A Case for Exploiting Memory-Access Persistence
نویسندگان
چکیده
Memory access l atencies have become a major bottleneck in the performance of modern computer systems. It has been observed that the SPECint2000 benchmark suite suffers particularly high performance penalties from instruction and data cache misses. Current hardware-based and softwarebased prefetch mechanisms cannot always learn access patterns early enough to avoid compulsory data cache misses. Memory-access persistence is based on the idea that long-latency memory accesses tend to repeat themselves over subsequent executions of a program, despite changing inputs. By logging long-latency memory accesses during execution and correlating those accesses and their patterns across multiple executions driven with varying input sets, a program can be dynamically optimized to predictively prefetch these memory locations during subsequent executions. In this paper, we determine the extent to which memory-access persistence exists in modern applications.
منابع مشابه
The Effectiveness of Training of Reading Assistant Package on Dyslexic childrens’ Working Memory - a Multiple Baseline Single Case Study
Introduction: ln literature review, cognitive problems such as poor working memory is considered as one of the main reading problems among dyslexic children. Therefore, the present study was conducted to determine the effect of Reading Assistant Package training on the working memory of dyslexic children. Methods: The present study was a single-subject research design of multiple baseline types...
متن کاملComputational Geometry: Generalized (or Colored) Intersection Searching
Michiel Smid Carleton University, Ottawa 1.1 Geometric intersection searching problems . . . . . . . . 1-1 Generalized intersection searching 1.2 Summary of known results . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-3 Axes-parallel objects • Arbitrarily-oriented objects • Problems on the grid • Single-shot problems • External memory and word-RAM algorithms 1.3 Techniques . . . . . . ...
متن کاملExploiting Application Behaviors for Resilient Static Random Access Memory Arrays in the Near-Threshold Computing Regime
Exploiting Application Behaviors for Resilient Static Random Access Memory Arrays in the Near-Threshold Computing Regime
متن کاملEXPLOITING APPLICATION BEHAVIORS FOR RESILIENT STATIC RANDOM ACCESS MEMORY ARRAYS IN THE NEAR-THRESHOLD COMPUTING REGIME by
Exploiting Application Behaviors for Resilient Static Random Access Memory Arrays in the Near-Threshold Computing Regime
متن کاملBoosting Persistence Parallelism in Memory Bus and RDMA Network
Emerging non-volatile memories (NVMs) incorporate the features of fast byte-addressability and data persistence, which are beneficial for data services, such as file systems and databases. To support data persistence, a persistent memory system requires ordering for write requests. We observe that the memory bus and the Remote Direct Memory Access (RDMA) network are severely under-utilized duri...
متن کامل