Computing Reviews

Precise automatable analytical modeling of the cache behavior of codes with indirections
Andrade D., Fraguela B., Doallo R. ACM Transactions on Architecture and Code Optimization4(3):16-es,2007.Type:Article
Date Reviewed: 11/28/07

The modeling of cache performance and the prediction of cache miss probability are difficult problems. Modeling the cache performance by trace-driven simulations has been widely studied in the past. However, the validity of these studies is hardware dependent, and these studies do not provide a good insight into the cache miss observations. Analytical models are expected to elucidate cache miss behaviors, and are strongly needed for implementing code optimization by production compilers.

The probabilistic miss equation (PME) model was an earlier analytical model, but it relies on the assumption that codes have regular access patterns. Like other analytical models, the model discussed in this paper is based on the assumption that the irregular access to the referenced array is uniformly distributed in the array. This assumption eases the modeling of the irregular access patterns posed for modeling the operations of the cache. The authors admit that most irregular accesses in real programs do not follow a uniform distribution. The authors also claim that experiments show that their model accurately predicts the behavior of several codes with nonuniformly distributed irregular accesses.

Even though the uniform distributed irregular patterns can closely approximate many nonuniformly distributed patterns, the assumption itself detaches the possible interactions between a program code and the operation of the cache. Namely, an originally closed-loop interaction is approximated by an open-loop model. The assumption about the uniform distributed access patterns limits the analytical model in this paper to non-real-time applications. In real-time applications, a much stronger interaction may exist between the application code and the cache operations.

Reviewer:  Jun Liu Review #: CR134984

Reproduction in whole or in part without permission is prohibited.   Copyright 2024 ComputingReviews.com™
Terms of Use
| Privacy Policy