Proceedings of the 14th International Conference on Compilers, Architectures and Synthesis for Embedded Systems 2011
DOI: 10.1145/2038698.2038722
|View full text |Cite
|
Sign up to set email alerts
|

WCET-driven cache-aware code positioning

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
9
0

Year Published

2011
2011
2019
2019

Publication Types

Select...
7
1

Relationship

2
6

Authors

Journals

citations
Cited by 16 publications
(9 citation statements)
references
References 18 publications
0
9
0
Order By: Relevance
“…Similar techniques can be applied in software [3,14,15,16,17] or in hardware [18,19,20] with different granularities. Software partitioning techniques usually rely on an indirect control over the cache, manipulating address-to-line mapping at OS, compiler, or application level.…”
Section: B Cache Managementmentioning
confidence: 99%
See 1 more Smart Citation
“…Similar techniques can be applied in software [3,14,15,16,17] or in hardware [18,19,20] with different granularities. Software partitioning techniques usually rely on an indirect control over the cache, manipulating address-to-line mapping at OS, compiler, or application level.…”
Section: B Cache Managementmentioning
confidence: 99%
“…Moreover, similarly to what we did on the P4080 platform, the proposed technique can be applied to a variety of platforms currently available on the market. Finally, unlike many works that have been presented in the past, our technique works on both data and code regions [3,4,5]. Experimental results show that, in the considered benchmarks, eliminating the interference in the last level cache can lead up to a 250% improvement of the execution time, with a resulting cache occupation as small as 4 memory pages.…”
Section: Introductionmentioning
confidence: 96%
“…WCC's code positioning [Falk and Kotthaus 2011] aims to systematically reduce I-cache conflict misses and thus to reduce the WCET of a program. It uses a cache conflict graph (CG) as the underlying model of a cache's behavior.…”
Section: Examples Of Wcet-aware Optimizationsmentioning
confidence: 99%
“…They placed procedures on the worst-case path that call each other frequently close together to reduce conflicts. Falk et al [15] recently used block and procedure positioning based on cache conflict graphs to reduce the WCET estimate. Unlike previous work, they accounted for the cache configuration including the associativity, size and replacement policy.…”
Section: Related Workmentioning
confidence: 99%