Reuse distance based performance modeling and workload mapping

Sai Prashanth Muralidhara, Mahmut Kandemir, Orhan Kislal

Research output: Chapter in Book/Report/Conference proceedingConference contribution

4 Scopus citations


Modern multicore architectures have multiple cores connected to a hierarchical cache structure resulting in heterogeneity in cache sharing across different subsets of cores. In these systems, overall throughput and efficiency depends heavily on a careful mapping of applications to available cores. In this paper, we study the problem of application-to-core mapping with the goal of trying to improve the overall cache performance in the presence of a hierarchical multi-level cache structure. We propose to sample the memory access patterns of individual applications and build their reuse distance distributions. Further, we propose to use these reuse distance distributions to compute an application-to-core mapping that tries to improve the overall cache performance, and consequently, the overall throughput. We show that our proposed mapping scheme is very effective in practice yielding throughput benefits of about 39% over the worst case mapping and about 30% over the default operating system based mapping. We believe, as larger chip multiprocessors with deeper cache hierarchies are projected to be the norm in the future, efficient mapping of applications to cores will become a vital requirement to extract the maximum possible performance from these systems.

Original languageEnglish (US)
Title of host publicationCF '12 - Proceedings of the ACM Computing Frontiers Conference
Number of pages10
StatePublished - 2012
EventACM Computing Frontiers Conference, CF '12 - Cagliari, Italy
Duration: May 15 2012May 17 2012

Publication series

NameCF '12 - Proceedings of the ACM Computing Frontiers Conference


OtherACM Computing Frontiers Conference, CF '12

All Science Journal Classification (ASJC) codes

  • Software


Dive into the research topics of 'Reuse distance based performance modeling and workload mapping'. Together they form a unique fingerprint.

Cite this