{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,2]],"date-time":"2026-04-02T16:02:11Z","timestamp":1775145731753,"version":"3.50.1"},"reference-count":40,"publisher":"Association for Computing Machinery (ACM)","issue":"2","license":[{"start":{"date-parts":[[2019,1,28]],"date-time":"2019-01-28T00:00:00Z","timestamp":1548633600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["Commun. ACM"],"published-print":{"date-parts":[[2019,1,28]]},"abstract":"<jats:p>Innovations like domain-specific hardware, enhanced security, open instruction sets, and agile chip development will lead the way.<\/jats:p>","DOI":"10.1145\/3282307","type":"journal-article","created":{"date-parts":[[2019,1,29]],"date-time":"2019-01-29T08:16:22Z","timestamp":1548749782000},"page":"48-60","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":542,"title":["A new golden age for computer architecture"],"prefix":"10.1145","volume":"62","author":[{"given":"John L.","family":"Hennessy","sequence":"first","affiliation":[{"name":"Stanford University, Stanford, CA and Alphabet Inc., Mountain View, CA"}]},{"given":"David A.","family":"Patterson","sequence":"additional","affiliation":[{"name":"University of California, Berkeley, CA and Google, Mountain View, CA"}]}],"member":"320","published-online":{"date-parts":[[2019,1,28]]},"reference":[{"key":"e_1_2_1_1_1","volume-title":"Manifesto for Agile Software Development","author":"Beck K.","year":"2001","unstructured":"Beck, K., Beedle, M., Van Bennekum, A., Cockburn, A., Cunningham, W., Fowler, M. ... and Kern, J. Manifesto for Agile Software Development, 2001; https:\/\/agilemanifesto.org\/"},{"key":"e_1_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/106972.107003"},{"key":"e_1_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.5555\/2245737.2245881"},{"key":"e_1_2_1_4_1","volume-title":"Proceedings of the Symposia on VLSI Technology and Circuits (Honolulu, HI, June 18--22)","author":"Dally W.","year":"2018","unstructured":"Dally, W. et al. Hardware-enabled artificial intelligence. In Proceedings of the Symposia on VLSI Technology and Circuits (Honolulu, HI, June 18--22). IEEE Press, 2018, 3--6."},{"key":"e_1_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/JSSC.1974.1050511"},{"key":"e_1_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/800015.808199"},{"key":"e_1_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/MC.1984.1659185"},{"key":"e_1_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/859520.859524"},{"key":"e_1_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/TC.1972.5009071"},{"key":"e_1_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISCA.2018.00012"},{"key":"e_1_2_1_11_1","volume-title":"CA","author":"Hennessy J.","unstructured":"Hennessy, J. and Patterson, D. A New Golden Age for Computer Architecture. Turing Lecture delivered at the 45<sup>th<\/sup> ACM\/IEEE Annual International Symposium on Computer Architecture (Los Angeles, CA, June 4, 2018); http:\/\/iscaconf.org\/isca2018\/turing_lecture.html; https:\/\/www.youtube.com\/watch?v=3LVeEjsn8Ts"},{"key":"e_1_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.5555\/1014194.800930"},{"key":"e_1_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.5555\/77493"},{"key":"e_1_2_1_14_1","volume-title":"Computer Architecture Today blog (Feb. 15","author":"Hill M.","year":"2018","unstructured":"Hill, M. A primer on the meltdown and Spectre hardware security design flaws and their important implications, Computer Architecture Today blog (Feb. 15, 2018); https:\/\/www.sigarch.org\/a-primer-on-the-meltdown-spectre-hardware-security-design-flaws-and-their-important-implications\/"},{"key":"e_1_2_1_15_1","unstructured":"Hopkins M. A critical look at IA-64: Massive resources massive ILP but can it deliver? Microprocessor Report 14 2 (Feb. 7 2000) 1--5."},{"key":"e_1_2_1_16_1","volume-title":"Proceedings of the IEEE International Solid-State Circuits Conference Digest of Technical Papers","author":"Horowitz M.","year":"2014","unstructured":"Horowitz M. Computing's energy problem (and what we can do about it). In Proceedings of the IEEE International Solid-State Circuits Conference Digest of Technical Papers (San Francisco, CA, Feb. 9--13). IEEE Press, 2014, 10--14."},{"key":"e_1_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/3154484"},{"key":"e_1_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/3079856.3080246"},{"key":"e_1_2_1_19_1","volume-title":"May 18","author":"Kloss C.","year":"2016","unstructured":"Kloss, C. Nervana Engine Delivers Deep Learning at Ludicrous Speed. Intel blog, May 18, 2016; https:\/\/ai.intel.com\/nervana-engine-delivers-deep-learning-at-ludicrous-speed\/"},{"key":"e_1_2_1_20_1","volume-title":"The Art of Computer Programming: Fundamental Algorithms","author":"Knuth D.","year":"1968","unstructured":"Knuth, D. The Art of Computer Programming: Fundamental Algorithms, First Edition. Addison Wesley, Reading, MA, 1968."},{"key":"e_1_2_1_21_1","volume-title":"InformIT","author":"Knuth D.","year":"2010","unstructured":"Knuth, D. and Binstock, A. Interview with Donald Knuth. InformIT, Hoboken, NJ, 2010; http:\/\/www.informit.com\/articles\/article.aspx"},{"key":"e_1_2_1_22_1","first-page":"282","article-title":"Systolic arrays (for VLSI). Chapter in Sparse Matrix Proceedings Vol. 1. Society for Industrial and Applied Mathematics, Philadelphia","volume":"256","author":"Kung H.","year":"1979","unstructured":"Kung, H. and Leiserson, C. Systolic arrays (for VLSI). Chapter in Sparse Matrix Proceedings Vol. 1. Society for Industrial and Applied Mathematics, Philadelphia, PA, 1979, 256--282.","journal-title":"PA"},{"key":"e_1_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/MM.2016.11"},{"key":"e_1_2_1_24_1","unstructured":"Leiserson C. et al. There's plenty of room at the top. To appear."},{"key":"e_1_2_1_25_1","volume-title":"The New York Times (Jan. 14","author":"Metz C.","year":"2018","unstructured":"Metz, C. Big bets on A.I. open a new frontier for chip start-ups, too. The New York Times (Jan. 14, 2018)."},{"key":"e_1_2_1_26_1","first-page":"8","article-title":"Cramming more components onto integrated circuits","volume":"38","author":"Moore G","year":"1965","unstructured":"Moore, G. Cramming more components onto integrated circuits. Electronics 38, 8 (Apr. 19, 1965), 56--59.","journal-title":"Electronics"},{"key":"e_1_2_1_27_1","first-page":"23","article-title":"No exponential is forever: But 'forever' can be delayed! {semiconductor industry}. In","volume":"20","author":"Moore G","year":"2003","unstructured":"Moore, G. No exponential is forever: But 'forever' can be delayed! {semiconductor industry}. In Proceedings of the IEEE International Solid-State Circuits Conference Digest of Technical Papers (San Francisco, CA, Feb. 13). IEEE, 2003, 20--23.","journal-title":"13). IEEE"},{"key":"e_1_2_1_28_1","volume-title":"Proceedings of the International Electronic Devices Meeting (Washington, D.C., Dec.). IEEE","author":"Moore G.","year":"1975","unstructured":"Moore, G. Progress in digital integrated electronics. In Proceedings of the International Electronic Devices Meeting (Washington, D.C., Dec.). IEEE, New York, 1975, 11--13."},{"key":"e_1_2_1_29_1","volume-title":"Nvidia Deep Learning Accelerator (NVDLA)","author":"Nvidia","year":"2017","unstructured":"Nvidia. Nvidia Deep Learning Accelerator (NVDLA), 2017; http:\/\/nvdla.org\/"},{"key":"e_1_2_1_30_1","volume-title":"June 19","author":"Patterson D.","year":"2017","unstructured":"Patterson, D. How Close is RISC-V to RISC-I? ASPIRE blog, June 19, 2017; https:\/\/aspire.eecs.berkeley.edu\/2017\/06\/how-close-is-risc-v-to-risc-i\/"},{"key":"e_1_2_1_31_1","volume-title":"May 30","author":"Patterson D.","year":"2018","unstructured":"Patterson, D. RISCy history. Computer Architecture Today blog, May 30, 2018; https:\/\/www.sigarch.org\/riscy-history\/"},{"key":"e_1_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.5555\/3176116"},{"key":"e_1_2_1_33_1","first-page":"181","article-title":"A pipelined 32b NMOS microprocessor. In","volume":"180","author":"Rowen C.","year":"1984","unstructured":"Rowen, C., Przbylski, S., Jouppi, N., Gross, T., Shott, J., and Hennessy, J. A pipelined 32b NMOS microprocessor. In Proceedings of the IEEE International Solid-State Circuits Conference Digest of Technical Papers (San Francisco, CA, Feb. 22--24) IEEE, 1984, 180--181.","journal-title":"22--24) IEEE"},{"key":"e_1_2_1_34_1","volume-title":"Netspectre: Read arbitrary memory over network. arXiv preprint","author":"Schwarz M.","year":"2018","unstructured":"Schwarz, M., Schwarzl, M., Lipp, M., and Gruss, D. Netspectre: Read arbitrary memory over network. arXiv preprint, 2018; https:\/\/arxiv.org\/pdf\/1807.10535.pdf"},{"key":"e_1_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISSCC.1984.1156668"},{"key":"e_1_2_1_36_1","volume-title":"Alto: A Personal Computer. CSL-79-11","author":"Thacker C.","year":"1979","unstructured":"Thacker, C., MacCreight, E., and Lampson, B. Alto: A Personal Computer. CSL-79-11, Xerox Palo Alto Research Center, Palo Alto, CA, Aug. 7,1979; http:\/\/people.scs.carleton.ca\/~soma\/distos\/fall2008\/alto.pdf"},{"key":"e_1_2_1_37_1","volume-title":"Aug. 14","author":"Turner P.","year":"2018","unstructured":"Turner, P., Parseghian, P., and Linton, M. Protecting against the new 'L1TF' speculative vulnerabilities. Google blog, Aug. 14, 2018; https:\/\/cloud.google.com\/blog\/products\/gcp\/protectingagainst-the-new-l1tf-speculative-vulnerabilities"},{"key":"e_1_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.5555\/3277203.3277277"},{"key":"e_1_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1017\/S0305004100028322"},{"key":"e_1_2_1_40_1","unstructured":"XLA Team. XLA -- TensorFlow. Mar. 6 2017; https:\/\/developers.googleblog.com\/2017\/03\/xlatensorflow-compiled.html"}],"container-title":["Communications of the ACM"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3282307","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3282307","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,5]],"date-time":"2025-11-05T17:04:35Z","timestamp":1762362275000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3282307"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,1,28]]},"references-count":40,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2019,1,28]]}},"alternative-id":["10.1145\/3282307"],"URL":"https:\/\/doi.org\/10.1145\/3282307","relation":{},"ISSN":["0001-0782","1557-7317"],"issn-type":[{"value":"0001-0782","type":"print"},{"value":"1557-7317","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,1,28]]},"assertion":[{"value":"2019-01-28","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}