skip to main content
10.1145/1375657.1375665acmconferencesArticle/Chapter ViewAbstractPublication PagescpsweekConference Proceedingsconference-collections
research-article

Relative competitive analysis of cache replacement policies

Published:12 June 2008Publication History

ABSTRACT

Caches are commonly employed to hide the latency gap between memory and the CPU by exploiting locality in memory accesses. On today's architectures a cache miss may cost several hundred CPU cycles.

In order to fulfill stringent performance requirements, caches are now also used in hard real-time systems. In such systems, upper and sometimes also lower bounds on the execution times of a task have to be computed. To obtain tight bounds, timing analyses must take into account the cache architecture. However, developing cache analyses -- analyses that determine whether a memory access is a hit or a miss -- is a difficult problem for some cache architectures.

In this paper, we present a tool to automatically compute relative competitive ratios for a large class of replacement policies, including LRU, FIFO, and PLRU. Relative competitive ratios bound the performance of one policy relative to the performance of another policy.

These performance relations allow us to use cache-performance predictions for one policy to compute predictions for another, including policies that could previously not be dealt with.

References

  1. Ravindra K. Ahuja, Thomas L. Magnanti, and James B. Orlin. phNetwork flows: theory, algorithms, and applications. Prentice-Hall, Inc., Upper Saddle River, NJ, USA, 1993. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. Hussein Al-Zoubi, Aleksandar Milenkovic, and Milena Milenkovic. Performance evaluation of cache replacement policies for the SPEC CPU2000 benchmark suite. In phACM-SE 42: Proceedings of the 42nd Annual Southeast Regional Conference, pages 267--272, New York, NY, USA, 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. James Aspnes and Orli Waarts. Modular competitiveness for distributed algorithms. In phSTOC '96: Proceedings of the twenty-eighth annual ACM symposium on Theory of computing, pages 237--246, New York, NY, USA, 1996. ACM Press. ISBN 0-89791-785-5. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. L. Belady. A study of replacement algorithms for a virtual storage computer. phIBM Systems Journal, 5: 78--101, 1966.Google ScholarGoogle Scholar
  5. Siddhartha Chatterjee, Erin Parker, Philip J. Hanlon, and Alvin R. Lebeck. Exact analysis of the cache behavior of nested loops. In phPLDI '01: Proceedings of the ACM SIGPLAN 2001 conference on Programming language design and implementation, pages 286--297, New York, NY, USA, 2001. ACM Press. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. Christian Ferdinand and Reinhard Wilhelm. Efficient and precise cache behavior prediction for real-time systems. phReal-Time Systems, 17 (2-3): 131--181, 1999. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Christian Ferdinand, Florian Martin, and Reinhard Wilhelm. Applying compiler techniques to cache behavior prediction. In phProceedings of the ACM SIGPLAN Workshop on Languages, Compilers and Tools for Real-Time Systems, pages 37--46, Las Vegas, Nevada, June 1997.Google ScholarGoogle Scholar
  8. Somnath Ghosh, Margaret Martonosi, and Sharad Malik. Precise miss analysis for program transformations with caches of arbitrary associativity. In phASPLOS-VIII: Proceedings of the eighth international conference on Architectural support for programming languages and operating systems, pages 228--239, New York, NY, USA, 1998. ACM Press. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. Reinhold Heckmann, Marc Langenbach, Stephan Thesing, and Reinhard Wilhelm. The influence of processor architecture on the design and the results of WCET tools. phProceedings of the IEEE, 91 (7), 2003.Google ScholarGoogle Scholar
  10. A. Hergenhan and W. Rosenstiel. Static timing analysis of embedded software on advanced processor architectures. In phDATE '00, pages 552--559, New York, NY, USA, 2000. ACM Press. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. Elias Koutsoupias and Christos H. Papadimitriou. Beyond competitive analysis. In phIEEE Symposium on Foundations of Computer Science, pages 394--400, 1994. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. E.L. Lawler. Optimal cycles in doubly weighted linear graphs. In phInt'l Symp. Theory of Graphs, pages 209--213, 1966.Google ScholarGoogle Scholar
  13. Jan Reineke and Daniel Grund. Relative competitiveness of cache replacement policies {extended abstract}. In phSIGMETRICS, 2008 (to appear). Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. Jan Reineke, Daniel Grund, Christoph Berg, and Reinhard Wilhelm. Timing predictability of cache replacement policies. phReal-Time Systems, 37 (2): 99--122, November 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. Daniel D. Sleator and Robert E. Tarjan. Amortized efficiency of list update and paging rules. phCommun. ACM, 28 (2): 202--208, 1985. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. Yannis Smaragdakis, Scott Kaplan, and Paul Wilson. The EELRU adaptive replacement algorithm. phPerform. Eval., 53 (2): 93--123, 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. Randall T. White, Christopher A. Healy, David B. Whalley, Frank Mueller, and Marion G. Harmon. Timing analysis for data caches and set-associative caches. In phRTAS '97, page 192, Washington, DC, USA, 1997. IEEE Computer Society. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Relative competitive analysis of cache replacement policies

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in
      • Published in

        cover image ACM Conferences
        LCTES '08: Proceedings of the 2008 ACM SIGPLAN-SIGBED conference on Languages, compilers, and tools for embedded systems
        June 2008
        180 pages
        ISBN:9781605581040
        DOI:10.1145/1375657
        • cover image ACM SIGPLAN Notices
          ACM SIGPLAN Notices  Volume 43, Issue 7
          LCTES '08
          July 2008
          167 pages
          ISSN:0362-1340
          EISSN:1558-1160
          DOI:10.1145/1379023
          Issue’s Table of Contents

        Copyright © 2008 ACM

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 12 June 2008

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • research-article

        Acceptance Rates

        Overall Acceptance Rate116of438submissions,26%

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader