Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1145/1016720.1016768acmconferencesArticle/Chapter ViewAbstractPublication PagesesweekConference Proceedingsconference-collections
Article

Operation tables for scheduling in the presence of incomplete bypassing

Published: 08 September 2004 Publication History

Abstract

Register bypassing is a powerful and widely used feature in modern processors to eliminate certain data hazards. Although complete bypassing is ideal for performance, bypassing has significant impact on cycle time, area, and power consumption of the processor. Due to the strict constraints on performance, cost and power consumption in embedded processors, architects need to evaluate and implement incomplete register bypassing mechanisms. However traditional data hazard detection and/or avoidance techniques used in retargetable schedulers break down in the presence of incomplete bypassing. In this paper, we present the concept of Operation Tables, which can be used to detect data hazards, even in the presence of incomplete bypassing. Furthermore our technique integrates the detection of both data, as well as resource hazards, and can be easily employed in a compiler to generate better schedules. Our experimental results on the popular Intel XScale embedded processor platform show that even with a simple intra-basic block scheduling technique, we achieve upto 20% performance improvement over fully optimized GCC generated code on embedded applications from the MiBench suite.

References

[1]
Intel xscale microarchitecture programmers reference manual.
[2]
A. Abnous and N. Bagerzadeh. Pipelining and bypassing in a vliw processor. In IEEE trans. on Parallel and Distributed Systems, 1995.
[3]
P. Ahuja, D. W. Clark, and A. Rogers. The performance impact of incomplete bypassing in processor pipelines. In Proc. of Symposium on Microarchitecture MICRO-28, 1995.
[4]
E. Bloch. The engineering design of the stretch computer. In Proc. of Eastern Joint Computer Conference, pages 48--59, 1959.
[5]
M. Buss, R. Azavedo, P. Centoducatte, and G. Araujo. Tailoring pipeline bypassing and functional unit mapping for application in clustered vliw architectures. In Proc. of CASES, 2001.
[6]
E. S. Davidson. The design and control of pipelined function generators. Int. IEEE Conf. on Systems Networks and Computers, pages 19--21, 1971.
[7]
K. Fan, N. Clark, M. Chu, K. V. Manjunath, R. Ravindran, M. Smelyanskiy, and S. Mahlke. Systematic register bypass customization for application-specific processors. In Proc. of IEEE Intl. Conf. on ASSAP, 2003.
[8]
M. R. Guthaus, J. S. Ringenberg, D. Ernst, T. M. Austin, T. Mudge, and R. B. Brown. Mibench: A free, commercially representative embedded benchmark suite. In IEEE Workshop in workload characterization, 2001.
[9]
A. Halambi, P. Grun, V. Ganesh, A. Khare, N. Dutt, and A. Nicolau. EXPRESSION: A language for architecture exploration through compiler/simulator retargetability. In Proceedings of Design Automation and Test in Europe, 1999.
[10]
A. Halambi, A. Shrivastava, N. Dutt, and A. Nicolau. A customizable compiler framework for embedded systems. In SCOPES, 2001.
[11]
P. Hennessy and D. A. Patterson. Computer Architecture: A Quantitative Approach. 1990.
[12]
P. G. Lowney, S. M. Freudenberger, T. J. Karzes, W. D. Lichtenstein, R. P. Nix, J. S. O'Donnell, and J. C. Ruttenberg. The Multiflow Trace Scheduling compiler. The Journal of Supercomputing", 7(1-2):51--142, 1993.
[13]
S. Muchnick. Advanced Compiler Design and Implementation. 1998.
[14]
The Trimaran Consortium. The Trimaran Compiler Infrastructure for Instruction Level Parallelism.

Cited By

View all
  • (2015)Dynamically adaptive register file architecture for energy reduction in embedded processorsMicroprocessors & Microsystems10.1016/j.micpro.2015.01.00539:2(49-63)Online publication date: 1-Mar-2015
  • (2014)When and How to Use Multilevel ModellingACM Transactions on Software Engineering and Methodology10.1145/268561524:2(1-46)Online publication date: 23-Dec-2014
  • (2014)A Unified Test Case Prioritization ApproachACM Transactions on Software Engineering and Methodology10.1145/268561424:2(1-31)Online publication date: 23-Dec-2014
  • Show More Cited By

Index Terms

  1. Operation tables for scheduling in the presence of incomplete bypassing

      Recommendations

      Comments

      Please enable JavaScript to view thecomments powered by Disqus.

      Information & Contributors

      Information

      Published In

      cover image ACM Conferences
      CODES+ISSS '04: Proceedings of the 2nd IEEE/ACM/IFIP international conference on Hardware/software codesign and system synthesis
      September 2004
      266 pages
      ISBN:158113 9373
      DOI:10.1145/1016720
      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Sponsors

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      Published: 08 September 2004

      Permissions

      Request permissions for this article.

      Check for updates

      Author Tags

      1. bypass
      2. hazard detection
      3. operation table
      4. reservation table
      5. retargetable compilers
      6. scheduling

      Qualifiers

      • Article

      Conference

      CODES/ISSS04

      Acceptance Rates

      Overall Acceptance Rate 280 of 864 submissions, 32%

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)2
      • Downloads (Last 6 weeks)0
      Reflects downloads up to 16 Feb 2025

      Other Metrics

      Citations

      Cited By

      View all
      • (2015)Dynamically adaptive register file architecture for energy reduction in embedded processorsMicroprocessors & Microsystems10.1016/j.micpro.2015.01.00539:2(49-63)Online publication date: 1-Mar-2015
      • (2014)When and How to Use Multilevel ModellingACM Transactions on Software Engineering and Methodology10.1145/268561524:2(1-46)Online publication date: 23-Dec-2014
      • (2014)A Unified Test Case Prioritization ApproachACM Transactions on Software Engineering and Methodology10.1145/268561424:2(1-31)Online publication date: 23-Dec-2014
      • (2014)Optimality of Clustering Properties of Space-Filling CurvesACM Transactions on Database Systems10.1145/255668639:2(1-27)Online publication date: 26-May-2014
      • (2014)Fast Distributed Transactions and Strongly Consistent Replication for OLTP Database SystemsACM Transactions on Database Systems10.1145/255668539:2(1-39)Online publication date: 26-May-2014
      • (2011)Static Analysis of Register File VulnerabilityIEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems10.1109/TCAD.2010.209563030:4(607-616)Online publication date: 1-Apr-2011
      • (2010)Register file partitioning and recompilation for register file power reductionACM Transactions on Design Automation of Electronic Systems10.1145/1754405.175440915:3(1-30)Online publication date: 10-Jun-2010
      • (2010)Code Transformations for TLB Power ReductionInternational Journal of Parallel Programming10.1007/s10766-009-0123-838:3-4(254-276)Online publication date: 21-Jan-2010
      • (2009)Static analysis to mitigate soft errors in register filesProceedings of the Conference on Design, Automation and Test in Europe10.5555/1874620.1874949(1367-1372)Online publication date: 20-Apr-2009
      • (2009)Tracing interrupts in embedded softwareACM SIGPLAN Notices10.1145/1543136.154247144:7(137-146)Online publication date: 19-Jun-2009
      • Show More Cited By

      View Options

      Login options

      View options

      PDF

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      Figures

      Tables

      Media

      Share

      Share

      Share this Publication link

      Share on social media