A trace-based binary compilation framework for energy-aware computing

被引:1
|
作者
Li, L [1 ]
Xue, JL [1 ]
机构
[1] Univ New S Wales, Sch Engn & Comp Sci, Compiler Res Grp, Sydney, NSW 2052, Australia
关键词
algorithms; languages; experimentation; performance; energy optimisation; trace; link-time optimisation; profile-guided optimisation; binary translation;
D O I
10.1145/998300.997178
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Energy-aware compilers are becoming increasingly important for embedded systems due to the need to meet conflicting constraints on time, code size and power consumption. We introduce a trace-based, offline compiler framework on binaries and demonstrate its benefits in supporting energy optimisations. The key innovation lies in identifying frequently executed paths in a binary program and duplicating them as single-entry traces. Separating frequently from infrequently executed paths enables the compiler to focus both performance and energy optimisations on the hot traces. Traces constructed at the level of binaries are inherently inter-procedural, spanning both application and library code. Such a framework allows an embedded application developer to exploit optimisation opportunities made possible due to the information that is available only at link time. We describe the implementation of our trace-based framework in alto, a link-time optimiser for the Alpha architecture. We present a new algorithm for constructing the hot traces from binaries. This algorithm is both effective (since the execution cycles are mostly spent on traces) and practical (due to small code size increases caused). We have developed and implemented a new optimisation to reduce the functional unit leakage energy. We show how the traces facilitate the development of such an optimisation, which results in significant leakage energy savings for benchmark programs at the cost of small performance penalties.
引用
收藏
页码:95 / 106
页数:12
相关论文
共 50 条
  • [21] Energy-Aware Scheduling of Tasks in Cloud Computing
    Mehor, Yamina
    Rebbah, Mohammed
    Smail, Omar
    [J]. Informatica (Slovenia), 2024, 48 (16): : 125 - 136
  • [22] Energy-Aware Resource Management for Computing Systems
    Siegel, Howard Jay
    Khemka, Bhavesh
    Friese, Ryan
    Pasricha, Sudeep
    Maciejewski, Anthony A.
    Koenig, Gregory A.
    Powers, Sarah
    Hilton, Marcia
    Rambharos, Rajendra
    Okonski, Gene
    Poole, Steve
    [J]. 2014 SEVENTH INTERNATIONAL CONFERENCE ON CONTEMPORARY COMPUTING (IC3), 2014, : 7 - 12
  • [23] Special issue on energy-aware computing and communications
    Wang, Lizhe
    Khan, Samee U.
    Yang, Laurence T.
    Xia, Feng
    [J]. CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2013, 16 (01): : 1 - 1
  • [24] Energy-Aware Computation Offloading in Wearable Computing
    Safar, Mariam
    Ahmad, Imtiaz
    Al-Yatama, Anwar
    [J]. 2017 INTERNATIONAL CONFERENCE ON COMPUTER AND APPLICATIONS (ICCA), 2017, : 266 - 278
  • [25] Energy-Aware Profiling for Cloud Computing Environments
    Alzamil, Ibrahim
    Djemame, Karim
    Armstrong, Django
    Kavanagh, Richard
    [J]. ELECTRONIC NOTES IN THEORETICAL COMPUTER SCIENCE, 2015, 318 : 91 - 108
  • [26] A General Trace-Based Framework of Logical Causality
    Goessler, Gregor
    Le Metayer, Daniel
    [J]. FORMAL ASPECTS OF COMPONENT SOFTWARE, 2014, 8348 : 157 - 173
  • [27] Energy-Aware RFID Authentication in Edge Computing
    Yao, Qingsong
    Ma, Jianfeng
    Li, Rui
    Li, Xinghua
    Li, Jinku
    Liu, Jiao
    [J]. IEEE ACCESS, 2019, 7 : 77964 - 77980
  • [28] Energy-Aware Resource Management for Computing Systems
    Siegel, H. J.
    [J]. 2014 SEVENTH INTERNATIONAL CONFERENCE ON CONTEMPORARY COMPUTING (IC3), 2014, : XI - XII
  • [29] Special issue on energy-aware computing and communications
    Lizhe Wang
    Samee U. Khan
    Laurence T. Yang
    Feng Xia
    [J]. Cluster Computing, 2013, 16 : 1 - 1
  • [30] Shadow Computing: An Energy-Aware Fault Tolerant Computing Model
    Mills, Bryan
    Znati, Taieb
    Melhem, Rami
    [J]. 2014 INTERNATIONAL CONFERENCE ON COMPUTING, NETWORKING AND COMMUNICATIONS (ICNC), 2014, : 73 - 77