Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1145/500001.500036acmconferencesArticle/Chapter ViewAbstractPublication PagesesweekConference Proceedingsconference-collections
Article

Source code transformation based on software cost analysis

Published: 30 September 2001 Publication History

Abstract

This paper presents a model and a strategy for source-code transformation applied to software application programs to reduce their energy cost. We propose a flexible performance and energy model for a processor-memory system. The benefit of the model is generality (it is not tied to a single memory and processor architecture) and effectiveness of evaluation. With this model, we first estimate the effects of source-code transformations (called transformation cost), representing the improvement ratios of processor cycles, I-cache misses, and D-cache misses. Next, we combine the transformation cost model with hardware parameters to estimate the actual effect of a transformation on performance and energy. The model can be used to guide software transformation selection for power and performance. The experimental results show that the proposed approach finds the optimal transformation in 95% of the cases, and that the penalty when the non-optimal transformation is selected is within 5%.

References

[1]
T. Ball and J. Larus, "Optimally Profiling and Tracing Programs", Proceedings of the 19th Annual Symposium on Principles of Programming Languages, Jan., 1992
[2]
E.-Y. Chung, L. Benini, and G. De Micheli, "Energy Efficient Source Code Transformation based on Value Profiling", 1st workshop for Compilers and Operating Systems for Low-Power, pp. D-1-D.7, Philadelphia, PA, 2000
[3]
V. Tiwari, S. Malik, A. Wolfe, "Instruction Level Power Analysis and Optimization of Software", Journal of VLSI Signal Processing Systems, vol. 13, pp.223-233, 1996
[4]
L. Benini and G. De Micheli, "System-Level Power Optimization Techniques and Tools", ACM TODAES, vol. 5, issue 2, pp.115-192, Apr. 2000
[5]
H. Mehta, R. Owens, M. Irwin, R. Chen, and D. Ghosh, "Techniques for Low Energy Software", ISLPED, pp.72-75, 1997
[6]
G. Esakkimuthu, N. Vijaykrishnan, M. Kandemir, M. Irwin, "Memory system energy: influence of hardware-software optimizations," ISLPED, pp. 244-246, 2000.
[7]
Y. Li and J. Henkel, "A Framework for Estimating and Minimizing Energy Dissipation of Embedded HW/SW Systems", Design Automation Conference, pp.188-193, 1997
[8]
F. Cathoor, S. Wuytack, E. De Greef, F. Balasa, L. Nachtergaele, and A. Vandecappelle, Custom Memory Management Methodology: Exploration of Memory Organization for Embedded Multimedia System Design, Kluwer, 1998
[9]
M. Wolfe, High Performance Compilers for Parallel Computing, Addison-Wesley, 1996
[10]
M.S. Lam, E.E. Rothberg, and M.E. Wolf, "The Cache Performance and Optimizations of Blocked Algorithms", ASPLOS, pp. 63-74, 1991
[11]
P.Panda, H. Nakamura, N. Dutt, and A. Nicolau, "Augmenting Loop Tiling with Data Alignment for Improved Cache Performance", IEEE trans. on Computers, vol. 48, No. 2, pp. 142-148, 1999
[12]
D. Bacon, S, Graham, and O. Sharp, 'Compiler Transformation for High-Perforamnce Computing", ACM Computing Surveys, pp.345-420, vol26, No. 4, Dec. 1994
[13]
Stanford Compiler Group, The SUIF Library: A set of core routines for manipulating SUIF data structures, Stanford University, 1994
[14]
D. Brooks, V. Tiwari, and M. Martonosi, "Wattch: a framework for architectural-level power analysis and optimizations", ISCA, pp. 83-94, 2000
[15]
T. Simunic, L. Benini, G. De Micheli, and M. Hans, "Source Code Optimization and Profiling of Energy Consumption in Embedded Systems", ISSS, pp. 193-198, 2000.
[16]
P. R.Panda, N. Dutt, and A. Nicolau. Memory Issues in Embedded Systems-on-Chip: Optimizations and Exploration. Kluwer, 1999.

Cited By

View all

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Conferences
ISSS '01: Proceedings of the 14th international symposium on Systems synthesis
September 2001
290 pages
ISBN:1581134185
DOI:10.1145/500001
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 30 September 2001

Permissions

Request permissions for this article.

Check for updates

Qualifiers

  • Article

Conference

ISSS01
Sponsor:
ISSS01: 14th International Symposium on System Synthesis
September 30 - October 3, 2001
P.Q., Montréal, Canada

Acceptance Rates

Overall Acceptance Rate 38 of 71 submissions, 54%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)3
  • Downloads (Last 6 weeks)0
Reflects downloads up to 03 Oct 2024

Other Metrics

Citations

Cited By

View all
  • (2021)OptimizationEmbedded System Design10.1007/978-3-030-60910-8_7(349-379)Online publication date: 26-Jan-2021
  • (2020)Robust eulerian-on-lagrangian rodsACM Transactions on Graphics10.1145/3386569.339248939:4(59:1-59:10)Online publication date: 12-Aug-2020
  • (2020)Uncertainty quantification for multi-scan registrationACM Transactions on Graphics10.1145/3386569.339240239:4(130:1-130:24)Online publication date: 12-Aug-2020
  • (2020)RigNetACM Transactions on Graphics10.1145/3386569.339237939:4(58:1-58:14)Online publication date: 12-Aug-2020
  • (2020)Redundancy Analysis and Elimination on Access Patterns of the Windows Applications based on I/O Log DataIEEE Access10.1109/ACCESS.2020.2964260(1-1)Online publication date: 2020
  • (2017)REDSPYACM SIGOPS Operating Systems Review10.1145/3093315.303772951:2(47-61)Online publication date: 4-Apr-2017
  • (2017)Research patterns and trends in software effort estimationInformation and Software Technology10.1016/j.infsof.2017.06.00291:C(1-21)Online publication date: 1-Nov-2017
  • (2012)Domain-Specific optimization in digital forensicsProceedings of the 5th international conference on Theory and Practice of Model Transformations10.1007/978-3-642-30476-7_8(121-136)Online publication date: 28-May-2012
  • (2011)Systemic model for software cost analyzing and optimizing2011 IEEE 3rd International Conference on Communication Software and Networks10.1109/ICCSN.2011.6014958(569-573)Online publication date: May-2011
  • (2010)Dynamic probability based instruction scheduling for low-power embedded system2010 International Conference on Computer Application and System Modeling (ICCASM 2010)10.1109/ICCASM.2010.5620363(V2-15-V2-19)Online publication date: Oct-2010
  • Show More Cited By

View Options

Get Access

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media