利用堆栈特征的片上末级缓存访问模式在线识别方法
发布时间:2018-09-12 12:21
【摘要】:很多优化处理器缓存利用效率的方法依赖于对访问请求序列的特征的探测或识别,例如,预取和绕开等。如何在线有效识别访问请求序列的特征依然是一个开放的问题。通过对典型访问模式的深入分析,发现其堆栈距离频度的分布展示出鲜明的特征。而模拟实验数据表明访问请求序列的特征具有一定的持续性和稳定性,具有检测和预测的可行性。因而提出了一种基于堆栈直方图峰值的在线识别访问模式的机制和方法,空间和时间开销都较小。对SPEC CPU2000/2006的15个程序的实验表明,所提方法均可正确识别测试程序的访问模式。
[Abstract]:Many methods to optimize the efficiency of processor cache utilization depend on the detection or recognition of the features of access request sequences, such as prefetching and bypassing. How to effectively identify the features of access request sequences is still an open problem. Through in-depth analysis of typical access patterns, it is found that the distribution of stack distance frequency shows distinct characteristics. The simulation results show that the characteristics of access request sequences are consistent and stable, and have the feasibility of detection and prediction. Therefore, a mechanism and method for on-line identification of access patterns based on stack histogram peak is proposed, with less space and time overhead. Experiments on 15 programs of SPEC CPU2000/2006 show that the proposed method can correctly identify the access patterns of test programs.
【作者单位】: 北京邮电大学计算机学院;北京航空航天大学软件开发环境国家重点实验室;吉林师范大学数学学院;
【基金】:中国博士后基金资助项目(2014M550662) 软件开发环境国家重点实验室资助项目(SKLSDE-2014KF-04)
【分类号】:TP332
本文编号:2238989
[Abstract]:Many methods to optimize the efficiency of processor cache utilization depend on the detection or recognition of the features of access request sequences, such as prefetching and bypassing. How to effectively identify the features of access request sequences is still an open problem. Through in-depth analysis of typical access patterns, it is found that the distribution of stack distance frequency shows distinct characteristics. The simulation results show that the characteristics of access request sequences are consistent and stable, and have the feasibility of detection and prediction. Therefore, a mechanism and method for on-line identification of access patterns based on stack histogram peak is proposed, with less space and time overhead. Experiments on 15 programs of SPEC CPU2000/2006 show that the proposed method can correctly identify the access patterns of test programs.
【作者单位】: 北京邮电大学计算机学院;北京航空航天大学软件开发环境国家重点实验室;吉林师范大学数学学院;
【基金】:中国博士后基金资助项目(2014M550662) 软件开发环境国家重点实验室资助项目(SKLSDE-2014KF-04)
【分类号】:TP332
【相似文献】
相关期刊论文 前3条
1 李红卫;黄卓恒;李翠萍;;云存储中数据安全访问的研究[J];江苏技术师范学院学报;2013年04期
2 李红卫;古春生;景征骏;于志敏;;云存储中基于ORAM的数据安全访问[J];微电子学与计算机;2014年06期
3 ;[J];;年期
相关会议论文 前1条
1 李宇骞;袁欣颢;王磊;刘超;刘洋;顾荣辉;王乃铮;陈渝;;分布式共享设备的等时传输优化[A];第六届和谐人机环境联合学术会议(HHME2010)、第19届全国多媒体学术会议(NCMT2010)、第6届全国人机交互学术会议(CHCI2010)、第5届全国普适计算学术会议(PCC2010)论文集[C];2010年
,本文编号:2238989
本文链接:https://www.wllwen.com/kejilunwen/jisuanjikexuelunwen/2238989.html