1992
DOI: 10.1109/71.139201
|View full text |Cite
|
Sign up to set email alerts
|

Models of access delays in multiprocessor memories

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

1995
1995
2020
2020

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 16 publications
(3 citation statements)
references
References 10 publications
0
3
0
Order By: Relevance
“…Network performance depends highly on the network traffic, and hence, access to different traffic models is critically important for a thorough analysis of different characteristics of the network architectures, protocols, and implementations. There has been extensive prior research work on traffic models for different networks ranging from the Internet [11] [12], Ethernet [13] [14], wireless LANs [15] to shared-memory-multiprocessor (SMP) networks [16] [17] [18]. These models provide critical insights into the traffic behavior of the corresponding networks.…”
Section: Related Workmentioning
confidence: 99%
“…Network performance depends highly on the network traffic, and hence, access to different traffic models is critically important for a thorough analysis of different characteristics of the network architectures, protocols, and implementations. There has been extensive prior research work on traffic models for different networks ranging from the Internet [11] [12], Ethernet [13] [14], wireless LANs [15] to shared-memory-multiprocessor (SMP) networks [16] [17] [18]. These models provide critical insights into the traffic behavior of the corresponding networks.…”
Section: Related Workmentioning
confidence: 99%
“…The probability that a transaction restarts is calculated in the same way as in the silent/static model, given the same con ict rate. The wasted time per transaction now has a truncated exponential distribution: Since a con ict aborts a transaction early, we can not make use of equation (13) to simplify equation (11). (18) Putting these formulae into equation (11) for R c (V ), we nd that R c (V ) = 1?Bc( c) cBc( c) (19) and, U c (V ) = bc cBc( c) 1?Bc( c) (20) We note that if b c (t) has an exponential distribution, then U c = 1.…”
Section: Fixed/fixedmentioning
confidence: 99%
“…Yuan and Aamodt [9] proposed a hybrid analytical model to predict DRAM access efficiency based on memory trace profiling. Bucher and Calahan [10] modeled the performance of an interleaved common memory of a multiprocessor using queuing and simulation methods. Choi et al [11] presented an analytical model to predict the DRAM performance based on the DRAM timing and memory access pattern parameters.…”
Section: Introductionmentioning
confidence: 99%