Online Memory Access Pattern Analysis on an Application Profiling Tool

As memory subsystems have become complex in the state of the art system architectures, application program codes required to be optimized targeting to their deeper memory hierarchy for rewarding their performance. To support such optimizations, we are developing a memory access pattern analysis tool...

Full description

Saved in:
Bibliographic Details
Published in2014 Second International Symposium on Computing and Networking pp. 602 - 604
Main Authors Matsubara, Yuki, Sato, Yukinori
Format Conference Proceeding
LanguageEnglish
Published IEEE 01.12.2014
Subjects
Online AccessGet full text
ISSN2379-1888
DOI10.1109/CANDAR.2014.86

Cover

Abstract As memory subsystems have become complex in the state of the art system architectures, application program codes required to be optimized targeting to their deeper memory hierarchy for rewarding their performance. To support such optimizations, we are developing a memory access pattern analysis tool. In this paper, we present the methodology how we detect memory access patterns on-the-fly on an execution-driven application analysis tool called Exana. First, we implement an offline trace file based method using a Python script code and verify its functionalities. Then, in order to improve its analysis speed, the code is ported to C++ language programs and integrated in the Exana. We evaluate the time and memory usage for the analysis of each implementation. From the results, we confirmed our online implementation can process faster than the offline trace file based method.
AbstractList As memory subsystems have become complex in the state of the art system architectures, application program codes required to be optimized targeting to their deeper memory hierarchy for rewarding their performance. To support such optimizations, we are developing a memory access pattern analysis tool. In this paper, we present the methodology how we detect memory access patterns on-the-fly on an execution-driven application analysis tool called Exana. First, we implement an offline trace file based method using a Python script code and verify its functionalities. Then, in order to improve its analysis speed, the code is ported to C++ language programs and integrated in the Exana. We evaluate the time and memory usage for the analysis of each implementation. From the results, we confirmed our online implementation can process faster than the offline trace file based method.
Author Matsubara, Yuki
Sato, Yukinori
Author_xml – sequence: 1
  givenname: Yuki
  surname: Matsubara
  fullname: Matsubara, Yuki
  email: yuuki-mt@jaist.ac.jp
  organization: Res. Center for Adv. Comput. Infrastruct., JAIST, Nomi, Japan
– sequence: 2
  givenname: Yukinori
  surname: Sato
  fullname: Sato, Yukinori
  email: yukinori@jaist.ac.jp
  organization: Res. Center for Adv. Comput. Infrastruct., JAIST, Nomi, Japan
BookMark eNotj7FOwzAURY1UJNrSlYXFP5Dwnu0kzhgFWpAKrVCZKyd9RkapHcVZ8vdEgunoDOdKd8UWPnhi7AEhRYTyqa4-nqvPVACqVOc3bIWqKEuFmRALthSyKBPUWt-xTYw_ACAFKMjlkm0PvnOe-DtdwzDxqm0pRn4040iD55U33RRd5MFzM2vfd641o5v1OATr5vSbn0Lo7tmtNV2kzT_X7Gv7cqpfk_1h91ZX-8QJhWOiSJsmE2iLNrdaWQO6yBRcCEDk-iIIlVQNWihsq1BQo6lprEWdZdCUrZJr9vi364jo3A_uaobpXMD8M8vlL_ZyTKQ
CODEN IEEPAD
ContentType Conference Proceeding
DBID 6IE
6IL
CBEJK
RIE
RIL
DOI 10.1109/CANDAR.2014.86
DatabaseName IEEE Electronic Library (IEL) Conference Proceedings
IEEE Xplore POP ALL
IEEE Xplore All Conference Proceedings
IEEE Electronic Library (IEL)
IEEE Proceedings Order Plans (POP All) 1998-Present
DatabaseTitleList
Database_xml – sequence: 1
  dbid: RIE
  name: IEEE Electronic Library (IEL)
  url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/
  sourceTypes: Publisher
DeliveryMethod fulltext_linktorsrc
Discipline Computer Science
EISBN 1479941522
9781479941520
EndPage 604
ExternalDocumentID 7052256
Genre orig-research
GroupedDBID 6IE
6IF
6IL
6IN
AAWTH
ABLEC
ADZIZ
ALMA_UNASSIGNED_HOLDINGS
BEFXN
BFFAM
BGNUA
BKEBE
BPEOZ
CBEJK
CHZPO
IEGSK
OCL
RIE
RIL
ID FETCH-LOGICAL-i241t-4e8ab521f7c6f84fa087540de00268d2e1434b1f07fc412eb8ebbff18550b9c43
IEDL.DBID RIE
ISSN 2379-1888
IngestDate Wed Aug 27 02:03:08 EDT 2025
IsPeerReviewed false
IsScholarly false
Language English
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-i241t-4e8ab521f7c6f84fa087540de00268d2e1434b1f07fc412eb8ebbff18550b9c43
PageCount 3
ParticipantIDs ieee_primary_7052256
PublicationCentury 2000
PublicationDate 2014-12
PublicationDateYYYYMMDD 2014-12-01
PublicationDate_xml – month: 12
  year: 2014
  text: 2014-12
PublicationDecade 2010
PublicationTitle 2014 Second International Symposium on Computing and Networking
PublicationTitleAbbrev candar
PublicationYear 2014
Publisher IEEE
Publisher_xml – name: IEEE
SSID ssj0003204063
ssj0001967840
Score 1.5787674
Snippet As memory subsystems have become complex in the state of the art system architectures, application program codes required to be optimized targeting to their...
SourceID ieee
SourceType Publisher
StartPage 602
SubjectTerms Algorithm design and analysis
Benchmark testing
Heuristic algorithms
Memory access pattern
Memory management
Online profiling
Optimization
Pattern analysis
Runtime
Title Online Memory Access Pattern Analysis on an Application Profiling Tool
URI https://ieeexplore.ieee.org/document/7052256
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV3PS8MwFH7MnTxN3cTf5ODRdmmbNe1xTMcQNoZssNto0hcYSivSHfSvNy_tNhEP3pIcSkhe895L3vd9APcq5HGeK-2FJiAJszjzUqPR4zrTA3tkYh4ROHk6iydL8bwarFrwsMfCIKIrPkOfmu4tPy_1lq7K-pLbaGEQH8GRNbMaq3W4T0ntsdvwllA_Cq15OiG1MJKpF9hMr-FsDHjaHw1nj8MXquwSPsGofyirOMcy7sB0N6W6nuTV31bK11-_2Br_O-cT6B0gfGy-d06n0MLiDDo7DQfW_NJdGNdco2xKFbefbOj0E9ncsW4WbEdZwsqCZbZ7eO2mj5sNYdnZoizferAcPy1GE6_RVvA21mdXnsAkU9Z1G6ljkwiTEbO94DlSUpbkIdo4SqjAcGm0CEJUCSplTED8ZyrVIjqHdlEWeAFMRnFkk0SRiwRtOMAVxoTLTAKUWlozuIQuLcv6vabPWDcrcvX38DUc067UFSM30K4-tnhr_X6l7tyGfwMkuaoR
linkProvider IEEE
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV09T8MwED2VMsBUoEV844GRpPlwvsaqUBVoqgq1Urcqds5SVZQglA7w6_ElaYsQA1ucIbJsx-_OvvcewJ1wLD9NhTQcZZOFmZ8YkZJoWDKRnt4yMXWJnByP_eGMP8-9eQPut1wYRCyLz9Ckx_IuP83lmo7KuoGlowXP34N9jfvcq9hauxOVSG-8tXIJtV1HL9DSSs1xg8iwda5XqzbaVtTt98YPvVeq7eImEal_eKuU0DJoQbzpVFVRsjLXhTDl1y-9xv_2-gg6OxIfm2zh6RgamJ1Aa-PiwOqfug2DSm2UxVRz-8l6pYMim5S6mxnbiJawPGOJbu7uu-njaklsdjbN87cOzAaP0_7QqN0VjKVG7cLgGCZCg7cKpK9CrhLStudWipSWhamDOpLiwlZWoCS3HRQhCqGUTQpoIpLcPYVmlmd4BixwfVeniTzlIeqAwBLoEzMztDGQgV4I59CmYVm8VwIai3pELv5-fQsHw2k8Woyexi-XcEgzVNWPXEGz-FjjtY4CCnFTTv43QWatXg
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=2014+Second+International+Symposium+on+Computing+and+Networking&rft.atitle=Online+Memory+Access+Pattern+Analysis+on+an+Application+Profiling+Tool&rft.au=Matsubara%2C+Yuki&rft.au=Sato%2C+Yukinori&rft.date=2014-12-01&rft.pub=IEEE&rft.issn=2379-1888&rft.spage=602&rft.epage=604&rft_id=info:doi/10.1109%2FCANDAR.2014.86&rft.externalDocID=7052256
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=2379-1888&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=2379-1888&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=2379-1888&client=summon