Computer Science ›› 2015, Vol. 42 ›› Issue (1): 71-74.doi: 10.11896/j.issn.1002-137X.2015.01.016

Previous Articles     Next Articles

Program Phase Analysis and Phase Detection Techniques

ZHANG Hai-bo, AN Hong, HE Song-tao, SUN Tao, WANG Tao, PENG Yi and CHENG Yi-chao   

  • Online:2018-11-14 Published:2018-11-14

Abstract: The rapid development of SMP and new proposed DHMP bring new challenges for program performance optimization.We raised two performance tuning problems and the solutions were given by phase analysis.The first problem is to find theperformance bottlenecks in each phase.We proposed a static phase analysis method,which finds performance bottlenecks in each phases by analyzing architecture features and its similar matrix.The second problem is to give the proper time to reconfigure for DHMP.We proposed dynamic phase detection algorithms,namely DPDA and HTPA.DPDA archives effective performance in a relative low software/hardware cost,and HTPD is the first phase detection algorithm using statistics theory.Our results show that comparing with BBV,DPDA and HTPD can avoid its limitation of offline,plus additional hardware in online algorithm and compiler’s effect,while they offer a comparable stability and correctness.Since DPDA and HTPD do not relay on additional hardware support,they can be implemented directly in mainstream processors and DHMP.

Key words: Program analysis,Program phase,Static program analysis,Phase detection

[1] Intel Corporation.Intel 64 and IA-32 Architectures SoftwareDeveloper’s Manualys.
[2] Kalla R,Sinharoy B,Starke W J,et al.Power7:IBM’s Next-Generation Server Processor[J].IEEE Micro,2010,30(2):7-15
[3] Ipek E,Kirman M,Kirman N,et al.Core fusion:accommodating software diversity in chip multiprocessors[C]∥Proceedings of the 34th annual international symposium onComputer architecture.Dean Tullsen ed.San Diego,California,USA:ACM,2007:186-197
[4] Kim C,Sethumadhavan S,Govindan M S,et al.ComposableLightweight Processors[C]∥Proceedings of the 40th Annual IEEE/ACM International Symposium on Microarchitecture.IEEE Computer Society,2007:381-394
[5] Watanabe Y,Davis J D,Wood D A.WiDGET:Wisconsin decoupled grid execution tiles[C]∥Proceedings of the 37th Annual International Symposium on Computer Architecture.André SeznecedSaint-Malo,France,ACM,2010:2-13
[6] Sherwood T,Sair S,Calder B.Phase tracking and prediction[C]∥Proceedings of the 30th Annual International Symposium on Computer Architecture.New York,NY,USA,ACM,2003:336-349
[7] Sherwood T,Perelman E,Calder B.Basic block distributionanalysis to find periodic behavior and simulation[C]∥Procee-dings 2001 International Conference on Parallel Architectures and Compilation Techniques.Barcelona,Catalunya,Spain,IEEE Computer Society,2001:3-14
[8] Sherwood T,Perelman E,Hamerly G,et al.Automatically chara-cterizing large scale program behavior[C]∥Proceedings of the 10th International Conference on Architectural Support for Programming Languages and Operating Systems.New York,NY,USA,ACM,2002:45-57
[9] Dhodapkar A S,Smith J E.Comparing Program Phase DetectionTechniques[C]∥Proceedings of the 36th Annual IEEE/ACM International Symposium on Microarchitecture.IEEE Computer Society,Washington DC,USA,2003:217-228
[10] Lau J,Schoenmackers S,Calder B.Transition Phase Classification and Prediction[C]∥Proceedings of the 11th International Symposium on High-Performance Computer Architecture.IEEE Computer Society,Washington DC,USA,2005:278-289

No related articles found!
Full text



[1] LEI Li-hui and WANG Jing. Parallelization of LTL Model Checking Based on Possibility Measure[J]. Computer Science, 2018, 45(4): 71 -75, 88 .
[2] XIA Qing-xun and ZHUANG Yi. Remote Attestation Mechanism Based on Locality Principle[J]. Computer Science, 2018, 45(4): 148 -151, 162 .
[3] LI Bai-shen, LI Ling-zhi, SUN Yong and ZHU Yan-qin. Intranet Defense Algorithm Based on Pseudo Boosting Decision Tree[J]. Computer Science, 2018, 45(4): 157 -162 .
[4] WANG Huan, ZHANG Yun-feng and ZHANG Yan. Rapid Decision Method for Repairing Sequence Based on CFDs[J]. Computer Science, 2018, 45(3): 311 -316 .
[5] SUN Qi, JIN Yan, HE Kun and XU Ling-xuan. Hybrid Evolutionary Algorithm for Solving Mixed Capacitated General Routing Problem[J]. Computer Science, 2018, 45(4): 76 -82 .
[6] ZHANG Jia-nan and XIAO Ming-yu. Approximation Algorithm for Weighted Mixed Domination Problem[J]. Computer Science, 2018, 45(4): 83 -88 .
[7] WU Jian-hui, HUANG Zhong-xiang, LI Wu, WU Jian-hui, PENG Xin and ZHANG Sheng. Robustness Optimization of Sequence Decision in Urban Road Construction[J]. Computer Science, 2018, 45(4): 89 -93 .
[8] LIU Qin. Study on Data Quality Based on Constraint in Computer Forensics[J]. Computer Science, 2018, 45(4): 169 -172 .
[9] ZHONG Fei and YANG Bin. License Plate Detection Based on Principal Component Analysis Network[J]. Computer Science, 2018, 45(3): 268 -273 .
[10] SHI Wen-jun, WU Ji-gang and LUO Yu-chun. Fast and Efficient Scheduling Algorithms for Mobile Cloud Offloading[J]. Computer Science, 2018, 45(4): 94 -99, 116 .