Online Memory Access Pattern Analysis on an Application Profiling Tool
As memory subsystems have become complex in the state of the art system architectures, application program codes required to be optimized targeting to their deeper memory hierarchy for rewarding their performance. To support such optimizations, we are developing a memory access pattern analysis tool...
Saved in:
Published in | 2014 Second International Symposium on Computing and Networking pp. 602 - 604 |
---|---|
Main Authors | , |
Format | Conference Proceeding |
Language | English |
Published |
IEEE
01.12.2014
|
Subjects | |
Online Access | Get full text |
ISSN | 2379-1888 |
DOI | 10.1109/CANDAR.2014.86 |
Cover
Abstract | As memory subsystems have become complex in the state of the art system architectures, application program codes required to be optimized targeting to their deeper memory hierarchy for rewarding their performance. To support such optimizations, we are developing a memory access pattern analysis tool. In this paper, we present the methodology how we detect memory access patterns on-the-fly on an execution-driven application analysis tool called Exana. First, we implement an offline trace file based method using a Python script code and verify its functionalities. Then, in order to improve its analysis speed, the code is ported to C++ language programs and integrated in the Exana. We evaluate the time and memory usage for the analysis of each implementation. From the results, we confirmed our online implementation can process faster than the offline trace file based method. |
---|---|
AbstractList | As memory subsystems have become complex in the state of the art system architectures, application program codes required to be optimized targeting to their deeper memory hierarchy for rewarding their performance. To support such optimizations, we are developing a memory access pattern analysis tool. In this paper, we present the methodology how we detect memory access patterns on-the-fly on an execution-driven application analysis tool called Exana. First, we implement an offline trace file based method using a Python script code and verify its functionalities. Then, in order to improve its analysis speed, the code is ported to C++ language programs and integrated in the Exana. We evaluate the time and memory usage for the analysis of each implementation. From the results, we confirmed our online implementation can process faster than the offline trace file based method. |
Author | Matsubara, Yuki Sato, Yukinori |
Author_xml | – sequence: 1 givenname: Yuki surname: Matsubara fullname: Matsubara, Yuki email: yuuki-mt@jaist.ac.jp organization: Res. Center for Adv. Comput. Infrastruct., JAIST, Nomi, Japan – sequence: 2 givenname: Yukinori surname: Sato fullname: Sato, Yukinori email: yukinori@jaist.ac.jp organization: Res. Center for Adv. Comput. Infrastruct., JAIST, Nomi, Japan |
BookMark | eNotj7FOwzAURY1UJNrSlYXFP5Dwnu0kzhgFWpAKrVCZKyd9RkapHcVZ8vdEgunoDOdKd8UWPnhi7AEhRYTyqa4-nqvPVACqVOc3bIWqKEuFmRALthSyKBPUWt-xTYw_ACAFKMjlkm0PvnOe-DtdwzDxqm0pRn4040iD55U33RRd5MFzM2vfd641o5v1OATr5vSbn0Lo7tmtNV2kzT_X7Gv7cqpfk_1h91ZX-8QJhWOiSJsmE2iLNrdaWQO6yBRcCEDk-iIIlVQNWihsq1BQo6lprEWdZdCUrZJr9vi364jo3A_uaobpXMD8M8vlL_ZyTKQ |
CODEN | IEEPAD |
ContentType | Conference Proceeding |
DBID | 6IE 6IL CBEJK RIE RIL |
DOI | 10.1109/CANDAR.2014.86 |
DatabaseName | IEEE Electronic Library (IEL) Conference Proceedings IEEE Xplore POP ALL IEEE Xplore All Conference Proceedings IEEE Electronic Library (IEL) IEEE Proceedings Order Plans (POP All) 1998-Present |
DatabaseTitleList | |
Database_xml | – sequence: 1 dbid: RIE name: IEEE Electronic Library (IEL) url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/ sourceTypes: Publisher |
DeliveryMethod | fulltext_linktorsrc |
Discipline | Computer Science |
EISBN | 1479941522 9781479941520 |
EndPage | 604 |
ExternalDocumentID | 7052256 |
Genre | orig-research |
GroupedDBID | 6IE 6IF 6IL 6IN AAWTH ABLEC ADZIZ ALMA_UNASSIGNED_HOLDINGS BEFXN BFFAM BGNUA BKEBE BPEOZ CBEJK CHZPO IEGSK OCL RIE RIL |
ID | FETCH-LOGICAL-i241t-4e8ab521f7c6f84fa087540de00268d2e1434b1f07fc412eb8ebbff18550b9c43 |
IEDL.DBID | RIE |
ISSN | 2379-1888 |
IngestDate | Wed Aug 27 02:03:08 EDT 2025 |
IsPeerReviewed | false |
IsScholarly | false |
Language | English |
LinkModel | DirectLink |
MergedId | FETCHMERGED-LOGICAL-i241t-4e8ab521f7c6f84fa087540de00268d2e1434b1f07fc412eb8ebbff18550b9c43 |
PageCount | 3 |
ParticipantIDs | ieee_primary_7052256 |
PublicationCentury | 2000 |
PublicationDate | 2014-12 |
PublicationDateYYYYMMDD | 2014-12-01 |
PublicationDate_xml | – month: 12 year: 2014 text: 2014-12 |
PublicationDecade | 2010 |
PublicationTitle | 2014 Second International Symposium on Computing and Networking |
PublicationTitleAbbrev | candar |
PublicationYear | 2014 |
Publisher | IEEE |
Publisher_xml | – name: IEEE |
SSID | ssj0003204063 ssj0001967840 |
Score | 1.5787674 |
Snippet | As memory subsystems have become complex in the state of the art system architectures, application program codes required to be optimized targeting to their... |
SourceID | ieee |
SourceType | Publisher |
StartPage | 602 |
SubjectTerms | Algorithm design and analysis Benchmark testing Heuristic algorithms Memory access pattern Memory management Online profiling Optimization Pattern analysis Runtime |
Title | Online Memory Access Pattern Analysis on an Application Profiling Tool |
URI | https://ieeexplore.ieee.org/document/7052256 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV3PS8MwFH7MnTxN3cTf5ODRdmmbNe1xTMcQNoZssNto0hcYSivSHfSvNy_tNhEP3pIcSkhe895L3vd9APcq5HGeK-2FJiAJszjzUqPR4zrTA3tkYh4ROHk6iydL8bwarFrwsMfCIKIrPkOfmu4tPy_1lq7K-pLbaGEQH8GRNbMaq3W4T0ntsdvwllA_Cq15OiG1MJKpF9hMr-FsDHjaHw1nj8MXquwSPsGofyirOMcy7sB0N6W6nuTV31bK11-_2Br_O-cT6B0gfGy-d06n0MLiDDo7DQfW_NJdGNdco2xKFbefbOj0E9ncsW4WbEdZwsqCZbZ7eO2mj5sNYdnZoizferAcPy1GE6_RVvA21mdXnsAkU9Z1G6ljkwiTEbO94DlSUpbkIdo4SqjAcGm0CEJUCSplTED8ZyrVIjqHdlEWeAFMRnFkk0SRiwRtOMAVxoTLTAKUWlozuIQuLcv6vabPWDcrcvX38DUc067UFSM30K4-tnhr_X6l7tyGfwMkuaoR |
linkProvider | IEEE |
linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV09T8MwED2VMsBUoEV844GRpPlwvsaqUBVoqgq1Urcqds5SVZQglA7w6_ElaYsQA1ucIbJsx-_OvvcewJ1wLD9NhTQcZZOFmZ8YkZJoWDKRnt4yMXWJnByP_eGMP8-9eQPut1wYRCyLz9Ckx_IuP83lmo7KuoGlowXP34N9jfvcq9hauxOVSG-8tXIJtV1HL9DSSs1xg8iwda5XqzbaVtTt98YPvVeq7eImEal_eKuU0DJoQbzpVFVRsjLXhTDl1y-9xv_2-gg6OxIfm2zh6RgamJ1Aa-PiwOqfug2DSm2UxVRz-8l6pYMim5S6mxnbiJawPGOJbu7uu-njaklsdjbN87cOzAaP0_7QqN0VjKVG7cLgGCZCg7cKpK9CrhLStudWipSWhamDOpLiwlZWoCS3HRQhCqGUTQpoIpLcPYVmlmd4BixwfVeniTzlIeqAwBLoEzMztDGQgV4I59CmYVm8VwIai3pELv5-fQsHw2k8Woyexi-XcEgzVNWPXEGz-FjjtY4CCnFTTv43QWatXg |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=2014+Second+International+Symposium+on+Computing+and+Networking&rft.atitle=Online+Memory+Access+Pattern+Analysis+on+an+Application+Profiling+Tool&rft.au=Matsubara%2C+Yuki&rft.au=Sato%2C+Yukinori&rft.date=2014-12-01&rft.pub=IEEE&rft.issn=2379-1888&rft.spage=602&rft.epage=604&rft_id=info:doi/10.1109%2FCANDAR.2014.86&rft.externalDocID=7052256 |
thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=2379-1888&client=summon |
thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=2379-1888&client=summon |
thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=2379-1888&client=summon |