Á¤º¸°úÇÐȸ³í¹®Áö (Journal of KIISE)
Current Result Document : 10 / 11
ÇѱÛÁ¦¸ñ(Korean Title) |
¸Þ¸ð¸® Á¢±Ù ÇÁ·ÎÆÄÀϸµÀ» ÅëÇÑ ÇÁ·Î±×·¥ÀÇ Swap »ç¿ë ÃÖÀûÈ |
¿µ¹®Á¦¸ñ(English Title) |
Optimizing Swap Use of Programs Using Memory Access Profiling |
ÀúÀÚ(Author) |
ÀÌ°æ¹Î
½É½Å¿ì
Á¶º´¸ð
±èűÔ
±è°æ°ï
ShinWoo Shim
ByoungMo Cho
GyungMin Lee
KyoungGon Kim
TaeKyu Kim
ÀÌÀ±Àç
¿°Ç念
ÇÑ Çõ
Yunjae Lee
Heon Y. Yeom
Hyuck Han
|
¿ø¹®¼ö·Ïó(Citation) |
VOL 47 NO. 05 PP. 0466 ~ 0472 (2020. 05) |
Çѱ۳»¿ë (Korean Abstract) |
¸ÞÀÎ ¸Þ¸ð¸®ÀÇ ³·Àº ¼ºÀå ¼Óµµ¿Í ¸¹Àº ¾çÀÇ ¸Þ¸ð¸®¸¦ ¿ä±¸ÇÏ´Â Çö´ë ÄÄÇ»Æà ÇÁ·Î±×·¥µéÀÇ µîÀåÀ¸·Î ÀÎÇØ ¸Þ¸ð¸®´Â Á¡Á¡ ÀüüÀûÀÎ ÄÄÇ»Æà ¼º´ÉÀ» Á¦ÇÑÇÏ´Â º´¸ñÀÌ µÇ¾î°¡°í ÀÖ´Ù. SwappingÀº ÀûÀº ¾çÀÇ ¸ÞÀÎ ¸Þ¸ð¸®¿Í Å« º¸Á¶ ÀúÀå ÀåÄ¡¸¦ »ç¿ëÇÏ¿© ÇÁ·Î±×·¥¿¡°Ô Å« °¡»óÀÇ ¸Þ¸ð¸®¸¦ Á¦°øÇØÁִµ¥, º¸¼öÀûÀÌ°í ¹ü¿ëÀûÀÎ Á¤Ã¥À¸·Î ÇÁ·Î±×·¥¿¡°Ô ÃÖÀûÀÇ ¼º´ÉÀ» Á¦°øÇØÁÖÁö ¸øÇÑ´Ù. º» ³í¹®¿¡¼´Â ¸Þ¸ð¸® Á¢±Ù ÇÁ·ÎÆÄÀϸµÀ» ÅëÇÏ¿© ÇÁ·Î±×·¥ÀÇ ¸Þ¸ð¸® Á¢±Ù ÆÐÅÏÀ» ºÐ¼®ÇÏ°í, ÀÌ¿¡ Æ¯ÈµÈ swappingÀ» »ç¿ëÇÒ ¼ö ÀÖµµ·Ï ÇÁ·Î±×·¥À» ÃÖÀûÈÇÑ´Ù. ³·Àº ¿À¹öÇìµåÀÇ ÇÁ·ÎÆÄÀϸµ ±â¹ý°ú °£´ÜÇÑ ÃÖÀûÈ ±â¹ýÀº »ç¿ëÀÚ°¡ ½±°Ô ÇÁ·Î±×·¥À» ÃÖÀûÈÇÒ ¼ö ÀÖµµ·Ï µ½´Â´Ù. Á¦¾ÈÇÏ´Â ±â¹ýÀ» ÅëÇØ ¿©¼¸ Á¾·ùÀÇ ÇÁ·Î±×·¥À» ÃÖÀûÈÇÑ °á°ú ÇÁ·Î±×·¥µéÀÇ ¼º´ÉÀÌ 43% Çâ»óµÇ¾ú´Ù.
|
¿µ¹®³»¿ë (English Abstract) |
The slow growth rate of main memory and modern computing workloads requires lots of memory, making main memory the bottleneck of system performance. Swapping provides a large virtual memory to programs by utilizing fast but small main memory and large secondary storage. However, programs cannot accomplish optimal performance due to conservative swapping policy which targets general workloads. The objective of this study was to analyze memory access pattern of programs and optimize programs to utilize swapping considering memory access pattern. A low-overhead memory profiling technique and a simple optimization technique can help programmers optimize their programs with ease. We optimized six workloads using these techniques and improved the performance of the workloads by 43%.
|
Å°¿öµå(Keyword) |
»çÀ̹ö º¸¾È
»çÀ̹ö°ø°Ý
ÆÄÀϸ®½º ¾Ç¼ºÄÚµå
»çÀ̹ö ų üÀÎ
cyber security
cyber-attack
fileless malware
cyber kill chain
¸Þ¸ð¸® °ü¸®
Swapping
ÇÁ·ÎÆÄÀϸµ
¼º´É
memory management
profiling
performance
optimization
ÃÖÀûÈ
|
ÆÄÀÏ÷ºÎ |
PDF ´Ù¿î·Îµå
|