Exploiting Program Hotspots and Code Sequentiality for Instruction Cache Leakage Management

J. S. Hu, A. Nadgir, N. Vijaykrishnan, Mary Jane Irwin, M. Kandemir

Research output: Contribution to conferencePaperpeer-review

3 Scopus citations

Abstract

Leakage energy optimization for caches has been the target of much recent effort. In this work, we focus on instruction caches and tailor two techniques that exploit the two major factors that shape the instruction access behavior, namely, hotspot execution and sequentiality. First, we adopt a hotspot detection mechanism by profiling the branch behavior at runtime and utilize this to implement a HotSpot based Leakage Management (HSLM) mechanism. Second, we exploit code sequentiality in implementing a Just-In-Time Activation (JITA) that transitions cache lines to active mode just before they are accessed. We utilize the recently proposed drowsy cache that dynamically scales voltages for leakage reduction and implement various schemes that use different combinations of HSLM and JITA. Our experimental evaluation using the SPEC2000 benchmark suite shows that instruction cache leakage energy consumption can be reduced by 63%, 49% and 29%, on the average, as compared to an unoptimized cache, a recently proposed hardware optimized cache, and a cache optimized using compiler, respectively. Further, we observe that these energy savings can be obtained without a significant impact on performance.

Original languageEnglish (US)
Pages402-407
Number of pages6
DOIs
StatePublished - 2003
EventProceedings of the 2003 International Symposium on Low Power Electronics and Design, (ISLPED'03) - Seoul, Korea, Republic of
Duration: Aug 25 2003Aug 27 2003

Other

OtherProceedings of the 2003 International Symposium on Low Power Electronics and Design, (ISLPED'03)
Country/TerritoryKorea, Republic of
CitySeoul
Period8/25/038/27/03

All Science Journal Classification (ASJC) codes

  • General Engineering

Fingerprint

Dive into the research topics of 'Exploiting Program Hotspots and Code Sequentiality for Instruction Cache Leakage Management'. Together they form a unique fingerprint.

Cite this