Proceedings of the 1989 ACM/IEEE Conference on Supercomputing - Supercomputing '89 1989
DOI: 10.1145/76263.76351
|View full text |Cite
|
Sign up to set email alerts
|

Some results in memory conflict analysis

Abstract: The delay of accesses in shared-memory vector multiprocessors is considered. Simple formulae are presented which predict the delays of both scalar and vector accesses with a variety of loads in terms of memory technology and design parameters. Comparisons are made with both simulated and measured results on five CRAY memory systems.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

1
9
0

Year Published

1990
1990
1997
1997

Publication Types

Select...
6
3

Relationship

0
9

Authors

Journals

citations
Cited by 15 publications
(10 citation statements)
references
References 4 publications
1
9
0
Order By: Relevance
“…For example, we found that a straightforward shared-memory variant of the BSP does not properly account for contention at the banks, since there is no way to account for the relative speed of memory banks and proces-I sors. On the other hand, previous models of multibank memory systems [4], [5], [9], [10], [11], [13], [15], [18], [28], [29], [47], [48], [49], [52] are highly detailed, and the studies have only considered either regular or random access patterns. In this paper, we are interested in modeling algorithms with irregular, but not necessarily random, access patterns without requiring a complicated model.…”
Section: Introductionmentioning
confidence: 99%
“…For example, we found that a straightforward shared-memory variant of the BSP does not properly account for contention at the banks, since there is no way to account for the relative speed of memory banks and proces-I sors. On the other hand, previous models of multibank memory systems [4], [5], [9], [10], [11], [13], [15], [18], [28], [29], [47], [48], [49], [52] are highly detailed, and the studies have only considered either regular or random access patterns. In this paper, we are interested in modeling algorithms with irregular, but not necessarily random, access patterns without requiring a complicated model.…”
Section: Introductionmentioning
confidence: 99%
“…A heuristic delay mode1 with unit-stride vector load accesses is constructed from two arguments (see [5]). …”
Section: 2 Sequential Vector Load Accesses: a Heuristic Modelmentioning
confidence: 99%
“…After startup, a vector is affected only by other vector startups. Each of these (30) This function is similar to the delay given in [5], except for the presence of the (1 -u ) denominator term.…”
Section: 2 Sequential Vector Load Accesses: a Heuristic Modelmentioning
confidence: 99%
“…Some studies evaluate commercial systems [14,15,16,17], and some other works evaluate the global system composed of processors running real applications, with different classes of interconnection networks and memory organization [18,19].…”
Section: Introductionmentioning
confidence: 99%