An effective way to improve energy efficiency is to throttle hardware resources to meet a certain QoS target, specified as a performance constraint, associated with all applications running on a multicore system. Prio...
详细信息
ISBN:
(数字)9781728168760
ISBN:
(纸本)9781728168777
An effective way to improve energy efficiency is to throttle hardware resources to meet a certain QoS target, specified as a performance constraint, associated with all applications running on a multicore system. Prior art has proposed resource management (RM) frameworks in which the share of the last-level cache (LLC) assigned to each processor core and the voltage-frequency (VF) setting for each core is managed in a coordinated fashion to reduce energy. A drawback of such a scheme is that, while one core gives up LLC resources for another core, the performance drop must be compensated by a higher VF setting which leads to a quadratic increase in energy consumption. By allowing each core to be adapted to exploit instruction and memory-level parallelism (ILP/MLP), substantially higher energy savings are *** paper proposes a coordinated RM for LLC partitioning, processor adaptation, and per-core VF scaling. A first contribution is a systematic study of the resource trade-offs enabled when trading between the three classes of resources in a coordinated fashion. A second contribution is a new RM framework that utilizes these trade-offs to save more energy. Finally, a challenge to accurately model the impact of resource throttling on performance is to predict the amount of MLP with high accuracy. To this end, the paper contributes with a mechanism that estimates the effect of MLP over different processor configurations and LLC allocations. Overall, we show that up to 18% of energy, and on average 10%, can be saved using the proposed scheme.
GPUs rely on large register files to unlock thread-level parallelism for high throughput. Unfortunately, large register files are power hungry, making it important to seek for new approaches to improve their utilizati...
详细信息
Cache partitioning in tile-based CMP architectures is a challenging problem because of i) the need to determine capacity allocations with low computational overhead and ii) the need to place allocations close to where...
详细信息
ISBN:
(数字)9781728168760
ISBN:
(纸本)9781728168777
Cache partitioning in tile-based CMP architectures is a challenging problem because of i) the need to determine capacity allocations with low computational overhead and ii) the need to place allocations close to where they are used, in order to reduce access latency. Although, previous solutions have addressed the problem of reducing the computational overhead and incorporating locality-awareness, they suffer from the overheads of centrally determining *** this paper, we propose DELTA, a novel distributed and locality-aware cache partitioning solution which works by exchanging asynchronous challenges among cores. The distributed nature of the algorithm coupled with the low computational complexity allows for frequent reconfigurations at negligible cost and for the scheme to be implemented directly in hardware. The allocation algorithm is supported by an enforcement mechanism which enables locality-aware placement of data. We evaluate DELTA on 16- and 64-core tiled CMPs with multi-programmed workloads. Our evaluation shows that DELTA improves performance by 9% and 16%, respectively, on average, compared to an unpartitioned shared last-level cache.
Estimating the entropy of probability distributions and quantum states is a fundamental task in information processing. Here, we examine the hardness of this task for the case of probability distributions or quantum s...
详细信息
Fog Computing is now emerging as the dominating paradigm bridging the compute and connectivity gap between sensing devices (a.k.a. "things") and latency-sensitive services. However, as fog deployments scale ...
详细信息
Spiking neural networks (SNNs) can be used in low-power and embedded systems (such as emerging neuromorphic chips) due to their event-based nature. Also, they have the advantage of low computation cost in contrast to ...
详细信息
Deploying machine-, and in particular deep-learning, (ML/DL) solutions in industry-strength, production quality contexts proves to challenging. This requires a structured engineering approach to constructing and evolv...
详细信息
Many generative applications, such as synthesis-based 3D molecular design, involve constructing compositional objects with continuous features. Here, we introduce Compositional Generative Flows (CGFlow), a novel frame...
详细信息
As global electric vehicle (EV) adoption accelerates, granular analysis of empirical usage and charging patterns remains scarce. This study presents a unique large-scale empirical examination of 1.6 million EVs, inclu...
As global electric vehicle (EV) adoption accelerates, granular analysis of empirical usage and charging patterns remains scarce. This study presents a unique large-scale empirical examination of 1.6 million EVs, including a broad array of vehicle types—private, taxi, rental, official, bus, and special purpose vehicle—across seven major Chinese cities with over 854 million observations of driving and charging events. Our findings illuminate significant heterogeneity in EV usage, battery energy, and charging behavior across vehicle types with notable city differences. Day-time high-power charging presents high loads on the electricity grid across all vehicle types, particularly from service-oriented vehicles, including taxis, rental cars, and buses. The maximum loads also are the highest in the center of the cities. Our study of large-scale EV usage offers critical insights for developing charging infrastructure, managing energy grids, and providing flexibility services, which are pivotal to the evolution of future transport ecosystems.
Dear editor,Fully homomorphic encryption (FHE) is a cryptographic primitive that allows anyone, even those without a secret key, to perform arbitrary computation on encrypted data. Since Gentry’s breakthrough realiza...
详细信息
Dear editor,Fully homomorphic encryption (FHE) is a cryptographic primitive that allows anyone, even those without a secret key, to perform arbitrary computation on encrypted data. Since Gentry’s breakthrough realization of FHE in 2009 [1], the research on FHE has been blown out. Furthermore,López-Alt et al.[2] proposed a new notion of multi-
暂无评论