Proceedings of the Second Workshop on Optimizing Stencil Computations 2014
DOI: 10.1145/2686745.2686748
|View full text |Cite
|
Sign up to set email alerts
|

Trace-Driven Memory Access Pattern Recognition in Computational Kernels

Abstract: Classifying memory access patterns is paramount to the selection of the right set of optimizations and determination of the parallelization strategy. Static analyses suffer from ambiguities present in source code, which modern compilation techniques, such as profile-guided optimization, alleviate by observing runtime behavior and feeding back into the compilation flow. This paper discusses a dynamic analysis technique for recognizing memory access patterns, with application to the stencils domain, and presents… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(1 citation statement)
references
References 18 publications
0
1
0
Order By: Relevance
“…Prior work also has examined nested loops with affine array subscript patterns, using different structures (vector [29], matrix [60] or reference [32]) to model memory access patterns or polyhedral model [45] to perform localization analysis. Since static analysis deals poorly with ambiguities in source code [6], recent work proposes profile-guided methods [17] and memorytracing [54] to capture memory access patterns. Simpler approaches focus on examining stencil code [23-25, 36, 54].…”
Section: Related Workmentioning
confidence: 99%
“…Prior work also has examined nested loops with affine array subscript patterns, using different structures (vector [29], matrix [60] or reference [32]) to model memory access patterns or polyhedral model [45] to perform localization analysis. Since static analysis deals poorly with ambiguities in source code [6], recent work proposes profile-guided methods [17] and memorytracing [54] to capture memory access patterns. Simpler approaches focus on examining stencil code [23-25, 36, 54].…”
Section: Related Workmentioning
confidence: 99%