Academic literature on the topic 'Belady's algorithm'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Belady's algorithm.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Belady's algorithm"

1

Pratheeksha, P., and SA Revathi. "Machine Learning-Based Cache Replacement Policies: A Survey." International Journal of Engineering and Advanced Technology (IJEAT) 10, no. 6 (2021): 19–22. https://doi.org/10.35940/ijeat.F2907.0810621.

Full text
Abstract:
Despite extensive developments in improving cache hit rates, designing an optimal cache replacement policy that mimics Belady’s algorithm still remains a challenging task. Existing standard static replacement policies does not adapt to the dynamic nature of memory access patterns, and the diversity of computer programs only exacerbates the problem. Several factors affect the design of a replacement policy such as hardware upgrades, memory overheads, memory access patterns, model latency, etc. The amalgamation of a fundamental concept like cache replacement with advanced machine learning algorithms provides surprising results and drives the development towards cost-effective solutions. In this paper, we review some of the machine-learning based cache replacement policies that outperformed the static heuristics.
APA, Harvard, Vancouver, ISO, and other styles
2

Park, Yeonhong, Sunhong Min, and Jae W. Lee. "Ginex." Proceedings of the VLDB Endowment 15, no. 11 (2022): 2626–39. http://dx.doi.org/10.14778/3551793.3551819.

Full text
Abstract:
Graph Neural Networks (GNNs) are receiving a spotlight as a powerful tool that can effectively serve various inference tasks on graph structured data. As the size of real-world graphs continues to scale, the GNN training system faces a scalability challenge. Distributed training is a popular approach to address this challenge by scaling out CPU nodes. However, not much attention has been paid to disk-based GNN training, which can scale up the single-node system in a more cost-effective manner by leveraging high-performance storage devices like NVMe SSDs. We observe that the data movement between the main memory and the disk is the primary bottleneck in the SSD-based training system, and that the conventional GNN training pipeline is sub-optimal without taking this overhead into account. Thus, we propose Ginex, the first SSD-based GNN training system that can process billion-scale graph datasets on a single machine. Inspired by the inspector-executor execution model in compiler optimization, Ginex restructures the GNN training pipeline by separating sample and gather stages. This separation enables Ginex to realize a provably optimal replacement algorithm, known as Belady's algorithm , for caching feature vectors in memory, which account for the dominant portion of I/O accesses. According to our evaluation with four billion-scale graph datasets and two GNN models, Ginex achieves 2.11X higher training throughput on average (2.67X at maximum) than the SSD-extended PyTorch Geometric.
APA, Harvard, Vancouver, ISO, and other styles
3

P, Pratheeksha, and Revathi S. A. "Machine Learning-Based Cache Replacement Policies: A Survey." International Journal of Engineering and Advanced Technology 10, no. 6 (2021): 19–22. http://dx.doi.org/10.35940/ijeat.f2907.0810621.

Full text
Abstract:
Despite extensive developments in improving cache hit rates, designing an optimal cache replacement policy that mimics Belady’s algorithm still remains a challenging task. Existing standard static replacement policies does not adapt to the dynamic nature of memory access patterns, and the diversity of computer programs only exacerbates the problem. Several factors affect the design of a replacement policy such as hardware upgrades, memory overheads, memory access patterns, model latency, etc. The amalgamation of a fundamental concept like cache replacement with advanced machine learning algorithms provides surprising results and drives the development towards cost-effective solutions. In this paper, we review some of the machine-learning based cache replacement policies that outperformed the static heuristics.
APA, Harvard, Vancouver, ISO, and other styles
4

Kuznetsov, O. V., L. E. Chala, and S. G. Udovenko. "Neural network data caching method." Bionics of Intelligence 1, no. 90 (2018): 84–90. https://doi.org/10.30837/bi.2018.1(90).12.

Full text
Abstract:
Main existing types of caching and algorithms of saving cached data were analyzed. The new type of caching based on neural networks was proposed. results of proof of concept project were analyzed. Proposed type of caching was reviewed as a solution to a problem of Belady algorithm. The scale of subject area to use neural type of caching was determined.
APA, Harvard, Vancouver, ISO, and other styles
5

Yoo, Ho Jung, Jeong Hun Kim, and Tae Hee Han. "RL-Based Cache Replacement: A Modern Interpretation of Belady’s Algorithm With Bypass Mechanism and Access Type Analysis." IEEE Access 11 (2023): 145238–53. http://dx.doi.org/10.1109/access.2023.3346790.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Wang, Yizhou, Yishuo Meng, Jiaxing Wang, and Chen Yang. "LSTM-CRP: Algorithm-Hardware Co-Design and Implementation of Cache Replacement Policy Using Long Short-Term Memory." Big Data and Cognitive Computing 8, no. 10 (2024): 140. http://dx.doi.org/10.3390/bdcc8100140.

Full text
Abstract:
As deep learning has produced dramatic breakthroughs in many areas, it has motivated emerging studies on the combination between neural networks and cache replacement algorithms. However, deep learning is a poor fit for performing cache replacement in hardware implementation because its neural network models are impractically large and slow. Many studies have tried to use the guidance of the Belady algorithm to speed up the prediction of cache replacement. But it is still impractical to accurately predict the characteristics of future access addresses, introducing inaccuracy in the discrimination of complex access patterns. Therefore, this paper presents the LSTM-CRP algorithm as well as its efficient hardware implementation, which employs the long short-term memory (LSTM) for access pattern identification at run-time to guide cache replacement algorithm. LSTM-CRP first converts the address into a novel key according to the frequency of the access address and a virtual capacity of the cache, which has the advantages of low information redundancy and high timeliness. Using the key as the inputs of four offline-trained LSTM network-based predictors, LSTM-CRP can accurately classify different access patterns and identify current cache characteristics in a timely manner via an online set dueling mechanism on sampling caches. For efficient implementation, heterogeneous lightweight LSTM networks are dedicatedly constructed in LSTM-CRP to lower hardware overhead and inference delay. The experimental results show that LSTM-CRP was able to averagely improve the cache hit rate by 20.10%, 15.35%, 12.11% and 8.49% compared with LRU, RRIP, Hawkeye and Glider, respectively. Implemented on Xilinx XCVU9P FPGA at the cost of 15,973 LUTs and 1610 FF registers, LSTM-CRP was running at a 200 MHz frequency with 2.74 W power consumption.
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Belady's algorithm"

1

Guo, Jia, María Jesús Garzarán, and David Padua. "The Power of Belady’s Algorithm in Register Allocation for Long Basic Blocks." In Languages and Compilers for Parallel Computing. Springer Berlin Heidelberg, 2004. http://dx.doi.org/10.1007/978-3-540-24644-2_24.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Hasslinger, Gerhard. "Markov Analysis of Optimum Caching as an Equivalent Alternative to Belady’s Algorithm Without Look-Ahead." In Lecture Notes in Computer Science. Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-74947-1_3.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Belady's algorithm"

1

Jain, Akanksha, and Calvin Lin. "Rethinking Belady's Algorithm to Accommodate Prefetching." In 2018 ACM/IEEE 45th Annual International Symposium on Computer Architecture (ISCA). IEEE, 2018. http://dx.doi.org/10.1109/isca.2018.00020.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

McMaster, Kirby, Samuel Sambasivam, and Nicole Anderson. "How Anomalous Is Beladv's Anomaly?" In InSITE 2009: Informing Science + IT Education Conference. Informing Science Institute, 2009. http://dx.doi.org/10.28945/3390.

Full text
Abstract:
In a virtual memory system using demand paging, the page fault rate of a process varies with the number of memory frames allocated to the process. When an increase in the number of frames allocated leads to an increase in the number of page faults, Belady's anomaly is said to occur. In this study we used computer simulation to examine four conditions that affect the incidence of Belady's anomaly: (1) page replacement algorithm (FIFO vs. Random Page), (2) process size, (3) reference string length, and (4) memory frames allocated to the process. We found that over a wide range of process sizes and reference string lengths, Belady's anomaly occurred for up to 58.6% of the (random) reference strings under FIFO, and up to 100% of the reference strings for Random Page. Under conditions where anomalies occur most often, the average frame allocation level was around 75% of the process size for FIFO, but just over 50% of the process size for Random Page. Throughout the study, Belady's anomaly occurred so frequently that it no longer seems anomalous. This is especially true for the Random Page algorithm.
APA, Harvard, Vancouver, ISO, and other styles
3

Jain, Akanksha, and Calvin Lin. "Back to the Future: Leveraging Belady's Algorithm for Improved Cache Replacement." In 2016 ACM/IEEE 43rd Annual International Symposium on Computer Architecture (ISCA). IEEE, 2016. http://dx.doi.org/10.1109/isca.2016.17.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Zhou, Wenbin, and Qian Wang. "An Efficient Cache Eviction Strategy based on Learning and Belady Algorithm." In 2023 IEEE 12th International Conference on Cloud Networking (CloudNet). IEEE, 2023. http://dx.doi.org/10.1109/cloudnet59005.2023.10490040.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!