Tango: A hardware-based data prefetching technique for superscalar processors

被引:7
作者
Pinter, SS
Yoaz, A
机构
来源
PROCEEDINGS OF THE 29TH ANNUAL IEEE/ACM INTERNATIONAL SYMPOSIUM ON MICROARCHITECTURE - MICRO-29 | 1996年
关键词
D O I
10.1109/MICRO.1996.566463
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
We present a new hardware-based data prefetching mechanism for enhancing instruction level parallelism and improving the performance of superscalar processors. The emphasis in our scheme is on the effective utilization of slack time and hardware resources not used for the main computation. The scheme suggests a new hardware construct, the Program Progress Graph (PPG), as a simple extension to the Branch Target Buffer (BTB). We use the PPG for implementing a fast pre-program counter pre-PC, that travels only through memory reference instructions (rather than scanning all the instructions sequentially). In a single clock cycle the pre-PC extracts all the predicted memory references in some future block of instructions, to obtain early data prefetching. In addition, the PPG can be used for implementing a pre-processor and for instruction prefetching. The prefetch requests are scheduled to ''tango'' with the core requests from the data cache, by using only free time slots on the existing data cache tag ports. Employing special methods for removing prefetch requests that are already in the cache (without utilizing the cache-tag ports bandwidth) and a simple optimization on the cache LRU mechanism reduce the number of prefetch requests sent to the core-cache bus and to the memory (second level) bus. Simulation results an the SPEC92 benchmark for the base line architecture (32K-byte data cache and 12 cycles fetch latency) show an average speedup of 1.36 (CPI ratio).
引用
收藏
页码:214 / 225
页数:12
相关论文
共 50 条
[31]   Hardware-based Systems for Partial Sorting of Streaming Data [J].
Rjabov, Artjom .
2016 15TH BIENNIAL BALTIC ELECTRONICS CONFERENCE (BEC), 2016, :59-62
[32]   A Hardware-based Technique for Efficient Implicit Information Flow Tracking [J].
Shin, Jangseop ;
Zhang, Hongce ;
Lee, Jinyong ;
Heo, Ingoo ;
Chen, Yu-Yuan ;
Lee, Ruby ;
Paek, Yunheung .
2016 IEEE/ACM INTERNATIONAL CONFERENCE ON COMPUTER-AIDED DESIGN (ICCAD), 2016,
[33]   AN EVALUATION OF HARDWARE AND SOFTWARE DATA PREFETCHING [J].
BAER, JL ;
CHEN, TF .
APPLICATIONS IN PARALLEL AND DISTRIBUTED COMPUTING, 1994, 44 :257-266
[34]   TrustedDB: A Trusted Hardware-Based Database with Privacy and Data Confidentiality [J].
Bajaj, Sumeet ;
Sion, Radu .
IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2014, 26 (03) :752-765
[35]   Block based fetch engine for superscalar processors [J].
Wu, ZK ;
Shieh, JJ .
COMPUTER APPLICATIONS IN INDUSTRY AND ENGINEERING, 2002, :201-204
[36]   Hardware-Based Data Value and Address Trace Filtering Techniques [J].
Uzelac, Vladimir ;
Milenkovic, Aleksandar .
PROCEEDINGS OF THE 2010 INTERNATIONAL CONFERENCE ON COMPILERS, ARCHITECTURES AND SYNTHESIS FOR EMBEDDED SYSTEMS (CASES '10), 2010, :117-126
[37]   Technique for detecting hardware-based Trojans using a convolutional neural network [J].
Ravichandran, C. ;
Nagalakshmi, T. J. ;
Bharathi, P. Shyamala ;
Sivakumaran, C. .
INTERNATIONAL JOURNAL OF INFORMATION AND COMPUTER SECURITY, 2024, 23 (03) :338-347
[38]   Hardware-based profiling: An effective technique for profile-driven optimization [J].
Conte, TM ;
Patel, BA ;
Menezes, KN ;
Cox, JS .
INTERNATIONAL JOURNAL OF PARALLEL PROGRAMMING, 1996, 24 (02) :187-206
[39]   Virtualization and hardware-based security [J].
Perez, Ronald ;
Sailer, Reiner ;
van Doorn, Leendert .
IEEE SECURITY & PRIVACY, 2008, 6 (05) :24-31
[40]   Hardware-based Cyber Threats [J].
Alves, Thiago ;
Morris, Thomas .
ICISSP: PROCEEDINGS OF THE 4TH INTERNATIONAL CONFERENCE ON INFORMATION SYSTEMS SECURITY AND PRIVACY, 2018, :259-266