Proceedings of the 21st International Conference on Parallel Architectures and Compilation Techniques 2012
DOI: 10.1145/2370816.2370860
|View full text |Cite
|
Sign up to set email alerts
|

Introducing hierarchy-awareness in replacement and bypass algorithms for last-level caches

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
48
0
1

Year Published

2014
2014
2022
2022

Publication Types

Select...
7
2

Relationship

0
9

Authors

Journals

citations
Cited by 53 publications
(49 citation statements)
references
References 24 publications
0
48
0
1
Order By: Relevance
“…In general, the main body of the cache bypassing techniques is to determine which block should be bypassed or not. For example, a reuse distance can be a key measure to determine whether to bypass or not [4,5,6,7]. Some other works consider reuse counts for making a decision in cache bypassing [8,9,10,11].…”
Section: Related Workmentioning
confidence: 99%
“…In general, the main body of the cache bypassing techniques is to determine which block should be bypassed or not. For example, a reuse distance can be a key measure to determine whether to bypass or not [4,5,6,7]. Some other works consider reuse counts for making a decision in cache bypassing [8,9,10,11].…”
Section: Related Workmentioning
confidence: 99%
“…When a miss is encountered here, the resulting overhead can be higher compared to other cache levels. Many works [2,3,5,6,8,9] have emerged in recent times which strive to improve the performance at LLC.…”
Section: Related Workmentioning
confidence: 99%
“…A method which was proposed by Mainak Chaudhuri et al [8] discusses on how the activities occurring in the inner levels of the cache can be used to make replacement decisions in the LLC. Here activities refer to the pattern of hits and misses encountered.…”
Section: Related Workmentioning
confidence: 99%
“…The effect of inter-thread interference due to sharing has been extensively studied in small scale multi-core contexts [4,3,12,6,7,8,1,5,9,11,2]. However, with advancement in process technology, processors are evolving towards packaging more cores on a chip.…”
Section: Introductionmentioning
confidence: 99%