{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,28]],"date-time":"2026-03-28T16:50:27Z","timestamp":1774716627005,"version":"3.50.1"},"reference-count":40,"publisher":"Association for Computing Machinery (ACM)","issue":"1","license":[{"start":{"date-parts":[[2014,2,1]],"date-time":"2014-02-01T00:00:00Z","timestamp":1391212800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100002855","name":"Ministry of Science and Technology of the People's Republic of China","doi-asserted-by":"publisher","award":["2011CB302502"],"award-info":[{"award-number":["2011CB302502"]}],"id":[{"id":"10.13039\/501100002855","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["60925009, 61272132, 60921002, and 60903046"],"award-info":[{"award-number":["60925009, 61272132, 60921002, and 60903046"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100002367","name":"Chinese Academy of Sciences","doi-asserted-by":"publisher","award":["XDA06010401"],"award-info":[{"award-number":["XDA06010401"]}],"id":[{"id":"10.13039\/501100002367","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100003816","name":"Huawei Technologies","doi-asserted-by":"publisher","award":["YBCB2011030"],"award-info":[{"award-number":["YBCB2011030"]}],"id":[{"id":"10.13039\/501100003816","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000143","name":"Division of Computing and Communication Foundations","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100000143","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Trans. Archit. Code Optim."],"published-print":{"date-parts":[[2014,2]]},"abstract":"<jats:p>DRAM access traces (i.e., off-chip memory references) can be extremely valuable for the design of memory subsystems and performance tuning of software. Hardware snooping on the off-chip memory interface is an effective and nonintrusive approach to monitoring and collecting real-life DRAM accesses. However, compared with software-based approaches, hardware snooping approaches typically lack semantic information, such as process\/function\/object identifiers, virtual addresses, and lock contexts, that is essential to the complete understanding of the systems and software under investigation.<\/jats:p>\n          <jats:p>In this article, we propose a hybrid hardware\/software mechanism that is able to collect off-chip memory reference traces with semantic information. We have designed and implemented a prototype system called HMTT (Hybrid Memory Trace Tool), which uses a custom-made DIMM connector to collect off-chip memory references and a high-level event-encoding scheme to correlate semantic information with memory references. In addition to providing complete, undistorted DRAM access traces, the proposed system is also able to perform various types of low-overhead profiling, such as object-relative accesses and multithread lock accesses.<\/jats:p>","DOI":"10.1145\/2579668","type":"journal-article","created":{"date-parts":[[2014,3,18]],"date-time":"2014-03-18T12:09:07Z","timestamp":1395144547000},"page":"1-25","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":13,"title":["HMTT"],"prefix":"10.1145","volume":"11","author":[{"given":"Yongbing","family":"Huang","sequence":"first","affiliation":[{"name":"State Key Laboratory of Computer Architecture, Institute of Computing Technology, Chinese Academy of Sciences, China; University of Chinese Academy of Sciences, Beijing, China"}]},{"given":"Licheng","family":"Chen","sequence":"additional","affiliation":[{"name":"State Key Laboratory of Computer Architecture, Institute of Computing Technology, Chinese Academy of Sciences, China; University of Chinese Academy of Sciences, Beijing, China"}]},{"given":"Zehan","family":"Cui","sequence":"additional","affiliation":[{"name":"State Key Laboratory of Computer Architecture, Institute of Computing Technology, Chinese Academy of Sciences, China; University of Chinese Academy of Sciences, Beijing, China"}]},{"given":"Yuan","family":"Ruan","sequence":"additional","affiliation":[{"name":"State Key Laboratory of Computer Architecture, Institute of Computing Technology, Chinese Academy of Sciences, Beijing, China"}]},{"given":"Yungang","family":"Bao","sequence":"additional","affiliation":[{"name":"State Key Laboratory of Computer Architecture, Institute of Computing Technology, Chinese Academy of Sciences, Beijing, China"}]},{"given":"Mingyu","family":"Chen","sequence":"additional","affiliation":[{"name":"State Key Laboratory of Computer Architecture, Institute of Computing Technology, Chinese Academy of Sciences, Beijing, China"}]},{"given":"Ninghui","family":"Sun","sequence":"additional","affiliation":[{"name":"State Key Laboratory of Computer Architecture, Institute of Computing Technology, Chinese Academy of Sciences, Beijing, China"}]}],"member":"320","published-online":{"date-parts":[[2014,2]]},"reference":[{"key":"e_1_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/381711.381717"},{"key":"e_1_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/2.982917"},{"key":"e_1_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/1384529.1375484"},{"key":"e_1_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/2.347997"},{"key":"e_1_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.5555\/1247360.1247401"},{"key":"e_1_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/1454115.1454128"},{"key":"e_1_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/2024716.2024718"},{"key":"e_1_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1177\/109434200001400404"},{"key":"e_1_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/1254810.1254830"},{"key":"e_1_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISPASS.2012.6189205"},{"key":"e_1_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/2000064.2000107"},{"key":"e_1_2_1_13_1","volume-title":"OLS (Ottawa Linux Symposium). Citeseer, 209--224","author":"Desnoyers Mathieu"},{"key":"e_1_2_1_15_1","unstructured":"FuturePlus. 2012. FuturePlus Systems. Retrieved from http:\/\/www.futureplus.com\/.  FuturePlus. 2012. FuturePlus Systems. Retrieved from http:\/\/www.futureplus.com\/."},{"key":"e_1_2_1_16_1","unstructured":"Green Hills Software. 2013. SuperTrace Probe. Retrieved from http:\/\/www.ghs.com\/products\/supertraceprobe.html.  Green Hills Software. 2013. SuperTrace Probe. Retrieved from http:\/\/www.ghs.com\/products\/supertraceprobe.html."},{"key":"e_1_2_1_17_1","volume-title":"BACH: A hardware monitor for tracing microprocessor-based sytems. Microprocessors and Microsystems 17, 6","author":"Grimsrud K.","year":"1993"},{"key":"e_1_2_1_18_1","first-page":"1","article-title":"Simpoint 3.0: Faster and more flexible program phase analysis","volume":"7","author":"Hamerly Greg","year":"2005","journal-title":"Journal of Instruction Level Parallelism"},{"key":"e_1_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/1117201.1117211"},{"key":"e_1_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/2370816.2370854"},{"key":"e_1_2_1_21_1","unstructured":"Intel Corporation. 2004. Intel Itanium2 Processor Reference Manual. Intel Corporation.  Intel Corporation. 2004. Intel Itanium2 Processor Reference Manual. Intel Corporation."},{"key":"e_1_2_1_22_1","unstructured":"Intel Corporation. 2012. Intel 64 and IA-32 Architectures Software Developer&smacr; Manual vol. 3A & 3B.  Intel Corporation. 2012. Intel 64 and IA-32 Architectures Software Developer&smacr; Manual vol. 3A & 3B."},{"key":"e_1_2_1_23_1","unstructured":"JEDEC Solid State Technology Association. 2004. Double Data Rate (DDR) SDRAM Specification.  JEDEC Solid State Technology Association. 2004. Double Data Rate (DDR) SDRAM Specification."},{"key":"e_1_2_1_24_1","article-title":"Bochs: A portable PC emulator for Unix\/x","volume":"1996","author":"Lawton Kevin P.","year":"1996","journal-title":"Linux Journal"},{"key":"e_1_2_1_25_1","volume-title":"Oprofile: A system profiler for Linux.","author":"Levon John","year":"2004"},{"key":"e_1_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/PACT.2009.35"},{"key":"e_1_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/1216919.1216927"},{"key":"e_1_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/1064978.1065034"},{"key":"e_1_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/2.982916"},{"key":"e_1_2_1_30_1","volume-title":"Monster: A Tool for Analyzing the Interaction between Operating Systems and Computer Architectures. Technical Report.","author":"Nagle D.","year":"1992"},{"key":"e_1_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/378993.378999"},{"key":"e_1_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/1273442.1250746"},{"key":"e_1_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/88.473612"},{"key":"e_1_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/178243.178260"},{"key":"e_1_2_1_36_1","unstructured":"Teledyne LeCroy. 2013. Protocol analyzers. Retrieved from http:\/\/teledynelecroy.com\/protocolanalyzer\/.  Teledyne LeCroy. 2013. Protocol analyzers. Retrieved from http:\/\/teledynelecroy.com\/protocolanalyzer\/."},{"key":"e_1_2_1_37_1","unstructured":"TopMC. 2011. TopMC: Performance Counter Monitor Tool. http:\/\/asg.ict.ac.cn\/projects\/topmc\/. (2011).  TopMC. 2011. TopMC: Performance Counter Monitor Tool. http:\/\/asg.ict.ac.cn\/projects\/topmc\/. (2011)."},{"key":"e_1_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/143371.143506"},{"key":"e_1_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/254180.254184"},{"key":"e_1_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/1105734.1105748"},{"key":"e_1_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1109\/MM.2007.39"},{"key":"e_1_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/216585.216588"},{"key":"e_1_2_1_43_1","volume-title":"Proceedings of High Performance Computing Asia.","author":"Youn Hyung-Min","year":"1997"}],"container-title":["ACM Transactions on Architecture and Code Optimization"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2579668","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2579668","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T23:43:50Z","timestamp":1750290230000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2579668"}},"subtitle":["A hybrid hardware\/software tracing system for bridging the DRAM access trace's semantic gap"],"short-title":[],"issued":{"date-parts":[[2014,2]]},"references-count":40,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2014,2]]}},"alternative-id":["10.1145\/2579668"],"URL":"https:\/\/doi.org\/10.1145\/2579668","relation":{},"ISSN":["1544-3566","1544-3973"],"issn-type":[{"value":"1544-3566","type":"print"},{"value":"1544-3973","type":"electronic"}],"subject":[],"published":{"date-parts":[[2014,2]]},"assertion":[{"value":"2013-05-01","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2013-10-01","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2014-02-01","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}