Proceedings of the 38th Annual International Symposium on Computer Architecture 2011
DOI: 10.1145/2000064.2000075
|View full text |Cite
|
Sign up to set email alerts
|

Bypass and insertion algorithms for exclusive last-level caches

Abstract: Inclusive last-level caches (LLCs) waste precious silicon estate due to cross-level replication of cache blocks. As the industry moves toward cache hierarchies with larger inner levels, this wasted cache space leads to bigger performance losses compared to exclusive LLCs. However, exclusive LLCs make the design of replacement policies more challenging. While in an inclusive LLC a block can gather a filtered access history, this is not possible in an exclusive design because the block is de-allocated from the L… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
31
0

Year Published

2012
2012
2023
2023

Publication Types

Select...
5
3
1

Relationship

0
9

Authors

Journals

citations
Cited by 62 publications
(31 citation statements)
references
References 23 publications
(13 reference statements)
0
31
0
Order By: Relevance
“…For example, a reuse distance can be a key measure to determine whether to bypass or not [4,5,6,7]. Some other works consider reuse counts for making a decision in cache bypassing [8,9,10,11]. In [12], cache bypass decision is performed by using support vector machine.…”
Section: Related Workmentioning
confidence: 99%
“…For example, a reuse distance can be a key measure to determine whether to bypass or not [4,5,6,7]. Some other works consider reuse counts for making a decision in cache bypassing [8,9,10,11]. In [12], cache bypass decision is performed by using support vector machine.…”
Section: Related Workmentioning
confidence: 99%
“…To make good use of the cache space, hot cache lines should be protected, and requests to conflicting addresses have to be bypassed when contention happens. Thus, existing CPU bypass policies [12], [11] can be applied to GPU to avoid pollution and thrashing access patterns.…”
Section: Cache Bypassing On Gpusmentioning
confidence: 99%
“…Gaur et al [7] proposed cache bypassing algorithms specific to exclusive cache hierarchies. The key contribution of this work is to tackle the problem of no reuse information being available for cache blocks (a cache hit de-allocates the cache block and the reuse information is lost).…”
Section: Related Workmentioning
confidence: 99%
“…A good cache replacement policy improves cache performance by selecting the least likely to be reused block as the victim and has been studied extensively [1] [3][5] [9][16] [17][20] [23]. A good cache allocation policy chooses to bypass a block to upper levels if it is predicted to be less useful than the blocks currently in the cache [7].…”
Section: Introductionmentioning
confidence: 99%