Detection of false sharing using machine learning

dc.contributor.authorJayasena, S
dc.contributor.authorAmarasinghe, S
dc.contributor.authorAbeyweera, A
dc.contributor.authorAmarasinghe, G
dc.contributor.authorDe Silva, H
dc.contributor.authorRathnayake, S
dc.contributor.authorMeng, X
dc.contributor.authorLiu, Y
dc.date.accessioned2015-06-19T08:11:31Z
dc.date.available2015-06-19T08:11:31Z
dc.date.issued2015-06-19
dc.description.abstractFalse sharing is a major class of performance bugs in parallel applications. Detecting false sharing is difficult as it does not change the program semantics. We introduce an efficient and effective approach for detecting false sharing based on machine learning. We develop a set of mini-programs in which false sharing can be turned on and off. We then run the mini-programs both with and without false sharing, collect a set of hardware performance event counts and use the collected data to train a classifier. We can use the trained classifier to analyze data from arbitrary programs for detection of false haring. Experiments with the PARSEC and Phoenix benchmarks show that our approach is indeed effective. We detect published false sharing regions in the benchmarks with zero false positives. Our performance penalty is less than 2%. Thus, we believe that this is an effective and practical method for detecting false sharing.en_US
dc.identifier.conferenceSuper Computing 2013, ACMen_US
dc.identifier.departmentDepartment of Computer Science and Engineeringen_US
dc.identifier.emailsanath@cse.mrt.ac.lken_US
dc.identifier.emailsaman@csail.mit.eduen_US
dc.identifier.emailasanka.09@cse.mrt.ac.lken_US
dc.identifier.emailgayashan.09@cse.mrt.ac.lken_US
dc.identifier.emailhimeshi.09@cse.mrt.ac.lken_US
dc.identifier.emailsunimalr.09@cse.mrt.ac.lken_US
dc.identifier.emailxmeng@us.ibm.comen_US
dc.identifier.emailygliu@us.ibm.comen_US
dc.identifier.facultyEngineeringen_US
dc.identifier.pgnos9p.en_US
dc.identifier.placeDenveren_US
dc.identifier.proceedingProceedings of the International Conference on high performance computing, networking, storage and analysis, article no. 30en_US
dc.identifier.urihttp://dl.lib.mrt.ac.lk/handle/123/10928
dc.identifier.year2013en_US
dc.language.isoenen_US
dc.source.urihttp://delivery.acm.org/10.1145/2510000/2503269/a30-jayasena.pdf?ip=192.248.8.66&id=2503269&acc=ACTIVE%20SERVICE&key=045416EF4DDA69D9%2EA13526572640286D%2E4D4702B0C3E38B35%2E4D4702B0C3E38B35&CFID=517260008&CFTOKEN=64311013&__acm__=1434604531_83709826161547579cca71f6a05923f0en_US
dc.subjectFalse sharingen_US
dc.subjectMachine Learningen_US
dc.subjectPerformance eventsen_US
dc.titleDetection of false sharing using machine learningen_US

Files