[1989] Proceedings of the Twenty-Second Annual Hawaii International Conference on System Sciences. Volume 1: Architecture Track
DOI: 10.1109/hicss.1989.47168
|View full text |Cite
|
Sign up to set email alerts
|

Improving cache performance by selective cache bypass

Abstract: In traditional cache-based computers, all memory references are made through cache. However, a significant number of items which are referenced in a program are referenced so infrequently that other cache traffic is certain t o "bump" these items from cache before they are referenced again. In such cases, not only is there no benefit in placing the item in cache, but there is the additional overhead of "bumping" some other item out of cache to make room for this useless cache entry. Where a cache line is large… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
16
0

Publication Types

Select...
4
3
2

Relationship

0
9

Authors

Journals

citations
Cited by 32 publications
(16 citation statements)
references
References 5 publications
(1 reference statement)
0
16
0
Order By: Relevance
“…The importance of reducing memory access latencies is reflected in a rich set of earlier results towards faster loads [26]- [29].…”
Section: Related Researchmentioning
confidence: 99%
See 1 more Smart Citation
“…The importance of reducing memory access latencies is reflected in a rich set of earlier results towards faster loads [26]- [29].…”
Section: Related Researchmentioning
confidence: 99%
“…Software cache bypassing schemes were discussed by Chi [29]. Energy savings for scientific applications were considered by Choi, et al [4] and Freeh, et al [30].…”
Section: Related Researchmentioning
confidence: 99%
“…Chi and Dietz [6] present an early work on selective cache bypassing; they use compiler support. Etsion et al [8] point out that if a resident block in a cache is chosen at random, it is unlikely to be a highly-referenced block, but if an access is chosen at random, it is likely to be to a highly-referenced block.…”
Section: Related Workmentioning
confidence: 99%
“…Based on how to predict distant reuse blocks, these studies can be classified into PC based [5,8,33] and address based [13,15,30,31]. LRF [37] combines PC based and address based methods to improve performance.…”
Section: Related Workmentioning
confidence: 99%