Abstract—Rampant dynamism due to load fluctuations, co-runner changes, and varying levels of interference poses a threat to application quality of service (QoS) and has limited our ability to allow co-locations in modern warehouse scale computers (WSCs). Instruction set features such as the non-temporal memory access hints found in modern ISAs (both ARM and x86) may be useful in mitigating these effects. However, despite the challenge of this dynamism and the availability of an instruction set mechanism that might help address the problem, a key capability missing in the system software stack in modern WSCs is the ability to dynamically transform (and re-transform) the executing application code to apply these instruction set features when ...
The cache hierarchy often consumes a large portion of a processor’s energy. To save energy in HPC en...
The overhead of performing optimizations during execu-tion is the main hindrance in achieving good p...
This paper describes transformation techniques for out-of-core pro-grams (i.e., those that deal with...
Commercial applications such as databases and Web servers constitute the most important market segme...
With the rapid improvement of processor speed, performance of the memory hierarchy has become the pr...
Out-of-core applications consume physical resources at a rapid rate, causing interactive application...
The large instruction working sets of private and public cloud workloads lead to frequent instructio...
This work was also published as a Rice University thesis/dissertation: http://hdl.handle.net/1911/19...
As software becomes more complex and the costs of developing and maintaining code increase, dynamic ...
While CPU speed has been improved by a factor of 6400 over the past twenty years, memory bandwidth h...
Recent technology advances enabled computerized services which have proliferated leading to a tremen...
To achieve the best performance, most computer languages are compiled, either ahead of time and s...
For a large class of scientific computing applications, the continuing growth in physical memory cap...
Recently, CPUs with an identical ISA tend to have different microarchitectures, different computatio...
It is known that with the support of domain–specific customizable heterogeneous architecture, energy...
The cache hierarchy often consumes a large portion of a processor’s energy. To save energy in HPC en...
The overhead of performing optimizations during execu-tion is the main hindrance in achieving good p...
This paper describes transformation techniques for out-of-core pro-grams (i.e., those that deal with...
Commercial applications such as databases and Web servers constitute the most important market segme...
With the rapid improvement of processor speed, performance of the memory hierarchy has become the pr...
Out-of-core applications consume physical resources at a rapid rate, causing interactive application...
The large instruction working sets of private and public cloud workloads lead to frequent instructio...
This work was also published as a Rice University thesis/dissertation: http://hdl.handle.net/1911/19...
As software becomes more complex and the costs of developing and maintaining code increase, dynamic ...
While CPU speed has been improved by a factor of 6400 over the past twenty years, memory bandwidth h...
Recent technology advances enabled computerized services which have proliferated leading to a tremen...
To achieve the best performance, most computer languages are compiled, either ahead of time and s...
For a large class of scientific computing applications, the continuing growth in physical memory cap...
Recently, CPUs with an identical ISA tend to have different microarchitectures, different computatio...
It is known that with the support of domain–specific customizable heterogeneous architecture, energy...
The cache hierarchy often consumes a large portion of a processor’s energy. To save energy in HPC en...
The overhead of performing optimizations during execu-tion is the main hindrance in achieving good p...
This paper describes transformation techniques for out-of-core pro-grams (i.e., those that deal with...