{"title":"消除了调度控制流密集型行为描述的内存访问瓶颈","authors":"S. Ravi, G. Lakshminarayana, N. Jha","doi":"10.1145/288548.289089","DOIUrl":null,"url":null,"abstract":"Application domains like signal and image processing, multimedia and networking protocols involve processing of huge amounts of data stored in memory modules. The behavioral descriptions of these applications may contain a large number of array references for data accesses. Dependencies between array accesses cause bottlenecks in the derivation of high performance schedules. We introduce a scheduling integrated technique to identify and remove these bottlenecks. We first demonstrate that there is a significant loss in the quality of a scheduler if these bottlenecks are not taken into account by the scheduler. We then propose a technique to overcome these bottlenecks by introducing new operations in the schedule called verification operations. Experimental results on several benchmarks show that a scheduler. powered by our technique demonstrates a two fold improvement in performance (measured in terms of the average number of clock cycles) over a recently introduced scheduler for control flow intensive behavioral descriptions, called Wavesched. Wavesched itself has a two fold performance advantage over traditional methods such as path based scheduling and loop directed scheduling. Also, the best- and worst-case execution times for the enhanced schedules obtained by our method are usually equal to or much less than the corresponding values for the execution times obtained by previous schedulers.","PeriodicalId":224802,"journal":{"name":"1998 IEEE/ACM International Conference on Computer-Aided Design. Digest of Technical Papers (IEEE Cat. No.98CB36287)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1998-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"8","resultStr":"{\"title\":\"Removal of memory access bottlenecks for scheduling control-flow intensive behavioral descriptions\",\"authors\":\"S. Ravi, G. Lakshminarayana, N. Jha\",\"doi\":\"10.1145/288548.289089\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Application domains like signal and image processing, multimedia and networking protocols involve processing of huge amounts of data stored in memory modules. The behavioral descriptions of these applications may contain a large number of array references for data accesses. Dependencies between array accesses cause bottlenecks in the derivation of high performance schedules. We introduce a scheduling integrated technique to identify and remove these bottlenecks. We first demonstrate that there is a significant loss in the quality of a scheduler if these bottlenecks are not taken into account by the scheduler. We then propose a technique to overcome these bottlenecks by introducing new operations in the schedule called verification operations. Experimental results on several benchmarks show that a scheduler. powered by our technique demonstrates a two fold improvement in performance (measured in terms of the average number of clock cycles) over a recently introduced scheduler for control flow intensive behavioral descriptions, called Wavesched. Wavesched itself has a two fold performance advantage over traditional methods such as path based scheduling and loop directed scheduling. Also, the best- and worst-case execution times for the enhanced schedules obtained by our method are usually equal to or much less than the corresponding values for the execution times obtained by previous schedulers.\",\"PeriodicalId\":224802,\"journal\":{\"name\":\"1998 IEEE/ACM International Conference on Computer-Aided Design. Digest of Technical Papers (IEEE Cat. No.98CB36287)\",\"volume\":\"23 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"1998-11-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"8\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"1998 IEEE/ACM International Conference on Computer-Aided Design. Digest of Technical Papers (IEEE Cat. No.98CB36287)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1145/288548.289089\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"1998 IEEE/ACM International Conference on Computer-Aided Design. Digest of Technical Papers (IEEE Cat. No.98CB36287)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/288548.289089","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Removal of memory access bottlenecks for scheduling control-flow intensive behavioral descriptions
Application domains like signal and image processing, multimedia and networking protocols involve processing of huge amounts of data stored in memory modules. The behavioral descriptions of these applications may contain a large number of array references for data accesses. Dependencies between array accesses cause bottlenecks in the derivation of high performance schedules. We introduce a scheduling integrated technique to identify and remove these bottlenecks. We first demonstrate that there is a significant loss in the quality of a scheduler if these bottlenecks are not taken into account by the scheduler. We then propose a technique to overcome these bottlenecks by introducing new operations in the schedule called verification operations. Experimental results on several benchmarks show that a scheduler. powered by our technique demonstrates a two fold improvement in performance (measured in terms of the average number of clock cycles) over a recently introduced scheduler for control flow intensive behavioral descriptions, called Wavesched. Wavesched itself has a two fold performance advantage over traditional methods such as path based scheduling and loop directed scheduling. Also, the best- and worst-case execution times for the enhanced schedules obtained by our method are usually equal to or much less than the corresponding values for the execution times obtained by previous schedulers.