Memory Access Pattern Profiling for Streaming Applications Based on MATLAB Models

Thomas Goldbrunner, Thomas Wild, Andreas Herkersdorf

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

1 Scopus citations

Abstract

In order to cope with the problems caused by the Data Deluge, for application-specific architectures it is important to design the system in such a way that the processing and memory subsystems are geared to each other. Especially for systems that need to fulfill high data throughput demands, there is a high risk, that otherwise there will be high degradation of the overall system performance caused by memory accesses. However especially for application-specific designs, it is possible to create a tailored memory subsystem by profiling the applications memory access patterns beforehand and then incorporating the information during the system design. For this purpose we present a data access pattern profiling framework, which can provide detailed information about an applications memory access patterns based on a MATLAB model of the application.

Original languageEnglish
Title of host publication2018 IEEE 28th International Symposium on Power and Timing Modeling, Optimization and Simulation, PATMOS 2018
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages32-38
Number of pages7
ISBN (Print)9781538663653
DOIs
StatePublished - 12 Sep 2018
Event28th IEEE International Symposium on Power and Timing Modeling, Optimization and Simulation, PATMOS 2018 - Platja d'Aro, Spain
Duration: 2 Jul 20184 Jul 2018

Publication series

Name2018 IEEE 28th International Symposium on Power and Timing Modeling, Optimization and Simulation, PATMOS 2018

Conference

Conference28th IEEE International Symposium on Power and Timing Modeling, Optimization and Simulation, PATMOS 2018
Country/TerritorySpain
CityPlatja d'Aro
Period2/07/184/07/18

Fingerprint

Dive into the research topics of 'Memory Access Pattern Profiling for Streaming Applications Based on MATLAB Models'. Together they form a unique fingerprint.

Cite this