While software-controlled static prefetching in software DSMs appears to achieve great performance on many applications, the results in investigating prefetching with runtime information are not satisfied due to the formidable overhead. Seeking specific prefetching mechanisms to reduce the execution time of a certain kind of applications, however, is a promising work and will impact on SVMs and other fields. In this report, an experimental work, adding dynamic prefetching in JIAJIA, a software DSM based on scope consistency [Pal 96], has been proposed and evaluated. There are two features in our prefetching algorithm: it’s sensitive to stride access pattern and can be combined into JIAJIA’s lock-based coherency protocol without much modific...
We have previously shown that the patterns in which files are accessed offer information that can ac...
International audienceData prefetching is an effective way to bridge the increasing performance gap ...
Abstract—This paper studies the isolated and combined effects of several latency-tolerance technique...
Abstract A major overhead in software DSM (Distributed Shared Memory) is the cost of remote memory a...
grantor: University of TorontoA key obstacle to achieving high performance on software dis...
International audienceDynamic optimizers modify the binary code of programs at runtime by profiling ...
This work was also published as a Rice University thesis/dissertation: http://hdl.handle.net/1911/19...
textModern computer systems spend a substantial fraction of their running time waiting for data from...
Abstract—Data prefetching of regular access patterns is an effective mechanism to hide the memory la...
Software prefetching and locality optimizations are techniques for overcoming the speed gap between ...
High performance processors employ hardware data prefetching to reduce the negative performance impa...
A set of hybrid and adaptive prefetching schemes are considered in this paper. The prefetchers are h...
International audienceIn multi-core systems, an application's prefetcher can interfere with the memo...
Current microprocessors aggressively exploit instruction-level parallelism (ILP) through techniques ...
Memory latency is a major factor in limiting CPU per-formance, and prefetching is a well-known metho...
We have previously shown that the patterns in which files are accessed offer information that can ac...
International audienceData prefetching is an effective way to bridge the increasing performance gap ...
Abstract—This paper studies the isolated and combined effects of several latency-tolerance technique...
Abstract A major overhead in software DSM (Distributed Shared Memory) is the cost of remote memory a...
grantor: University of TorontoA key obstacle to achieving high performance on software dis...
International audienceDynamic optimizers modify the binary code of programs at runtime by profiling ...
This work was also published as a Rice University thesis/dissertation: http://hdl.handle.net/1911/19...
textModern computer systems spend a substantial fraction of their running time waiting for data from...
Abstract—Data prefetching of regular access patterns is an effective mechanism to hide the memory la...
Software prefetching and locality optimizations are techniques for overcoming the speed gap between ...
High performance processors employ hardware data prefetching to reduce the negative performance impa...
A set of hybrid and adaptive prefetching schemes are considered in this paper. The prefetchers are h...
International audienceIn multi-core systems, an application's prefetcher can interfere with the memo...
Current microprocessors aggressively exploit instruction-level parallelism (ILP) through techniques ...
Memory latency is a major factor in limiting CPU per-formance, and prefetching is a well-known metho...
We have previously shown that the patterns in which files are accessed offer information that can ac...
International audienceData prefetching is an effective way to bridge the increasing performance gap ...
Abstract—This paper studies the isolated and combined effects of several latency-tolerance technique...