1988
DOI: 10.1109/12.2208
|View full text |Cite
|
Sign up to set email alerts
|

Cache operations by MRU change

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

1
28
0

Year Published

1990
1990
2018
2018

Publication Types

Select...
4
3
2

Relationship

0
9

Authors

Journals

citations
Cited by 116 publications
(29 citation statements)
references
References 8 publications
1
28
0
Order By: Relevance
“…The NMRU (or non-MRU) replacement algorithm differentiates the most recently accessed (MRU) line from other lines in the set [41]. On a miss, a line is chosen (uniformly) randomly from among the A ′ − 1 non-MRU lines.…”
Section: Estimating φ φ φ(Nmru)mentioning
confidence: 99%
See 1 more Smart Citation
“…The NMRU (or non-MRU) replacement algorithm differentiates the most recently accessed (MRU) line from other lines in the set [41]. On a miss, a line is chosen (uniformly) randomly from among the A ′ − 1 non-MRU lines.…”
Section: Estimating φ φ φ(Nmru)mentioning
confidence: 99%
“…Partitioned LRU [41] (also popularly called pseudo-LRU) maintains a balanced binary tree that, at each level, differentiates between the two sub-trees based on access recency. Every internal node is represented by a single bit whose value decides which of the two subtrees was accessed more recently.…”
Section: Estimating φ φ φ(Plru)mentioning
confidence: 99%
“…The wider CMP-SNUCA network provides the additional bandwidth needed by an 8-processor CMP, but requires longer latencies as compared to the originally proposed uniprocessor network. Fourth, shared CMP caches are subject to contention from different processors' working sets [32], motivating 16-way set-associative banks with a pseudo-LRU replacement policy [40]. Finally, we assume an idealized off-chip communication controller to provide consistent off-chip latency for all processors.…”
Section: Baseline Cmp Designmentioning
confidence: 99%
“…PLRU schemes employ approximations of the LRU mechanism to speed up operations and reduce the complexity of implementation [9], [10]. Due to the approximations, the least recently accessed cache memory is not always the location to be replaced.…”
Section: Common Cache Replacement Policiesmentioning
confidence: 99%