Oceans 2002 Conference and Exhibition. Conference Proceedings (Cat. No.02CH37362)
DOI: 10.1109/pact.2003.1238018
|View full text |Cite
|
Sign up to set email alerts
|

Characterizing and predicting program behavior and its variability

Abstract: To reach the next level of performance and energy efficiency, optimizations

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

1
111
1

Publication Types

Select...
4
3
2

Relationship

0
9

Authors

Journals

citations
Cited by 138 publications
(116 citation statements)
references
References 33 publications
1
111
1
Order By: Relevance
“…Finally, the repetitive behavior of applications has been exploited in speeding up architectural simulators [22], predicting performance metrics based on history information [12] and synthesizing kernels that resemble applications using architectural simulation [5]. Such studies exploit repetition at "instruction block" level, while we exploit larger-scale and more explicit behavior repetition in high performance scientific codes, based on the iterative nature many of them possess.…”
Section: Related Workmentioning
confidence: 99%
“…Finally, the repetitive behavior of applications has been exploited in speeding up architectural simulators [22], predicting performance metrics based on history information [12] and synthesizing kernels that resemble applications using architectural simulation [5]. Such studies exploit repetition at "instruction block" level, while we exploit larger-scale and more explicit behavior repetition in high performance scientific codes, based on the iterative nature many of them possess.…”
Section: Related Workmentioning
confidence: 99%
“…We use signal analysis techniques in a similar fashion compared to prior work [9], [12] to allow us to capture micro-architecture independent application characteristics.…”
Section: B Determining Application Periodicitymentioning
confidence: 99%
“…This fingerprint depends on the executed source code. Some methods depend on run-time event counters or other metrics [2,3,17,9], such as IPC, power, cache misses rate and branch misprediction, to identify phases. Our infrastructure uses the edge vector of each interval, a vector that gives a count for each control-flow edge in the program, along with the measured IPC.…”
Section: Related Workmentioning
confidence: 99%