Memory access pattern: Difference between revisions

Content deleted Content added
No edit summary
No edit summary
Line 14:
and programmers understand,analyse and improve the memory access pattern, e.g. [[VTune]] and others
,<ref>{{cite web|title=QUAD a memory access pattern analyser|url=http://ce-publications.et.tudelft.nl/publications/207_quad__a_memory_access_pattern_analyser.pdf}}</ref><ref>{{cite web|title=Dymaxion: Optimizing Memory Access Patterns for Heterogeneous Systems|url=http://www.cs.virginia.edu/~skadron/Papers/sc11_dymaxion_dist.pdf}}</ref><ref>{{cite web|title=evaluation of a memory access classification scheme for pointer intensive and numeric programs|url=http://citeseerx.ist.psu.edu/viewdoc/download;jsessionid=555D92F6A16D03EE4A8057EEC1AFA80B?doi=10.1.1.48.4163&rep=rep1&type=pdf}}</ref><ref>{{cite web|title=
Online Memory Access Pattern Analysis on an Application Profiling Tool|url=http://ieeexplore.ieee.org/xpl/login.jsp?tp=&arnumber=7052256&url=http%3A%2F%2Fieeexplore.ieee.org%2Fxpls%2Fabs_all.jsp%3Farnumber%3D7052256}}</ref> including tools to address [[GPU]] memory access patterns<ref>{{cite web|title=CuMAPz: a tool to analyze memory access patterns in CUDA|url=http://dl.acm.org/citation.cfm?id=2024754}}</ref>
 
Memory access patterns also have implications for security,<ref>{{cite web|title=Memory Access Pattern Protection for Resource-constrained Devices|url=https://www.cardis.org/proceedings/cardis_2012/CARDIS2012_14.pdf}}</ref>