2014 ACM/IEEE 41st International Symposium on Computer Architecture (ISCA) 2014
DOI: 10.1109/isca.2014.6853207
|View full text |Cite
|
Sign up to set email alerts
|

Eliminating redundant fragment shader executions on a mobile GPU via hardware memoization

Abstract: Redundancy is at the heart of graphical applications. In fact, generating an animation typically involves the succession of extremely similar images. In terms of rendering these images, this behavior translates into the creation of many fragment programs with the exact same input data. We have measured this fragment redundancy for a set of commercial Android applications, and found that more than 40% of the fragments used in a frame have been already computed in a prior frame.Postprint (published version

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
39
0

Year Published

2016
2016
2018
2018

Publication Types

Select...
2
2
2

Relationship

0
6

Authors

Journals

citations
Cited by 38 publications
(46 citation statements)
references
References 19 publications
0
39
0
Order By: Relevance
“…Approximate computing, which broadly refers to technique that harvests substantial performance/energy benefits 7 We choose QoS=0.8 as an example for demonstration purposes. Users should determine the proper QoS metric and level for their individual application.…”
Section: Related Workmentioning
confidence: 99%
See 4 more Smart Citations
“…Approximate computing, which broadly refers to technique that harvests substantial performance/energy benefits 7 We choose QoS=0.8 as an example for demonstration purposes. Users should determine the proper QoS metric and level for their individual application.…”
Section: Related Workmentioning
confidence: 99%
“…Users should determine the proper QoS metric and level for their individual application. level (e.g., fault-allowable storage [36], voltage overscaling [37], DRAM refresh [38], analog circuits [39], neural acceleration [40], descent fault recovery [41], remote memory data prediction [42], function memorization [5,7], control/memory divergence [6]) and software level (e.g., loop perforation [25], task skipping [43], loop early termination [4,44], program transformation [23], compilation [24], bitwdith reduction [38]). However, it is often not suitable to deploy the current approximate techniques directly to the scientific applications (e.g., weather simulation and molecular dynamics), which are usually numerically intensive and very sensitive to accuracy loss.…”
Section: Related Workmentioning
confidence: 99%
See 3 more Smart Citations