2018 ACM/IEEE 45th Annual International Symposium on Computer Architecture (ISCA) 2018
DOI: 10.1109/isca.2018.00020
|View full text |Cite
|
Sign up to set email alerts
|

Rethinking Belady's Algorithm to Accommodate Prefetching

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
17
0
3

Year Published

2019
2019
2023
2023

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 31 publications
(20 citation statements)
references
References 50 publications
0
17
0
3
Order By: Relevance
“…Summary: Hardware cache management is an established difficult problem, which is reflected in the small average speed-ups (usually 1%-5%) achieved by state-of-the-art cache management schemes over the prior best schemes [5,26,28,29,49,52,53]. Our work shows that graph applications present a particularly challenging workload for these schemes, in many cases leading to significant performance slowdowns.…”
Section: A History-based Predictive Schemesmentioning
confidence: 92%
See 1 more Smart Citation
“…Summary: Hardware cache management is an established difficult problem, which is reflected in the small average speed-ups (usually 1%-5%) achieved by state-of-the-art cache management schemes over the prior best schemes [5,26,28,29,49,52,53]. Our work shows that graph applications present a particularly challenging workload for these schemes, in many cases leading to significant performance slowdowns.…”
Section: A History-based Predictive Schemesmentioning
confidence: 92%
“…These hardware schemes aim to perform two tasks: (1) identify cache blocks that are likely to exhibit high reuse, and (2) protect high reuse cache blocks from cache thrashing. To accomplish the first task, these schemes deploy either probabilistic or prediction-based hardware mechanisms [5,10,13,26,28,29,41,49,51,52,53,57,58,59,60]. However, our work finds that graph-dependent irregular access patterns prevent these schemes from correctly learning which cache blocks to preserve, rendering them deficient for the broad domain of graph analytics.…”
Section: Introductionmentioning
confidence: 96%
“…However, AOB and ETR are actually general techniques that enable formulating direct-mapped versions of replacement policies, as well as reducing the bandwidth needed to maintain replacement policy state. AOB and ETR can make even state-of-the-art signature-based policies [10,11,12,32,33] suitable for DRAM caches. We show how using Signature-based Hit Predictor (SHiP) [10] as an example.…”
Section: Signature-based Policiesmentioning
confidence: 99%
“…We design a bypassing version of RRIP, RRIP-AOB, and implement ETR on our RRIP-AOB as an example of this class of policies, but our ETR scheme can be easily used to reduce update-cost of other frequency and reuse-based replacement algorithms. Signature-based replacement [10,11,12,32,33] attempt to predict line reuse based on signatures (e.g., PC). We develop a bypassing version of SHiP, called SHiP-AOB, to show how to implement signature-based replacement on caches with low associativity.…”
Section: Replacement / Bypassing Policiesmentioning
confidence: 99%
“…Simulações de memória cache têm seus efeitos alterados pela falta de prefetcher, o que poderia invalidar resultados de vários artigos, inclusive o do próprio ZSim. Com isso, o efeito apresentado em artigos sobre política de substituição de cache seria reduzido, pois o prefetcher já mitiga a latência de acessosà memória principal [Jain and Lin 2018]. Além disso, o efeito da comunicação e a própria ação do prefetch aumentam a contenção nos bancos da cache deúltimo nível.…”
Section: Análise De Comportamento Da Hierarquia De Memóriaunclassified