MK Qureshi, DN Lynch, O Mutlu, YN Patt - ACM SIGARCH Computer …, 2006 - dl.acm.org
… Based on the observation that the aim of a cachereplacement … cachereplacement and make the following contributions: … mechanism to implement a MLPaware cachereplacement …
A Balamash, M Krunz - IEEE Communications Surveys & …, 2004 - ieeexplore.ieee.org
… -K buffer caching policy [23], integrating both cachereplacement and consistency (the two were treated independently in previous policies). Consistency mechanisms try to keep cached …
M Kharbutli, Y Solihin - IEEE Transactions on Computers, 2008 - ieeexplore.ieee.org
… Our mechanism relies on counters that keep track of the … of cache leakage power reduction [4], [5], [7] and prefetching [8]. However, logically, it is applicable for aiding cachereplacement …
This book summarizes the landscape of cachereplacement policies for CPU data caches. The emphasis is on algorithmic issues, so the authors start by defining a taxonomy that places …
… policy as close to optimal as possible, we thoroughly explored the design space of existing replacementmechanisms using SimpleScalar toolset and SPEC CPU2000 benchmark suite, …
JE Smith, JR Goodman - IEEE Transactions on Computers, 1985 - ieeexplore.ieee.org
… program; rather, it provides a mechanism for explaining and predicting qualitative differences in hit ratios as cache dimensions and replacement policies are changed. In addition, there …
TA Khan, D Zhang, A Sriraman… - 2021 ACM/IEEE 48th …, 2021 - ieeexplore.ieee.org
… We evaluate Ripple in combination with I-cache prefetching mechanisms, and show that Ripple yields on average 1.6% (up to 2.13%) improvement over prior work as it reduces I…
M Zahran - WDDD held in conjunction with ISCA, 2007 - mzahran.com
… This means that all cache accesses are made visible to the LRU mechanism of all … the effectiveness of local cachereplacement policies. We show that local replacement may not be the …
H Chen, Y Xiao - IEEE Communications Magazine, 2006 - ieeexplore.ieee.org
… In particular, we classify and survey cache access mechanisms and replacement algorithms, which should be designed considering both the limitations of wireless networks/devices …