2018 ACM/IEEE 45th Annual International Symposium on Computer Architecture (ISCA) 2018
DOI: 10.1109/isca.2018.00027
|View full text |Cite
|
Sign up to set email alerts
|

A Case for Richer Cross-Layer Abstractions: Bridging the Semantic Gap with Expressive Memory

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
26
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
5
1
1

Relationship

2
5

Authors

Journals

citations
Cited by 40 publications
(26 citation statements)
references
References 112 publications
0
26
0
Order By: Relevance
“…In practice, there might be data that do not need to be protected from speculative side-channel attacks, significantly limiting the number of speculative accesses that need to be delayed or predicted. Vijaykumar et al [54] have already proposed a solution for tagging memory regions that can be used exactly for this purpose, assuming that the sensitive data regions have been identified by the programmer.…”
Section: Future Workmentioning
confidence: 99%
“…In practice, there might be data that do not need to be protected from speculative side-channel attacks, significantly limiting the number of speculative accesses that need to be delayed or predicted. Vijaykumar et al [54] have already proposed a solution for tagging memory regions that can be used exactly for this purpose, assuming that the sensitive data regions have been identified by the programmer.…”
Section: Future Workmentioning
confidence: 99%
“…However, our work finds that graph-dependent irregular access patterns prevent these schemes from correctly learning which cache blocks to preserve, rendering them deficient for the broad domain of graph analytics. Meanwhile, to accomplish the second task, recent work proposes pinning of high-reuse cache blocks in LLC to ensure that these blocks are not evicted [7]. However, we find that pinning-based schemes are overly rigid and result in sub-optimal utilization of cache capacity.…”
Section: Introductionmentioning
confidence: 90%
“…We appropriately scale the number of sampling sets and predictor table entries for a 16MB cache. XMem [7] is a pinning-based scheme, originally proposed for algorithms that benefit from cache tiling. A cache block, once pinned, cannot be evicted until explicitly unpinned by the software, usually done when the processing of a tile is complete.…”
Section: Methodology For Hardware Evaluationmentioning
confidence: 99%
See 1 more Smart Citation
“…Many semantic or other characteristics of data (e.g., compressibility, approximability, sparsity, criticality, access and security semantics, locality, latency vs. bandwidth sensitivity, privacy requirements, data types, error vulnerability) are invisible or unknown to modern hardware and thus need to be communicated or discovered. We believe efficient and expressive software/hardware interfaces and resulting cross-layer mechanisms, as exemplified by X-Mem (Expressive Memory) [52,53] and the Virtual Block Interface [56] as well as other works [54,55,57,58,107,116,11], are promising and critically-needed approaches to creating general-purpose data-aware architectures.…”
Section: Data-awarementioning
confidence: 97%