scispace - formally typeset
W

William J. Starke

Researcher at IBM

Publications -  268
Citations -  4448

William J. Starke is an academic researcher from IBM. The author has contributed to research in topics: Cache & Cache pollution. The author has an hindex of 30, co-authored 268 publications receiving 4349 citations. Previous affiliations of William J. Starke include GlobalFoundries.

Papers
More filters
Journal ArticleDOI

Power7: IBM's Next-Generation Server Processor

TL;DR: Power Systems™ continue strong 7th Generation Power chip: Balanced Multi-Core design EDRAM technology SMT4 greater then 4X performance in same power envelope as previous generation.
Journal ArticleDOI

IBM POWER6 microarchitecture

TL;DR: Key extensions to the coherence protocol enable POWER6 microprocessor-based systems to achieve better SMP scalability while enabling reductions in system packaging complexity and cost.
Patent

Preprocessing of stored target routines for emulating incompatible instructions on a target processor

TL;DR: In this paper, the authors present a method to emulate the execution results of an incompatible program when the target processor itself is incapable of performing the emulated acts, by accessing the target routines corresponding to the instructions, interruptions and authorizations of the program.
Patent

Method of using a target processor to execute programs of a source architecture that uses multiple address spaces

TL;DR: In this paper, the authors propose an instruction set translator (IST) for dynamically translating the machine language instructions of an alien source computer into a set of functionally equivalent target computer instructions, providing in the target machine, an execution environment for source machine operating systems, application subsystems, and applications.
Patent

Storage access authorization controls in a computer system using dynamic translation of large addresses

TL;DR: In this paper, a method of using the DAT mechanism in a computer processor to extend both: 1) the native storage access authorization architecture of the processor, and 2) to enable the processor to execute programs designed to operate under different storage access architectures.