2017
DOI: 10.1002/cpe.4250
|View full text |Cite
|
Sign up to set email alerts
|

A survey of value prediction techniques for leveraging value locality

Abstract: SummaryValue locality (VL) refers to recurrence of values in a memory structure, and value prediction (VP) refers to predicting VL and leveraging it for diverse optimizations. VP holds the promise of exceeding true‐data dependencies and provide performance and bandwidth advantages in both single‐ and multi‐threaded applications. Fully exploiting the potential of VL, however, requires addressing several challenges, such as achieving high accuracy and coverage, reducing hardware and latency overheads, etc. In th… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
9
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
4
1

Relationship

2
3

Authors

Journals

citations
Cited by 9 publications
(9 citation statements)
references
References 55 publications
0
9
0
Order By: Relevance
“…Here, we present a quick background on BP and refer the reader to prior works for more details on taxonomy, value locality, static BPs, comparative evaluation of multiple BPs, and discussion of commercial BPs . We discuss the BP naming scheme in Section 3.1.…”
Section: Background and Motivationmentioning
confidence: 99%
“…Here, we present a quick background on BP and refer the reader to prior works for more details on taxonomy, value locality, static BPs, comparative evaluation of multiple BPs, and discussion of commercial BPs . We discuss the BP naming scheme in Section 3.1.…”
Section: Background and Motivationmentioning
confidence: 99%
“…However, due to this, programming to in-between states (10 and 01) consumes much higher (e.g., an order of magnitude) latency/energy than programming to terminal states (00 and 11) [2,20]. Due to value locality, the plaintext is likely to contain long strings of zeros or ones [36]; however, since encryption increases data randomness, the ciphertext contains many 01 and 10 pairs. In other words, encryption increases the frequency of inbetween states and thus, use of encryption increases the memory write energy significantly.…”
Section: Motivation and Challengesmentioning
confidence: 99%
“…We categorize these works into three groups based on either a hardware or a software approach, as shown in Figure 1. Value prediction 2‐5 is a hardware approaches, but computation reuse 6‐16 and memoization 17‐30 can be implemented using hardware as well as software. A standard procedure to execute these techniques follows some simple steps described below: Analyze and identify the hot code (hc) of a program to concentrate your optimization effort.…”
Section: Introductionmentioning
confidence: 99%
“…All these techniques rely on the previous computation result produced by the hc. Value prediction is a speculative technique that infers the current instruction's value from the previous execution instances 4 On the other hand, computation reuse is a non‐speculative technique that stores the result of the past instruction and reuses it whenever the same instruction gets executed with the same input instances 5 …”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation