A Study of Memory Access Patterns in Irregular Parallel Codes Using Hardware Counter-Based Tools

نویسندگان

  • Oscar G. Lorenzo
  • Juan A. Lorenzo
  • Dora B. Heras
  • Marcos Suárez
  • Juan C. Pichel
چکیده

This work presents the development of a series of tools to simplify both EARs (Event Address Registers) counters reading and programming in parallel codes. These tools allow EAR counters access in a user friendly workspace. The next tools have been developed: A tool for inserting, in a simple and intuitive manner, the code needed to monitor and program hardware counters in a parallel program. Another tool takes as input the data obtained by the monitored parallel code and shows them in a comprehensive and detailed way. These tools were used to carry out a study of parallel irregular codes and to validate a data reordering technique used to optimize locality of memory accesses in the SpMxV (sparse matrix vector product) problem. Access characterization is one of the main issues dealing with the problem of improving performance of irregular accesses. This is specially true in parallel shared memory platforms.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Quantifying and Resolving Remote Memory Access Contention on Hardware DSM Multiprocessors

This paper makes the following contributions: It proposes a new methodology for quantifying remote memory access contention on hardware DSM multiprocessors. The most valuable aspect of this methodology is that it assesses the impact of contention on real parallel programs running on real hardware. The methodology uses as input the number of accesses from each DSM node to each page in memory. A ...

متن کامل

Towards Tera-scale Performance for Longest Common Subsequence using Graphics Processor

1. EXTENDED ABSTRACT GPUs tradeoff complex hardware-based support for instruction level parallelism for a large number of simpler processing cores. This has a far reaching impact on application programs. Data-parallel programs with regular control flow and memory-access patterns are able to utilize the GPU hardware effectively, while programs that have thread-dependent control flow or irregular...

متن کامل

Modeling Set Associative Caches Behaviour for Irregular Computations

While much work has been devoted to the study of cache behavior during the execution of codes with regular access patterns, little attention has been paid to irregular codes. An important portion of these codes are scientiic applications that handle compressed sparse matrices. In this work a probabilistic model for the prediction of the number of misses on a K-way associative cache memory consi...

متن کامل

Automated and accurate cache behavior analysis for codes with irregular access patterns

The memory hierarchy plays an essential role in the performance of current computers, thus good analysis tools that help predict and understand its behavior are required. Analytical modeling is the ideal base for such tools if its traditional limitations in accuracy and scope of application are overcome. While there has been extensive research on the modeling of codes with regular access patter...

متن کامل

Evaluating Locality Optimizations For Adaptive Irregular Scientific Codes

Irregular scientific codes experience poor cache performance due to their memory access patterns. Researchers have proposed several data and computation transformations to improve locality in irregular scientific codes. We experimentally compare their performance and present GPART, a new technique based on hierarchical clustering. Quality partitions are constructed quickly by clustering multipl...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2011