2001
DOI: 10.1145/384285.379253
|View full text |Cite
|
Sign up to set email alerts
|

Focusing processor policies via critical-path prediction

Abstract: Although some instructions hurt performance more than others, current processors typically apply scheduling and speculation as if each instruction was equally costly. Instruction cost can be naturally expressed through the critical path: if we could predict it at run-time, egalitarian policies could be replaced with cost-sensitive strategies that will grow increasingly effective as processors become more parallel.This paper introduces a hardware predictor of instruction criticality and uses it to improve perfo… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
88
0

Year Published

2008
2008
2024
2024

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 45 publications
(88 citation statements)
references
References 36 publications
0
88
0
Order By: Relevance
“…The critical path is modelled as a dependence graph, similar to those proposed by Tullsen and Calder [26] and Fields et al [27]. This is because it provides an accurate representation of the events that occur to instructions as they are dispatched and issued.…”
Section: Critical Path Modelmentioning
confidence: 99%
See 1 more Smart Citation
“…The critical path is modelled as a dependence graph, similar to those proposed by Tullsen and Calder [26] and Fields et al [27]. This is because it provides an accurate representation of the events that occur to instructions as they are dispatched and issued.…”
Section: Critical Path Modelmentioning
confidence: 99%
“…Each edge is weighted with the minimum number of cycles that the dependence takes to be resolved. Unlike in Fields et al [27], control dependences between branches are not modelled because it is assumed that all branches will be predicted correctly. Figure 2 shows an example piece of assembly code and the dependence graph that is formed as the critical path model.…”
Section: Critical Path Modelmentioning
confidence: 99%
“…A performance validation effort showed that performance results from tsim-proc were on average within 4% of those obtained from the RTL-level simulator on our test suite and within 10% on randomly generated test programs. We use the methodology of Fields et al [18] to attribute percentages of the critical path of the program to different microarchitectural activities and partitioning overheads.…”
Section: Distributed Protocol Overheadsmentioning
confidence: 99%
“…Each instruction passes through a myriad of hardware resources resulting in numerous microarchitectural events during the course of its lifetime-cache misses, branch mispredictions, re-order buffer stalls, port contentions, and data dependence hazards. We developed a critical path analysis tool called tsim critical based on the methodology proposed by Fields et al [18,68].…”
Section: Critical Path Analysismentioning
confidence: 99%
“…Recent studies such as Age-based approach [86] and Bottleneck Identification and Scheduling (BIS) [87] were also assisted by the source code, the library and/or the compiler in differentiating the applications. Even though prediction is proposed by Fields et al [88,89], their predictor was Program Counter(PC)-indexed and trace-based. Some other studies, e.g., [90,91], obtained the representative information of the underlying architecture, and then estimated the performance of the applications.…”
Section: Demands Among Workloadsmentioning
confidence: 99%