A Comparison of Locality-Based and Recency-Based Replacement Policies
نویسندگان
چکیده
Caches do not grow in size at the speed of main memory or raw processor performance. Therefore, optimal use of the limited cache resources is of paramount importance to obtain a good system performance. Instead of a recency-based replacement policy (such as, e.g., LRU), we can also make use of a locality-based policy, based on the temporal reuse of data. These replacement policies have usually been constructed to operate in a cache with multiple modules, some of them dedicated to data showing high temporal reuse, and some of them dedicated to data showing low temporal reuse. In this paper, we show how locality-based replacement policies can be adapted to operate in set-associative and skewed-associative [8] caches. In order to understand the benefits of locality-based replacement policies, they are compared to recency-based replacement policies, something that has not been done before.
منابع مشابه
ProWGen: a synthetic workload generation tool for simulation evaluation of web proxy caches
This paper describes the design and use of a synthetic Web proxy workload generator called ProWGen to investigate the sensitivity of Web proxy cache replacement policies to five selected Web workload characteristics. Three representative cache replacement policies are considered in the simulation study: a recency-based policy called Least-Recently-Used (LRU), a frequency-based policy called Lea...
متن کاملDisk Cache Replacement Policies for NetworkFileserversDarryl
Trace driven simulations are used to study the performance of several disk cache replacement policies for network leservers. It is shown that locality based approaches, such as the common Least Recently Used (LRU) policy, which are known to work well on standalone disked workstations and at client workstations in distributed systems, are inappropriate at a leserver. Quite simple frequency based...
متن کاملOn Caching Search Engine Results
In this paper we explore the problem of Caching of Search Engine Query Results in order to reduce the computing and I/O requirements needed to support the functionality of a search engine of the worldwide web. Based on traces from search engines we show that there is signiicant locality in the queries asked, that is, 20-30% of the queries have been previously submitted by the same or a diierent...
متن کاملAn Integrated Closed-loop Supply Chain Configuration Model and Supplier Selection based on Offered Discount Policies
In this paper, a mathematical programming model is presented for integrated problem of closed loop supply chain network design and supplier selection. The suppliers propose discount policy based on purchase amount and loyalty of buyers which are both taken from the elements of RFM (Recency, Frequency and Monetary) technique. The main objective of this paper which is formulated by a mixed-integ...
متن کاملTowards High-Performance Network Application Identification With Aggregate-Flow Cache
Classifying network traffic according to their application-layer protocols is an important task in modern networks for traffic management and network security. Existing payload-based or statistical methods of application identification cannot meet the demand of both high performance and accurate identification at the same time. We propose an application identification framework that classifies ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2000