• Àüü
  • ÀüÀÚ/Àü±â
  • Åë½Å
  • ÄÄÇ»ÅÍ
´Ý±â

»çÀÌÆ®¸Ê

Loading..

Please wait....

±¹³» ³í¹®Áö

Ȩ Ȩ > ¿¬±¸¹®Çå > ±¹³» ³í¹®Áö > Çѱ¹Á¤º¸°úÇÐȸ ³í¹®Áö > Á¤º¸°úÇÐȸ³í¹®Áö (Journal of KIISE)

Á¤º¸°úÇÐȸ³í¹®Áö (Journal of KIISE)

Current Result Document : 10 / 11

ÇѱÛÁ¦¸ñ(Korean Title) ¸Þ¸ð¸® Á¢±Ù ÇÁ·ÎÆÄÀϸµÀ» ÅëÇÑ ÇÁ·Î±×·¥ÀÇ Swap »ç¿ë ÃÖÀûÈ­
¿µ¹®Á¦¸ñ(English Title) Optimizing Swap Use of Programs Using Memory Access Profiling
ÀúÀÚ(Author) ÀÌ°æ¹Î   ½É½Å¿ì   Á¶º´¸ð   ±èűԠ  ±è°æ°ï   ShinWoo Shim   ByoungMo Cho   GyungMin Lee   KyoungGon Kim   TaeKyu Kim   ÀÌÀ±Àç   ¿°Ç念   ÇÑ Çõ   Yunjae Lee   Heon Y. Yeom   Hyuck Han  
¿ø¹®¼ö·Ïó(Citation) VOL 47 NO. 05 PP. 0466 ~ 0472 (2020. 05)
Çѱ۳»¿ë
(Korean Abstract)
¸ÞÀÎ ¸Þ¸ð¸®ÀÇ ³·Àº ¼ºÀå ¼Óµµ¿Í ¸¹Àº ¾çÀÇ ¸Þ¸ð¸®¸¦ ¿ä±¸ÇÏ´Â Çö´ë ÄÄÇ»Æà ÇÁ·Î±×·¥µéÀÇ µîÀåÀ¸·Î ÀÎÇØ ¸Þ¸ð¸®´Â Á¡Á¡ ÀüüÀûÀÎ ÄÄÇ»Æà ¼º´ÉÀ» Á¦ÇÑÇÏ´Â º´¸ñÀÌ µÇ¾î°¡°í ÀÖ´Ù. SwappingÀº ÀûÀº ¾çÀÇ ¸ÞÀÎ ¸Þ¸ð¸®¿Í Å« º¸Á¶ ÀúÀå ÀåÄ¡¸¦ »ç¿ëÇÏ¿© ÇÁ·Î±×·¥¿¡°Ô Å« °¡»óÀÇ ¸Þ¸ð¸®¸¦ Á¦°øÇØÁִµ¥, º¸¼öÀûÀÌ°í ¹ü¿ëÀûÀÎ Á¤Ã¥À¸·Î ÇÁ·Î±×·¥¿¡°Ô ÃÖÀûÀÇ ¼º´ÉÀ» Á¦°øÇØÁÖÁö ¸øÇÑ´Ù. º» ³í¹®¿¡¼­´Â ¸Þ¸ð¸® Á¢±Ù ÇÁ·ÎÆÄÀϸµÀ» ÅëÇÏ¿© ÇÁ·Î±×·¥ÀÇ ¸Þ¸ð¸® Á¢±Ù ÆÐÅÏÀ» ºÐ¼®ÇÏ°í, ÀÌ¿¡ ƯȭµÈ swappingÀ» »ç¿ëÇÒ ¼ö ÀÖµµ·Ï ÇÁ·Î±×·¥À» ÃÖÀûÈ­ÇÑ´Ù. ³·Àº ¿À¹öÇìµåÀÇ ÇÁ·ÎÆÄÀϸµ ±â¹ý°ú °£´ÜÇÑ ÃÖÀûÈ­ ±â¹ýÀº »ç¿ëÀÚ°¡ ½±°Ô ÇÁ·Î±×·¥À» ÃÖÀûÈ­ÇÒ ¼ö ÀÖµµ·Ï µ½´Â´Ù. Á¦¾ÈÇÏ´Â ±â¹ýÀ» ÅëÇØ ¿©¼¸ Á¾·ùÀÇ ÇÁ·Î±×·¥À» ÃÖÀûÈ­ÇÑ °á°ú ÇÁ·Î±×·¥µéÀÇ ¼º´ÉÀÌ 43% Çâ»óµÇ¾ú´Ù.
¿µ¹®³»¿ë
(English Abstract)
The slow growth rate of main memory and modern computing workloads requires lots of memory, making main memory the bottleneck of system performance. Swapping provides a large virtual memory to programs by utilizing fast but small main memory and large secondary storage. However, programs cannot accomplish optimal performance due to conservative swapping policy which targets general workloads. The objective of this study was to analyze memory access pattern of programs and optimize programs to utilize swapping considering memory access pattern. A low-overhead memory profiling technique and a simple optimization technique can help programmers optimize their programs with ease. We optimized six workloads using these techniques and improved the performance of the workloads by 43%.
Å°¿öµå(Keyword) »çÀ̹ö º¸¾È   »çÀ̹ö°ø°Ý   ÆÄÀϸ®½º ¾Ç¼ºÄڵ堠 »çÀ̹ö ų üÀΠ  cyber security   cyber-attack   fileless malware   cyber kill chain   ¸Þ¸ð¸® °ü¸®   Swapping   ÇÁ·ÎÆÄÀϸµ   ¼º´É   memory management   profiling   performance   optimization   ÃÖÀûÈ­  
ÆÄÀÏ÷ºÎ PDF ´Ù¿î·Îµå