Memory access pattern: Difference between revisions

Content deleted Content added
No edit summary
No edit summary
Line 7:
<ref>{{cite web|title=gpgpu scatter vs gather|url=http://http.developer.nvidia.com/GPUGems2/gpugems2_chapter31.html}}</ref>
<ref>{{cite web|title=Analysis of Energy and Performance of Code Transformations for PGAS-based Data Access Patterns||url=http://nic.uoregon.edu/pgas14/papers/pgas14_submission_17.pdf}}</ref>
Computer memory is usually described as '[[random access memory|random access]]', but traversals by software will still exhibit patterns that can be exploited for efficiency.
Memory access patterns also have implications for security<ref>{{cite web|title=Memory Access Pattern Protection for Resource-constrained Devices|url=https://www.cardis.org/proceedings/cardis_2012/CARDIS2012_14.pdf}}</ref>,which motivates some to try and disguise a programs activity for privacy reasons<ref>{{cite web|title=protecting data in the cloud|url=http://news.mit.edu/2013/protecting-data-in-the-cloud-0702}}</ref>.
== Examples ==