Filters








2,301 Hits in 1.5 sec

Bandwidth adaptive snooping

M.M.K. Martin, D.J. Sorin, M.D. Hill, D.A. Wood
Proceedings Eighth International Symposium on High Performance Computer Architecture  
We propose Bandwidth Adaptive Snooping Hybrid (BASH), a hybrid protocol that ranges from behaving like snooping (by broadcasting requests) when excess bandwidth is available to behaving like a directory  ...  We propose Bandwidth Adaptive Snooping Hybrid (BASH), a hybrid protocol that ranges from behaving like snooping (by broadcasting requests) when excess bandwidth is available to behaving like a directory  ...  A Bandwidth Adaptive Snooping Protocol BASH, our bandwidth adaptive snooping hybrid protocol, incorporates features of both snooping and directory protocols.  ... 
doi:10.1109/hpca.2002.995715 dblp:conf/hpca/MartinSHW02 fatcat:ppun5m3a6fh65hcfq4ed6wacym

Using Partial Tag Comparison in Low-Power Snoop-Based Chip Multiprocessors [chapter]

Ali Shafiee, Narges Shahidi, Amirali Baniasadi
2011 Lecture Notes in Computer Science  
Our solutions reduce snoop request bandwidth from 78.5% to 81.9% and averagetagarraydynamicpowerbyabout52%.  ...  Abstract Inthisworkweintroducepoweroptimizations relying on partial tag comparison (PTC) in snoop-based chip multiprocessors.  ...  Flexible snoopingfurtherimprovesserialsnoopinginlogicalring interconnects by employing an adaptive filter on each core that decides to snoop the request and then forward ortosnoopandforwardinparallel  ... 
doi:10.1007/978-3-642-24322-6_18 fatcat:hjo23ufey5fjhp33tzkqf34h2u

Using destination-set prediction to improve the latency/bandwidth tradeoff in shared-memory multiprocessors

Milo M. K. Martin, Pacia J. Harper, Daniel J. Sorin, Mark D. Hill, David A. Wood
2003 SIGARCH Computer Architecture News  
For example, one of our predictors obtains almost 90% of the performance of snooping while using only 15% more bandwidth than a directory protocol (and less than half the bandwidth of snooping).  ...  Third, we illustrate the effectiveness of destination-set predictors in the context of a multicast snooping protocol.  ...  Other hybrid protocols adapt between writeinvalidate and write-update [4, 9, 15, 26, 31] , by migrating data near to where it is being used [10, 14, 35] or by adapting to available bandwidth [24] .  ... 
doi:10.1145/871656.859642 fatcat:ps4egvgxh5ca5abiwfuodklgxe

Using destination-set prediction to improve the latency/bandwidth tradeoff in shared-memory multiprocessors

Milo M. K. Martin, Pacia J. Harper, Daniel J. Sorin, Mark D. Hill, David A. Wood
2003 Proceedings of the 30th annual international symposium on Computer architecture - ISCA '03  
For example, one of our predictors obtains almost 90% of the performance of snooping while using only 15% more bandwidth than a directory protocol (and less than half the bandwidth of snooping).  ...  Third, we illustrate the effectiveness of destination-set predictors in the context of a multicast snooping protocol.  ...  Other hybrid protocols adapt between writeinvalidate and write-update [4, 9, 15, 26, 31] , by migrating data near to where it is being used [10, 14, 35] or by adapting to available bandwidth [24] .  ... 
doi:10.1145/859618.859642 fatcat:4dkl77tagfb4vl6ohxq3fsarky

Enhancing TCP Over HSDPA by Cross-Layer Signalling

M. Fiorenzi, D. Girella, N. Moller, Å. Arvidsson, R. Skog, J. Petersson, P. Karlsson, Carlo Fischione, K. H. Johansson
2007 IEEE GLOBECOM 2007-2007 IEEE Global Telecommunications Conference  
In particular, TCP suffers from the fast bandwidth variations of wireless channels, since the TCP adaptation to such changes is quite slow, in particular when the bandwidth increases.  ...  The proxy adapts its congestion window according to a control algorithm, which is based on feedback from the Radio Network Controller about the bandwidth over the wireless interface.  ... 
doi:10.1109/glocom.2007.1016 dblp:conf/globecom/FiorenziGMASPKFJ07 fatcat:kfx4pg53vnbxdgckp4kv4yno2q

Cache Coherence Protocol and Memory Performance of the Intel Haswell-EP Architecture

Daniel Molka, Daniel Hackenberg, Robert Schone, Wolfgang E. Nagel
2015 2015 44th International Conference on Parallel Processing  
Using these benchmarks we investigate performance data and architectural properties of the Haswell-EP microarchitecture, including important memory latency and bandwidth characteristics as well as the  ...  Furthermore, the uncore frequency is adapted to the workload dynamically by the hardware [12] . B.  ...  28.3 30.2 30.4 30.6 Table VII shows the bandwidth scaling for the source snoop and home snoop mode.  ... 
doi:10.1109/icpp.2015.83 dblp:conf/icpp/MolkaHSN15 fatcat:x77aoi7355faznwvotqlhtkybi

A TCP acceleration algorithm for a wireless link using rate adaptation based on round-trip-time and virtual receiver window information

Sungwon Lee, Seongsoo Park, Jaehwang Yu, Choongseon Hong
2009 IEEE Communications Letters  
FAST Transmission Control Protocol (TCP) was previously proposed for high capacity network environments with long delay, and "FAST TCP with Snoop" performs better than conventional TCP enhancements in  ...  We propose an enhanced TCP acceleration algorithm at the TCP sender side which efficiently adapts to the maximum transmission rate of a mobile wireless link using the round trip time (RTT) and virtual  ...  Also, the dynamic bandwidth in a mobile wireless link can cause variable packet transmis- sion delays.  ... 
doi:10.1109/lcomm.2009.090520 fatcat:alhba2f44rfcpi7cnljpc2ujoq

A distributed cache architecture with snooping for QoS routing in large networks

M. Rezvan, K. Pawlikowski, H. Sirisena
2004 Computer Networks  
Route bottleneck bandwidth Egress segment topology information Ingress segment topology information Address list of border nodes Route identifier Route state Reuse counter Time stamp  ...  In addition, our results suggest that the cache snooping can significantly increase the overall routing performance, especially in the presence of highly inaccurate network state information.  ...  In this way, it intelligently adapts to the changes in the network states.  ... 
doi:10.1016/j.comnet.2003.02.001 fatcat:4456oaqhznf6jlhrr7thpbz7la

Token coherence

Milo M. K. Martin, Mark D. Hill, David A. Wood
2003 Proceedings of the 30th annual international symposium on Computer architecture - ISCA '03  
Simulations using commercial workloads show that our new protocol can significantly outperform traditional snooping and directory protocols.  ...  coherence in these systems is difficult, because traditional approaches either add indirection for common cache-to-cache misses (directory protocols) or require a totally-ordered interconnect (traditional snooping  ...  Second, bandwidth-adaptive techniques would allow a system to dynamically adapt between TokenB and this directory-like mode, providing high performance for multiple system sizes and workloads [29] .  ... 
doi:10.1145/859618.859640 fatcat:hmctofqezzaz3btiyaoxh67cje

Optimal and efficient merging schedules for video-on-demand servers

Derek Eager, Mary Vernon, John Zahorjan
1999 Proceedings of the seventh ACM international conference on Multimedia (Part 1) - MULTIMEDIA '99  
+-Client The dynamic program used to compute optimal merge trees for a known set of arrival times can be adapted to compute the minimum cost tree to complete the set of active streams at each arrival instant  ...  (For example, if client D arrives at time 0.49 under ERMT, client D will snoop on client B's stream.)  ... 
doi:10.1145/319463.319601 dblp:conf/mm/EagerVZ99 fatcat:vimphmxmo5dxxjsq6bspuwddta

Timestamp snooping

Milo M. K. Martin, David A. Wood, Daniel J. Sorin, Anatassia Ailamaki, Alaa R. Alameldeen, Ross M. Dickson, Carl J. Mauer, Kevin E. Moore, Manoj Plakal, Mark D. Hill
2000 SIGARCH Computer Architecture News  
Thus, timestamp snooping is worth considering when buying more interconnect bandwidth is easier than reducing interconnect latency.  ...  Traditional snooping requires physical ordering of transactions. Timestamp snooping works by processing address transactions in a logical order.  ...  Timestamp snooping, on the other hand, adapts the above ideas to work with writeback MOESI coherence protocols that are (nearly) universally used in commercial systems.  ... 
doi:10.1145/378995.378998 fatcat:56rdl6n7zrd5da7hxqvpowq4zi

Timestamp snooping

Milo M. K. Martin, David A. Wood, Daniel J. Sorin, Anatassia Ailamaki, Alaa R. Alameldeen, Ross M. Dickson, Carl J. Mauer, Kevin E. Moore, Manoj Plakal, Mark D. Hill
2000 Proceedings of the ninth international conference on Architectural support for programming languages and operating systems - ASPLOS-IX  
Thus, timestamp snooping is worth considering when buying more interconnect bandwidth is easier than reducing interconnect latency.  ...  Traditional snooping requires physical ordering of transactions. Timestamp snooping works by processing address transactions in a logical order.  ...  Timestamp snooping, on the other hand, adapts the above ideas to work with writeback MOESI coherence protocols that are (nearly) universally used in commercial systems.  ... 
doi:10.1145/378993.378998 fatcat:n4vqo545enggji5bce7qvjk54y

Timestamp snooping

Milo M. K. Martin, David A. Wood, Daniel J. Sorin, Anatassia Ailamaki, Alaa R. Alameldeen, Ross M. Dickson, Carl J. Mauer, Kevin E. Moore, Manoj Plakal, Mark D. Hill
2000 ACM SIGOPS Operating Systems Review  
Thus, timestamp snooping is worth considering when buying more interconnect bandwidth is easier than reducing interconnect latency.  ...  Traditional snooping requires physical ordering of transactions. Timestamp snooping works by processing address transactions in a logical order.  ...  Timestamp snooping, on the other hand, adapts the above ideas to work with writeback MOESI coherence protocols that are (nearly) universally used in commercial systems.  ... 
doi:10.1145/384264.378998 fatcat:nzuouyvxubcxnfddwwpk54lxgu

Timestamp snooping

Milo M. K. Martin, David H. Wood, Daniel J. Sorin, Anastassia Ailamaki, Alaa R. Alameldeen, Ross M. Dickson, Carl J. Mauer, Kevin E. Moore, Manoj Plakal, Mark D. Hill
2000 SIGPLAN notices  
Thus, timestamp snooping is worth considering when buying more interconnect bandwidth is easier than reducing interconnect latency.  ...  Traditional snooping requires physical ordering of transactions. Timestamp snooping works by processing address transactions in a logical order.  ...  Timestamp snooping, on the other hand, adapts the above ideas to work with writeback MOESI coherence protocols that are (nearly) universally used in commercial systems.  ... 
doi:10.1145/356989.356992 fatcat:5eqevkd2nnegloacnbyg342vvy

Subspace snooping

Daehoon Kim, Jeongseob Ahn, Jaehong Kim, Jaehyuk Huh
2010 Proceedings of the 19th international conference on Parallel architectures and compilation techniques - PACT '10  
We evaluate subspace snooping with Token Coherence on un-ordered mesh networks. For scientific and server applications on a 16-core system, subspace snooping reduces 44% of snoops on average.  ...  Although snoop-based coherence protocols provide fast cacheto-cache transfers with a simple and robust coherence mechanism, scaling the protocols has been difficult due to the overheads of broadcast snooping  ...  The performance gain would increase, as the bandwidth requirement increases with more demanding applications or different system configurations (for example with less private L2 caches).  ... 
doi:10.1145/1854273.1854292 dblp:conf/IEEEpact/KimAKH10 fatcat:awg6ppifmnh6joakmnx7e2bzkq
« Previous Showing results 1 — 15 out of 2,301 results