes </span></i><span style="font-weight: 400;">to the proper partial product as the correct output. To materialize the subscription, we leverage temporal coding, often seen in the brain, which generates a spike at the cycle indexed by the data value. For example, a data valued 8 will generate a spike at cycle 8, as shown in Figure 1 (b). Therefore, there exists a temporal correspondence between the spike and the accumulated partial product. Each input subscribes to their correct output in parallel, giving the rise to value-level parallelism. The scheduling unit is no longer the instruction or the array element; it is the unique product value, made available to many input consumers via temporal coding. Given this formulation, we see that lower precision produces fewer unique values, while larger batches create more inputs to share the unique values.</span></p>
<h3><strong>Generalizing Beyond</strong></h3>
<p><span style="font-weight: 400;">So far, VLP in Carat targets GEMM optimization for large-batch, low-precision, symmetric-format use cases. However, these assumptions may no longer hold in more recent LLM workloads: the batch size is small (e.g., 8~16) to ensure real-time response, the data formats are asymmetric (e.g., INT4-FP16) to minimize the memory footprint of the weight and KV cache, and the nonlinear operations are heavy and complicated (e.g., softmax, GELU, SiLU) to ensure high accuracy.</span></p>
<p><b>Mugi (Price, Vellaisamy, Shen, Wu — ASPLOS &#8217;26)</b> <a href="https://feeds.feedblitz.com/~/t/0/0/sigarch-cat/~https://dl.acm.org/doi/10.1145/3779212.3790189"><span style="font-weight: 400;">[6]</span></a><span style="font-weight: 400;"> is a follow-up work that closes the gap and generalizes VLP for both linear and nonlinear operations for broader AI workloads. Figure 2 shows VLP for elementwise nonlinear operations that can be done through a four-phase pipeline on input floating-point numbers with a sign (S), mantissa (M) and exponent (E). The first phase is input approximation, which converts wider inputs to narrower bits without sacrificing the LLM accuracy too much. The inputs to nonlinear operations are always in higher precision (e.g., BF16, FP16, or FP32) in AI workloads than model weights. The approximation to narrower bits ensures a shorter temporal signal for high throughput. The second phase is value reuse with opportunities from large GEMM shapes in LLMs. Unlike value reuse in Carat accumulating the partial product, value reuse in Mugi loads the precomputed nonlinear results, where higher accuracy is allocated to more critical inputs. The third phase performs temporal subscription on the mantissa bits (M) of the inputs. For each input, the selected output corresponds to the nonlinear results with the same mantissa but different exponents (E). Finally, the fourth phase performs temporal subscription on the exponent bits of the inputs. For each input, the selected output corresponds to the correct mantissa and exponent.</span></p>
<p><img loading="lazy" decoding="async" class="alignnone wp-image-104477" src="https://www.sigarch.org/wp-content/uploads/2026/05/vlp-sigarch-blog-2-scaled.png" alt="" width="726" height="173" /></p>
<p><span style="font-weight: 400;">Figure 2. Overview of VLP for elementwise nonlinear operations.</span></p>
<p><span style="font-weight: 400;">Mugi essentially cascades VLP to construct high dimensionality in the value space to compute nonlinear operations. The resulting architecture unifies the datapath for both linear and nonlinear operations, leading to savings in silicon area.</span></p>
<h3><strong>What Makes VLP Different</strong></h3>
<p><span style="font-weight: 400;">Conventional architectures pay arithmetic costs to process every instruction and data element while advanced techniques (e.g., memoization, tabulation) leverage computation reuse and pay memory costs to store past results and refer back to them when needed. VLP pays for </span><i><span style="font-weight: 400;">neither</span></i><span style="font-weight: 400;">: it minimizes both arithmetic and memory access, instead spending its silicon budget on </span><i><span style="font-weight: 400;">value delivery</span></i><span style="font-weight: 400;">, i.e., the network and temporal converters that route unique results to many input consumers in parallel. The type of computation fundamentally changes to something new: a form of </span><i><span style="font-weight: 400;">temporal subscription</span></i><span style="font-weight: 400;">.</span></p>
<p>&nbsp;</p>
<h1><strong>Future Opportunities and Open Questions</strong></h1>
<p><span style="font-weight: 400;">In its current form, VLP relies on temporal coding, which is actually inspired from how the brain works. Though the community has focused predominantly on deep learning, VLP opens up a different research direction: </span><i><span style="font-weight: 400;">what are potential synergies between neuromorphic and classical computing in computer architecture</span></i><span style="font-weight: 400;">? Looking beyond, VLP raises several questions to answer in the AI era. </span></p>
<ul>
<li><i><span style="font-weight: 400;">Where does VLP stop paying off? </span></i><span style="font-weight: 400;">Though Carat and Mugi work for varying batch sizes, both of them now are designed for low precision to create more opportunities for value reuse. There is presumably a design space with high precision and low value redundancy. It is essential to understand the mechanism to exploit VLP for such scenarios and quantify the potential gain.</span></li>
<li><i>Is VLP an ISA-level concept or an accelerator-level one? </i>Both Carat and Mugi are accelerator designs. A real-world question is whether VLP can inform CPU and GPU microarchitecture. What would a VLP-based tensor instruction look like? Could it be a drop-in replacement of tensor cores with better efficiency?</li>
<li><i>What should the software stack look like?</i> VLP for nonlinear involves approximation, which naturally introduces inaccuracy to the task. This falls back to the question of approximate computing, but in the context of new hardware primitives. We probably shall build a co-design framework to deploy VLP under approximation errors.</li>
<li><i>Can VLP live with sparsity? </i>Sparse computation has been a major optimization since the start of deep learning, and more opportunities are emerging from weight, KV-cache spanning across the bit level, value level, block level and even request level. It is meaningful to study how VLP synergizes with such use cases.</li>
<li><i>How does VLP interact with memory? </i>Despite efforts in computation, memory stays at the core of AI. A natural question is whether we can optimize the memory system with VLP, or more broadly, value-centric computing. There have been associative memory-based AI accelerators, and whether there could be VLP-based alternatives?</li>
</ul>
<p>&nbsp;</p>
<h1><strong>Final Thoughts</strong></h1>
<p><span style="font-weight: 400;">Architecture research is all about how to compute faster and more efficiently. </span><i><span style="font-weight: 400;">Control-level parallelism</span></i><span style="font-weight: 400;"> has let us argue about IPC and pipelines for thirty years. </span><i><span style="font-weight: 400;">Data-level parallelism</span></i><span style="font-weight: 400;"> has let us argue about FLOPS and dataflow for fifteen. </span><i><span style="font-weight: 400;">Value-level parallelism</span></i><span style="font-weight: 400;">, the third axis, now shows promise for emerging AI workloads (thanks to Carat and Mugi) and paves the way for exciting synergies between neuromorphic and classical computing. Here&#8217;s hoping one day computer architects see the </span><i><span style="font-weight: 400;">value</span></i><span style="font-weight: 400;"> in it.</span></p>
<p>&nbsp;</p>
<h3><span style="font-weight: 400;"><strong>About the authors:</strong> </span></h3>
<p><i><span style="font-weight: 400;"><strong>Di Wu</strong> is an assistant professor at the University of Central Florida. </span></i></p>
<p><i><span style="font-weight: 400;"><strong>Zhewen Pan</strong> is a PhD candidate at the University of Wisconsin–Madison. </span></i></p>
<p><i><span style="font-weight: 400;"><strong>Joshua San Miguel</strong> is an associate professor at the University of Wisconsin–Madison.</span></i></p>
<p class="disclaim"><strong>Disclaimer:</strong> <em>These posts are written by individual contributors to share their thoughts on the Computer Architecture Today blog for the benefit of the community. Any views or opinions represented in this blog are personal, belong solely to the blog author and do not represent those of ACM SIGARCH or its parent organization, ACM.</em></p><Img align="left" border="0" height="1" width="1" alt="" style="border:0;float:left;margin:0;padding:0;width:1px!important;height:1px!important;" hspace="0" src="https://feeds.feedblitz.com/~/i/955857566/0/sigarch-cat">
]]>
</content:encoded>
			<wfw:commentRss>https://feeds.feedblitz.com/~/955857566/0/sigarch-cat~From-Control-to-Data-to-Value-A-Third-Axis-of-Parallelism/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
	<post-id xmlns="com-wordpress:feed-additions:1">104410</post-id></item>
<item>
<feedburner:origLink>https://www.sigarch.org/how-ai-will-reshape-computer-systems-by-2035-a-jeffersonian-dinner-in-san-francisco-about-our-10000x-future/</feedburner:origLink>
		<title>How AI Will Reshape Computer Systems by 2035: A Jeffersonian Dinner in San Francisco about Our 10,000x Future</title>
		<link>https://feeds.feedblitz.com/~/955221287/0/sigarch-cat~How-AI-Will-Reshape-Computer-Systems-by-A-Jeffersonian-Dinner-in-San-Francisco-about-Our-x-Future/</link>
		<comments>https://feeds.feedblitz.com/~/955221287/0/sigarch-cat~How-AI-Will-Reshape-Computer-Systems-by-A-Jeffersonian-Dinner-in-San-Francisco-about-Our-x-Future/#respond</comments>
		<pubDate>Mon, 04 May 2026 14:00:06 +0000</pubDate>
		<dc:creator><![CDATA[Helen Wright, Jeff Dean, Mark D. Hill, and Dave Patterson]]></dc:creator>
		<category><![CDATA[ACM SIGARCH]]></category>
		<category><![CDATA[AI]]></category>
		<category><![CDATA[Computer Systems]]></category>
		<guid isPermaLink="false">https://www.sigarch.org/?p=103841</guid>
		<description><![CDATA[<div><img width="300" xheight="239" src="https://www.sigarch.org/wp-content/uploads/2026/04/Screenshot-2026-04-30-at-3.55.21-PM-300x239.png" class="attachment-medium size-medium wp-post-image" alt="" style="max-width:100% !important;height:auto !important;margin-bottom:15px;margin-left:15px;float:right;"  loading="lazy" /></div>Editor&#8217;s Note: this post is a republication of CRA-I post available at: https://cra.org/industry/2026/04/27/how-ai-will-reshape-computer-systems-by-2035-a-jeffersonian-dinner-in-san-francisco-about-our-10000x-future/ CRA-Industry (CRA-I) recently continued its series of intimate Industry Salon Gatherings, bringing together leaders to discuss the long-term trajectory of our field. Our latest session, organized by Mark D. Hill (University of Wisconsin-Madison &#38; CRA) and CRA-I, took place on April 16, [&#8230;]]]>
</description>
				<content:encoded><![CDATA[<div><img width="300" height="239" src="https://www.sigarch.org/wp-content/uploads/2026/04/Screenshot-2026-04-30-at-3.55.21-PM-300x239.png" class="attachment-medium size-medium wp-post-image" alt="" style="margin-bottom:15px;margin-left:15px;float:right;" decoding="async" loading="lazy" /></div><p><em>Editor&#8217;s Note: this post is a republication of CRA-I post available at: <a href="https://feeds.feedblitz.com/~/t/0/0/sigarch-cat/~https://cra.org/industry/2026/04/27/how-ai-will-reshape-computer-systems-by-2035-a-jeffersonian-dinner-in-san-francisco-about-our-10000x-future/">https://cra.org/industry/2026/04/27/how-ai-will-reshape-computer-systems-by-2035-a-jeffersonian-dinner-in-san-francisco-about-our-10000x-future/</a></em></p>
<p><a href="https://feeds.feedblitz.com/~/t/0/0/sigarch-cat/~https://cra.org/industry/">CRA-Industry (CRA-I)</a> recently continued its series of intimate Industry Salon Gatherings, bringing together leaders to discuss the long-term trajectory of our field. Our latest session, organized by Mark D. Hill (University of Wisconsin-Madison &amp; CRA) and CRA-I, took place on April 16, 2026 at the historic <a href="https://feeds.feedblitz.com/~/t/0/0/sigarch-cat/~https://www.uclubsf.org/">University Club of San Francisco</a> and was sponsored by <a href="https://feeds.feedblitz.com/~/t/0/0/sigarch-cat/~https://www.laude.org/">Laude Institute</a>, which had just announced an ambitious and exciting slate of new <a href="https://feeds.feedblitz.com/~/t/0/0/sigarch-cat/~https://www.laude.org/moonshots">research “AI moonshot” awards</a>.</p>
<p>The evening featured a high-level conversation among 20 participants, co-hosted by <b>Dave Patterson </b>(UC Berkeley/Google) and <b>Jeff Dean </b>(Google AI)<b>.</b> The Salon tackled a fundamental question: “<a href="https://feeds.feedblitz.com/~/t/0/0/sigarch-cat/~https://cra.org/industry/events/what-will-computer-systems-look-like-in-2035-and-how-will-they-be-designed/">What will computer systems look like in 2035, and how will they be designed?”</a> The participants were researchers and leaders from West Coast academic institutions and technology companies, big and small. As the table below shows, the group was diverse in multiple dimensions, including career stage, with expertise centering on computer architecture but extending to software systems, AI models, and design methodology and tools.</p>
<p>Following the <a href="https://feeds.feedblitz.com/~/t/0/0/sigarch-cat/~https://www.bouteco.co/sustainable-luxury-travel/2022/4/27/whats-a-jeffersonian-dinner-earth-day">“Jeffersonian” dinner</a> format, the evening was designed to forge deep connections and brainstorm visionary ideas. To ensure a frank and pre-competitive dialogue, the event operated under the <a href="https://feeds.feedblitz.com/~/t/0/0/sigarch-cat/~https://www.chathamhouse.org/about-us/chatham-house-rule">Chatham House Rule</a>, allowing for candid exchange while protecting the anonymity of the participants’ specific contributions.</p>
<p>The three-hour (!) conversation explored the intersection of architecture, software, AI, and future design methodologies. Here we highlight some key observations and conjectures made by Salon participants:</p>
<ul>
<li>We are in the midst of an AI revolution that appears to be even more impactful than the introduction of microprocessors, PCs, Internet, or smartphones.</li>
<li>To drive future change, we must focus on metrics such as improving “intelligence” per Watt for efficiency and more AI tokens processed at fixed user-perceived latency for more “intelligence.”</li>
<li>One lively topic was centered on the future of interfaces and abstractions that have been essential for humans to build complex systems. We explored two related questions: whether abstractions will continue to matter in the AI era, and, if they do, whether those abstractions must remain human-interpretable, allowing human/AI teams to advance the field together. The general view was that abstractions will continue to play an important role, not only for humans, but also helping AI systems to reason and coordinate. However, for communication and reasoning among agents, these abstractions need not be interpretable to humans, and may evolve beyond human comprehension. At the same time, there remains a need for human-interpretable abstractions to enable oversight, intervention and guidance by humans.</li>
<li>We conjecture that in five years 10,000x more AI inference will be done worldwide, with these gains hypothetically coming from multiplicative progress of  50x in AI algorithms, 50x in system/hardware optimization/specialization, and 4x from further data center growth.</li>
<li>We expect 50x AI algorithm progress for three reasons. First, Transformers have sparked a rapid series of AI inventions since the <a href="https://feeds.feedblitz.com/~/t/0/0/sigarch-cat/~https://en.wikipedia.org/wiki/Attention_Is_All_You_Need">original paper in 2017</a>, and the area is still ripe. There has been a clear trend in increased data and compute efficiency in training large models. Second, there is an existence proof that we can do much better since humans learning from birth to early adulthood are able to use 1,000x less input data than today’s largest ML models, suggesting that much more data-efficient learning algorithms are still possible.Third, deep analysis to determine what aspects of current AI technology are necessary for current levels of intelligence may reveal much more efficient methods for obtaining the same or better results.</li>
<li>We expect 50x system/hardware progress from two trends. First, increased hardware specialization will lead to major improvements in efficiency. Second, AI to automate hardware design will enable much faster and lower-cost creation of this specialized hardware. AI is already greatly impacting the system/hardware design process. We expect many design flows to be accelerated or altered. For example, can Large Language Models iterate with improving formal tools and specification methods to “hill climb” design spaces, and can formal verification be accelerated by customized hardware? Moreover, AI is having a fundamental impact on software developers. We conjecture that future developers will write little code directly. Rather, they will manage teams of AI agents. And this in turn could dramatically accelerate software development for specialized hardware. How do we prepare students and professionals for this world?</li>
<li>We expect a substantial increase in global data center capacity (perhaps 4x over the next five years), but recognize that non-technical forces are at play here. Expansion will be relatively larger if companies focus on scale out more than the above innovation opportunities. However, expansion could be much less due to community “techlash.”</li>
<li>We discussed energy trends, including that solar was now significantly cheaper than other energy sources for new capacity, and that battery prices continued to fall, making solar+batteries a viable way of powering new datacenters and other energy needs.  We also discussed other new sources of clean energy that are not yet commercially viable but might be in the next five years, such as fusion.</li>
<li>Finally, acknowledging “tech-lash” brings us to opportunities and challenges that AI brings to society. <a href="https://feeds.feedblitz.com/~/t/0/0/sigarch-cat/~https://newrepublic.com/article/209163/ai-industry-discovering-public-backlash">Much of the public views AI as a potential disruption in their lives, fearing the negative more than embracing the positive</a>. They may currently be correct. It is our job to ensure that we develop and encourage the societally- beneficial aspects of AI, and we discussed education and healthcare as two domains with considerable early positive benefits and enormous further potential.  We also recognized negative aspects of AI usage in areas like easing the creation of misinformation and cyberattacks, and many expressed concern about society’s capacity to absorb substantial job disruption in short time scales.  We conjecture that within the next few years, AI policy will be a major election factor. How do we make a public AI debate substantive? How do we ensure policymakers can make informed decisions about AI, so that we can sensibly regulate some of the negative consequences of AI without stifling the positive uses? As AI changes our world, how does that change university teaching, life-long learning, and job retraining? How does it alter university and industry research? Three hours are insufficient to answer these societal questions.</li>
</ul>
<p>In their Turing Award lecture in 2018, <a href="https://feeds.feedblitz.com/~/t/0/0/sigarch-cat/~https://cacm.acm.org/research/a-new-golden-age-for-computer-architecture/">Hennessy and Patterson asserted that we were beginning a Golden Age for computer architecture</a>. The subsequent decade has shown them to be prescient.</p>
<p>This San Francisco gathering reinforced the value of bringing industry and academia together to look beyond the immediate product cycle. As noted by the organizers, the insights gained here will help shape the CRA roadmap for supporting the computing research ecosystem over the next decade.</p>
<p>As we went around the table to get everyone’s last comments, many mentioned how much they enjoyed the conversation and would love to do it again. Impressively, four of the invited leaders had to fly to San Francisco for the event and everyone stayed until the official end of the three-plus-hour reception and dinner. The feedback was overwhelmingly positive. One participant noted that it was “valuable to hear directly from the leaders of our community [about] their perspectives on the role of AI—both in how we design computers and the projected compute demand driving that design.” Another shared that the evening was “tremendously valuable for my own thinking on where the computing industry is and should be going, and for sharing thoughts to hopefully influence how others view technology advancement and its societal implications.”</p>
<p>If you are interested in participating in or hosting future CRA-I Salon Gatherings, please sign up for our mailing list or contact Helen Wright (<a href="mailto:hwright@cra.org">hwright@cra.org</a>).</p>
<p><b>Salon Participants</b></p>
<table>
<tbody>
<tr>
<td><b>First Name</b></td>
<td><b>Last Name</b></td>
<td><b>Affiliation</b></td>
</tr>
<tr>
<td>Doug</td>
<td>Burger</td>
<td>Microsoft Research</td>
</tr>
<tr>
<td>Jason</td>
<td>Cong</td>
<td>UCLA</td>
</tr>
<tr>
<td>Jeff</td>
<td>Dean</td>
<td>Google</td>
</tr>
<tr>
<td>Chris</td>
<td>Fletcher</td>
<td>Berkeley</td>
</tr>
<tr>
<td>Anna</td>
<td>Goldie</td>
<td>Ricursive Intelligence</td>
</tr>
<tr>
<td>Peter</td>
<td>Harsha</td>
<td>CRA</td>
</tr>
<tr>
<td>Mark</td>
<td>Hill</td>
<td>CRA/University of Wisconsin–Madison</td>
</tr>
<tr>
<td>Andy</td>
<td>Konwinski</td>
<td>Laude Institute</td>
</tr>
<tr>
<td>Alex</td>
<td>Ksendzovsky</td>
<td>The Biological Computing Co</td>
</tr>
<tr>
<td>Azalia</td>
<td>Mirhoseini</td>
<td>Stanford/Ricursive Intelligence</td>
</tr>
<tr>
<td>Dave</td>
<td>Patterson</td>
<td>Berkeley/Google</td>
</tr>
<tr>
<td>Chris</td>
<td>Ramming</td>
<td>CRA-Industry</td>
</tr>
<tr>
<td>Sophia</td>
<td>Shao</td>
<td>Berkeley</td>
</tr>
<tr>
<td>Ben</td>
<td>Spector</td>
<td>Flapping Airplanes</td>
</tr>
<tr>
<td>Ion</td>
<td>Stoica</td>
<td>Berkeley</td>
</tr>
<tr>
<td>Caroline</td>
<td>Trippel</td>
<td>Stanford</td>
</tr>
<tr>
<td>Natalia</td>
<td>Vassilieva</td>
<td>Cerebras Systems</td>
</tr>
<tr>
<td>Ralph</td>
<td>Wittig</td>
<td>AMD</td>
</tr>
<tr>
<td>Helen</td>
<td>Wright</td>
<td>CRA</td>
</tr>
<tr>
<td>Carole-Jean</td>
<td>Wu</td>
<td>Meta</td>
</tr>
</tbody>
</table>
<p>&nbsp;</p>
<p><strong>About the Authors:</strong></p>
<div><strong>Helen Wright</strong> is the Manager of CRA-Industry (CRA-I), a committee of the Computing Research Association. She bridges the gap between academia and industry, convening leadership to tackle &#8220;grand challenges&#8221; like workforce, socially responsible AI, and partnerships. Helen leads a Council and Steering Committee of over 20 industry pioneers to drive these initiatives forward. Previously, she was a Science Education Analyst at the NSF. She holds graduate and undergraduate degrees from the University of Virginia.</div>
<div></div>
<div><strong>Jeff Dean</strong> joined Google in 1999 and is currently Google’s Chief Scientist, where he co-leads the Gemini effort. His areas of focus include machine learning and AI, computer systems, and AI applications. He has worked on Google Search, Google News, Google Translate, Google’s advertising systems, MapReduce, BigTable, Spanner, TensorFlow, Pathways, and Gemini. In 2011, he co-founded the Google Brain project. He received a B.S. in CS and economics from the University of Minnesota in 1990 and a Ph.D. in CS from the University of Washington in 1996. He is a member of the U.S. National Academy of Engineering (2009), and is a Fellow of the ACM and the AAAS. He is a recipient of the ACM Prize in Computing, and the IEEE John von Neumann medal.</div>
<div></div>
<div><strong>Mark D. Hill</strong> is the Gene M. Amdahl and John P. Morgridge Professor Emeritus of Computer Sciences at the University of Wisconsin-Madison (<a href="https://feeds.feedblitz.com/~/t/0/0/sigarch-cat/~www.cs.wisc.edu/~markhill">http://www.cs.wisc.edu/~markhill</a>), following his 1988-2020 service in CS and ECE. His research interests include parallel-computer system design, memory system design, and computer simulation. Hill&#8217;s work is highly collaborative with over 170 co-authors. He received the 2019 Eckert-Mauchly Award and is a fellow of AAAS, ACM, and IEEE. He serves on Computing Research Association (CRA) Board of Directors that is sponsoring this event. Hill was also Partner Hardware Architect at Microsoft (2020-24) where he led some software-hardware pathfinding for Azure.</div>
<div></div>
<div><strong>David Patterson</strong> retired after 40 years as an EECS professor at UC Berkeley before joining Google in 2016 as a Distinguished Engineer. He is probably best known for the book Computer Architecture: A Quantitative Approach and for the Berkeley RISC (Reduced Instruction Set Computer), RAID (Redundant Array of Inexpensive Disks) and NOW (Network of Workstations) projects. He and his co-author John Hennessy shared the 2017 ACM A.M Turing Award (the “Nobel Prize of Computing”) and the 2022 NAE Charles Stark Draper Prize for Engineering (a “Nobel Prize of Engineering”).</div>
<p class="disclaim"><strong>Disclaimer:</strong> <em>These posts are written by individual contributors to share their thoughts on the Computer Architecture Today blog for the benefit of the community. Any views or opinions represented in this blog are personal, belong solely to the blog author and do not represent those of ACM SIGARCH or its parent organization, ACM.</em></p><Img align="left" border="0" height="1" width="1" alt="" style="border:0;float:left;margin:0;padding:0;width:1px!important;height:1px!important;" hspace="0" src="https://feeds.feedblitz.com/~/i/955221287/0/sigarch-cat">
]]>
</content:encoded>
			<wfw:commentRss>https://feeds.feedblitz.com/~/955221287/0/sigarch-cat~How-AI-Will-Reshape-Computer-Systems-by-A-Jeffersonian-Dinner-in-San-Francisco-about-Our-x-Future/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
	<post-id xmlns="com-wordpress:feed-additions:1">103841</post-id></item>
<item>
<feedburner:origLink>https://www.sigarch.org/an-overview-of-the-fourth-data-prefetching-championship-part-2/</feedburner:origLink>
		<title>Fourth Data Prefetching Championship: Part 2</title>
		<link>https://feeds.feedblitz.com/~/954807320/0/sigarch-cat~Fourth-Data-Prefetching-Championship-Part/</link>
		<comments>https://feeds.feedblitz.com/~/954807320/0/sigarch-cat~Fourth-Data-Prefetching-Championship-Part/#respond</comments>
		<pubDate>Wed, 29 Apr 2026 14:00:03 +0000</pubDate>
		<dc:creator><![CDATA[Digvijay Singh]]></dc:creator>
		<category><![CDATA[ACM SIGARCH]]></category>
		<category><![CDATA[Data Prefetcher]]></category>
		<category><![CDATA[Memory Wall]]></category>
		<guid isPermaLink="false">https://www.sigarch.org/?p=103014</guid>
		<description><![CDATA[<div><img width="300" xheight="187" src="https://www.sigarch.org/wp-content/uploads/2026/04/DPC-4-Part-1-300x187.png" class="attachment-medium size-medium wp-post-image" alt="DPC-4 Concept Art (Indigo)" style="max-width:100% !important;height:auto !important;margin-bottom:15px;margin-left:15px;float:right;"  loading="lazy" /></div>This article continues (and concludes) the discussion on the proceedings of DPC-4, covering the remaining four contestants and a summary of the trends observed in all eight prefetchers presented in the championship. Similar to Part I, we focus on how each prefetch algorithm functions, and why it is effective. Finer implementation details can be obtained [&#8230;]]]>
</description>
				<content:encoded><![CDATA[<div><img width="300" height="187" src="https://www.sigarch.org/wp-content/uploads/2026/04/DPC-4-Part-1-300x187.png" class="attachment-medium size-medium wp-post-image" alt="DPC-4 Concept Art (Indigo)" style="margin-bottom:15px;margin-left:15px;float:right;" decoding="async" loading="lazy" /></div><p>This article continues (and concludes) the discussion on the proceedings of <a href="https://feeds.feedblitz.com/~/t/0/0/sigarch-cat/~https://sites.google.com/view/dpc4-2026/home?pli=1">DPC-4</a>, covering the remaining four contestants and a summary of the trends observed in all eight prefetchers presented in the championship. Similar to <a href="https://feeds.feedblitz.com/~/t/0/0/sigarch-cat/~https://www.sigarch.org/fourth-data-prefetching-championship-part-i/">Part I</a>, we focus on how each prefetch algorithm functions, and why it is effective. Finer implementation details can be obtained from the workshop <a class="WKVSfLCavKyjywFEXwZDFLAfdDosdiAqrY " href="https://feeds.feedblitz.com/~/t/0/0/sigarch-cat/~https://github.com/CMU-SAFARI/DPC4/tree/main/final-versions" target="_self" data-test-app-aware-link="">papers</a> or the source <a class="WKVSfLCavKyjywFEXwZDFLAfdDosdiAqrY " href="https://feeds.feedblitz.com/~/t/0/0/sigarch-cat/~https://github.com/CMU-SAFARI/DPC4/tree/main/submissions" target="_self" data-test-app-aware-link="">code</a>.</p>
<h3><a href="https://feeds.feedblitz.com/~/t/0/0/sigarch-cat/~https://github.com/CMU-SAFARI/DPC4/blob/main/final-versions/BertiGO-final.pdf"><strong>BertiGO</strong> (</a><em>Simranjit Singh, University of Murcia; Agustín Navarro Torres, University of Zaragoza; Alberto Ros (University of Murcia</em></h3>
<h4 id="ember675" class="ember-view reader-text-block__heading-3">Motivation</h4>
<p id="ember676" class="ember-view reader-text-block__paragraph">When evaluating the baseline prefetcher configuration, the authors noted that <a href="https://feeds.feedblitz.com/~/t/0/0/sigarch-cat/~https://dpc3.compas.cs.stonybrook.edu/pdfs/Berti.pdf">Berti</a> frequently issues redundant prefetch requests for lines already prefetched or present in the cache. Also, using only the PC provides very limited context for pattern recognition, limiting the prediction capabilities of Berti. Furthermore, <a href="https://feeds.feedblitz.com/~/t/0/0/sigarch-cat/~https://dl.acm.org/doi/10.1145/3466752.3480114">Pythia</a> is found to generate a lot of useless prefetches for some workloads, which pollutes the L2 cache and wastes memory bandwidth.</p>
<h4 id="ember677" class="ember-view reader-text-block__heading-3">Idea</h4>
<ol>
<li>A Region-Based Bit-Map Filter is added, which is a fully associative structure storing the prefetched and accessed cache lines per region, in the form of a bit-vector. For regions tracked by the filter, having the M-th bit set in the bitmap implies that we drop all prefetch requests for the M-th cache line inside the region.</li>
<li>In addition to using PC, the authors propose using a hash (shifted XOR) of the last 4 PCs with the current PC, to index the Berti tables with additional context.</li>
<li>Set-Dueling is added to Pythia: instead of using the default policy to issue prefetches, 5 different policies are introduced, including a No-Prefetch policy that disables Pythia. All 5 policies are enabled for a 10M-instruction tournament, at the end of which the policy with the lowest miss rate is chosen for the rest of execution.</li>
<li>An Adaptive Next Line (ANeLin) is added to the LLC, which uses a sampling cache to track the demand misses and insert next-line prefetches. A heuristic mechanism is used to track useful and useless prefetches globally and per-PC. ANeLin can be disabled if the ratio of useful to useless prefetches drops below a threshold.</li>
</ol>
<h4 id="ember679" class="ember-view reader-text-block__heading-3">Why It Works</h4>
<p id="ember680" class="ember-view reader-text-block__paragraph">Adding a Bit-Map Filter eliminates redundant and useless prefetches. Using PC history adds context from the program flow while learning memory accesses with minimal overhead. Disabling Pythia and Next Line prefetching when they do not generate enough useful prefetches solves the problem of cache pollution due to wasteful prefetching. This is especially useful in the constrained bandwidth and multicore scenarios where data and memory need to be shared judiciously for optimal performance.</p>
<h3 id="ember682" class="ember-view reader-text-block__heading-2"><a href="https://feeds.feedblitz.com/~/t/0/0/sigarch-cat/~https://github.com/CMU-SAFARI/DPC4/blob/main/final-versions/EDP-final.pdf"><strong>Entangling Data Prefetcher</strong> (</a><em>Agustín Navarro Torres, Universidad de Zaragoza;  Simranjit Singh, University of Murcia; Biswabandan Panda, IIT Bombay; Alberto Ros, University of Murcia)</em></h3>
<h4 id="ember684" class="ember-view reader-text-block__heading-3">Motivation</h4>
<p id="ember685" class="ember-view reader-text-block__paragraph">Comparing Berti with other state-of-art prefetchers, the authors identify a SPEC2017 workload where Berti achieves negligible performance gain over no-prefetch baseline. Profiling this trace reveals that it consists of long-reuse strides (stride accesses separated by 2K-cycle interval) and zero-strides (consecutive accesses to the same cache line). Berti cannot issue zero-delta prefetches, and even though prefetches are correctly issued for long-reuse deltas, they get evicted before the cache line gets accessed. T-SKID, a Time Skipping Prefetcher is built on top of a standard PC-Stride prefetcher, but decouples the PC that triggers a prefetch (TriggerPC) from the PC that trains the predictor(TargetPC). This allows it to prefetch long-reuse and zero stride patterns. However, the underlying stride prefetcher limits its scope to constant stride instead of complex delta patterns predicted easily by Berti.</p>
<h4 id="ember686" class="ember-view reader-text-block__heading-3">Idea</h4>
<p id="ember687" class="ember-view reader-text-block__paragraph">EDP is proposed as a VA-based L1D prefetcher. It gets trained and triggered on cache misses or prefetch hits (cache hit on a prefetched line). For every TargetPC, it records the fill latency of the demand access or prefetch request. It then searches the global PC history for the most recent PC that was observed more than (current cycle &#8211; fill latency) cycles ago – this is the TriggerPC which could have triggered a timely prefetch for TargetPC. This ‘Entangling Pair’ of PCs is added to the Entangling Table, that stores the set of TargetPCs for a given TriggerPC. EDP also looks at the address history of each TargetPC to calculate the list of timely deltas (similar to Berti) and stores them with the current address in a Delta Table indexed by TargetPC. To issue prefetches, the TriggerPC is used to obtain one or more TargetPC, which are used to obtain address and deltas for timely prefetch. The prefetches calculated in this way are passed through a Bloom Filter to drop redundant requests, and then placed in a Proxy Prefetch Queue (PPQ) where the prefetch request waits till slots open up in the demand read queue. If there is no space in the latter, prefetch requests are not issued. Pythia is implemented at L2, with a throttling mechanism at LLC that tracks each core&#8217;s requests and sets the EDP aggressiveness.</p>
<h4 id="ember688" class="ember-view reader-text-block__heading-3">Why It Works</h4>
<p id="ember689" class="ember-view reader-text-block__paragraph">Using a different PC to trigger prefetches allows EDP to successfully prefetch zero and long reuse delta patterns for its target PC. Filtering out redundant prefetches reduces contention for resources. Using a dedicated PPQ for prefetch requests prevents prefetches from competing with critical loads for resources. The LLC throttling mechanism helps evenly distribute resources in the multi-core scenario.</p>
<h3 id="ember691" class="ember-view reader-text-block__heading-2"><a href="https://feeds.feedblitz.com/~/t/0/0/sigarch-cat/~https://github.com/CMU-SAFARI/DPC4/blob/main/final-versions/uMAMA-final.pdf"><strong>Composite Prefetching with Bandits</strong> (</a><em>Charles Block, Pedro Palacios, Abraham Farrell, Gerasimos Gerogiannis, Josep Torrellas, University of Illinois at Urbana-Champaign)</em></h3>
<h4 id="ember693" class="ember-view reader-text-block__heading-3">Motivation</h4>
<p id="ember694" class="ember-view reader-text-block__paragraph">The authors point out that the current state-of-the-art prefetchers try to optimize low-level metrics such as accuracy, timeliness and coverage. The system performance (IPC) depends on these factors, but can have variable sensitivity to each of them depending on the workload and program phase. Furthermore, a single prefetcher is generally insufficient to deliver the best performance for a diverse set of workloads – industrial processors generally deploy a composite prefetcher consisting of multiple prefetch engines.</p>
<h4 id="ember695" class="ember-view reader-text-block__heading-3">Idea</h4>
<p id="ember696" class="ember-view reader-text-block__paragraph">A Multi-Armed Bandit is a Reinforcement Learning agent that chooses the best action (arm) to maximize the reward function value. Inspired by this, a Micro-Armed Bandit (MAB) is used to prefetch at L2C. Each ‘arm’ consists of different configurations for 5 state-of-the-art prefetchers-</p>
<ul>
<li>Next Line, Spatial Memory Streaming, Best Offset Prefetcher: Can be turned ON or OFF</li>
<li>Stride, Stream prefetchers: Degree can be tuned to control aggressiveness</li>
</ul>
<p id="ember698" class="ember-view reader-text-block__paragraph">A bloom filter is implemented to prevent issuing redundant prefetches. Each arm is used for a fixed time period (bandit step) after which the reward generated by it is evaluated by the agent. This is evaluated against the rewards generated previously to calculate which arm to use next. The total IPC of the core is used as a reward function for the MAB.</p>
<p id="ember699" class="ember-view reader-text-block__paragraph">To optimize multi-core performance, another agent called ‘µMama’ is added at the system level, using the geometric mean of IPCs across all cores as a reward function. At each timestep, it decides whether to allow the cores to pursue their independent actions, or to force them into joint actions which have a record of increasing the µMama reward.</p>
<h4 id="ember700" class="ember-view reader-text-block__heading-3">Why It Works</h4>
<p id="ember701" class="ember-view reader-text-block__paragraph">Using Reinforcement Learning to directly maximize the system performance ensures that the prefetcher dynamically re-configures itself with execution to improve IPC. The caveat is that this now becomes a search space problem &#8211; the arms of the bandit need to be diverse enough to support different kinds of workloads, in order to deliver the best performance.</p>
<h3 id="ember703" class="ember-view reader-text-block__heading-2"><a href="https://feeds.feedblitz.com/~/t/0/0/sigarch-cat/~https://github.com/CMU-SAFARI/DPC4/blob/main/final-versions/GBerti-final.pdf"><strong>Global Berti</strong> (</a><em>Gilead Posluns, Mark Jeffrey; University of Toronto)</em></h3>
<h4 id="ember705" class="ember-view reader-text-block__heading-3">Motivation</h4>
<p id="ember706" class="ember-view reader-text-block__paragraph">Berti is a state-of-the-art prefetcher that detects Streaming patterns, i.e., consistent delta values between accesses by the <em>same</em> PC. Practical workloads however, often exhibit Spatial patterns identified by consistent delta values between accesses by <em>different </em>PCs. In the absence of streaming patterns, prefetching based on spatial patterns could alleviate the efficacy of Berti.</p>
<h4 id="ember707" class="ember-view reader-text-block__heading-3">Idea</h4>
<p id="ember708" class="ember-view reader-text-block__paragraph">Global Berti detects spatial patterns using Berti’s existing structures – the History Table conventionally stores within a row, the addresses of all the lines accessed by a particular PC, in FIFO order. When a streaming pattern cannot be detected, local training is useless and Global Berti looks at the most recent address for all PCs to detect spatial patterns (global training). Berti’s Delta Table holds the row delta values for the same PC; Global Berti stores the global deltas (across PCs) in the same table, adding a local bit to differentiate between streaming and spatial training.</p>
<h4 id="ember709" class="ember-view reader-text-block__heading-3">Why It Works</h4>
<p id="ember710" class="ember-view reader-text-block__paragraph">By itself, Berti is quite effective at detecting and covering streaming patterns. Adding the capability to detect spatial patterns in the absence of streaming patterns increases Global Berti’s coverage and therefore, the overall performance. As expected, the highest speedup over Berti is obtained in SPEC2017 and Graph workloads that are dominated by irregular accesses which require spatial prefetching. On the other hand, AI workloads containing mostly streaming patterns see a much lesser speedup.</p>
<h3 id="ember712" class="ember-view reader-text-block__heading-2">General Trends</h3>
<p id="ember713" class="ember-view reader-text-block__paragraph">Although the major focus of almost all DPC-4 submissions is to overcome the limitations of the high-performing Berti/Pythia baseline, they highlight several key trends in data prefetching research:</p>
<ul>
<li><strong>Prefetching across Physical Page Boundaries: </strong>Issuing page-crossing prefetches is extremely useful for AI workloads since they are dominated by streaming accesses. This is leveraged by most submissions to gain an edge over the baseline prefetcher configuration.</li>
<li><strong>Preventing Redundant Prefetches: </strong>Quite a few papers also combat excessive prefetching and resource contention through advanced throttling, priority, and filtering mechanisms.</li>
<li><strong>Increased System-Level and Multi-Core Awareness:</strong> There is a growing emphasis on system-aware solutions to judiciously manage shared resources like memory bandwidth, which is constrained in high-core-count datacenters. This includes core-level fairness throttling (Emender, EDP) and global coordination agents (µMama) to dynamically adjust prefetcher configurations for optimal multi-core performance.</li>
<li><strong>Expanding Pattern Coverage for Diverse Workloads:</strong> Submissions seek to improve coverage beyond simple streaming patterns. This includes detecting spatial patterns across different PCs (Global Berti), and targeting complex patterns like long-reuse and zero-strides (EDP). The adoption of PC history (BertiGO) also provides better context for pattern recognition.</li>
<li><strong>Shift Towards Adaptive and Composite Designs:</strong> Recognizing that a  single prefetcher is insufficient for diverse workloads, the trend moves toward composite prefetchers. This is accompanied by dynamic re-configuration to select the best prefetcher setting at runtime, and adaptive heuristics to tune aggressiveness.</li>
</ul>
<h3>About the Author</h3>
<p><span style="font-weight: 400;">Digvijay Singh obtained his Bachelor’s degree from BITS Pilani and his Master’s degree from Texas A&amp;M University where he worked on data prefetching as part of the CAMSIN research group. He currently works as a Silicon Architect in Google’s mobile CPU team.</span></p>
<p class="disclaim"><strong>Disclaimer:</strong> <em>These posts are written by individual contributors to share their thoughts on the Computer Architecture Today blog for the benefit of the community. Any views or opinions represented in this blog are personal, belong solely to the blog author and do not represent those of ACM SIGARCH or its parent organization, ACM.</em></p><Img align="left" border="0" height="1" width="1" alt="" style="border:0;float:left;margin:0;padding:0;width:1px!important;height:1px!important;" hspace="0" src="https://feeds.feedblitz.com/~/i/954807320/0/sigarch-cat">
]]>
</content:encoded>
			<wfw:commentRss>https://feeds.feedblitz.com/~/954807320/0/sigarch-cat~Fourth-Data-Prefetching-Championship-Part/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
	<post-id xmlns="com-wordpress:feed-additions:1">103014</post-id></item>
<item>
<feedburner:origLink>https://www.sigarch.org/fourth-data-prefetching-championship-part-i/</feedburner:origLink>
		<title>Fourth Data Prefetching Championship: Part I</title>
		<link>https://feeds.feedblitz.com/~/954636863/0/sigarch-cat~Fourth-Data-Prefetching-Championship-Part-I/</link>
		<comments>https://feeds.feedblitz.com/~/954636863/0/sigarch-cat~Fourth-Data-Prefetching-Championship-Part-I/#respond</comments>
		<pubDate>Mon, 27 Apr 2026 14:00:53 +0000</pubDate>
		<dc:creator><![CDATA[Digvijay Singh]]></dc:creator>
		<category><![CDATA[ACM SIGARCH]]></category>
		<category><![CDATA[Data Prefetcher]]></category>
		<category><![CDATA[Memory Wall]]></category>
		<guid isPermaLink="false">https://www.sigarch.org/?p=103010</guid>
		<description><![CDATA[<div><img width="300" xheight="187" src="https://www.sigarch.org/wp-content/uploads/2026/04/DPC-4-Part-2-300x187.png" class="attachment-medium size-medium wp-post-image" alt="DPC-4 Concept Art (Blue)" style="max-width:100% !important;height:auto !important;margin-bottom:15px;margin-left:15px;float:right;"  loading="lazy" /></div>This article is the first in a two-part series that summarizes the key contributions of 4th Data Prefetching Championship (DPC-4), held in conjunction with the 32nd iteration of HPCA in 2026. While discussing innovative data prefetching techniques presented in this contest, we focus on the functionality of proposed algorithms and also explain why they are [&#8230;]]]>
</description>
				<content:encoded><![CDATA[<div><img width="300" height="187" src="https://www.sigarch.org/wp-content/uploads/2026/04/DPC-4-Part-2-300x187.png" class="attachment-medium size-medium wp-post-image" alt="DPC-4 Concept Art (Blue)" style="margin-bottom:15px;margin-left:15px;float:right;" decoding="async" loading="lazy" /></div><p class="ember-view reader-text-block__paragraph">This article is the first in a two-part series that summarizes the key contributions of 4th Data Prefetching Championship (<a class="WKVSfLCavKyjywFEXwZDFLAfdDosdiAqrY " href="https://feeds.feedblitz.com/~/t/0/0/sigarch-cat/~https://sites.google.com/corp/view/dpc4-2026/home" target="_self" data-test-app-aware-link="">DPC-4</a>), held in conjunction with the 32nd iteration of <a href="https://feeds.feedblitz.com/~/t/0/0/sigarch-cat/~https://2026.hpca-conf.org/track/hpca-2026-main-conference">HPCA</a> in 2026. While discussing innovative data prefetching techniques presented in this contest, we focus on the functionality of proposed algorithms and also explain why they are effective. Finer implementation details can be found from the <a class="WKVSfLCavKyjywFEXwZDFLAfdDosdiAqrY " href="https://feeds.feedblitz.com/~/t/0/0/sigarch-cat/~https://github.com/CMU-SAFARI/DPC4/tree/main/final-versions" target="_self" data-test-app-aware-link="">papers</a> or the source <a class="WKVSfLCavKyjywFEXwZDFLAfdDosdiAqrY " href="https://feeds.feedblitz.com/~/t/0/0/sigarch-cat/~https://github.com/CMU-SAFARI/DPC4/tree/main/submissions" target="_self" data-test-app-aware-link="">code</a>.</p>
<h3 id="ember612" class="ember-view reader-text-block__heading-3">Implementation Constraints</h3>
<p id="ember613" class="ember-view reader-text-block__paragraph">All prefetchers are evaluated against a baseline configuration that employs: <a href="https://feeds.feedblitz.com/~/t/0/0/sigarch-cat/~https://dpc3.compas.cs.stonybrook.edu/pdfs/Berti.pdf">Berti</a> prefetcher (<a href="https://feeds.feedblitz.com/~/t/0/0/sigarch-cat/~https://dpc3.compas.cs.stonybrook.edu/">DPC3</a> winner) at L1D (Level-1 Data cache) and <a href="https://feeds.feedblitz.com/~/t/0/0/sigarch-cat/~https://dl.acm.org/doi/10.1145/3466752.3480114">Pythia</a> prefetcher at L2 (Level-2 cache). While there were no constraint on design complexity, upper limits were defined on the storage budget of the prefetchers to ensure the design was practically feasible for implementation. These limits were defined as follows: L1D Prefetcher: 32KB, L2 Prefetcher: 128KB, LLC (Last Level Cache) Prefetcher: 256KB.</p>
<h3 id="ember618" class="ember-view reader-text-block__heading-2">Keynotes</h3>
<p>The event included two keynote talks. The first keynote, titled &#8220;Is Prefetcher Research Still Alive?&#8221;, was given by <em><a id="ember621" class="ember-view" href="https://feeds.feedblitz.com/~/t/0/0/sigarch-cat/~https://www.linkedin.com/in/leeor-peled-125365b4/">Leeor Peled</a> </em>from Huawei. Leeor discussed the modern relevance of prefetching research, offering a pragmatic philosophy for academic researchers. He argued that the primary objective should not necessarily be to surpass &#8220;best-in-class&#8221; models – which are often the result of years of ‘engineered’ fine-tuning – but rather to introduce <strong>novel, high-potential concepts</strong> that invite further optimization. He emphasized that while an individual effort might not immediately surpass the state-of-the-art, a sufficiently &#8220;interesting&#8221; technique can evolve into a transformative solution through subsequent community-driven iteration.</p>
<p id="ember623" class="ember-view reader-text-block__paragraph">He suggested two optimizations that can be explored:</p>
<ol>
<li>Building a Semantic Prefetcher that correlates memory accesses with address generating code, i.e., a high-precision version of the Runahead Prefetcher that selectively runs only the code responsible for generating a future address.</li>
<li>Training neural networks to identify deep correlations between memory accesses, potentially unlocking the ability to predict complex, non-linear patterns that remain invisible to current heuristic-based logic.</li>
</ol>
<p id="ember625" class="ember-view reader-text-block__paragraph">The following issues can (and should) be addressed to build better prefetchers:</p>
<ul>
<li>Generalizing complex patterns, e.g. pointer chasing loads</li>
<li>Accurately choosing memory access with high correlation for better training</li>
<li>Prefetching to the appropriate cache level to optimize for timeliness</li>
<li>Throttling prefetches for fairness amongst multiple cores</li>
<li>Using LLMs to process memory traces instead of text sequences</li>
</ul>
<p id="ember631" class="ember-view reader-text-block__paragraph">The second keynote, titled &#8220;Data Prefetching: A Datacenter Perspective&#8221;, was given by <em><a id="ember630" class="ember-view" href="https://feeds.feedblitz.com/~/t/0/0/sigarch-cat/~https://www.linkedin.com/in/akanksha-j-a8336884/">Akanksha J.</a> from Google. </em> Addressing the memory bottleneck problem in modern datacenters (40% of the CPU cycles are spent idling for memory responses) Akanksha highlighted that cloud environments are characterized by massive multi-threading and incessant context switching. In these scenarios, a single thread may migrate across multiple cores, while each core rotates through a vast &#8220;plethora&#8221; of applications. The Google workloads utilized in DPC-4 are a better representation of this reality, and are primarily frontend-bound. Without a sophisticated instruction prefetcher to streamline code delivery, the underlying bottlenecks in data prefetching remain obscured and impossible to solve. She also analyzed structural failures of current prefetching solutions, identifying these primary aspects:</p>
<ol>
<li>Current design philosophy focuses on &#8220;tuning for the common case,&#8221; resulting in hard-coded heuristic values—such as fixed confidence thresholds and prefetch degrees—that are taped out into non-programmable silicon. While these &#8220;black boxes&#8221; are meticulously engineered to squeeze every drop of performance from SPEC workloads, they lack the flexibility required for the high heterogeneity of datacenter tasks. Consequently, these resource-hungry techniques often penalize cloud performance rather than enhancing it.</li>
<li>If we disable hardware prefetchers entirely and rely on software to insert prefetches, we miss out on critical opportunities to utilize valuable information about system states (coherence, timeliness, cache hits/misses) that improves prefetching. Akanksha proposed a shift towards <strong>&#8220;Software-Defined Prefetching,&#8221;</strong> a paradigm that transcends current <a href="https://feeds.feedblitz.com/~/t/0/0/sigarch-cat/~https://www.arm.com/glossary/isa">ISA</a> limitations. In this model, the software layer dynamically selects which code segments to target and determines the optimal hardware prefetcher to activate for peak accuracy. Simultaneously, the hardware leverages real-time system state data to maximize coverage.</li>
</ol>
<p id="ember633" class="ember-view reader-text-block__paragraph">Furthermore, Akanksha advocated for evaluating all prefetching techniques within constrained-bandwidth environments, arguing that such stress tests better reflect the realities of modern compute environments.</p>
<p>Now, on to prefetcher designs themselves.</p>
<h3 id="ember635" class="ember-view reader-text-block__heading-2"><a href="https://feeds.feedblitz.com/~/t/0/0/sigarch-cat/~https://github.com/CMU-SAFARI/DPC4/blob/main/final-versions/VIP-final.pdf"><strong>Virtual Inter-Page Prefetcher</strong></a> (<em>Ho Je Lee, Won Woo Ro; Yonsei University)</em></h3>
<h4 id="ember637" class="ember-view reader-text-block__heading-3">Motivation</h4>
<ul>
<li>Analyzing the baseline prefetecher configuration, the authors observed that the L2 Prefetcher (Pythia) is more effective than the L1 Prefetcher (Berti) in reducing Misses Per Kilo Instructions (MPKI) for the Last Level Cache (LLC).</li>
<li>Since Pythia operates in the Physical Address (PA) space, it is not feasible to let it issue prefetches across page boundaries, as incorrect physical page access poses a security risk.</li>
<li>A roofline study shows that there is significant performance to be gained when Pythia is allowed to issue page-cross prefetches in the PA space. This advantage amplifies when it is granted visibility of the Virtual Address (VA) space, preventing incorrect page accesses.</li>
</ul>
<h4 id="ember639" class="ember-view reader-text-block__heading-3">Idea</h4>
<p id="ember640" class="ember-view reader-text-block__paragraph">VIP is implemented at L1 level,  but issues prefetches to the L2. It gets trained on L1 Misses by reading the {<a href="https://feeds.feedblitz.com/~/t/0/0/sigarch-cat/~https://www.geeksforgeeks.org/operating-systems/what-is-program-counter/">PC</a>, VA} information off the packets sent to L1 MSHR. These are written to the VIP Stride Table that calculates the observed stride for a particular PC and stores it. If a stride value is repeated, the confidence gets incremented. Otherwise it gets reset. The confidence value determines the prefetch degree.</p>
<h4 id="ember641" class="ember-view reader-text-block__heading-3">Why It Works</h4>
<p id="ember642" class="ember-view reader-text-block__paragraph">The implemented VIP configuration is a simple yet elegant solution to gain performance over the baseline by supplementing the existing Berti and Pythia prefetchers with cross-page prefetches (note that the DPC-3 version of Berti operates in the PA space and cannot issue prefetches across page boundaries). As expected, the stride prefetcher boosts AI workloads with sequential accesses of large data structures that span across pages. The typical CPU workloads such as SPEC see a moderate gain; the control-flow dominated Google workloads have a marginal slowdown since they rarely have uninterrupted streams.</p>
<h3 id="ember644" class="ember-view reader-text-block__heading-2"><a href="https://feeds.feedblitz.com/~/t/0/0/sigarch-cat/~https://github.com/CMU-SAFARI/DPC4/blob/main/final-versions/SPPAM-final.pdf"><strong>Signature Pattern Prediction and Access-Map Prefetcher</strong></a> (<em>Maccoy Merrell, Lei Wang, Paul Gratz, Stavros Kalafatis; Texas A&amp;M University)</em></h3>
<h4 id="ember646" class="ember-view reader-text-block__heading-3">Motivation</h4>
<p id="ember647" class="ember-view reader-text-block__paragraph">Access Map Pattern Matching (<a href="https://feeds.feedblitz.com/~/t/0/0/sigarch-cat/~https://dl.acm.org/doi/10.1145/1542275.1542349">AMPM</a>) and Signature Path Prefetching (<a href="https://feeds.feedblitz.com/~/t/0/0/sigarch-cat/~https://dl.acm.org/doi/10.5555/3195638.3195711">SPP</a>) are both considered state-of-the-art prefetching techniques; while SPP is sensitive to the order of memory accesses, AMPM is resistant to OoO execution. However, AMPM relies heavily on stored patterns for each region and  is unable to issue prefetches for new regions or when the observed accesses deviate from expectations. SPP excels at this and can even make predictions from its issued prefetches.</p>
<h4 id="ember648" class="ember-view reader-text-block__heading-3">Idea</h4>
<p id="ember649" class="ember-view reader-text-block__paragraph">Implemented at L2 level, a Region Table (RT) tracks all access maps (as bit-vectors) on a per-region basis. Upon a memory access, an N-bit portion from the respective access map is used to index a Pattern Table (PT). The PT outputs the most frequently occurring N-bit pattern as a prefetch candidate, which can be used to speculatively index the PT. Similar to SPP, speculative prefetching continues till the overall confidence drops below a threshold. The RT access map indicates the recently accessed cache lines and filters out redundant prefetches.</p>
<h4 id="ember650" class="ember-view reader-text-block__heading-3">Why It Works</h4>
<p id="ember651" class="ember-view reader-text-block__paragraph">The authors have identified the complementary nature of SPP and AMPM, and have combined them effectively to utilize the OoO resistance of AMPM with the Speculative mechanism of SPP. Additionally, numerous throttling mechanisms are implemented which consider pattern usefulness as well as global metrics such as DRAM bandwidth and overall usefulness to drop prefetches and set prefetch degree. SPPAM is implemented at L2C with Berti (the MICRO version which operates in the VA space) at L1D and Bingo at LLC. Similar to the previous paper, the cross-page stream information is passed to SPPAM from L1D.</p>
<h3 id="ember653" class="ember-view reader-text-block__heading-2"><a href="https://feeds.feedblitz.com/~/t/0/0/sigarch-cat/~https://github.com/CMU-SAFARI/DPC4/blob/main/final-versions/Emender-final.pdf"><strong>Emender</strong></a> (<em>Jiajie Chen, Tingji Zhang, Xiaoyi Liu, Xuefeng Zhang, Peng Qu, Youhui Zhang; Tsinghua University)</em></h3>
<h4 id="ember655" class="ember-view reader-text-block__heading-3">Motivation</h4>
<p id="ember656" class="ember-view reader-text-block__paragraph">An evaluation of different combinations of state-of-the-art prefetchers shows that <a href="https://feeds.feedblitz.com/~/t/0/0/sigarch-cat/~https://dl.acm.org/doi/10.1109/MICRO56248.2022.00072">VBerti</a> (L1D) and Pythia (L2) is the highest performing combination. Here, VBerti refers to the MICRO version of Berti that operates in the VA space, allowing it to issue page-crossing prefetches. It is observed that this optimal prefetcher combination issues too many prefetch requests that fill the prefetch queue quickly, which leads to useful prefetches getting dropped. A second-order effect of a full prefetch queue is the excessive usage of L1D to Memory bandwidth that can delay critical loads.</p>
<h4 id="ember657" class="ember-view reader-text-block__heading-3">Idea</h4>
<p id="ember658" class="ember-view reader-text-block__paragraph">Four key features are added to tackle the problem of over-prefetching in the VBerti+Pythia configuration:</p>
<ol>
<li>Pending Target Buffer is added to sort all issued prefetches by confidence, which helps prioritize useful prefetches between different PCs.</li>
<li>Cuckoo Filter is added which tracks the VAs already present in the cache to prevent redundant prefetches. This structure is chosen due to its O(1) query time, high accuracy and zero false negatives.</li>
<li>Dynamic Confidence Threshold is added which increases with the cache miss rate, throttling low-confidence prefetches.</li>
<li>A Fairness-based Throttling scheme is implemented across cores, which tracks the useless prefetches per-core at L3 and stops the core with the most useless prefetches from prefetching.</li>
</ol>
<h4 id="ember661" class="ember-view reader-text-block__heading-3">Why It Works</h4>
<p id="ember662" class="ember-view reader-text-block__paragraph">The authors identify problematic areas in the baseline Berti+Pythia system and propose features to effectively address them. The best performance improvement comes from the Cuckoo Filter for single-core and Fairness Throttling for multi-core configuration. Since Emender provides the least gain for limited bandwidth configuration, it would be interesting to look at the accuracy data.</p>
<h3 id="ember664" class="ember-view reader-text-block__heading-2"><a href="https://feeds.feedblitz.com/~/t/0/0/sigarch-cat/~https://github.com/CMU-SAFARI/DPC4/blob/main/final-versions/sBerti-final.pdf"><strong>sBerti</strong></a> (<em>Jiapeng Zhou, Ben Chen, Kunlin Li, Yun Chen; HKUST, Guangzhou)</em></h3>
<h4 id="ember666" class="ember-view reader-text-block__heading-3">Motivation</h4>
<p id="ember667" class="ember-view reader-text-block__paragraph">When profiling the DPC4 workloads on the given baseline prefetcher configuration (Berti + Pythia), the authors observed a high L1D miss rate in the AI-ML and Google workloads. A deeper analysis of the traces indicated that most of these misses occurred when the access stream moved across the 4KB physical page boundary, which happens frequently in these workloads. The version of Berti used in the baseline does not issue prefetches across page boundaries, and thus, a stride prefetcher can help.</p>
<h4 id="ember668" class="ember-view reader-text-block__heading-3">Idea</h4>
<p id="ember669" class="ember-view reader-text-block__paragraph">A decoupled Smart Stride Prefetcher is added at L1D, which operates on the VA space and can  therefore track memory access streams across page boundaries. It is trained using a Smart Stride Table (SST), which is indexed by a hash of the PC, and subtracts the lastVA from the current VA to calculate the delta value. If the absolute value of delta is a multiple of the stored stride, the confidence is updated; this also provides resistance to out-of-order execution. Prefetches are issued if this confidence is greater than a static threshold. The lookahead is tuned via a heuristic which is incremented upon observing late prefetches and decremented by timely prefetches. A Recent Prefetch Table stores the recently issued prefetches to track their timeliness and filter duplicate prefetches between Berti and Smart Stride engines.</p>
<h4 id="ember670" class="ember-view reader-text-block__heading-3">Why It Works</h4>
<p id="ember671" class="ember-view reader-text-block__paragraph">The addition of a decoupled stride prefetcher gives sBerti the ability to issue prefetches across physical page boundaries, reducing the “Cold-start Penalty” of Berti. The heuristic based dynamic distance adjustment helps tune the aggressiveness at runtime, allowing longer lookahead for AI-ML workloads dominated by streaming accesses. The final sBerti configuration (Stride + Berti at L1D, Pythia at L2) delivers the best performance in a full bandwidth scenario, where the stride engine can prefetch further ahead.</p>
<p>We will overview the rest of the prefetchers in part 2 of this post.</p>
<h3>About the Author</h3>
<p><span style="font-weight: 400;">Digvijay Singh received his Bachelor’s degree from BITS Pilani and his Master’s degree from Texas A&amp;M University where he worked on data prefetching as part of the CAMSIN research group. He currently works as a Silicon Architect in Google’s mobile CPU team.</span></p>
<p class="disclaim"><strong>Disclaimer:</strong> <em>These posts are written by individual contributors to share their thoughts on the Computer Architecture Today blog for the benefit of the community. Any views or opinions represented in this blog are personal, belong solely to the blog author and do not represent those of ACM SIGARCH or its parent organization, ACM.</em></p><Img align="left" border="0" height="1" width="1" alt="" style="border:0;float:left;margin:0;padding:0;width:1px!important;height:1px!important;" hspace="0" src="https://feeds.feedblitz.com/~/i/954636863/0/sigarch-cat">
]]>
</content:encoded>
			<wfw:commentRss>https://feeds.feedblitz.com/~/954636863/0/sigarch-cat~Fourth-Data-Prefetching-Championship-Part-I/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
	<post-id xmlns="com-wordpress:feed-additions:1">103010</post-id></item>
<item>
<feedburner:origLink>https://www.sigarch.org/beyond-qubits-a-systems-view-of-hybrid-cv-dv-quantum-computing/</feedburner:origLink>
		<title>Beyond Qubits: A Systems View of Hybrid CV-DV Quantum Computing</title>
		<link>https://feeds.feedblitz.com/~/954105707/0/sigarch-cat~Beyond-Qubits-A-Systems-View-of-Hybrid-CVDV-Quantum-Computing/</link>
		<comments>https://feeds.feedblitz.com/~/954105707/0/sigarch-cat~Beyond-Qubits-A-Systems-View-of-Hybrid-CVDV-Quantum-Computing/#respond</comments>
		<pubDate>Mon, 20 Apr 2026 15:31:53 +0000</pubDate>
		<dc:creator><![CDATA[Yuan Liu, Zihan Chen, Shubdeep Mohapatra, Jim Furches, Zheng (Eddy) Zhang, Huiyang Zhou]]></dc:creator>
		<category><![CDATA[ACM SIGARCH]]></category>
		<category><![CDATA[Quantum Computing]]></category>
		<guid isPermaLink="false">https://www.sigarch.org/?p=102865</guid>
		<description><![CDATA[<div><img width="300" xheight="167" src="https://www.sigarch.org/wp-content/uploads/2026/04/Picture1-300x167.png" class="attachment-medium size-medium wp-post-image" alt="" style="max-width:100% !important;height:auto !important;margin-bottom:15px;margin-left:15px;float:right;"  loading="lazy" /></div>Hybrid continuous-discrete-variable (CV-DV) quantum computing combines oscillators and qubits to tackle problems that are difficult for either model alone, from bosonic simulation to quantum error correction. At ASPLOS 2026, our tutorial introduced the foundations, compilation stack, benchmarking methods, and programming tools behind this emerging architecture model. In this blog post, we overview the key elements [&#8230;]]]>
</description>
				<content:encoded><![CDATA[<div><img width="300" height="167" src="https://www.sigarch.org/wp-content/uploads/2026/04/Picture1-300x167.png" class="attachment-medium size-medium wp-post-image" alt="" style="margin-bottom:15px;margin-left:15px;float:right;" decoding="async" loading="lazy" /></div><p><b>Hybrid continuous-discrete-variable (CV-DV) quantum computing combines oscillators and qubits to tackle problems that are difficult for either model alone, from bosonic simulation to quantum error correction. At ASPLOS 2026, our tutorial introduced the foundations, compilation stack, benchmarking methods, and programming tools behind this emerging architecture model. In this blog post, we overview the key elements of our tutorial. </b></p>
<p><span style="font-weight: 400;">Tutorial website: </span><a href="https://feeds.feedblitz.com/~/t/0/0/sigarch-cat/~https://cvdv.ncsu.edu/resources/asplos-tutorial/"><span style="font-weight: 400;">https://cvdv.ncsu.edu/resources/asplos-tutorial/</span></a></p>
<h3><b>Foundations</b></h3>
<p><span style="font-weight: 400;">We began with the foundations of hybrid CV-DV quantum computing, introducing the physical model, mathematical language, and programming abstractions behind qubit-oscillator systems. Many leading quantum platforms naturally combine qubits with oscillator modes, such as cavities, vibrational modes, or photonic fields. Rather than treating oscillators as auxiliary hardware, hybrid CV-DV computing views their large Hilbert spaces as a computational resource.</span></p>
<p><span style="font-weight: 400;">The tutorial covered core representations of CV states in both Fock space and phase space, along with the key operators and gate families that support universal CV-DV computation. A central message was that hybrid systems are not simply “qubits plus extra hardware,” but a distinct computational model with their own instruction sets, abstractions, and compilation challenges. We showed how familiar qubit concepts such as Pauli and Clifford structure extend into the oscillator setting through displacement operations, squeezing, quadratic Hamiltonians, beamsplitters, and controlled hybrid interactions.</span></p>
<p><span style="font-weight: 400;">We also discussed why this matters from a computer architecture perspective. Hybrid CV-DV systems introduce new instruction set architectures (ISAs), abstract machine models (AMMs), and compilation choices that help separate hardware details from software design. Depending on the platform and compiler stack, the same computation may be expressed in phase-space language, Fock-space language, or a mixed qubit-oscillator representation.</span></p>
<p><span style="font-weight: 400;">To ground these ideas, we highlighted emerging algorithmic primitives and applications where hybrid systems may offer advantages, including oscillator-mediated entangling gates, state-transfer protocols, Hamiltonian simulation, bosonic quantum error correction, vibronic dynamics, and sensing. We closed the session by surveying two leading implementation pathways, superconducting circuit QED and trapped-ion systems, and discussing the distinct control and connectivity tradeoffs they expose. A comprehensive tutorial on the foundations of hybrid CV-DV quantum processors is available </span><a href="https://feeds.feedblitz.com/~/t/0/0/sigarch-cat/~https://journals.aps.org/prxquantum/abstract/10.1103/4rf7-9tfx"><span style="font-weight: 400;">here</span></a><span style="font-weight: 400;">.</span></p>
<h3><b>Compilation</b></h3>
<p><span style="font-weight: 400;">We also presented Strategies and Tools to Compile CV-DV Quantum Circuits. We began by emphasizing why Hamiltonian simulation is a central application and one of the most promising directions for hybrid continuous-variable and discrete-variable (CV-DV) quantum systems. CV systems can naturally represent continuous degrees of freedom, while DV systems provide strong control and interaction structures. Together, they enable important applications in areas such as quantum chemistry and materials science. However, a key challenge lies in decomposing the time-evolution operator e^{-iHt} into a sequence of executable quantum gates. This transformation is fundamentally a compilation problem, bridging high-level quantum algorithms and low-level hardware. As such, compilers play a critical role in hybrid quantum systems.</span></p>
<p><span style="font-weight: 400;">We then focused on the dominant approach today: symbolic compilation. In particular, we discussed two early CV-DV Hamiltonian simulation compilers from </span><a href="https://feeds.feedblitz.com/~/t/0/0/sigarch-cat/~https://dl.acm.org/doi/full/10.1145/3695053.3731065"><span style="font-weight: 400;">Chen et al., ISCA’25</span></a><span style="font-weight: 400;"> and </span><a href="https://feeds.feedblitz.com/~/t/0/0/sigarch-cat/~https://ieeexplore.ieee.org/abstract/document/11250346"><span style="font-weight: 400;">Decker et al., QCE’25</span></a><span style="font-weight: 400;">. The core idea is to avoid direct matrix-based computation and instead leverage the algebraic structure of operators for rule-based decomposition. Techniques such as Trotter-Suzuki product formulas, the Baker–Campbell–Hausdorff (BCH) expansion, and bosonic commutation relations are used to gradually break down complex Hamiltonians into hardware-executable primitive gates. This process is typically implemented through rule matching and recursive rewriting, where expressions are repeatedly transformed until only supported base gates remain. While this approach avoids the exponential blowup of high-dimensional matrices, it introduces tradeoffs between approximation error and resource overhead.</span></p>
<p><span style="font-weight: 400;">Finally, we analyzed the limitations of current compilers and outlined future research directions. Key challenges include limited gate sets and decomposition rules, the tradeoff between accuracy and resource cost, hardware connectivity constraints, and insufficient optimization flexibility. To address these issues, we highlighted the need for improved programmability, richer native gate support, more accurate cost models, and optimizations that exploit algebraic properties such as commutativity. We also presented the </span><a href="https://feeds.feedblitz.com/~/t/0/0/sigarch-cat/~https://github.com/ruadapt/Genesis-CVDV-Compiler"><span style="font-weight: 400;">Genesis compiler</span></a><span style="font-weight: 400;"> from Chen et al., ISCA’25 as an end-to-end solution example, including typical use cases and code snippets. Genesis employs a multi-level intermediate representation (IR) and a full compilation pipeline to automatically translate Hamiltonians into limited hardware connectivity physical circuits, demonstrating a systematic and extensible compilation framework for hybrid CV-DV quantum computing.</span></p>
<h3><b>Benchmark and Circuit Simulator</b></h3>
<p><span style="font-weight: 400;">We also presented </span><a href="https://feeds.feedblitz.com/~/t/0/0/sigarch-cat/~https://arxiv.org/abs/2603.04398"><b>HyQBench</b></a> <span style="font-weight: 400;">by Mohapatra et al., an open-source benchmark suite implemented in Bosonic Qiskit and QuTiP. HyQBench covers eight representative hybrid circuits spanning three abstraction levels: primitives, algorithms, and applications. These include cat state generation, GKP state preparation, CV-to-DV state transfer, </span><a href="https://feeds.feedblitz.com/~/t/0/0/sigarch-cat/~https://ieeexplore.ieee.org/abstract/document/11129874"><span style="font-weight: 400;">CV-DV QFT</span></a><span style="font-weight: 400;">, </span><a href="https://feeds.feedblitz.com/~/t/0/0/sigarch-cat/~https://arxiv.org/abs/2501.11735"><span style="font-weight: 400;">CV-DV VQE</span></a><span style="font-weight: 400;">, CV-QAOA, Jaynes-Cummings-Hubbard (JCH) Hamiltonian simulation, and </span><a href="https://feeds.feedblitz.com/~/t/0/0/sigarch-cat/~https://www.nature.com/articles/s41467-025-67694-5"><span style="font-weight: 400;">Shor’s algorithm</span></a><span style="font-weight: 400;">.</span></p>
<p><span style="font-weight: 400;">One key takeaway is that hybrid architectures can reduce hardware resources dramatically for some workloads. For example, simulating a 3-site JCH model in a DV-only encoding requires 9 qubits and 393 CNOT gates, whereas a hybrid implementation uses only 3 qumodes, 3 qubits, and 8 gates. This kind of reduction highlights why benchmarking hybrid systems requires more than simply counting qubits.</span></p>
<p><span style="font-weight: 400;">To support this, we introduced a feature map tailored to hybrid systems. In addition to standard structural metrics such as gate counts, circuit depth, and qubit/qumode counts, we proposed three CV-DV-specific metrics: Wigner negativity as a proxy for non-classicality and classical simulation hardness, truncation cost to quantify population near the Fock cutoff, and maximum energy. These metrics help separate workloads with very different simulation and execution behavior. For example, JCH simulation remains relatively close to Gaussian behavior, while CV-QAOA and Shor’s algorithm exhibit higher Wigner negativity and are harder to simulate classically.</span></p>
<p><span style="font-weight: 400;">We also discussed early hardware validation. A cat-state preparation benchmark was executed on Sandia National Laboratories’ QSCOUT trapped-ion platform and achieved a fidelity of 0.71. HyQBench was further used to calibrate conditional displacement gates on the same platform, reinforcing the need for standardized benchmark suites that support both evaluation and device calibration. The full paper is available at </span><a href="https://feeds.feedblitz.com/~/t/0/0/sigarch-cat/~https://arxiv.org/abs/2603.04398"><span style="font-weight: 400;">https://arxiv.org/abs/2603.04398</span></a><span style="font-weight: 400;">.</span></p>
<p><span style="font-weight: 400;">To lower the barrier to entry for this area, we also developed </span><b>HyQSim</b><span style="font-weight: 400;">, a browser-based hybrid CV-DV circuit simulator that requires no installation. HyQSim supports drag-and-drop circuit construction, arbitrary Fock cutoffs, and built-in visualization through Wigner plots, Fock-state amplitudes, and Bloch sphere views. It is available at </span><a href="https://feeds.feedblitz.com/~/t/0/0/sigarch-cat/~https://cvdv.ncsu.edu/resources/simulator/"><span style="font-weight: 400;">https://cvdv.ncsu.edu/resources/simulator/</span></a><span style="font-weight: 400;">, and the code is hosted at </span><a href="https://feeds.feedblitz.com/~/t/0/0/sigarch-cat/~https://github.com/shubdeepmohapatra01/HyQSim/"><span style="font-weight: 400;">https://github.com/shubdeepmohapatra01/HyQSim/</span></a><span style="font-weight: 400;">.</span></p>
<h3><b>Programming</b></h3>
<p><span style="font-weight: 400;">Finally, we discussed programming support for hybrid CV-DV systems. Quantum programming languages and frameworks have developed many important ideas over the years, including </span><a href="https://feeds.feedblitz.com/~/t/0/0/sigarch-cat/~https://dl.acm.org/doi/10.1007/11417170_26"><span style="font-weight: 400;">linear quantum types</span></a><span style="font-weight: 400;"> for enforcing the no-cloning theorem, </span><a href="https://feeds.feedblitz.com/~/t/0/0/sigarch-cat/~https://dl.acm.org/doi/10.1145/3385412.3386007"><span style="font-weight: 400;">automatic uncomputation</span></a><span style="font-weight: 400;"> of ancilla qubits, and </span><a href="https://feeds.feedblitz.com/~/t/0/0/sigarch-cat/~https://dl.acm.org/doi/10.1145/2499370.2462177"><span style="font-weight: 400;">dynamic lifting of classical variables</span></a><span style="font-weight: 400;"> for mid-circuit measurement. Hybrid quantum computing introduces an additional requirement: heterogeneous quantum registers containing both qubits and qumodes.</span></p>
<p><span style="font-weight: 400;">To address this challenge, we developed </span><a href="https://feeds.feedblitz.com/~/t/0/0/sigarch-cat/~https://arxiv.org/abs/2603.10919"><b>Hybridlane</b></a><span style="font-weight: 400;">, a CV-DV quantum programming framework built on </span><a href="https://feeds.feedblitz.com/~/t/0/0/sigarch-cat/~https://arxiv.org/abs/1811.04968"><span style="font-weight: 400;">PennyLane</span></a><span style="font-weight: 400;">. By extending PennyLane, Hybridlane inherits a broad library of qubit algorithms, gates, and compilation routines while remaining familiar to existing users. Hybridlane tracks wire types automatically through symbolic circuit analysis and type inference, enabling scalable circuit construction, platform independence, and integration with downstream compilation flows.</span></p>
<p><span style="font-weight: 400;">The tutorial concluded with example workflows using Hybridlane. In one example, we reused an existing PennyLane quantum phase estimation template for a CV-DV Hamiltonian simulation and then lowered it through symbolic compilation to a gate sequence executable on the </span><a href="https://feeds.feedblitz.com/~/t/0/0/sigarch-cat/~https://arxiv.org/abs/2209.11153"><span style="font-weight: 400;">Bosonic Qiskit</span></a><span style="font-weight: 400;"> backend. In another, we demonstrated a cross-platform workflow in which a conditional displacement gate was calibrated in simulation and then compiled for execution on Sandia’s QSCOUT trapped-ion platform. Together, these examples showed how hybrid quantum software can begin to support the same define-simulate-execute workflow that has become standard in mature qubit SDKs.</span></p>
<p><span style="font-weight: 400;">We hope Hybridlane helps enable a broader ecosystem of reusable software and research for hybrid quantum computing. It is available at </span><a href="https://feeds.feedblitz.com/~/t/0/0/sigarch-cat/~https://github.com/pnnl/hybridlane"><span style="font-weight: 400;">https://github.com/pnnl/hybridlane</span></a><span style="font-weight: 400;">.</span></p>
<h3><b>Closing</b></h3>
<p><span style="font-weight: 400;">Hybrid CV-DV computing sits at the intersection of quantum hardware, computer architecture, compilation, and programming systems. We hope this tutorial helps make the area more accessible to researchers across architecture, systems, programming languages, and quantum information, and we invite readers to explore the tutorial materials, benchmarks, and tools linked above.</span></p>
<h3><strong>About the Authors</strong></h3>
<p><span style="font-weight: 400;"><strong>Yuan Liu</strong> is an Assistant Professor of Electrical &amp; Computer Engineering and Computer Science at North Carolina State University. Prior to joining the NC State faculty, he was a postdoctoral researcher at the Massachusetts Institute of Technology. His research interests lie at the intersection of quantum computing, quantum engineering, quantum algorithms/architectures and applications.</span></p>
<p><span style="font-weight: 400;"><strong>Zihan Chen</strong> is a Ph.D. student in computer systems at Rutgers University, advised by Prof. Eddy Z. Zhang. His research focuses on compiler and system-level techniques, as well as parallel computing, to enhance the efficiency, programmability, scalability, and fault tolerance of emerging quantum computing systems.</span></p>
<p><span style="font-weight: 400;"><strong>Shubdeep Mohapatra</strong> is a Ph.D. candidate in Computer Engineering at NC State University, advised by Prof. Huiyang Zhou and Prof. Yuan Liu. His research focuses on quantum error characterization, mitigation, and benchmarking, aimed at improving the reliability and fault tolerance of near-term quantum computing systems.</span></p>
<p><span style="font-weight: 400;"><strong>Jim Furches</strong> is a post-masters research associate at Pacific Northwest National Laboratory. His current research interests are in quantum benchmarking, algorithms, and quantum programming and compilation.</span></p>
<p><span style="font-weight: 400;"><strong>Zheng (Eddy) Zhang</strong> is a Professor in the Department of Computer Science at Rutgers University. Her research focuses on full-stack compiler and programming systems for quantum computing. She studies how to better coordinate quantum applications, programming languages, intermediate representations, compilation, pulse-level control, and hardware architecture to improve the performance, usability, and scalability of quantum systems.</span></p>
<p><span style="font-weight: 400;"><strong>Huiyang Zhou</strong> is a Professor of Electrical and Computer Engineering at North Carolina State University. His current research interests include GPU architecture, processor security, and quantum computing.</span></p>
<p class="disclaim"><strong>Disclaimer:</strong> <em>These posts are written by individual contributors to share their thoughts on the Computer Architecture Today blog for the benefit of the community. Any views or opinions represented in this blog are personal, belong solely to the blog author and do not represent those of ACM SIGARCH or its parent organization, ACM.</em></p><Img align="left" border="0" height="1" width="1" alt="" style="border:0;float:left;margin:0;padding:0;width:1px!important;height:1px!important;" hspace="0" src="https://feeds.feedblitz.com/~/i/954105707/0/sigarch-cat">
]]>
</content:encoded>
			<wfw:commentRss>https://feeds.feedblitz.com/~/954105707/0/sigarch-cat~Beyond-Qubits-A-Systems-View-of-Hybrid-CVDV-Quantum-Computing/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
	<post-id xmlns="com-wordpress:feed-additions:1">102865</post-id></item>
<item>
<feedburner:origLink>https://www.sigarch.org/computer-architectures-alphazero-moment-is-here/</feedburner:origLink>
		<title>Computer Architecture&#8217;s AlphaZero Moment is Here</title>
		<link>https://feeds.feedblitz.com/~/953617784/0/sigarch-cat~Computer-Architectures-AlphaZero-Moment-is-Here/</link>
		<comments>https://feeds.feedblitz.com/~/953617784/0/sigarch-cat~Computer-Architectures-AlphaZero-Moment-is-Here/#comments</comments>
		<pubDate>Fri, 10 Apr 2026 14:00:43 +0000</pubDate>
		<dc:creator><![CDATA[Karu Sankaralingam]]></dc:creator>
		<category><![CDATA[ACM SIGARCH]]></category>
		<category><![CDATA[Architecture]]></category>
		<category><![CDATA[Evaluation]]></category>
		<category><![CDATA[Machine Learning]]></category>
		<guid isPermaLink="false">https://www.sigarch.org/?p=102162</guid>
		<description><![CDATA[<div><img width="300" xheight="187" src="https://www.sigarch.org/wp-content/uploads/2026/04/Gemini_Generated_Image_yndetsyndetsynde-1-300x187.png" class="attachment-medium size-medium wp-post-image" alt="" style="max-width:100% !important;height:auto !important;margin-bottom:15px;margin-left:15px;float:right;"  loading="lazy" /></div>For decades, we have designed chips in fundamentally the same way: human intuition applied to a vanishingly small slice of an impossibly large design space. That paradigm worked when Moore&#8217;s Law was lifting everything. We could afford to be wrong. We could afford to miss the best design. Process scaling would close the gap. That [&#8230;]]]>
</description>
				<content:encoded><![CDATA[<div><img width="300" height="187" src="https://www.sigarch.org/wp-content/uploads/2026/04/Gemini_Generated_Image_yndetsyndetsynde-1-300x187.png" class="attachment-medium size-medium wp-post-image" alt="" style="margin-bottom:15px;margin-left:15px;float:right;" decoding="async" loading="lazy" /></div><div>
<div></div>
<div>For decades, we have designed chips in fundamentally the same way: human intuition applied to a vanishingly small slice of an impossibly large design space. That paradigm worked when Moore&#8217;s Law was lifting everything. We could afford to be wrong. We could afford to miss the best design. Process scaling would close the gap.</div>
<div></div>
<div>That world is over. In a recent position paper — <a href="https://feeds.feedblitz.com/~/t/0/0/sigarch-cat/~https://arxiv.org/abs/2604.03312">&#8220;Computer Architecture&#8217;s AlphaZero Moment: Automated Discovery in an Encircled World&#8221;</a> — I argue that we are at an inflection point. Not a gradual shift, but a structural break in how architecture must be practiced.</div>
<div></div>
<h3>From Idea Scarcity to Evaluation Scarcity</h3>
<div>The central claim is simple, but uncomfortable:</div>
<div></div>
<div><em>Computer architecture is no longer bottlenecked by ideas. It is bottlenecked by evaluation and telemetry.</em></div>
<div></div>
<div>For decades, the field has implicitly assumed that ideas are scarce — that the role of the architect is to generate the one clever mechanism worth exploring. Everything else follows. But recent evidence suggests the opposite. With modern large language models and agentic pipelines, hundreds of viable architectural ideas can be generated per day, thousands of candidate designs can be evaluated per week, and design cycles can compress from months to weeks.</div>
<div></div>
<div>This is not speculative. We built a system called the <a href="https://feeds.feedblitz.com/~/t/0/0/sigarch-cat/~https://github.com/VerticalResearchGroup/Gauntlet">Gauntlet</a> and tested it on 85 papers from ISCA 2025 and HPCA 2026 — largely outside the model&#8217;s training data. Across 475 independent runs, it produced viable architectural mechanisms 95% of the time: independently re-deriving authors&#8217; exact solutions in 48% of cases, and proposing valid alternatives the authors never considered in another 50%. Each took 10–20 minutes. This flips a foundational assumption of the field. If ideas are abundant, then the limiting factor is no longer creativity — it is <strong>which ideas we can evaluate, validate, and trust</strong>. This <a href="https://feeds.feedblitz.com/~/t/0/0/sigarch-cat/~https://pages.cs.wisc.edu/~karu/ArchAlphaZero/zero-arch/html/">link</a> has this corpus of problem statement and Gauntlet&#8217;s solutions.</div>
</div>
<div></div>
<div>
<h4></h4>
<h4>1. Evaluation is the new bottleneck</h4>
<p>We are moving from a world where the question was &#8220;Can we come up with a good idea?&#8221; to one where the question becomes &#8220;Can we evaluate 10,000 ideas fast enough to find the best one?&#8221; This elevates simulation infrastructure, analytical modeling, and verification into the central problems of the field. The &#8220;PhD student for three months&#8221; implementation bottleneck is already eroding — our system built first-principles performance models from papers in under 20 minutes. What replaces it is a race to build faster, more accurate, and more scalable evaluation pipelines.</p>
<h4></h4>
<h4>2. The telemetry divide</h4>
<div>If evaluation becomes central, then <strong>ground truth becomes everything. </strong>Over time, access to closed-loop deployment telemetry — real workloads, real performance counters, real system behavior at scale, and in low-level depth — may matter as much as architectural insight itself. This creates a risk of structural divide. Academic research, long dependent on proxy benchmarks, could drift further from production reality unless we collectively rethink how we share and access workload data.</div>
<h4></h4>
<h4>3. The end of the old boundary</h4>
<div>The traditional separation between &#8220;chip company&#8221; and &#8220;cloud provider&#8221; begins to dissolve. Automated architecture requires three tightly coupled capabilities: deployment (to generate telemetry), infrastructure (to evaluate designs at scale), and silicon expertise (to realize designs physically). No single traditional player owns all three. The result is convergence — either through vertical integration or new hybrid ecosystems.</div>
<h3></h3>
<h3>The Deeper Claim</h3>
<div>The more provocative claim is not about tools — it is about limits. Human-driven architecture is becoming structurally outmatched by the scale of the design space. This is not a statement about human ability. It is about combinatorics. The architectural search space — spanning parametric and structural choices — is effectively unbounded. Humans sample an infinitesimal fraction of it. That was acceptable in an era of abundance. It is not acceptable in an era where architectural efficiency is the primary lever for progress. The analogy to <a href="https://feeds.feedblitz.com/~/t/0/0/sigarch-cat/~https://arxiv.org/abs/1712.01815">AlphaZero </a> is not rhetorical. It is structural: when search, evaluation, and feedback loops become fast enough, intuition gives way to systematic exploration.</div>
<h3></h3>
<h3>What This Means for Research — and Teaching</h3>
<div>If this framing is even partially correct, it forces a rethinking of what it means to &#8220;do&#8221; computer architecture research. Several shifts seem likely. If machines can generate many viable solutions, identifying the *right problem* becomes the scarce intellectual act. Evaluation frameworks, modeling techniques, and telemetry integration may matter more than individual architectural ideas. And the reliance on fixed benchmark suites becomes increasingly fragile in a world driven by dynamic, evolving workloads.</div>
<div></div>
<div>The full paper includes a set of predictions and my opinions on how I see this playing out. This extends to how we teach. Do we still emphasize canonical microarchitectures, or shift toward trade-off reasoning, evaluation frameworks, and interpreting machine-generated designs? What does it mean to train a researcher when idea generation itself is becoming automated?</div>
<h3></h3>
<h3>A Call for Collaboration</h3>
<div>This is not a settled direction — it is a hypothesis that needs to be stress-tested by the community. If this resonates (or if you think it is completely wrong), I would love to engage on: new models for teaching architecture, shared evaluation infrastructure and artifacts, privacy-preserving approaches to workload telemetry, and workshops focused on problem formulation rather than solution novelty. If this is even half right, we may need to rethink our identity as a field. Let&#8217;s debate it.</div>
<div></div>
<div><strong>About the author:</strong> Karthikeyan Sankaralingam is Principal Research Scientist at NVIDIA and Professor at UW-Madison.</div>
<div></div>
<div>Disclaimer: These posts are written by individual contributors to share their thoughts on the Computer Architecture Today blog for the benefit of the community. Any views or opinions represented in this blog are personal, belong solely to the blog author and do not represent those of ACM SIGARCH or its parent organization, ACM.</div>
</div>
<p class="disclaim"><strong>Disclaimer:</strong> <em>These posts are written by individual contributors to share their thoughts on the Computer Architecture Today blog for the benefit of the community. Any views or opinions represented in this blog are personal, belong solely to the blog author and do not represent those of ACM SIGARCH or its parent organization, ACM.</em></p><Img align="left" border="0" height="1" width="1" alt="" style="border:0;float:left;margin:0;padding:0;width:1px!important;height:1px!important;" hspace="0" src="https://feeds.feedblitz.com/~/i/953617784/0/sigarch-cat">
]]>
</content:encoded>
			<wfw:commentRss>https://feeds.feedblitz.com/~/953617784/0/sigarch-cat~Computer-Architectures-AlphaZero-Moment-is-Here/feed/</wfw:commentRss>
		<slash:comments>1</slash:comments>
	<post-id xmlns="com-wordpress:feed-additions:1">102162</post-id></item>
<item>
<feedburner:origLink>https://www.sigarch.org/spilling-the-neural-tea-a-journey-down-the-side-channel/</feedburner:origLink>
		<title>Spilling the Neural Tea: A Journey Down the Side-Channel</title>
		<link>https://feeds.feedblitz.com/~/953386850/0/sigarch-cat~Spilling-the-Neural-Tea-A-Journey-Down-the-SideChannel/</link>
		<comments>https://feeds.feedblitz.com/~/953386850/0/sigarch-cat~Spilling-the-Neural-Tea-A-Journey-Down-the-SideChannel/#respond</comments>
		<pubDate>Mon, 06 Apr 2026 15:37:22 +0000</pubDate>
		<dc:creator><![CDATA[Adnan Rakin]]></dc:creator>
		<category><![CDATA[ACM SIGARCH]]></category>
		<category><![CDATA[deep neural networks]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[side-channels]]></category>
		<guid isPermaLink="false">https://www.sigarch.org/?p=101933</guid>
		<description><![CDATA[<div><img width="300" xheight="164" src="https://www.sigarch.org/wp-content/uploads/2026/04/Gemini_Generated_Image_ptypq1ptypq1ptyp-300x164.png" class="attachment-medium size-medium wp-post-image" alt="" style="max-width:100% !important;height:auto !important;margin-bottom:15px;margin-left:15px;float:right;"  loading="lazy" /></div>Years ago, I came across three pioneering works (CSI-NN, Cache Telepathy, and DeepSniffer) in the field of reverse engineering neural networks that inspired my journey into side-channel attacks to uncover the secrets of modern Deep Neural Networks (DNNs). Fast forward to today, and there has been significant exploitation of side-channel attacks to discover the secrets [&#8230;]]]>
</description>
				<content:encoded><![CDATA[<div><img width="300" height="164" src="https://www.sigarch.org/wp-content/uploads/2026/04/Gemini_Generated_Image_ptypq1ptypq1ptyp-300x164.png" class="attachment-medium size-medium wp-post-image" alt="" style="margin-bottom:15px;margin-left:15px;float:right;" decoding="async" loading="lazy" /></div><p><span style="font-weight: 400;">Years ago, I came across three pioneering works (</span><a href="https://feeds.feedblitz.com/~/t/0/0/sigarch-cat/~https://www.usenix.org/conference/usenixsecurity19/presentation/batina"><span style="font-weight: 400;">CSI-NN</span></a><span style="font-weight: 400;">, </span><a href="https://feeds.feedblitz.com/~/t/0/0/sigarch-cat/~https://iacoma.cs.uiuc.edu/iacoma-papers/usenix20.pdf"><span style="font-weight: 400;">Cache Telepathy</span></a><span style="font-weight: 400;">, and </span><a href="https://feeds.feedblitz.com/~/t/0/0/sigarch-cat/~https://dl.acm.org/doi/10.1145/3373376.3378460"><span style="font-weight: 400;">DeepSniffer</span></a><span style="font-weight: 400;">) in the field of reverse engineering neural networks that inspired my journey into side-channel attacks to uncover the secrets of modern Deep Neural Networks (DNNs). Fast forward to today, and there has been significant exploitation of side-channel attacks to discover the secrets of neural networks. It&#8217;s a good time to provide an overview of where we stand, the outlook for the future, and the challenges ahead.</span></p>
<p><b>Motivation: </b><span style="font-weight: 400;">Let&#8217;s take a step back and first try to understand why we care about secrets in deep learning models. It basically boils down to two fundamental chall</span><span style="font-weight: 400;">enges associated with deep learning: i) Financial, ii) Security and Privacy challenges. In general, DNNs are intellectual property (IP), as they are products developed over years of research, implementation, and investment in computing units, and they entail significant training costs (time, energy, and labor), making them a valuable asset for their owners. Just to give a rough estimate, OpenAI’s </span><a href="https://feeds.feedblitz.com/~/t/0/0/sigarch-cat/~https://openai.com/index/gpt-4-research/"><span style="font-weight: 400;">GPT-4</span></a><span style="font-weight: 400;"> costs more than $ 100 million, and its </span><a href="https://feeds.feedblitz.com/~/t/0/0/sigarch-cat/~https://openai.com/gpt-5/"><span style="font-weight: 400;">GPT-5</span></a><span style="font-weight: 400;"> model is expected to be more than 5x as expensive (</span><a href="https://feeds.feedblitz.com/~/t/0/0/sigarch-cat/~https://www.forbes.com/sites/katharinabuchholz/2024/08/23/the-extreme-cost-of-training-ai-models/"><span style="font-weight: 400;">Cost of Training GPT</span></a><span style="font-weight: 400;">). I do not know about you, but if I spent 100 million on something, I would care about protecting it. The next challenge is knowing that a model secret gives an adversary white-box knowledge, which is extremely powerful in security and privacy settings. Any adversary with knowledge of a target victim&#8217;s model architecture (e.g., model type, layer sequence, and number) and weight information, formally defined as “white-box,” can launch powerful security (adversarial attacks) and privacy threats (model inversion attacks/membership inference attacks). As highlighted in Figure 1, the attacker’s final objective in the DNN reverse-engineering attack is to gain white-box privileges either to steal IP for financial gain or to launch subsequent attacks.</span></p>
<p><i><span style="font-weight: 400;">In summary, in security and privacy research, defining the threat model is the first step towards any exploitation, and the underlying assumption is often that a reverse-engineering attack has successfully uncovered the model architecture, weights, and other hyperparameters.</span></i></p>
<p><b>Attack Objectives: </b><span style="font-weight: 400;">By now, we have established that an attacker’s goal is to uncover two key properties of a victim DNN: its architecture and its parameters. However, this is an oversimplified goal and can often be misleading. To understand this, let&#8217;s consider a deep neural network as a function of </span><span style="font-weight: 400;">x, denoted</span><span style="font-weight: 400;"> </span><span style="font-weight: 400;">f</span><span style="font-weight: 400;">(x)</span><span style="font-weight: 400;">.  If an attacker wants to recover the exact victim model, their objective is for the stolen model to be identical to the original </span><span style="font-weight: 400;">f</span><span style="font-weight: 400;">(x)</span><span style="font-weight: 400;">, which is practically impossible for large-scale DNNs, whether using existing side-channel attacks or the exact victim dataset. As a result, a more practical and plausible goal for an attacker would be to achieve functional equivalence. If the stolen function is different, such as </span><span style="font-weight: 400;">g</span><span style="font-weight: 400;">(x)</span><span style="font-weight: 400;">,</span><span style="font-weight: 400;"> then, for incentive purposes, all an attacker cares about is that these two functions produce identical output,  i.e., </span><span style="font-weight: 400;">f</span><span style="font-weight: 400;">(x)=</span> <span style="font-weight: 400;">g</span><span style="font-weight: 400;">(x)</span><span style="font-weight: 400;">, for inputs </span><span style="font-weight: 400;">x</span><span style="font-weight: 400;"> that are of the attacker&#8217;s interest. As a result, achieving functional equivalence means recovering the DNN model architecture, often as close as possible to the victim architecture&#8217;s topology. On the weight side, even if an attacker cannot extract the exact weights, they must aim for a weight-space solution that captures the victim model&#8217;s functionality.</span></p>
<p><i><span style="font-weight: 400;">In summary, to steal a copy of the victim model/function, an attacker must identify the victim model architecture. In modern deep learning, where most practical applications use some version of a DNN model from an existing pool (e.g., GPT, Llama), recovering the architecture often boils down to detecting the model&#8217;s topology. Once the architecture is revealed, the attacker must recover the model parameters/weights, which is often a challenging part of the attack. Then again, as we discussed earlier, exact model recovery can be challenging, but achieving functional equivalence is a modest objective. Most importantly, to achieve functional equivalence, the attacker may not need to reveal the exact numerical weights; rather, gradually recovering coarse-grained information (e.g., weight sparsity, quantization pattern, weight distribution) is often sufficient.</span></i></p>
<p><img loading="lazy" decoding="async" class="alignnone wp-image-101935" src="https://www.sigarch.org/wp-content/uploads/2026/04/image7.png" alt="" width="884" height="483" /></p>
<p>Figure 1: Spectrum of attack threats characterized by attacker’s knowledge: Black-Box (No Knowledge), Grey-Box (Partial Knowledge, e.g., architecture), and White-box (Complete knowledge of model architecture and weights), the ultimate goal of reverse-engineering (AI-generated).</p>
<p><b>Attack Techniques and Capabilities.</b> <span style="font-weight: 400;">Among the popular types of side-channel attacks, i.e., physical and microarchitectural, both can be utilized in two different threat model settings. In edge or embedded devices, the physical side channel is the dominant threat, and several works (</span><a href="https://feeds.feedblitz.com/~/t/0/0/sigarch-cat/~https://www.usenix.org/conference/usenixsecurity19/presentation/batina"><span style="font-weight: 400;">CSI-NN</span></a><span style="font-weight: 400;">, </span><a href="https://feeds.feedblitz.com/~/t/0/0/sigarch-cat/~https://www.usenix.org/conference/usenixsecurity25/presentation/horvath"><span style="font-weight: 400;">BarraCUDA</span></a><span style="font-weight: 400;">) have shown that it is possible to recover the model architecture and weights of simple neural networks. On the other hand, micro-architectural side channels are a popular choice for resource-sharing cloud environments where users can upload and run their code in a colocated environment (e.g., </span><a href="https://feeds.feedblitz.com/~/t/0/0/sigarch-cat/~https://aws.amazon.com/sagemaker/"><span style="font-weight: 400;">Amazon SageMaker</span></a><span style="font-weight: 400;"> and </span><a href="https://feeds.feedblitz.com/~/t/0/0/sigarch-cat/~https://cloud.google.com/ml-engine/docs/technical-overview"><span style="font-weight: 400;">Google ML Engine</span></a><span style="font-weight: 400;">). Microarchitectural attacks have been successful in recovering model architecture across the board using </span><a href="https://feeds.feedblitz.com/~/t/0/0/sigarch-cat/~https://www.usenix.org/conference/usenixsecurity20/presentation/yan"><span style="font-weight: 400;">cache timing channels</span></a><span style="font-weight: 400;">, </span><a href="https://feeds.feedblitz.com/~/t/0/0/sigarch-cat/~https://dl.acm.org/doi/10.1145/3373376.3378460"><span style="font-weight: 400;">memory access patterns</span></a><span style="font-weight: 400;">, and </span><a href="https://feeds.feedblitz.com/~/t/0/0/sigarch-cat/~https://ieeexplore.ieee.org/document/9153424/"><span style="font-weight: 400;">GPU context switching</span></a><span style="font-weight: 400;">. I acknowledge that there are many ways to recover DNN model weights, including </span><a href="https://feeds.feedblitz.com/~/t/0/0/sigarch-cat/~https://www.usenix.org/conference/usenixsecurity16/technical-sessions/presentation/tramer"><span style="font-weight: 400;">learning-based approaches</span></a><span style="font-weight: 400;"> and </span><a href="https://feeds.feedblitz.com/~/t/0/0/sigarch-cat/~https://www.usenix.org/conference/usenixsecurity20/presentation/jagielski"><span style="font-weight: 400;">mathematical recovery</span></a><span style="font-weight: 400;"> techniques. In this blog post, I focus on side-channel attacks. At the same time, learning-based approaches can work as a complementary approach with side-channel attacks once the architecture information has already been leaked. </span></p>
<p><i><span style="font-weight: 400;">In summary, while side-channel attacks have been successful in leaking model architecture information, as the scale of modern DNNs, e.g., LLM weights, continues to reach new heights of billions, none of the existing side channels can scalably and predictably recover model parameter information. A common workaround would be to support these methods with a learning approach, assuming an attacker has a partial training set, which may not be practical, even in a resource-sharing environment where data remains private.</span></i></p>
<p><b><i>Future Challenges and Opportunities: </i></b></p>
<p><b>What is the future of architecture-recovery attacks, given the success of existing side channels?</b></p>
<p><i><span style="font-weight: 400;">As the next wave of vision and language domain architectures emerges, they present new challenges and opportunities for the microarchitectural side-channel attack community. These models require modern compute support, which can accelerate their inference (e.g., tensor cores), as GPUs become more modern and newer generations may leave new traces of side-channel information. Hence, these newer compute platforms (e.g., new GPUs) and their associated architectural support demand new innovation in side-channel capabilities to recover the model architecture. We must remember that architecture recovery is essential; without it, model parameter recovery is no longer useful. Moreover, as LLMs emerge as the dominant model, the question is not just about recovering weights or architecture; leaking other components, such as KV cache in a multi-tenant setting, can lead to </span></i><a href="https://feeds.feedblitz.com/~/t/0/0/sigarch-cat/~https://www.ndss-symposium.org/wp-content/uploads/2025-1772-paper.pdf"><i><span style="font-weight: 400;">privacy leakage</span></i></a><i><span style="font-weight: 400;">. </span></i></p>
<p><b>Can a microarchitectural side channel alone ever be sufficient to recover model weight information? </b></p>
<p><span style="font-weight: 400;">The sheer scale of the modern model poses an even greater challenge for recovering weights, making direct recovery an ambitious, and even impossible, goal; instead, we should focus on functional equivalence. To achieve functional equivalence, weight recovery methods can set tiny stepping stones to augment learning-based recovery. </span></p>
<p><i><span style="font-weight: 400;">Complete weight recovery using a side channel at the scale of LLMs or even a smaller vision model may be too ambitious. Instead, the attacks should focus on coarse-grained information about weights, such as model sparsity levels, quantization mechanisms, weight sign recovery, and other optimization techniques. The key idea is to achieve functional equivalence by first recovering coarse-grained information, which is sufficient to support other learning-based recovery. It is time to work towards an achievable target: recovering this statistical weight-level knowledge and studying how critical their role is in improving subsequent attacks. As models and their computation units are increasingly optimized, leaking information such as sparsity levels or bit-widths will become more feasible by detecting optimized paths through side-channel leakage.</span></i></p>
<p><span style="font-weight: 400;">Finally, an attack is never the end goal. We probe attacks from every angle so we can study them before any attacker ever thinks about them. The endgame is always to develop subsequent defenses, which I leave for another discussion.</span></p>
<p><strong>About the author: </strong></p>
<p><a href="https://feeds.feedblitz.com/~/t/0/0/sigarch-cat/~https://www.binghamton.edu/computer-science/people/profile.html?id=arakin"><span style="font-weight: 400;">Adnan Siraj Rakin</span></a><span style="font-weight: 400;"> is an Assistant Professor at the School of Computing at Binghamton University. He received his Master&#8217;s (2021) and PhD (2022) from Arizona State University. He works on emerging security and privacy challenges in modern AI </span><a href="https://feeds.feedblitz.com/~/t/0/0/sigarch-cat/~https://www.usenix.org/conference/usenixsecurity21/presentation/rakin"><span style="font-weight: 400;">systems</span></a><span style="font-weight: 400;"> and </span><a href="https://feeds.feedblitz.com/~/t/0/0/sigarch-cat/~https://openaccess.thecvf.com/content/ICCV2023/papers/Ahmed_SSDA_Secure_Source-Free_Domain_Adaptation_ICCV_2023_paper.pdf"><span style="font-weight: 400;">algorithms</span></a><span style="font-weight: 400;">. His paper on</span><a href="https://feeds.feedblitz.com/~/t/0/0/sigarch-cat/~https://ieeexplore.ieee.org/document/9833743/"><span style="font-weight: 400;"> DNN model weight recovery</span></a><span style="font-weight: 400;"> has been </span><span style="font-weight: 400;">crowned as </span><span style="font-weight: 400;">Top Picks in Hardware and Embedded Security in 2024. </span></p>
<p class="disclaim"><strong>Disclaimer:</strong> <em>These posts are written by individual contributors to share their thoughts on the Computer Architecture Today blog for the benefit of the community. Any views or opinions represented in this blog are personal, belong solely to the blog author and do not represent those of ACM SIGARCH or its parent organization, ACM.</em></p><Img align="left" border="0" height="1" width="1" alt="" style="border:0;float:left;margin:0;padding:0;width:1px!important;height:1px!important;" hspace="0" src="https://feeds.feedblitz.com/~/i/953386850/0/sigarch-cat">
]]>
</content:encoded>
			<wfw:commentRss>https://feeds.feedblitz.com/~/953386850/0/sigarch-cat~Spilling-the-Neural-Tea-A-Journey-Down-the-SideChannel/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
	<post-id xmlns="com-wordpress:feed-additions:1">101933</post-id></item>
<item>
<feedburner:origLink>https://www.sigarch.org/to-sparsify-or-to-quantize-a-hardware-architecture-view/</feedburner:origLink>
		<title>To Sparsify or To Quantize: A Hardware Architecture View</title>
		<link>https://feeds.feedblitz.com/~/950020673/0/sigarch-cat~To-Sparsify-or-To-Quantize-A-Hardware-Architecture-View/</link>
		<comments>https://feeds.feedblitz.com/~/950020673/0/sigarch-cat~To-Sparsify-or-To-Quantize-A-Hardware-Architecture-View/#respond</comments>
		<pubDate>Thu, 12 Mar 2026 15:00:43 +0000</pubDate>
		<dc:creator><![CDATA[Sai Srivatsa Bhamidipati]]></dc:creator>
		<category><![CDATA[ACM SIGARCH]]></category>
		<category><![CDATA[Accelerators]]></category>
		<category><![CDATA[deep neural networks]]></category>
		<category><![CDATA[Machine Learning]]></category>
		<guid isPermaLink="false">https://www.sigarch.org/?p=100754</guid>
		<description><![CDATA[<div><img width="300" xheight="164" src="https://www.sigarch.org/wp-content/uploads/2026/03/Blog-Image-2-Picsart-AiImageEnhancer-300x164.png" class="attachment-medium size-medium wp-post-image" alt="" style="max-width:100% !important;height:auto !important;margin-bottom:15px;margin-left:15px;float:right;"  loading="lazy" /></div>The debate of sparsity versus quantization has made its rounds in the ML optimization community for many years. Now, with the Generative AI revolution, the debate is intensifying. While these might both seem like simple mathematical approximations to an AI researcher, for a hardware architect, they present fundamentally different sets of challenges. Many architects in [&#8230;]]]>
</description>
				<content:encoded><![CDATA[<div><img width="300" height="164" src="https://www.sigarch.org/wp-content/uploads/2026/03/Blog-Image-2-Picsart-AiImageEnhancer-300x164.png" class="attachment-medium size-medium wp-post-image" alt="" style="margin-bottom:15px;margin-left:15px;float:right;" decoding="async" loading="lazy" /></div><p><span style="font-weight: 400;">The debate of sparsity versus quantization has made its rounds in the ML optimization community for many years. Now, with the Generative AI revolution, the debate is intensifying. While these might both seem like simple mathematical approximations to </span>an AI researcher, for a hardware architect, they present fundamentally different sets of challenges. Many architects in the AI hardware space are deeply familiar with watching the scale tip from one side to the other, constantly searching for a pragmatic balance. Let&#8217;s look at both techniques, unpack the architectural challenges they introduce, and explore whether a &#8220;best of both worlds&#8221; scenario is truly possible (Spoiler: It depends).</p>
<p><i><span style="font-weight: 400;">Note: We will only be looking at compute-bound workloads, which traditionally rely on dense compute units such as tensor cores or MXUs. We will set aside memory-bound workloads for now, as they introduce their own distinct set of tradeoffs for sparsity and quantization.</span></i></p>
<h2><b>Sparsity</b></h2>
<p><span style="font-weight: 400;">The core idea of sparsity is beautifully simple: if a neural network weight is zero (or close enough to it), just don&#8217;t do the math. Theoretically, pruning can save massive amounts of compute and memory bandwidth.</span></p>
<p><b>The Architecture Challenge: The Chaos of Unstructured Data</b></p>
<p><span style="font-weight: 400;">The golden goose of this approach is fine-grained, unstructured sparsity. It offers a high level of achievable compression through pruning, but results in a completely random distribution of zero elements. Traditional dense hardware </span><i><span style="font-weight: 400;">hates</span></i><span style="font-weight: 400;"> this. Randomness leads to irregular memory accesses, unpredictable load balancing across cores, and terrible cache utilization. High-performance SIMD units end up starving while the memory controller plays hopscotch trying to fetch the next non-zero value. To architect around this, pioneering unstructured sparse accelerators—such as</span><a href="https://feeds.feedblitz.com/~/t/0/0/sigarch-cat/~https://arxiv.org/abs/1602.01528"> <span style="font-weight: 400;">EIE</span></a><span style="font-weight: 400;"> and</span><a href="https://feeds.feedblitz.com/~/t/0/0/sigarch-cat/~https://arxiv.org/abs/1708.04485"> <span style="font-weight: 400;">SCNN</span></a><span style="font-weight: 400;">—had to rely heavily on complex routing logic, specialized crossbars, and deep queues just to keep the compute units fed, often trading compute area for routing overhead.</span></p>
<p><b>The Compromise: Structured and Coarse-Grained Sparsity</b></p>
<p><span style="font-weight: 400;">To tame this chaos, the industry shifted toward structured compromises. The universally embraced</span><a href="https://feeds.feedblitz.com/~/t/0/0/sigarch-cat/~https://developer.nvidia.com/blog/accelerating-inference-with-sparsity-using-ampere-and-tensorrt/"> <span style="font-weight: 400;">N:M sparsity</span></a><span style="font-weight: 400;"> (popularized by NVIDIA&#8217;s Ampere architecture) forces exactly N non-zero elements in every block of M. This provides a predictable load-balancing mechanism where the hardware can perfectly schedule memory fetches and compute.</span></p>
<p><span style="font-weight: 400;">More recently, to tackle the quadratic memory bottleneck of long-context LLMs, we&#8217;ve seen a surge in modern </span><i><span style="font-weight: 400;">sparse attention mechanisms</span></i><span style="font-weight: 400;"> that leverage block sparsity. Techniques like</span> <a href="https://feeds.feedblitz.com/~/t/0/0/sigarch-cat/~https://github.com/mit-han-lab/Block-Sparse-Attention"><i><span style="font-weight: 400;">Block-Sparse Attention</span></i></a><span style="font-weight: 400;"> and </span><a href="https://feeds.feedblitz.com/~/t/0/0/sigarch-cat/~https://arxiv.org/abs/2003.05997"><span style="font-weight: 400;">Routing Attention</span></a><span style="font-weight: 400;"> enforce sparsity at the chunk or tile level. Instead of picking individual tokens, they route computation to contiguous blocks of tokens, allowing standard dense matrix multiplication engines to skip entire chunks while maintaining high MXU utilizations and contiguous memory access. Other approaches, like</span><a href="https://feeds.feedblitz.com/~/t/0/0/sigarch-cat/~https://arxiv.org/abs/2309.17453"> <span style="font-weight: 400;">StreamingLLM</span></a><span style="font-weight: 400;">, evict older tokens entirely, retaining only local context and specific &#8220;heavy hitter&#8221; sink tokens.</span></p>
<p><span style="font-weight: 400;">The trade-off across these methods is clear: we exchange theoretical maximum efficiency for hardware-friendly predictability, paying a &#8220;tax&#8221; in metadata storage (index matrices), specialized multiplexing logic, and the persistent algorithmic risk of dropping contextually vital information.</span></p>
<h2><b>Quantization</b></h2>
<p><span style="font-weight: 400;">While sparsity aims to compute </span><i><span style="font-weight: 400;">less</span></i><span style="font-weight: 400;">, quantization aims to compute </span><i><span style="font-weight: 400;">smaller</span></i><span style="font-weight: 400;">. Shrinking datatypes from 32-bit floats (FP32) to INT8, or embracing emerging standards like the</span><a href="https://feeds.feedblitz.com/~/t/0/0/sigarch-cat/~https://www.opencompute.org/documents/ocp-microscaling-formats-mx-v1-0-spec-final-pdf"> <span style="font-weight: 400;">OCP Microscaling Formats (MX) Specification</span></a><span style="font-weight: 400;"> (such as MXFP8 E4M3 and E5M2), acts as an immediate multiplier for memory bandwidth and capacity. But the frontier has pushed much further than 8-bit. Recent advancements in extreme quantization, such as</span><a href="https://feeds.feedblitz.com/~/t/0/0/sigarch-cat/~https://arxiv.org/abs/2402.17764"> <span style="font-weight: 400;">BitNet b1.58</span></a><span style="font-weight: 400;"> (1-bit LLMs using ternary weights of {-1, 0, 1}) and 2-bit quantization schemes (like</span><a href="https://feeds.feedblitz.com/~/t/0/0/sigarch-cat/~https://arxiv.org/abs/2210.17323"> <span style="font-weight: 400;">GPTQ</span></a><span style="font-weight: 400;"> or <a href="https://feeds.feedblitz.com/~/t/0/0/sigarch-cat/~https://arxiv.org/abs/2307.13304">Quip</a>), demonstrate that large language models can maintain remarkable accuracy even when weights are squeezed to their absolute theoretical limits.</span></p>
<p><b>The Architecture Challenge: The Tyranny of Metadata and Scaling Factors</b></p>
<p><span style="font-weight: 400;">From an architecture perspective, the challenge of extreme quantization isn&#8217;t just the math—it&#8217;s the metadata. To maintain accuracy at 4-bit, 2-bit, or sub-integer levels, algorithms demand fine-grained control, requiring per-channel, per-group, or even per-token dynamic scaling factors. Every time we shrink the primary datapath, the relative hardware overhead of managing these scaling factors skyrockets. Along with that, the quantization algorithm also becomes more fine grained, dynamic and complex. We are forced to add additional logic and even high-precision accumulators (often FP16 or FP32) just to handle the on-the-fly de-quantization and accumulation. We aggressively optimize the MAC (Multiply-Accumulate) units, only to trade that for the overhead of adding scaling factor handling and supporting a potentially new dynamic quantization scheme, which can outweigh the gains.</span></p>
<p><b>The Compromise: Algorithmic Offloading</b></p>
<p><span style="font-weight: 400;">To fix this without blowing up the complexity and area budget, the community relies on algorithmic co-design. Techniques like</span><a href="https://feeds.feedblitz.com/~/t/0/0/sigarch-cat/~https://arxiv.org/abs/2211.10438"> <span style="font-weight: 400;">SmoothQuant</span></a><span style="font-weight: 400;"> effectively migrate the quantization difficulty offline, mathematically shifting the dynamic range from spiky, hard-to-predict activations into the statically known weights. Similarly,</span><a href="https://feeds.feedblitz.com/~/t/0/0/sigarch-cat/~https://arxiv.org/abs/2306.00978"> <span style="font-weight: 400;">AWQ (Activation-aware Weight Quantization)</span></a><span style="font-weight: 400;"> identifies and protects a small fraction of &#8220;salient&#8221; weights to maintain accuracy without requiring complex, dynamic mixed-precision hardware pipelines. By absorbing the complexity into offline mathematics, these techniques allow the hardware to run mostly uniform, low-precision datatypes.</span></p>
<p><span style="font-weight: 400;">However, much like the routing tax in sparsity, this algorithmic offloading comes with some compromises. These methods heavily rely on static, offline calibration datasets. If a model encounters out-of-distribution data in production (a different language, an unusual coding syntax, or an unexpected prompt structure), the statically determined scaling factors can fail, leading to outlier clipping and catastrophic accuracy collapse. Furthermore, relying on offline preprocessing creates a rigid deployment pipeline that prevents the model from adapting to extreme activation spikes on the fly.</span></p>
<h2><b>Is there a &#8220;best of both worlds&#8221;?</b></h2>
<p><span style="font-weight: 400;">So, knowing these trade-offs, do we sparsify or do we quantize? Many years ago, the </span><a href="https://feeds.feedblitz.com/~/t/0/0/sigarch-cat/~https://arxiv.org/abs/1510.00149"><span style="font-weight: 400;">Deep Compression</span></a><span style="font-weight: 400;"> paper proved we could do both. But today, pulling this off at the scale of a 70-billion parameter LLM is incredibly difficult. It suffers from the classic hardware optimization catch-22 (see </span><a href="https://feeds.feedblitz.com/~/t/0/0/sigarch-cat/~https://www.sigarch.org/dont-put-all-your-tensors-in-one-basket-hardware-lottery/"><span style="font-weight: 400;">All in on Matmul?</span></a><span style="font-weight: 400;">) : </span><i><span style="font-weight: 400;">No one uses a new piece of hardware because it’s not supported by software, and it’s not supported by software because no one’s using it.</span></i></p>
<p><span style="font-weight: 400;">So what&#8217;s the path forward for hardware architects? In my opinion, the following:</span></p>
<ul>
<li style="font-weight: 400;"><b>Deep Hardware-Software Co-design:</b><span style="font-weight: 400;"> The days of throwing a generic matrix-multiplication engine at a model are over. We need to work directly with AI researchers so that when they design a new pruning threshold or a novel sub-byte data type, the hardware already has a streamlined, fast path for the metadata.</span></li>
<li style="font-weight: 400;"><b>Generalized Compression Abstractions:</b><span style="font-weight: 400;"> Historically, we have designed accelerators that are either &#8220;good at sparsity&#8221; (with complex routing networks) or &#8220;good at quantization&#8221; (with mixed-precision MACs). Moving forward, we need to view these not as orthogonal features, but as a unified spectrum of compression. Architectures must be designed to dynamically adapt—perhaps fluidly dropping structurally sparse blocks during a memory-bound decode phase, while leaning on extreme sub-byte quantization during a compute-heavy prefill phase—potentially even sharing the same underlying logic.</span></li>
<li style="font-weight: 400;"><b>Balance Efficiency and Programmability:</b><span style="font-weight: 400;"> As explored in the &#8220;All in on MatMul?&#8221; post, we need to keep our hardware flexible. Over-fitting to today&#8217;s specific sparsity pattern or quantization trick risks building being trapped in the local minimum. We must maintain enough programmability to enable future algorithm discovery and break free from the catch-22.</span></li>
</ul>
<p><span style="font-weight: 400;">Some notable research going along this path include </span><a href="https://feeds.feedblitz.com/~/t/0/0/sigarch-cat/~https://arxiv.org/pdf/2405.20935"><span style="font-weight: 400;">Effective interplay between sparsity and quantization</span></a><span style="font-weight: 400;">, which proves the non-orthogonality of the two techniques and explores the interplay between them and also the </span><a href="https://feeds.feedblitz.com/~/t/0/0/sigarch-cat/~https://www.cs.toronto.edu/~mmozaffari/compression-trinity/index.html"><span style="font-weight: 400;">Compression Trinity</span></a><span style="font-weight: 400;"> work which takes a look at multiple techniques across sparsity, quantization and low rank approximation and tries to take a holistic view of the optimization space across the stack.</span></p>
<p><span style="font-weight: 400;">Ultimately, as alluded to before, there is no single silver bullet, and like all open architecture problems, the answer is always &#8220;it depends&#8221;.  But in the era of Generative AI, it depends on whether we view sparsity and quantization as competing alternatives or as pieces of the same puzzle. Perhaps it’s time we stop asking which one is better, and start designing architectures flexible enough to embrace the realities of both.</span></p>
<p>&nbsp;</p>
<h3><b>About the Author:</b></h3>
<p><span style="font-weight: 400;">Sai Srivatsa Bhamidipati is a Senior Silicon Architect at Google working on the Google Tensor TPU in the Pixel phones. His primary focus is on efficient and scalable compute for Generative AI on the Tensor TPU.</span></p>
<h3><b>Authors’ Disclaimer:</b></h3>
<p><span style="font-weight: 400;">Portions of this post were edited with the assistance of AI models. Some references, notes and images were also compiled using AI tools. The content represents the opinions of the authors and does not necessarily represent the views, policies, or positions of Google or its affiliates.</span></p>
<p class="disclaim"><strong>Disclaimer:</strong> <em>These posts are written by individual contributors to share their thoughts on the Computer Architecture Today blog for the benefit of the community. Any views or opinions represented in this blog are personal, belong solely to the blog author and do not represent those of ACM SIGARCH or its parent organization, ACM.</em></p><Img align="left" border="0" height="1" width="1" alt="" style="border:0;float:left;margin:0;padding:0;width:1px!important;height:1px!important;" hspace="0" src="https://feeds.feedblitz.com/~/i/950020673/0/sigarch-cat">
]]>
</content:encoded>
			<wfw:commentRss>https://feeds.feedblitz.com/~/950020673/0/sigarch-cat~To-Sparsify-or-To-Quantize-A-Hardware-Architecture-View/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
	<post-id xmlns="com-wordpress:feed-additions:1">100754</post-id></item>
<item>
<feedburner:origLink>https://www.sigarch.org/from-the-editors-desk-2026-edition/</feedburner:origLink>
		<title>From the Editor&#8217;s Desk &#8211; 2026 Edition</title>
		<link>https://feeds.feedblitz.com/~/944524166/0/sigarch-cat~From-the-Editors-Desk-Edition/</link>
		<comments>https://feeds.feedblitz.com/~/944524166/0/sigarch-cat~From-the-Editors-Desk-Edition/#respond</comments>
		<pubDate>Tue, 03 Feb 2026 20:19:39 +0000</pubDate>
		<dc:creator><![CDATA[Dmitry Ponomarev]]></dc:creator>
		<category><![CDATA[ACM SIGARCH]]></category>
		<category><![CDATA[Blog]]></category>
		<category><![CDATA[Editorial]]></category>
		<guid isPermaLink="false">https://www.sigarch.org/?p=96844</guid>
		<description><![CDATA[<div><img width="300" xheight="169" src="https://www.sigarch.org/wp-content/uploads/2026/02/AdobeStock_862939397-300x169.jpeg" class="attachment-medium size-medium wp-post-image" alt="" style="max-width:100% !important;height:auto !important;margin-bottom:15px;margin-left:15px;float:right;"  loading="lazy" /></div>As we close the book on 2025, Computer Architecture Today has seen another successful year of community engagement. We published 29 posts covering a wide spectrum of topics—from datacenter energy-efficiency to the evolving debate on LLMs in peer review, alongside trip reports from our major conferences. I want to thank all our authors for their [&#8230;]]]>
</description>
				<content:encoded><![CDATA[<div><img width="300" height="169" src="https://www.sigarch.org/wp-content/uploads/2026/02/AdobeStock_862939397-300x169.jpeg" class="attachment-medium size-medium wp-post-image" alt="" style="margin-bottom:15px;margin-left:15px;float:right;" decoding="async" loading="lazy" /></div><p>As we close the book on 2025, <i data-path-to-node="18,0" data-index-in-node="30">Computer Architecture Today</i> has seen another successful year of community engagement. We published 29 posts covering a wide spectrum of topics—from datacenter energy-efficiency to the evolving debate on LLMs in peer review, alongside trip reports from our major conferences. I want to thank all our authors for their insights, with special appreciation for those who contributed multiple times.</p>
<p>Over the last year, we shifted our editorial model, moving from a roster of set contributors to a more flexible, open-submission approach. We also re-established our conference trip reports, highlighting top architecture venues.</p>
<p data-path-to-node="14,2">The blog thrives on new voices, and our door is always open. We are actively looking for:</p>
<ul data-path-to-node="14,3">
<li>
<p data-path-to-node="14,3,0,0"><b data-path-to-node="14,3,0,0" data-index-in-node="0">New Ideas:</b> If you have a topic in mind, please propose it using <a href="https://feeds.feedblitz.com/~/t/0/0/sigarch-cat/~https://www.sigarch.org/contribute/propose-a-blog-post-topic/">this link</a> or email me directly.</p>
</li>
<li>
<p data-path-to-node="14,3,1,0"><b data-path-to-node="14,3,1,0" data-index-in-node="0">Trip Reports:</b> Planning to attend a conference? Volunteer to share your experience.</p>
</li>
<li>
<p data-path-to-node="14,3,2,0"><b data-path-to-node="14,3,2,0" data-index-in-node="0">Event Summaries:</b> Organizers of workshops or tutorials are welcome to publicize their events through summary posts.</p>
</li>
<li>
<p data-path-to-node="14,3,3,0"><b data-path-to-node="14,3,3,0" data-index-in-node="0">Industry Perspectives:</b> We would like to hear from our industry colleagues about their take on the future landscape of computer architecture.</p>
</li>
</ul>
<p data-path-to-node="14,4">Finally, as AI tools proliferate, the conversation around their role in our paper reviewing process is far from over. I look forward to seeing more of that debate here.</p>
<p data-path-to-node="14,4">Here’s to the new advances in Computer Architecture in 2026!</p>
<p class="disclaim"><strong>Disclaimer:</strong> <em>These posts are written by individual contributors to share their thoughts on the Computer Architecture Today blog for the benefit of the community. Any views or opinions represented in this blog are personal, belong solely to the blog author and do not represent those of ACM SIGARCH or its parent organization, ACM.</em></p><Img align="left" border="0" height="1" width="1" alt="" style="border:0;float:left;margin:0;padding:0;width:1px!important;height:1px!important;" hspace="0" src="https://feeds.feedblitz.com/~/i/944524166/0/sigarch-cat">
]]>
</content:encoded>
			<wfw:commentRss>https://feeds.feedblitz.com/~/944524166/0/sigarch-cat~From-the-Editors-Desk-Edition/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
	<post-id xmlns="com-wordpress:feed-additions:1">96844</post-id></item>
</channel></rss>

