“…Existing false sharing detectors fall short in several ways. First, most tools cannot distinguish true and false sharing, or require substantial manual effort to identify optimization opportunities [9,12,13,16,18,24,26,30,31]. Second, tools [9,18,20,28,32] based on memory access instrumentation introduce high runtime overhead, hindering their applicability to real, longrun applications.…”