Data motif-based proxy benchmarks for big data and AI workloads

W Gao, J Zhan, L Wang, C Luo, Z Jia… - 2018 IEEE …, 2018 - ieeexplore.ieee.org
For the architecture community, reasonable simulation time is a strong requirement in
addition to performance data accuracy. However, emerging big data and AI workloads are …

Proxy benchmarks for emerging big-data workloads

R Panda, LK John - 2017 26th International Conference on …, 2017 - ieeexplore.ieee.org
Early design-space evaluation of computer-systems is usually performed using performance
models such as detailed simulators, RTL-based models etc. Unfortunately, it is very …

Camp: Accurate modeling of core and memory locality for proxy generation of big-data applications

R Panda, X Zheng, A Gerstlauer… - … Design, Automation & …, 2018 - ieeexplore.ieee.org
Fast and accurate design-space exploration is a critical requirement for enabling future
hardware designs. However, big-data applications are often complex targets to evaluate on …

A methodology for characterizing the correspondence between real and proxy applications

O Aaziz, J Cook, J Cook, T Juedeman… - 2018 IEEE …, 2018 - ieeexplore.ieee.org
Proxy applications are a simplified means for stake-holders to evaluate how both hardware
and software stacks might perform on the class of real applications that they are meant to …

Exploring and quantifying how communication behaviors in proxies relate to real applications

O Aaziz, J Cook, J Cook… - 2018 IEEE/ACM …, 2018 - ieeexplore.ieee.org
Proxy applications, or proxies, are simple applications meant to exercise systems in a way
that mimics real applications (their parents). However, characterizing the relationship …

Benchmarking key-value stores on high-performance storage and interconnects for web-scale workloads

D Shankar, X Lu, M Wasi-ur-Rahman… - … Conference on Big …, 2015 - ieeexplore.ieee.org
Leveraging a distributed key-value based caching layer has proven to be invaluable for
scalable data-intensive web applications. With the emergence of high-performance storage …

TraceTracker: Hardware/software co-evaluation for large-scale I/O workload reconstruction

M Kwon, J Zhang, G Park, W Choi… - 2017 IEEE …, 2017 - ieeexplore.ieee.org
Block traces are widely used for system studies, model verifications, and design analyses in
both industry and academia. While such traces include detailed block access patterns …

Data motifs: A lens towards fully understanding big data and ai workloads

W Gao, J Zhan, L Wang, C Luo, D Zheng… - Proceedings of the 27th …, 2018 - dl.acm.org
The complexity and diversity of big data and AI workloads make understanding them difficult
and challenging. This paper proposes a new approachto modelling and characterizing big …

DSServe-data science using serverless

D Patel, S Lin, J Kalagnanam - 2022 IEEE International …, 2022 - ieeexplore.ieee.org
AI Applications uses various data science tools such as Jupyter notebook to prescribe a
series of steps, commonly referred as workflow, for building AI Solutions. The steps in …

On the potential of execution traces for batch processing workload optimization in public clouds

D Scheinert, A Alamgiralem, J Bader… - … Conference on Big …, 2021 - ieeexplore.ieee.org
With the growing amount of data, data processing workloads and the management of their
resource usage becomes increasingly important. Since managing a dedicated infrastructure …