2012
DOI: 10.1145/2366231.2337208
|View full text |Cite
|
Sign up to set email alerts
|

Probabilistic shared cache management (PriSM)

Abstract: Effective sharing of the last level cache has a significant influence on the overall performance of a multicore system. We observe that existing solutions control cache occupancy at a coarser granularity, do not scale well to large core counts and in some cases lack the flexibility to support a variety of performance goals. In this paper, we propose Probabilistic Shared Cache Management (PriSM), a framework to manage the cache occupancy of different cores at cache block granularity by controlling the… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
6
0

Year Published

2014
2014
2018
2018

Publication Types

Select...
4
4
1

Relationship

0
9

Authors

Journals

citations
Cited by 21 publications
(6 citation statements)
references
References 18 publications
0
6
0
Order By: Relevance
“…Implications Many prior studies on hardware architecture, memory hierarchy design or program access pattern analysis observe and test small sample segments from program execution, with typical lengths of under 200 million instructions [17,31,33,41] and 200-500 million instructions [20,25,36,46,50,58] Our experiments reveal that one or a few such samples often fail to capture a full picture of the programs' memory access behavior, even within their "steady phase" (after initialization and before nalization).…”
Section: Sampling Window Size For Access Pro Lingmentioning
confidence: 87%
“…Implications Many prior studies on hardware architecture, memory hierarchy design or program access pattern analysis observe and test small sample segments from program execution, with typical lengths of under 200 million instructions [17,31,33,41] and 200-500 million instructions [20,25,36,46,50,58] Our experiments reveal that one or a few such samples often fail to capture a full picture of the programs' memory access behavior, even within their "steady phase" (after initialization and before nalization).…”
Section: Sampling Window Size For Access Pro Lingmentioning
confidence: 87%
“…Manikantan et al proposed a framework that computes eviction probabilities for each core and replaces the cache lines according to these probabilities in order to achieve a finer granularity at line level [10]. Probabilistic shared cache management (PriSM) collects the augmented cache hit information using shadow tags and obtains target size.…”
Section: Related Workmentioning
confidence: 99%
“…Heap data blocks are also identified as practically private if at least one pointer in the reference list is of global scope (i.e., the pointer is global or passed to other threads) and that pointer is dereferenced with a TI variable. 1 Typically, this indicates that these data blocks are probably private. In many embarrassingly parallel applications, probably private is actually private when the global data blocks are exclusively partitioned among multiple threads by TI variables.…”
Section: (A)mentioning
confidence: 99%
“…These factors include remote data access latency, coherence overhead, inter-core communication penalty, etc. While many effective improvements [1]- [6] to CMPs have been proposed to address these issues, many optimization opportunities are lost unless specific characteristics of the application(s) running on the system can be leveraged. In particular, the lack of information about characteristics of a running application such as data access patterns, communication behavior, memory usage, etc., typically results in a more generic but less efficient method for utilizing on-chip caches, interconnect and coherence directories.…”
Section: Introductionmentioning
confidence: 99%