DocumentCode
3370481
Title
Read-after-read memory dependence prediction
Author
Moshovos, Andreas ; Sohi, Gurindar S.
Author_Institution
Dept. of Electr. & Comput. Eng., Northwestern Univ., Evanston, IL, USA
fYear
1999
fDate
1999
Firstpage
177
Lastpage
185
Abstract
We identify that typical programs which exhibit highly regular read-after-read (RAR) memory dependence streams. We exploit this regularity by introducing read-after-read (RAR) memory dependence prediction. We also present two RAR memory dependence prediction-based memory latency reduction techniques. In the first technique, a load can obtain a value by simply naming a preceding load with which a RAR dependence is predicted. The second technique speculatively converts a series of LOAD1-USE1,…,LOADN-USE N chains into a single LOAD1-USE1…USEN producer/consumer graph. Our techniques can be implemented as surgical extensions to the recently proposed read-after-write (RAW) dependence prediction based speculative memory cloaking and speculative memory bypassing. On average, our techniques provide correct values for an additional 20% (integer codes) and 30% (floating-point codes) of all loads. Moreover, a combined RAW- and RAR-based cloaking/bypassing mechanism improves performance by 6.44% (integer) and 4.66% (floating-point) even when naive memory dependence speculation is used. The original RAW-based cloaking/bypassing mechanism yields improvements of 4.28% (integer) and 3.20% (floating-point)
Keywords
naming services; parallel processing; performance evaluation; memory dependence prediction-based memory latency reduction; read-after-read memory dependence prediction; speculative memory bypassing; History; Lab-on-a-chip; Registers;
fLanguage
English
Publisher
ieee
Conference_Titel
Microarchitecture, 1999. MICRO-32. Proceedings. 32nd Annual International Symposium on
Conference_Location
Haifa
ISSN
1072-4451
Print_ISBN
0-7695-0437-X
Type
conf
DOI
10.1109/MICRO.1999.809455
Filename
809455
Link To Document