“…To exploit this opportunity, numerous proposals revolve around identifying the nature of memory accesses as private or shared [7], [8], [9], [10], [11], [12], [13], [14], [15] for optimizing the coherence protocol or, for example, enhancing data placement. While these optimized coherence protocols outperform traditional protocols, the underlying techniques for classifying accesses still lack accuracy (Section II), due to the classification of memory accesses based on the private or shared nature of the target data.…”