Oceans 2002 Conference and Exhibition. Conference Proceedings (Cat. No.02CH37362)
DOI: 10.1109/pact.2003.1238004
|View full text |Cite
|
Sign up to set email alerts
|

Miss rate prediction across all program inputs

Abstract: Abstract

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
63
0

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 43 publications
(63 citation statements)
references
References 25 publications
0
63
0
Order By: Relevance
“…Our PIN tool records profiles in between every pair of barrier calls-i.e., per parallel region. 1 Multiple loops can occur within a single parallel region so this does not isolate all parallel loops, but it is sufficient for our study.…”
Section: A Profilingmentioning
confidence: 99%
See 1 more Smart Citation
“…Our PIN tool records profiles in between every pair of barrier calls-i.e., per parallel region. 1 Multiple loops can occur within a single parallel region so this does not isolate all parallel loops, but it is sufficient for our study.…”
Section: A Profilingmentioning
confidence: 99%
“…We employ reference groups [1], a technique previously used to predict RD profiles across problem scaling, to predict coherent shifting. We also propose uniformly distributing the portion of CRD profiles associated with shared references to predict spreading.…”
Section: Introductionmentioning
confidence: 99%
“…Previous work on computing cache miss predictions from memory reuse distance information has explored approaches that associate reuse distance data with either individual references [9], [13], groups of related references from the same loop [14], or an entire application [23]. Associating reuse distance data with a section of code, be it a reference, a loop or an entire application, is sufficient for computing the number of cache misses incurred by that piece of code.…”
Section: Understanding Data Reuse Patternsmentioning
confidence: 99%
“…These include investigating memory hierarchy management techniques [3], [16], characterizing data locality in program executions for individual program inputs [4], [7], and using memory reuse distance data from training runs to predict cache miss rate for other program inputs [9], [13], [23].…”
Section: Introductionmentioning
confidence: 99%
“…A trace may not represent the program behavior on other inputs, and a trace may be too large to be analyzed. For many programs, earlier work has shown that the temporal locality follows a predictable pattern and the (cache miss) behavior of all program inputs can be predicted by examining medium-size training runs [14,15,26,34,44]. In this paper, we use a medium-size input for each program.…”
Section: Introductionmentioning
confidence: 99%