A Machine Learning Framework for Performance Coverage Analysis of Proxy Applications

被引:0
作者
Islam, Tanzima Z. [1 ]
Thiagarajan, Jayaraman J. [1 ]
Bhatele, Abhinav [1 ]
Schulz, Martin [1 ]
Gamblin, Todd [1 ]
机构
[1] Lawrence Livermore Natl Lab, Ctr Appl Sci Comp, Livermore, CA 94551 USA
来源
SC '16: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE FOR HIGH PERFORMANCE COMPUTING, NETWORKING, STORAGE AND ANALYSIS | 2016年
关键词
Machine learning; Unsupervised learning; Performance analysis; Scalability; SHAFER EVIDENCE THEORY; CLASSIFICATION;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Proxy applications are written to represent subsets of performance behaviors of larger, and more complex applications that often have distribution restrictions. They enable easy evaluation of these behaviors across systems, e.g., for procurement or co-design purposes. However, the intended correlation between the performance behaviors of proxy applications and their parent codes is often based solely on the developer's intuition. In this paper, we present novel machine learning techniques to methodically quantify the coverage of performance behaviors of parent codes by their proxy applications. We have developed a framework, VERITAS, to answer these questions in the context of on-node performance: a) which hardware resources are covered by a proxy application and how well, and b) which resources are important, but not covered. We present our techniques in the context of two benchmarks, STREAM and DGEMM, and two production applications, OpenMC and CMTnek, and their respective proxy applications.
引用
收藏
页码:538 / 549
页数:12
相关论文
共 27 条
[11]   Least angle regression - Rejoinder [J].
Efron, B ;
Hastie, T ;
Johnstone, I ;
Tibshirani, R .
ANNALS OF STATISTICS, 2004, 32 (02) :494-499
[12]  
Karlin I., 2013, IPDPS 13
[13]   CMT-bone: A mini-app for Compressible Multiphase Turbulence Simulation Software [J].
Kumar, Nalini ;
Sringarpure, Mrugesh ;
Banerjee, Tania ;
Hackl, Jason ;
Balachandar, S. ;
Lam, Herman ;
George, Alan ;
Ranka, Sanjay .
2015 IEEE INTERNATIONAL CONFERENCE ON CLUSTER COMPUTING - CLUSTER 2015, 2015, :785-792
[14]   Application of Dempster-Shafer evidence theory to unsupervised classification in multisource remote sensing [J].
LeHegaratMascle, S ;
Bloch, I ;
VidalMadjar, D .
IEEE TRANSACTIONS ON GEOSCIENCE AND REMOTE SENSING, 1997, 35 (04) :1018-1031
[15]  
Levinthal David., 2009, Intel Performance Analysis Guide
[16]  
LLNL, PERF DUMP TOOL COLL
[17]  
McCalpin J. D., 1995, IEEE Technical Committee on Computer Architecture Newsletter, V1995, P19
[18]  
Phansalkar A, 2007, CONF PROC INT SYMP C, P412, DOI 10.1145/1273440.1250713
[19]  
Ramamurthy KN, 2013, INT CONF ACOUST SPEE, P1583, DOI 10.1109/ICASSP.2013.6637918
[20]   The OpenMC Monte Carlo particle transport code [J].
Romano, Paul K. ;
Forget, Benoit .
ANNALS OF NUCLEAR ENERGY, 2013, 51 :274-281