Automated and accurate cache behavior analysis for codes with irregular access patterns

被引:10
|
作者
Andrade, Diego [1 ]
Arenaz, Manuel [1 ]
Fraguela, Basilio B. [1 ]
Tourino, Juan [1 ]
Doallo, Ramon [1 ]
机构
[1] Univ A Coruna, Dept Elect & Syst, Comp Architecture Grp, La Coruna, Spain
来源
关键词
memory hierarchy; cache behavior; performance prediction; irregular access patterns; chains of recurrences;
D O I
10.1002/cpe.1173
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
The memory hierarchy plays an essential role in the performance of current computers, so good analysis tools that help in predicting and understanding its behavior are required. Analytical modeling is the ideal base for such tools if its traditional limitations in accuracy and scope of application can be overcome. While there has been extensive research on the modeling of codes with regular access patterns, less attention has been paid to codes with irregular patterns due to the increased difficulty in analyzing them. Nevertheless, many important applications exhibit this kind of pattern, and their lack of locality make them more cache-demanding, which makes their study more relevant. The focus of this paper is the automation of the Probabilistic Miss Equations (PME) model, an analytical model of the cache behavior that provides fast and accurate predictions for codes with irregular access patterns. The information requirements of the PME model are defined and its integration in the XARK compiler, a research compiler oriented to automatic kernel recognition in scientific codes, is described. We show how to exploit the powerful information-gathering capabilities provided by this compiler to allow the automated modeling of loop-oriented scientific codes. Experimental results that validate the correctness of the automated PME model are also presented. Copyright (c) 2007 John Wiley & Sons, Ltd.
引用
收藏
页码:2407 / 2423
页数:17
相关论文
共 50 条
  • [41] Dynamic scratch-pad memory management for irregular array access patterns
    Chen, G.
    Ozturk, O.
    Kandemir, M.
    Karakoy, M.
    2006 DESIGN AUTOMATION AND TEST IN EUROPE, VOLS 1-3, PROCEEDINGS, 2006, : 929 - +
  • [42] Analysis of countermeasures against access driven cache attacks on AES
    Bloemer, Johannes
    Krummel, Volker
    SELECTED AREAS IN CRYPTOGRAPHY, 2007, 4876 : 96 - 109
  • [43] Accurate Automated Apnea Analysis in Preterm Infants
    Vergales, Brooke D.
    Paget-Brown, Alix O.
    Lee, Hoshik
    Guin, Lauren E.
    Smoot, Terri J.
    Rusin, Craig G.
    Clark, Matthew T.
    Delos, John B.
    Fairchild, Karen D.
    Lake, Douglas E.
    Moorman, Randall
    Kattwinkel, John
    AMERICAN JOURNAL OF PERINATOLOGY, 2014, 31 (02) : 156 - 162
  • [44] An Automated and Accurate Spine Curve Analysis System
    Chen, Bo
    Xu, Qiuhao
    Wang, Liansheng
    Leung, Stephanie
    Chung, Jonathan
    Li, Shuo
    IEEE ACCESS, 2019, 7 : 124596 - 124605
  • [45] Automated rapid and accurate cell cycle analysis
    Yurlova, Larisa
    Gregor, Jacqueline
    Sirenko, Oksana
    Cromwell, Evan
    Zolghadr, Kourosh
    CANCER RESEARCH, 2014, 74 (19)
  • [46] Access Control Policy Based on Behavior Patterns
    Zhu, XiPing
    Feng, Hao
    Chen, Hong
    THIRD INTERNATIONAL CONFERENCE ON GENETIC AND EVOLUTIONARY COMPUTING, 2009, : 557 - 560
  • [47] Analysis of Threshold of Regular and Irregular LDPC Codes Using Gaussian Approximation
    Ho, Chia-Lu
    WTS: 2009 WIRELESS TELECOMMUNICATIONS SYMPOSIUM, 2009, : 16 - 22
  • [48] Web Access Patterns Reveal Insiders Behavior
    Gamachchi, Anagi
    Boztas, Serdar
    2015 SEVENTH INTERNATIONAL WORKSHOP ON SIGNAL DESIGN AND ITS APPLICATIONS IN COMMUNICATIONS (IWSDA), 2015, : 70 - 74
  • [49] Matching Cache Access Behavior and Bit Error Pattern for High Performance Low Vcc L1 Cache
    Choi, Young Geun
    Yoo, Sungjoo
    Lee, Sunggu
    Ahn, Jung Ho
    PROCEEDINGS OF THE 48TH ACM/EDAC/IEEE DESIGN AUTOMATION CONFERENCE (DAC), 2011, : 978 - 983
  • [50] On the analysis of irregular stock market trading behavior
    Franke, Markus
    Hoser, Bettina
    Schroeder, Jan
    DATA ANALYSIS, MACHINE LEARNING AND APPLICATIONS, 2008, : 355 - 362