map-numa: access patterns used to characterize the numa memory access optimization techniques and algorithms
文献类型:会议论文
作者 | Luo Qiuming ; Liu Chenjian ; Kong Chang ; Cai Ye |
出版日期 | 2012 |
会议名称 | 9th IFIP International Conference on Network and Parallel Computing, NPC 2012 |
会议日期 | September 6, 2012 - September 8, 2012 |
会议地点 | Gwangju, Korea, Republic of |
关键词 | Algorithms Optimization Parallel architectures |
页码 | 208-216 |
中文摘要 | Some typical memory access patterns are provided and programmed in C, which can be used as benchmark to characterize the various techniques and algorithms aim to improve the performance of NUMA memory access. These access patterns, called MAP-numa (Memory Access Patterns for NUMA), currently include three classes, whose working data sets are corresponding to 1-dimension array, 2-dimension matrix and 3-dimension cube. It is dedicated for NUMA memory access optimization other than measuring the memory bandwidth and latency. MAP-numa is an alternative to those exist benchmarks such as STREAM, pChase, etc. It is used to verify the optimizations' (made automatically/manually to source code/executive binary) capacities by investigating what locality leakage can be remedied. Some experiment results are shown, which give an example of using MAP-numa to evaluate some optimizations based on Oprofile sampling. © IFIP International Federation for Information Processing 2012. |
英文摘要 | Some typical memory access patterns are provided and programmed in C, which can be used as benchmark to characterize the various techniques and algorithms aim to improve the performance of NUMA memory access. These access patterns, called MAP-numa (Memory Access Patterns for NUMA), currently include three classes, whose working data sets are corresponding to 1-dimension array, 2-dimension matrix and 3-dimension cube. It is dedicated for NUMA memory access optimization other than measuring the memory bandwidth and latency. MAP-numa is an alternative to those exist benchmarks such as STREAM, pChase, etc. It is used to verify the optimizations' (made automatically/manually to source code/executive binary) capacities by investigating what locality leakage can be remedied. Some experiment results are shown, which give an example of using MAP-numa to evaluate some optimizations based on Oprofile sampling. © IFIP International Federation for Information Processing 2012. |
收录类别 | EI |
会议录 | Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
![]() |
语种 | 英语 |
ISSN号 | 0302-9743 |
ISBN号 | 9783642356056 |
源URL | [http://ir.iscas.ac.cn/handle/311060/15956] ![]() |
专题 | 软件研究所_软件所图书馆_会议论文 |
推荐引用方式 GB/T 7714 | Luo Qiuming,Liu Chenjian,Kong Chang,et al. map-numa: access patterns used to characterize the numa memory access optimization techniques and algorithms[C]. 见:9th IFIP International Conference on Network and Parallel Computing, NPC 2012. Gwangju, Korea, Republic of. September 6, 2012 - September 8, 2012. |
入库方式: OAI收割
来源:软件研究所
浏览0
下载0
收藏0
其他版本
除非特别说明,本系统中所有内容都受版权保护,并保留所有权利。