2008 Asia and South Pacific Design Automation Conference 2008
DOI: 10.1109/aspdac.2008.4483990
|View full text |Cite
|
Sign up to set email alerts
|

Enabling run-time memory data transfer optimizations at the system level with automated extraction of embedded software metadata information

Abstract: Abstract-The information about the run-time behavior of software applications is crucial for enabling system level optimizations for embedded systems. This embedded Software Metadata information is especially important today, because several complex multi-threaded applications are mapped on the memory of a single embedded system. Each thread is triggered at run-time by different input events that can not be predicted at design-time. New methods and tools are needed to automatically profile and analyze the dyna… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
5
0

Year Published

2009
2009
2015
2015

Publication Types

Select...
3
2
1

Relationship

2
4

Authors

Journals

citations
Cited by 7 publications
(5 citation statements)
references
References 13 publications
(14 reference statements)
0
5
0
Order By: Relevance
“…In contrast to previous work, [5] instruments just the dynamic memory management primitives along with all the accesses to memory. A data identification algorithm is proposed and based on the results, DMA optimizations are implemented.…”
Section: Background and Related Workmentioning
confidence: 87%
“…In contrast to previous work, [5] instruments just the dynamic memory management primitives along with all the accesses to memory. A data identification algorithm is proposed and based on the results, DMA optimizations are implemented.…”
Section: Background and Related Workmentioning
confidence: 87%
“…Therefore, the information regarding the behavior of the application in terms of its dynamic memory consumption must be collected at run-time. As such, the method starts with a metadata collection step before the different optimization steps are applied, resulting in a method flow to tackle dynamic memory [22].…”
Section: Proposed Optimization Methodsmentioning
confidence: 99%
“…The second one uses the DMA module for blocks of more than 32 bytes (eight words), but the maximum number of cycles that the DMA engine may hold the bus during burst transactions is limited to eight words (therefore, once the DMA is granted access to the bus, it can transfer without interruptions at least as many bytes as the shortest transfer). Finally, the third configuration employs the DMA module for transfers of at least 32 bytes, but ensures that the DMA may access up to a full DRAM page in a single burst transaction to maximize the efficiency; additionally, this last policy uses the techniques presented in [135] and [22] to decide whether to use the DMA module or not if the system can recognize the current input case. We refer to these policies as "No DMA," "DMA Bad" and "DMA Opt", respectively.…”
Section: Dynamic Memory Block Transfer Optimizationmentioning
confidence: 99%
See 1 more Smart Citation
“…More information about this application and the network traces can be found in [34]. The case study was evaluated on a cycle-accurate Network-on-Chip (NoC) simulation environment [18].…”
Section: Application Overviewmentioning
confidence: 99%