期刊文献+

基于复用距离的cache失效率分析 被引量:1

Reuse Distance Based Cache Miss Rate Analysis
下载PDF
导出
摘要 复用距离已经成为程序cache行为的一种重要度量标准,但高复杂度和可能的内存溢出问题使得其难以应用.本文在引入最大cache大小的基础上提出一种受限的复用距离分析方法.该方法有效地避免了一般复用距离分析可能导致的内存溢出问题,同时使得复用距离分析达到线性时间复杂度.文章通过对一系列整数和浮点程序的实验说明基于该复用距离分析的cache失效率分析的可行性和正确性. Reuse distance has become an important metric of program cache behavior, but high complexity and possible memory overflow problem make its using difficult. Considering max cache size, this paper introduces a limited reuse distance analysis method. This method avoids possible memory overflow problem in normal reuse distance analysis, at the same time this method makes complexity of reuse distance analysis decrease to linear. Experiments from some integer and floatlng-point programs show it is feasible and correct that cache miss rate is analyzed by this reuse distance analysis.
出处 《小型微型计算机系统》 CSCD 北大核心 2006年第9期1777-1781,共5页 Journal of Chinese Computer Systems
基金 国家自然科学基金项目(60473068)资助 Intel中国研究中心资助
关键词 复用距离 Cache失效率 局部性 reuse distance cache miss rate locality
  • 相关文献

参考文献9

  • 1Ding C,Zhong Y.Predicting whole-program locality with reuse distance analysis[C].In:Proceedings of ACM SIGPLAN Conference on Programming Language Design and Implementation,San Diego,CA,June,2003:245-257.
  • 2Beyls,Kristof.Software methods to improve data locality and cache behavior[D].Ghent University,2004.
  • 3Almasi G,Cascaval C,Padua D.Calculating stack distances efficiently[C].In:Proceedings of the First ACM SIGPLAN Workshop on Memory System Performance,Berlin,Germany,June 2002:37-43.
  • 4Mattson R L,Gecsei J,Slutz D,et al.Evaluation techniques for storage hierarchies[J].IBM System Journal,1970,9(2):78-117.
  • 5Sleator D D,Tarjan R E.Self adjusting binary search trees[J].Journal of the ACM,1985,32(3):652-686.
  • 6Zhong Y,Dropsho S G,Ding C.Miss rate preidiction across all program inputs[C].In:Proceedings of the 12th International Conference on Parallel Architectures and Compilation Techniques,New Orleans,Louisiana,September 2003.
  • 7Chi-Keung Luk,Robert Cohn,et al.Pin:building customized program analysis tools with dynamic instrumentation[C].In:Proceedings of ACM SIGPLAN Conference on Programming Language Design and Implementation,Chicago,Illinois,USA,2005:190-200.
  • 8Sugumar R A,Abraham S G.Efficient simulation of multiple cache configurations using binomial trees[R].Technical Report CSE-TR-111-91,CSE Division,University of Michigan,1991.
  • 9Bennett B T,Kruskal V J.LRU stack processing[J].IBM Journal of Research and Development,1975,19(4):353-357.

同被引文献10

  • 1Seongbeom Kim, Dhruba Chandra, Yan Solihin. Fair cache sha- ring and partitioning on a chip multi-processor architecture[ C]. In Proc. of the Intl. Conf. on Parallel Architecture and Compilation Techniques, 2004.
  • 2Soares Livio, Tam David. Reducing the harmful effects of last-lev- el cache polluters with an OS-level, software-only pollute buffer C 1- In: MICRO 41 Proceedings of the 4lst Annual IEEE/ACM International Symposium on Microarchitecture, Washington D C, USA: IEEE Computer Society, 2008: 256-269.
  • 3Erik Berg, Erik Hagersten. StatCache: a probabilistic approach to efficient and accurate data locality analysis [ C ]. In : Performance Analysis of System and Software, 2004 IEEE International Sympo- sium on ISPASS, Washington D C, USA: IEEE Computer Socie- ty, 2004: 20-27.
  • 4Yah Solihin, Fei Guo, Seongbeom Kim. Predicting cache space contention in utility computing servers [ C ]. In: Parallel and Dis- tributed Processing Symposium, 19th IEEE International, Washing- ton D C, USA: IEEE Computer Society, 2005: 8-13.
  • 5Mazen Kharbutli, Keith Irwin, Yan solihin, et al. Using prime numbers for cache indexing to eliminate conflict misses [ C ]. In Proe. of the Intl. Syrup. on High Performance Computer Architec- ture, 2004.
  • 6Jeffrey D Gee, Alan Jay Smith. Analysis of multiprocessor memory reference behavior[ J]. Computer Design: VLSI in Computers and Processors, 1994.
  • 7Radford M Neal. Probabilistic inference using markov cain monte carlo methods[ D]. Department of Computer Science University of Toronto, 1993.
  • 8Christian Beecks, Merih Seran Uysal, Thomas Seidl. Similarity at- fix compression for efficient signature quadratic form distance com- putation[D]. Proceedings of the Third International Conference on Similarity Search and Applications, 2010, 9( 181- 9) :109-114.
  • 9田新华,欧国东,张民选.基于修正LRU的压缩Cache替换策略[J].计算机工程,2008,34(18):7-9. 被引量:3
  • 10丰月姣,贺兴时.二阶隐马尔科夫模型的原理与实现[J].价值工程,2009,28(12):103-105. 被引量:6

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部