Access pattern-based code compression for memory-constrained systems
dc.citation.epage | 60-30 | en_US |
dc.citation.issueNumber | 4 | en_US |
dc.citation.spage | 60-1 | en_US |
dc.citation.volumeNumber | 13 | en_US |
dc.contributor.author | Ozturk, O. | en_US |
dc.contributor.author | Kandemir, M. | en_US |
dc.contributor.author | Chen, G. | en_US |
dc.date.accessioned | 2016-02-08T10:08:00Z | |
dc.date.available | 2016-02-08T10:08:00Z | |
dc.date.issued | 2008-09 | en_US |
dc.department | Department of Computer Engineering | en_US |
dc.description.abstract | As compared to a large spectrum of performance optimizations, relatively less effort has been dedicated to optimize other aspects of embedded applications such as memory space requirements, power, real-time predictability, and reliability. In particular, many modern embedded systems operate under tight memory space constraints. One way of addressing this constraint is to compress executable code and data as much as possible. While researchers on code compression have studied efficient hardware and software based code compression strategies, many of these techniques do not take application behavior into account; that is, the same compression/decompression strategy is used irrespective of the application being optimized. This article presents an application-sensitive code compression strategy based on control flow graph (CFG) representation of the embedded program. The idea is to start with a memory image wherein all basic blocks of the application are compressed, and decompress only the blocks that are predicted to be needed in the near future. When the current access to a basic block is over, our approach also decides the point at which the block could be compressed. We propose and evaluate several compression and decompression strategies that try to reduce memory requirements without excessively increasing the original instruction cycle counts. Some of our strategies make use of profile data, whereas others are fully automatic. Our experimental evaluation using seven applications from the MediaBench suite and three large embedded applications reveals that the proposed code compression strategy is very successful in practice. Our results also indicate that working at a basic block granularity, as opposed to a procedure granularity, is important for maximizing memory space savings. © 2008 ACM. | en_US |
dc.description.provenance | Made available in DSpace on 2016-02-08T10:08:00Z (GMT). No. of bitstreams: 1 bilkent-research-paper.pdf: 70227 bytes, checksum: 26e812c6f5156f83f0e77b261a471b5a (MD5) Previous issue date: 2008 | en |
dc.identifier.doi | 10.1145/1391962.1391968 | en_US |
dc.identifier.issn | 1084-4309 | en_US |
dc.identifier.uri | http://hdl.handle.net/11693/23026 | en_US |
dc.language.iso | English | en_US |
dc.publisher | Association for Computing Machinery | en_US |
dc.relation.isversionof | http://dx.doi.org/10.1145/1391962.1391968 | en_US |
dc.source.title | ACM Transactions on Design Automation of Electronic Systems | en_US |
dc.subject | CFG | en_US |
dc.subject | Code access pattern | en_US |
dc.subject | Code compression | en_US |
dc.subject | Embedded systems | en_US |
dc.subject | Memory optimization | en_US |
dc.subject | Applications | en_US |
dc.subject | Codes (symbols) | en_US |
dc.subject | Concurrency control | en_US |
dc.subject | Constrained optimization | en_US |
dc.subject | Data compression | en_US |
dc.subject | Integrated circuits | en_US |
dc.subject | Optimization | en_US |
dc.subject | Power spectrum | en_US |
dc.subject | Real time systems | en_US |
dc.subject | Embedded systems | en_US |
dc.title | Access pattern-based code compression for memory-constrained systems | en_US |
dc.type | Article | en_US |
Files
Original bundle
1 - 1 of 1
Loading...
- Name:
- Access pattern-based code compression for memory-constrained systems.pdf
- Size:
- 924.08 KB
- Format:
- Adobe Portable Document Format
- Description:
- f