2003 International Conference on Parallel Processing, 2003. Proceedings. 2003
DOI: 10.1109/icpp.2003.1240592
|View full text |Cite
|
Sign up to set email alerts
|

A novel approach to cache block reuse predictions

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
19
0

Year Published

2005
2005
2024
2024

Publication Types

Select...
7
2

Relationship

0
9

Authors

Journals

citations
Cited by 26 publications
(19 citation statements)
references
References 10 publications
0
19
0
Order By: Relevance
“…Bypassing: Prior work has also used bypassing [6], [10], [11], [22], [27] to improve cache efficiency. Tyson et al proposed bypassing based on the hit rate of the missing load/store instruction [27].…”
Section: Prior Work On Dead Block Predictionmentioning
confidence: 99%
“…Bypassing: Prior work has also used bypassing [6], [10], [11], [22], [27] to improve cache efficiency. Tyson et al proposed bypassing based on the hit rate of the missing load/store instruction [27].…”
Section: Prior Work On Dead Block Predictionmentioning
confidence: 99%
“…Karlsson and Hagersten found that the number of cache replacements between a block's last use and its eviction is fairly stable, and checked whether a block's reuse distance is smaller [10]. Jalminger and Stenström targeted similar goals using a structure similar to a two level branch predictor [7]. In a different approach, Tyson et al implemented non-transiency prediction by identifying load/store operations that are likely to cause a cache miss, using a cache bypass for the fetched data [15].…”
Section: Identifying the Core Working Setmentioning
confidence: 99%
“…A number of works focus on predicting which data will be reused using predictors and information collected based on either the program counter (PC) [2,4,5] or the address [6,7,8].…”
Section: Related Workmentioning
confidence: 99%
“…Instructions which create a lot of misses are not allowed to allocate, identified by a two-bit predictor; later used in [7] to predict which data should be bypassed based on addresses instead of PC. Similarly, Johnson et al [6] store counters in Memory Access Table, looked up to decide bypassing.…”
Section: Related Workmentioning
confidence: 99%