[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
article
Open access

Profile-based adaptation for cache decay

Published: 01 September 2004 Publication History

Abstract

"Cache decay" is a set of leakage-reduction mechanisms that put cache lines that have not been accessed for a specific duration into a low-leakage standby mode. This duration is called the decay interval, and its optimal value varies across applications. This paper describes an adaptation technique that analytically finds the optimal decay interval through profiling, and shows that the most important variables required for finding the optimal decay interval can be estimated with a reasonable degree of accuracy using profiling. This work explicitly trades off the leakage power saved in putting both the "live" and "dead" lines into standby mode, against its performance and energy costs. It achieves energy savings close to what can be obtained with an omniscient choice of per-benchmark optimal decay interval.

References

[1]
Albonesi, D. H. 1999. Selective cache ways: On-demand cache resource allocation. In Proceedings of the 32nd Annual ACM/IEEE International Symposium on Microarchitecture. 248--259.
[2]
Bala, V., Duesterwald, E., and Banerjia, S. 2000. Dynamo: A transparent dynamic optimization system. In Proceedings of the ACM SIGPLAN 2000 Conference on Programming Languages Design and Implementation.
[3]
Brooks, D., Tiwari, V., and Martonosi, M. 2000. Wattch: A framework for architectural-level power analysis and optimizations. In Proceedings of the 27th Annual International Symposium on Computer Architecture. 83--94.
[4]
Burger, D. C., Austin, T. M., and Bennett, S. 1996. Evaluating Future Microprocessors: The SimpleScalar Tool Set. Tech. Report TR-1308, University of Wisconsin-Madison Computer Sciences Department. July.
[5]
Flautner, K., Kim, N. S., Martin, S., Blaauw, D., and Mudge, T. 2002. Drowsy caches: Simple techniques for reducing leakage power. In Proceedings of the 29th Annual International Symposium on Computer Architecture. 147--157.
[6]
Huang, M., Renau, J., and Torrellas, J. 2003. Positional adaptation of processors: Application to energy reduction. In Proceedings of the 30th Annual International Symposium on Computer Architecture. 157--168.
[7]
Kaxiras, S., Hu, Z., and Martonosi, M. 2001. Cache decay: Exploiting generational behavior to reduce cache leakage power. In Proceedings of the 28th Annual International Symposium on Computer Architecture.
[8]
Kobayashi, T. and Sakurai, T. 1994. Self-adjusting threshold-voltage scheme (sats) for low-voltage high-speed operation. In Proceedings of the IEEE 1994 CICC. 271--274.
[9]
Lee, H., Tyson, G., and Farrens, M. 2000. Eager writeback---A technique for improving bandwidth utilization. In Proceedings of the 33rd Annual IEEE/ACM International Symposium on Microarchitecture. 11--21.
[10]
Li, Y., Parikh, D., Zhang, Y., Sankaranarayanan, K., Skadron, K., and Stan, M. 2004. State-preserving vs. non-state preserving leakage control in caches. In Proceedings of the 2004 Design, Automation and Test in Europe Conference.
[11]
Magklis, G., Scott, M. L., Semeraro, G., Albonesi, D. H., and Dropsho, S. 2003. Profile-based dynamic voltage and frequency scaling for a multiple clock domain microprocessor. In Proceedings of the 30th Annual International Symposium on Computer Architecture. 14--27.
[12]
Nii, K. et al. 1998. A low power SRAM using auto-backgate-controlled MT-CMOS. In Proceedings of the 1998 International Symposium on Low Power Electronics and Design. 293--298.
[13]
Sankaranarayanan, K. and Skadron, K. 2004. Profile-Based Adaptation for Cache Decay: A Technical Report. Tech. Rep. CS-2004-14, University of Virginia Department of Computer Science. Apr.
[14]
Scott, K., Kumar, N., Velusamy, S., Childers, B., Davidson, J. W., and Soffa, M. L. 2003. Retargetable and reconfigurable software dynamic translation. In Proceedings of the International Symposium on Code Generation and Optimization. 36--47.
[15]
Sherwood, T., Perelman, E., Hamerly, G., and Calder, B. 2002. Automatically characterizing large scale program behavior. In Proceedings of the Tenth International Conference on Architectural Support for Programming Languages and Operating Systems. 45--57.
[16]
Velusamy, S., Sankaranarayanan, K., Parikh, D., Abdelzaher, T., and Skadron, K. 2002. Adaptive cache decay using formal feedback control. In Proceedings of the 2002 Workshop on Memory Performance Issues.
[17]
Yang, S.-H., Powell, M. D., Falsafi, B., Roy, K., and Vijaykumar, T. N. 2001. An integrated circuit/architecture approach to reducing leakage in deep-submicron high-performance I-caches. In Proceedings of the Seventh International Symposium on High-Performance Computer Architecture.
[18]
Zhou, H., Toburen, M., Rotenberg, E., and Conte, T. M. 2003. Adaptive mode control: A static-power-efficient cache design. ACM Trans. Embedded Comput. Syst. 2, 3, 347--372.

Cited By

View all
  • (2015)Forgetting based File Cache Management Scheme for Non-Volatile MemoryJournal of KIISE10.5626/JOK.2015.42.8.97242:8(972-978)Online publication date: 15-Aug-2015
  • (2015)Immediate sleepProceedings of the 2015 33rd IEEE International Conference on Computer Design (ICCD)10.1109/ICCD.2015.7357096(149-156)Online publication date: 18-Oct-2015
  • (2012)Deconstructing iterative optimizationACM Transactions on Architecture and Code Optimization10.1145/2355585.23555949:3(1-30)Online publication date: 5-Oct-2012
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Transactions on Architecture and Code Optimization
ACM Transactions on Architecture and Code Optimization  Volume 1, Issue 3
September 2004
121 pages
ISSN:1544-3566
EISSN:1544-3973
DOI:10.1145/1022969
Issue’s Table of Contents
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 01 September 2004
Published in TACO Volume 1, Issue 3

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. Adaptation
  2. cache decay
  3. interval
  4. leakage power

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)34
  • Downloads (Last 6 weeks)4
Reflects downloads up to 13 Dec 2024

Other Metrics

Citations

Cited By

View all
  • (2015)Forgetting based File Cache Management Scheme for Non-Volatile MemoryJournal of KIISE10.5626/JOK.2015.42.8.97242:8(972-978)Online publication date: 15-Aug-2015
  • (2015)Immediate sleepProceedings of the 2015 33rd IEEE International Conference on Computer Design (ICCD)10.1109/ICCD.2015.7357096(149-156)Online publication date: 18-Oct-2015
  • (2012)Deconstructing iterative optimizationACM Transactions on Architecture and Code Optimization10.1145/2355585.23555949:3(1-30)Online publication date: 5-Oct-2012
  • (2010)Evaluating iterative optimization across 1000 datasetsACM SIGPLAN Notices10.1145/1809028.180664745:6(448-459)Online publication date: 5-Jun-2010
  • (2010)Evaluating iterative optimization across 1000 datasetsProceedings of the 31st ACM SIGPLAN Conference on Programming Language Design and Implementation10.1145/1806596.1806647(448-459)Online publication date: 5-Jun-2010
  • (2008)Capturing and optimizing the interactions between prefetching and cache line turnoffMicroprocessors & Microsystems10.1016/j.micpro.2008.05.00332:7(394-404)Online publication date: 1-Oct-2008
  • (2005)Exploring the limits of leakage power reduction in cachesACM Transactions on Architecture and Code Optimization10.1145/1089008.10890092:3(221-246)Online publication date: 1-Sep-2005
  • (2004)Implementing branch-predictor decay using quasi-static memory cellsACM Transactions on Architecture and Code Optimization10.1145/1011528.10115311:2(180-219)Online publication date: 1-Jun-2004

View Options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Login options

Full Access

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media