A Case for Exploiting Memory-Access Persistence

نویسندگان

  • Kim M. Hazelwood
  • Mark C. Toburen
  • Thomas M. Conte
چکیده

Memory access l atencies have become a major bottleneck in the performance of modern computer systems. It has been observed that the SPECint2000 benchmark suite suffers particularly high performance penalties from instruction and data cache misses. Current hardware-based and softwarebased prefetch mechanisms cannot always learn access patterns early enough to avoid compulsory data cache misses. Memory-access persistence is based on the idea that long-latency memory accesses tend to repeat themselves over subsequent executions of a program, despite changing inputs. By logging long-latency memory accesses during execution and correlating those accesses and their patterns across multiple executions driven with varying input sets, a program can be dynamically optimized to predictively prefetch these memory locations during subsequent executions. In this paper, we determine the extent to which memory-access persistence exists in modern applications.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

The Effectiveness of Training of Reading Assistant Package on Dyslexic childrens’ Working Memory - a Multiple Baseline Single Case Study

Introduction: ln literature review, cognitive problems such as poor working memory is considered as one of the main reading problems among dyslexic children. Therefore, the present study was conducted to determine the effect of Reading Assistant Package training on the working memory of dyslexic children. Methods: The present study was a single-subject research design of multiple baseline types...

متن کامل

Computational Geometry: Generalized (or Colored) Intersection Searching

Michiel Smid Carleton University, Ottawa 1.1 Geometric intersection searching problems . . . . . . . . 1-1 Generalized intersection searching 1.2 Summary of known results . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-3 Axes-parallel objects • Arbitrarily-oriented objects • Problems on the grid • Single-shot problems • External memory and word-RAM algorithms 1.3 Techniques . . . . . . ...

متن کامل

Exploiting Application Behaviors for Resilient Static Random Access Memory Arrays in the Near-Threshold Computing Regime

Exploiting Application Behaviors for Resilient Static Random Access Memory Arrays in the Near-Threshold Computing Regime

متن کامل

EXPLOITING APPLICATION BEHAVIORS FOR RESILIENT STATIC RANDOM ACCESS MEMORY ARRAYS IN THE NEAR-THRESHOLD COMPUTING REGIME by

Exploiting Application Behaviors for Resilient Static Random Access Memory Arrays in the Near-Threshold Computing Regime

متن کامل

Boosting Persistence Parallelism in Memory Bus and RDMA Network

Emerging non-volatile memories (NVMs) incorporate the features of fast byte-addressability and data persistence, which are beneficial for data services, such as file systems and databases. To support data persistence, a persistent memory system requires ordering for write requests. We observe that the memory bus and the Remote Direct Memory Access (RDMA) network are severely under-utilized duri...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2001