mhirki / rapl-tools
Tools for experimenting with Running Average Power Limit (RAPL)
☆16Updated 7 years ago
Alternatives and similar repositories for rapl-tools:
Users that are interested in rapl-tools are comparing it to the libraries listed below
- https://rs3lab.github.io/SynCord/☆22Updated 2 years ago
- µSuite: A Benchmark Suite for Microservices☆42Updated 4 years ago
- Accel-config / libaccel-config☆61Updated 3 weeks ago
- ReDMArk: Bypassing RDMA Security Mechanisms.☆38Updated 4 years ago
- Benchmark Test Suite for RDMA Networks☆51Updated last year
- Reexamining Direct Cache Access to Optimize I/O Intensive Applications for Multi-hundred-gigabit Networks☆88Updated 3 years ago
- Benchmark Suite for RDMA Performance Isolation☆36Updated last year
- ☆24Updated 5 months ago
- Skyloft: A General High-Efficient Scheduling Framework in User Space (SOSP 2024)☆32Updated 4 months ago
- Characterizing and Modeling Non-Volatile Memory Systems [MICRO'20, TopPicks'21]☆33Updated 3 years ago
- CXL-DMSim: A Full-System CXL Disaggregated Memory Simulator Based on gem5☆46Updated 2 months ago
- Exploring the Design Space of Page Management for Multi-Tiered Memory Systems (USENIX ATC '21)☆43Updated 2 years ago
- CleanupSpec (MICRO-2019)☆17Updated 4 years ago
- Sources for the Multi-Clock system as described in the paper: MULTI-CLOCK: Dynamic Tiering for Hybrid Memory Systems, HPCA 2022.☆19Updated 2 years ago
- Clio, ASPLOS'22.☆71Updated 2 years ago
- A new memory mapping interface for efficient direct user-space access to byte-addressable storage, published in MICRO2022.☆15Updated 2 years ago
- VANS: A validated NVRAM simulator☆26Updated last year
- Suite of contentious microbenchmarks☆53Updated 7 years ago
- ☆60Updated 6 months ago
- The artifact for SecSMT paper -- Usenix Security 2022☆26Updated 2 years ago
- Creating beautiful gem5 simulations☆47Updated 3 years ago
- ☆18Updated 4 years ago
- Artifact package for CBMM paper (ATC'22)☆8Updated 2 years ago
- ☆14Updated 6 months ago
- Repo for OSDI 2023 paper: "Ship your Critical Section Not Your Data: Enabling Transparent Delegation with TCLocks"☆12Updated 2 months ago
- Repeated access to L2-containable loops to look for snoop filter conflicts on Intel Skylake Xeon processors.☆29Updated 6 years ago
- ☆15Updated last year
- Pythia is a set of RDMA-based remote side-channel attacks. USENIX Security 2019.☆26Updated 4 years ago
- A user level library for applications to transparently use Intel DSA.☆30Updated this week
- (elastic) cuckoo hashing☆13Updated 4 years ago