2009 IEEE International Symposium on Performance Analysis of Systems and Software 2009
DOI: 10.1109/ispass.2009.4919655
|View full text |Cite
|
Sign up to set email alerts
|

Accurately approximating superscalar processor performance from traces

Abstract: Trace-driven simulation of superscalar processors is particularly complicated. The dynamic nature of superscalar processors combined with the static nature of traces can lead to large inaccuracies in the results, especially when traces contain only a subset of executed instructions for trace reduction. The main problem in the filtered trace simulation is that the trace does not contain enough information with which one can predict the actual penalty of a cache miss. In this paper, we discuss and evaluate three… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
22
0

Year Published

2010
2010
2016
2016

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 18 publications
(22 citation statements)
references
References 26 publications
0
22
0
Order By: Relevance
“…The detailed mode is based on the Reorder-Buffer Occupancy Analysis model proposed by Lee et al [21]. When running in detailed mode, TaskSim models a user-defined memory hierarchy including private and shared cache memories, interconnect structures and DRAM.…”
Section: Methodsmentioning
confidence: 99%
“…The detailed mode is based on the Reorder-Buffer Occupancy Analysis model proposed by Lee et al [21]. When running in detailed mode, TaskSim models a user-defined memory hierarchy including private and shared cache memories, interconnect structures and DRAM.…”
Section: Methodsmentioning
confidence: 99%
“…Several approximate microarchitecture simulation methods have been proposed [3], [8], [9], [10], [11], [2], [12], [13] (the list is not exhaustive). In general, these methods trade accuracy for simulation speed.…”
Section: Approximate Simulationmentioning
confidence: 99%
“…Lee et al proposed and studied several behavioral core models [18], [1]. These models consist of a trace of L2 accesses annotated with some information, in particular timestamps, like in the ASPEN model.…”
Section: B Behavioral Core Modelsmentioning
confidence: 99%
“…Lee et al recently introduced the PDCM behavioral core model [1]. During the model building phase, a per-application trace is generated from a cycle-accurate microarchitecture simulator, assuming an ideal L2 cache, i.e., forcing an L2 cache hit on each L1 cache miss.…”
Section: The Pdcm Behavioral Modelmentioning
confidence: 99%
See 1 more Smart Citation