Proceedings of the 21st International Conference on Parallel Architectures and Compilation Techniques 2012
DOI: 10.1145/2370816.2370862
|View full text |Cite
|
Sign up to set email alerts
|

Optimal bypass monitor for high performance last-level caches

Abstract: In the last-level cache, large amounts of blocks have reuse distances greater than the available cache capacity. Cache performance and efficiency can be improved if some subset of these distant reuse blocks can reside in the cache longer. The bypass technique is an effective and attractive solution that prevents the insertion of harmful blocks.Our analysis shows that bypass can contribute significant performance improvement, and the optimal bypass can achieve similar performance compared to OPT+B, which is the… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
32
0

Year Published

2013
2013
2021
2021

Publication Types

Select...
5
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 33 publications
(32 citation statements)
references
References 39 publications
0
32
0
Order By: Relevance
“…A number of works focus on predicting which data will be reused using predictors and information collected based on either the program counter (PC) [2,4,5] or the address [6,7,8].…”
Section: Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…A number of works focus on predicting which data will be reused using predictors and information collected based on either the program counter (PC) [2,4,5] or the address [6,7,8].…”
Section: Related Workmentioning
confidence: 99%
“…The memory system, especially shared last-level cache (LLC), is impacted by these accesses; different types of concurrent workloads result in lower hit rate or even thrashing when the working set is larger than the cache size. In order to better manage limited cache space, selectively bypassing data from the LLC has been shown to ameliorate the problem [1,2,3].…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…On the other hand, many industrial designs, including Intel Core i7 [26], use inclusive last level caches which makes employing the cache bypassing on these designs a non-trivial task. As suggested in a recent work on cache bypassing algorithm [18], a bypassing algorithm can be modified to work with inclusive caches by inserting the bypassed block at the LRU (least recently used) position. In this manner, the bypassing candidates chosen by the bypassing algorithm are victimized on the next miss to the cache set.…”
Section: Motivationmentioning
confidence: 99%
“…Recently proposed replacement algorithms [3] [6] can be an effective method to improve the LLC performance for a wide variety of workloads. Recent work by Li et al [18] uses a similar mechanism to decide the effectiveness of bypassing. The key difference is they do not use probabilistic bypassing and instead maintain a signature based history per program counter to make bypassing decisions.…”
Section: Related Workmentioning
confidence: 99%