ACR: APPLICATION AWARE CACHE REPLACEMENT FOR SHARED CACHES IN MULTI-CORE SYSTEMS
Journal Title: International Journal of Computer Engineering & Technology (IJCET) - Year 2019, Vol 10, Issue 2
Abstract
Modern multi-core systems allow concurrent execution of different applications on a single chip. Such multicores handle the large bandwidth requirement from the processing cores by employing multiple levels of caches with one or two levels of private caches along with a shared last-level cache (LLC). In shared LLC, when applications with varying access behavior compete with each other for space, conventional single core cache replacement techniques can significantly degrade the system performance. In such scenarios, we need an efficient replacement policy for reducing the off-chip memory traffic as well as contention for the memory bandwidth. This paper proposes a novel Application-aware Cache Replacement (ACR) policy for the shared LLC. ACR policy considers the memory access behavior of the applications during the process of victim selection to prevent victimizing a low access rate application by a high-access rate application. \textcolor{red}{ It dynamically tracks the maximum life-time of cache lines in shared LLC for each concurrent application and helps in efficient utilization of the cache space. Experimental evaluation of ACR policy for 4-core systems, with 16-way set associative 4MB LLC, using SPEC CPU 2000 and 2006 benchmark suites shows a geometric mean speed-up of 8.7% over the least recently used (LRU) replacement policy. We show that the ACR policy performs better than recently proposed thread-aware dynamic re-reference interval prediction (TA-DRRIP) and protecting distance based (PDP) techniques for various 2-core, 4-core and 8-core workloads.
Authors and Affiliations
TRIPTI S WARRIER
EXPERIMENTAL STUDY ON CLOUD SECURITY FOR PERSONAL HEALTH RECORDS OVER PATIENT CENTRIC DATA
Cloud computing offers many services among one is Storage as a service. Using this service user can outsource his data and whenever required he can download or he can share with others. Using cloud computing PHR owner...
COMPREHENSIVE STUDY OF HYPERSPECTRL SIGNATURES, PETROGRAPHY AND EDX ANALYSIS ON GOLD BEARING LITHO UNITS OF KEMPINAKOTE, NUGGIHALLI SCHIST BELT, DHARWAR CRATON, KARNATAKA, INDIA
The Archean Green Stone Belts (AGSB) having enormous metalliferous deposits like gold , copper, silver, iron and other precious gem stones which are also called as schist belts of Dharwar Craton. The study area Kempina...
FAULT DATA DETECTION IN SOFTWARE USING A NOVEL FGRNN ALGORITHM
The use and dependence on software in various fields has been the reason why researchers for past decades have spent their efforts on finding better methods to predict software quality and reliability. Soft computing m...
IMPLEMENTATION OF ARTIFICIAL NEURAL NETWORK DATA MINING ALGORITHM: A CASE STUDY OF BIRTH REGISTRATION DATA
The scope of different applications of Artificial Neural Network is immense. In recent times, Artificial Neural Network has been used in different type of applications. The use of Artificial Neural Network in Medical S...
ROBOTIC PROCESS AUTOMATION IN SOFTWARE PERFORMANCE TESTING WORKLOAD MODELING
Software Performance Testing(SPT) is the kind of Non-Functional Testing(NFT) to prove the to be delivered system by the project team/product team is working as expected with respect to system health, consistency, endur...