2019 IEEE International Symposium on Performance Analysis of Systems and Software (ISPASS) 2019
DOI: 10.1109/ispass.2019.00025
|View full text |Cite
|
Sign up to set email alerts
|

Fast Modeling of the L2 Cache Reuse Distance Histograms from Software Traces

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0

Year Published

2019
2019
2021
2021

Publication Types

Select...
4
1

Relationship

2
3

Authors

Journals

citations
Cited by 7 publications
(6 citation statements)
references
References 3 publications
0
6
0
Order By: Relevance
“…3, the inputs of the model are the L2 individual RDHs and individual AAD from each core, which are obtained by Ge's model. Literatures [6] and [7] introduce how to construct the L2RDH from the L1RDH profiled from the CPU traces. Although they have not explained how to obtain AAD, we can get it easily and efficiently when profiling Hit-RDH by small updating in the information extraction code.…”
Section: Access Address Distribution(aad)mentioning
confidence: 99%
See 3 more Smart Citations
“…3, the inputs of the model are the L2 individual RDHs and individual AAD from each core, which are obtained by Ge's model. Literatures [6] and [7] introduce how to construct the L2RDH from the L1RDH profiled from the CPU traces. Although they have not explained how to obtain AAD, we can get it easily and efficiently when profiling Hit-RDH by small updating in the information extraction code.…”
Section: Access Address Distribution(aad)mentioning
confidence: 99%
“…Before discussing these two problems, we will start from the introduction of the upstream cache model. In this paper, we choose Ge's multi-level cache model [6] [7] as the upstream cache model. The multi-level cache model proposes two new metrics, namely the Reuse-and-Stack-Transfer (RST) table and the Hit-RDH table.…”
Section: Integrating With the Upstream Cache Modelmentioning
confidence: 99%
See 2 more Smart Citations
“…[21]. To find the correlation of interference effect with memory access latency characterization of cache behavior is carried out through the reuse distance histogram model [22]. L2 cache miss rate is measured by considering L1 cache configuration as input and applying random and LRU cache replacement policies in the gem5 simulator.…”
Section: A Characterization In Isolationmentioning
confidence: 99%