Proceedings of the International Conference on High Performance Computing, Networking, Storage and Analysis 2013
DOI: 10.1145/2503210.2503269
|View full text |Cite
|
Sign up to set email alerts
|

Detection of false sharing using machine learning

Abstract: False sharing is a major class of performance bugs in parallel applications. Detecting false sharing is difficult as it does not change the program semantics. We introduce an efficient and effective approach for detecting false sharing based on machine learning.We develop a set of mini-programs in which false sharing can be turned on and off. We then run the mini-programs both with and without false sharing, collect a set of hardware performance event counts and use the collected data to train a classifier. We… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
17
0

Year Published

2014
2014
2019
2019

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 25 publications
(17 citation statements)
references
References 26 publications
0
17
0
Order By: Relevance
“…Many projects focus on detecting one type of contention. Collecting hardware counters has been extensively used for detecting cache contention [2], [4], [43], [44], [45], [46], NUMA effects [47], or false sharing [48]. Several works simulate the memory subsystem to detect cache issues [6], or to detect false-sharing [28], [49].…”
Section: Related Workmentioning
confidence: 99%
“…Many projects focus on detecting one type of contention. Collecting hardware counters has been extensively used for detecting cache contention [2], [4], [43], [44], [45], [46], NUMA effects [47], or false sharing [48]. Several works simulate the memory subsystem to detect cache issues [6], or to detect false-sharing [28], [49].…”
Section: Related Workmentioning
confidence: 99%
“…As prior work [16,19,20,32], we perform experiments on two well-known benchmark suites: Phoenix [27] and PARSEC [3]. We intentionally use 16 threads in order to run applications for sufficiently long time, as Cheetah needs enough samples to detect false sharing problems.…”
Section: Evaluated Applicationsmentioning
confidence: 99%
“…All existing PMU-based approaches actually detect false sharing by monitoring cache related events. Jayasena et al use the machine learning approach to derive the potential pattern of false sharing by monitoring cache misses, TLB events, interactions among cores, and resources stalls [16]. DARWIN collects cache coherence events during the first round, then identifies possible memory accesses on data structures with frequent cache invalidations during the second round [30].…”
Section: Os-related Approaches Sheriff Proposes Turning Threadsmentioning
confidence: 99%
See 1 more Smart Citation
“…Sanath et al designed a machine learning based approach to detect false sharing problems. They train their classifier on mini-programs and apply this classifier to general programs [13]. Instead of instrumenting memory accesses, this tool relies on hardware performance counters to collect memory accesses events.…”
Section: False Sharing Detectionmentioning
confidence: 99%