Proceedings of the 9th Conference on Computing Frontiers 2012
DOI: 10.1145/2212908.2212936
|View full text |Cite
|
Sign up to set email alerts
|

Reuse distance based performance modeling and workload mapping

Abstract: Modern multicore architectures have multiple cores connected to a hierarchical cache structure resulting in heterogeneity in cache sharing across different subsets of cores. In these systems, overall throughput and efficiency depends heavily on a careful mapping of applications to available cores. In this paper, we study the problem of application-to-core mapping with the goal of trying to improve the overall cache performance in the presence of a hierarchical multi-level cache structure. We propose to sample … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
3
0

Year Published

2016
2016
2018
2018

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(3 citation statements)
references
References 17 publications
0
3
0
Order By: Relevance
“…Moreover, it needs to modify the Linux kernel to implement the proposed framework, which restricts its generality. Muralidhara et al [9] proposed a cache hierarchy-aware application grouping algorithm to find an application-to-core mapping. The work mainly analyzes the memory access relationship between different applications according to the sampling reuse distance distribution on the simulator, and groups the workload on the coarse-grained program level, which could not fully reflect the data interaction characteristics between different threads in the same application.…”
Section: Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…Moreover, it needs to modify the Linux kernel to implement the proposed framework, which restricts its generality. Muralidhara et al [9] proposed a cache hierarchy-aware application grouping algorithm to find an application-to-core mapping. The work mainly analyzes the memory access relationship between different applications according to the sampling reuse distance distribution on the simulator, and groups the workload on the coarse-grained program level, which could not fully reflect the data interaction characteristics between different threads in the same application.…”
Section: Related Workmentioning
confidence: 99%
“…Referring to the mapping algorithm in the [9,10], the data affinity sub-trees and memory hierarchy graph are used as input, we realize the thread mapping by static binding of threads to processing cores. The mapping rules are as follows:…”
Section: Mapping Rulesmentioning
confidence: 99%
See 1 more Smart Citation