ILP/Problem 0

As Figure 3.1, from the book Computer Architecture, A Quantitative Approach, below shows, the ILP available in many applications can be fairly high. Nevertheless, in practical processor implementations it can be hard to exploit this available ILP. List at least three factors that might limit the exploitable ILP and explain why they limit the ILP.

Screen Shot 2014-04-16 at 3.30.01 PM.png


Some factors that limit the exploitable ILP (book Section 3.2)

Screen Shot 2014-04-16 at 3.32.21 PM.png