efeslab / huron
A false sharing detection and repair tool
☆14Updated 5 years ago
Alternatives and similar repositories for huron:
Users that are interested in huron are comparing it to the libraries listed below
- DMon Prototype for OSDI 2021 Artifact Evaluation☆22Updated 3 years ago
- Interprocedural Basic Block Code Layout Optimization☆18Updated 6 years ago
- Characterizing and Modeling Non-Volatile Memory Systems [MICRO'20, TopPicks'21]☆33Updated 3 years ago
- Creating beautiful gem5 simulations☆49Updated 4 years ago
- Slice-aware Memory Management - Exploiting NUCA Characteristic of LLC in Intel Processors☆40Updated 5 years ago
- HeteroSync is a benchmark suite for performing fine-grained synchronization on tightly coupled GPUs☆28Updated 7 months ago
- a Pin tool for collecting microarchitecture-independent workload characteristics☆60Updated last year
- Repeated access to L2-containable loops to look for snoop filter conflicts on Intel Skylake Xeon processors.☆29Updated 6 years ago
- ☆34Updated 3 years ago
- (elastic) cuckoo hashing☆14Updated 4 years ago
- Artifact Evaluation Reproduction for "Software Prefetching for Indirect Memory Accesses", CGO 2017, using CK.☆38Updated 3 years ago
- The Splash-3 benchmark suite☆44Updated 2 years ago
- Efficiently Detecting Concurrency Bugs in Persistent Memory Programs (ASPLOS 2022)☆8Updated 3 years ago
- A Speculation-Aware Collaborative Dependence Analysis Framework☆28Updated 9 months ago
- ☆27Updated 5 years ago
- Memory System Microbenchmarks☆62Updated 2 years ago
- ThyNVM: Transparent hybrid NonVolatile Memory (NOTE: This repo is not working yet. Please refer to the old version: https://github.com/ba…☆29Updated 7 years ago
- DRAM Bank-Aware Kernel Memory Allocator☆42Updated 3 months ago
- ☆32Updated last year
- This repository contains some tools to monitor the UNC_CBO_CACHE_LOOKUP event of the C-Boxes.☆11Updated 7 years ago
- Microscope: Enabling Microarchitectural Replay Attacks☆19Updated 4 years ago
- Gem5 implementation of "InvisiSpec", a defense mechanism of speculative execution attacks on cache hierarchy.☆60Updated 4 years ago
- Pythia is a set of RDMA-based remote side-channel attacks. USENIX Security 2019.☆27Updated 4 years ago
- A low-overhead tool to periodically collect system-wide hardware performance counters on Intel64 systems.☆33Updated 2 years ago
- Source code for the Base-Delta-Immediate Compression Algorithm (described in the PACT 2012 paper by Pekhimenko et al. at http://users.ece…☆26Updated 10 years ago
- Tools to track memory accesses in applications and visualize the patterns to reveal opportunities for optimization.☆92Updated 9 years ago
- ☆14Updated 4 years ago
- PIN-tool to produce multi-threaded atomic memory traces☆36Updated 11 years ago
- ☆22Updated 2 years ago
- Collaborative Parallelization Framework (CPF)☆32Updated last year