{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:08:31Z","timestamp":1750306111264,"version":"3.41.0"},"reference-count":60,"publisher":"Association for Computing Machinery (ACM)","issue":"4","license":[{"start":{"date-parts":[[2016,12,12]],"date-time":"2016-12-12T00:00:00Z","timestamp":1481500800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"National Science Foundation, under CAREER","award":["CNS-0953268, CCF-1619140, CCF-1617954, and CNS-1464288"],"award-info":[{"award-number":["CNS-0953268, CCF-1619140, CCF-1617954, and CNS-1464288"]}]},{"name":"2016 Intel SSG award"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Trans. Archit. Code Optim."],"published-print":{"date-parts":[[2016,12,28]]},"abstract":"<jats:p>\n            Many performance optimizations rely on or are enhanced by runtime profile information. However, both offline and online profiling techniques suffer from intrinsic and practical limitations that affect the quality of delivered profile data. The\n            <jats:italic>quality<\/jats:italic>\n            of profile data is its ability to accurately predict (relevant aspects of) future program behavior. While these limitations are known, their impact on the effectiveness of profile-guided optimizations, compared to the ideal performance, is not as well understood. We define\n            <jats:italic>ideal<\/jats:italic>\n            performance for adaptive optimizations as that achieved with a precise profile of\n            <jats:italic>future<\/jats:italic>\n            program behavior.\n          <\/jats:p>\n          <jats:p>\n            In this work, we study and quantify the performance impact of fundamental profiling limitations by comparing the effectiveness of typical adaptive optimizations when using the best profiles generated by offline and online schemes against a\n            <jats:italic>baseline<\/jats:italic>\n            where the adaptive optimization is given access to profile information about the future execution of the program. We model and compare the behavior of three adaptive JVM optimizations\u2014heap memory management using object usage profiles, code cache management using method usage profiles, and selective just-in-time compilation using method hotness profiles\u2014for the Java DaCapo benchmarks. Our results provide insight into the advantages and drawbacks of current profiling strategies and shed light on directions for future profiling research.\n          <\/jats:p>","DOI":"10.1145\/3008661","type":"journal-article","created":{"date-parts":[[2016,12,13]],"date-time":"2016-12-13T14:34:05Z","timestamp":1481639645000},"page":"1-26","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["Impact of Intrinsic Profiling Limitations on Effectiveness of Adaptive Optimizations"],"prefix":"10.1145","volume":"13","author":[{"given":"Michael R.","family":"Jantz","sequence":"first","affiliation":[{"name":"University of Tennessee, Knoxville, TN"}]},{"given":"Forrest J.","family":"Robinson","sequence":"additional","affiliation":[{"name":"University of Kansas, Lawrence, KS"}]},{"given":"Prasad A.","family":"Kulkarni","sequence":"additional","affiliation":[{"name":"University of Kansas, Lawrence, KS"}]}],"member":"320","published-online":{"date-parts":[[2016,12,12]]},"reference":[{"key":"e_1_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/2775054.2694381"},{"key":"e_1_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/265924.265925"},{"key":"e_1_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/354222.353175"},{"volume-title":"Proceedings of the 3rd ACM Workshop on Feedback Directed and Dynamic Optimization (FDDO\u201900)","author":"Arnold Matthew","key":"e_1_2_1_4_1","unstructured":"Matthew Arnold , Stephen Fink , David Grove , Michael Hind , and Peter F. Sweeney . 2000b. Adaptive optimization in the Jalapeno JVM: The controller\u2019s analytical model . In Proceedings of the 3rd ACM Workshop on Feedback Directed and Dynamic Optimization (FDDO\u201900) . Matthew Arnold, Stephen Fink, David Grove, Michael Hind, and Peter F. Sweeney. 2000b. Adaptive optimization in the Jalapeno JVM: The controller\u2019s analytical model. In Proceedings of the 3rd ACM Workshop on Feedback Directed and Dynamic Optimization (FDDO\u201900)."},{"key":"e_1_2_1_5_1","first-page":"2","article-title":"A survey of adaptive optimization in virtual machines","volume":"92","author":"Arnold Matthew","year":"2005","unstructured":"Matthew Arnold , Stephen Fink , David Grove , Michael Hind , and Peter F. Sweeney . 2005 . A survey of adaptive optimization in virtual machines . Proc. IEEE 92 , 2 (Feb. 2005), 449--466. Matthew Arnold, Stephen Fink, David Grove, Michael Hind, and Peter F. Sweeney. 2005. A survey of adaptive optimization in virtual machines. Proc. IEEE 92, 2 (Feb. 2005), 449--466.","journal-title":"Proc. IEEE"},{"key":"e_1_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/CGO.2005.9"},{"key":"e_1_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/583854.582432"},{"key":"e_1_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/378795.378832"},{"key":"e_1_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1002\/spe.v36:6"},{"key":"e_1_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/1167473.1167488"},{"key":"e_1_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/2555670.2466482"},{"key":"e_1_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/291006.291036"},{"key":"e_1_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/2656075.2656078"},{"key":"e_1_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1002\/spe.4380211204"},{"key":"e_1_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/MICRO.2014.20"},{"key":"e_1_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/1133981.1134011"},{"key":"e_1_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/1998582.1998590"},{"key":"e_1_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/2541940.2541945"},{"key":"e_1_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/356989.357008"},{"key":"e_1_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.5555\/942806.943853"},{"key":"e_1_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/1297027.1297033"},{"key":"e_1_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/1241601.1241624"},{"key":"e_1_2_1_24_1","volume-title":"2015 USENIX Annual Technical Conference (USENIX ATC\u201915)","author":"Guo Rentong","year":"2015","unstructured":"Rentong Guo , Xiaofei Liao , Hai Jin , Jianhui Yue , and Guang Tan . 2015 . NightWatch: Integrating lightweight and transparent cache pollution control into dynamic memory allocation systems . In 2015 USENIX Annual Technical Conference (USENIX ATC\u201915) . USENIX, 307--318. Rentong Guo, Xiaofei Liao, Hai Jin, Jianhui Yue, and Guang Tan. 2015. NightWatch: Integrating lightweight and transparent cache pollution control into dynamic memory allocation systems. In 2015 USENIX Annual Technical Conference (USENIX ATC\u201915). USENIX, 307--318."},{"volume-title":"The Datacenter as a Computer: An Introduction to the Design of Warehouse-Scale Machines","author":"Hoelzle Urs","key":"e_1_2_1_25_1","unstructured":"Urs Hoelzle and Luiz Andre Barroso . 2009. The Datacenter as a Computer: An Introduction to the Design of Warehouse-Scale Machines . Morgan and Claypool Publishers . Urs Hoelzle and Luiz Andre Barroso. 2009. The Datacenter as a Computer: An Introduction to the Design of Warehouse-Scale Machines. Morgan and Claypool Publishers."},{"key":"e_1_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/2568088.2576759"},{"key":"e_1_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/233561.233562"},{"key":"e_1_2_1_28_1","volume-title":"Proceedings of the 6th Annual Workshop on Interaction Between Compilers and Computer Architectures (INTERACT\u201902)","author":"Hsu Wei Chung","year":"2002","unstructured":"Wei Chung Hsu , Howard Chen , Pen Chung Yew , and Dong-Yuan Chen . 2002 . On the predictability of program behavior using different input data sets . In Proceedings of the 6th Annual Workshop on Interaction Between Compilers and Computer Architectures (INTERACT\u201902) . IEEE, 45--53. Wei Chung Hsu, Howard Chen, Pen Chung Yew, and Dong-Yuan Chen. 2002. On the predictability of program behavior using different input data sets. In Proceedings of the 6th Annual Workshop on Interaction Between Compilers and Computer Architectures (INTERACT\u201902). IEEE, 45--53."},{"key":"e_1_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/1028976.1028983"},{"key":"e_1_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1007\/BF01205185"},{"key":"e_1_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/1640089.1640100"},{"key":"e_1_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/2541228.2541229"},{"key":"e_1_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/2814270.2814322"},{"key":"e_1_2_1_34_1","unstructured":"JEDEC. 2009. DDR3 SDRAM Standard. Retrieved from http:\/\/www.jedec.org\/standards-documents\/docs\/jesd-79-3d.  JEDEC. 2009. DDR3 SDRAM Standard. Retrieved from http:\/\/www.jedec.org\/standards-documents\/docs\/jesd-79-3d."},{"key":"e_1_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/1772954.1772989"},{"key":"e_1_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/1369396.1370017"},{"key":"e_1_2_1_37_1","first-page":"8","article-title":"Reducing the overhead of dynamic compilation. Software","volume":"31","author":"Krintz Chandra","year":"2000","unstructured":"Chandra Krintz , David Grove , Vivek Sarkar , and Brad Calder . 2000 . Reducing the overhead of dynamic compilation. Software : Pract. Exper. 31 , 8 (Dec. 2000), 717--738. Chandra Krintz, David Grove, Vivek Sarkar, and Brad Calder. 2000. Reducing the overhead of dynamic compilation. Software: Pract. Exper. 31, 8 (Dec. 2000), 717--738.","journal-title":"Pract. Exper."},{"key":"e_1_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/2048066.2048126"},{"key":"e_1_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2003.1250880"},{"key":"e_1_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/1555754.1555789"},{"key":"e_1_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.5555\/2337159.2337164"},{"key":"e_1_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1109\/CGO.2009.10"},{"volume-title":"2015 IEEE 21st International Symposium on High Performance Computer Architecture (HPCA\u201915)","author":"Meswani Mitesh R.","key":"e_1_2_1_43_1","unstructured":"Mitesh R. Meswani , Sergey Blagodurov , David Roberts , John Slice , Mike Ignatowski , and Gabriel H. Loh . 2015. Heterogeneous memory architectures: A HW\/SW approach for mixing die-stacked and off-package memories . In 2015 IEEE 21st International Symposium on High Performance Computer Architecture (HPCA\u201915) . 126--136. Mitesh R. Meswani, Sergey Blagodurov, David Roberts, John Slice, Mike Ignatowski, and Gabriel H. Loh. 2015. Heterogeneous memory architectures: A HW\/SW approach for mixing die-stacked and off-package memories. In 2015 IEEE 21st International Symposium on High Performance Computer Architecture (HPCA\u201915). 126--136."},{"key":"e_1_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/360128.360158"},{"key":"e_1_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1109\/CGO.2007.35"},{"key":"e_1_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/1806596.1806618"},{"key":"e_1_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1145\/1735997.1736016"},{"key":"e_1_2_1_48_1","unstructured":"Oracle. 2014. Java Virtual Machine Tool Interface (JVM TI). Retrieved from http:\/\/docs.oracle.com\/javase\/6\/docs\/technotes\/guides\/jvmti\/.  Oracle. 2014. Java Virtual Machine Tool Interface (JVM TI). Retrieved from http:\/\/docs.oracle.com\/javase\/6\/docs\/technotes\/guides\/jvmti\/."},{"key":"e_1_2_1_49_1","volume-title":"Proceedings of the 2001 Symposium on JavaTM Virtual Machine Research and Technology Symposium (JVM\u201901)","author":"Paleczny Michael","year":"2001","unstructured":"Michael Paleczny , Christopher Vick , and Cliff Click . 2001 . The Java HotSpot\u2122 server compiler . In Proceedings of the 2001 Symposium on JavaTM Virtual Machine Research and Technology Symposium (JVM\u201901) . USENIX, 1--12. Michael Paleczny, Christopher Vick, and Cliff Click. 2001. The Java HotSpot\u2122 server compiler. In Proceedings of the 2001 Symposium on JavaTM Virtual Machine Research and Technology Symposium (JVM\u201901). USENIX, 1--12."},{"key":"e_1_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1145\/93542.93550"},{"key":"e_1_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1145\/2907950.2907958"},{"key":"e_1_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1145\/503272.503287"},{"key":"e_1_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1145\/2254064.2254067"},{"key":"e_1_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10766-012-0236-3"},{"key":"e_1_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1145\/1735970.1736045"},{"key":"e_1_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1145\/1869459.1869471"},{"key":"e_1_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1109\/CGO.2007.37"},{"key":"e_1_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.1145\/337449.337483"},{"key":"e_1_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.1145\/2384616.2384678"},{"key":"e_1_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.1145\/2749469.2750401"},{"key":"e_1_2_1_61_1","doi-asserted-by":"publisher","DOI":"10.1145\/1356058.1356083"}],"container-title":["ACM Transactions on Architecture and Code Optimization"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3008661","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3008661","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T03:36:21Z","timestamp":1750217781000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3008661"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,12,12]]},"references-count":60,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2016,12,28]]}},"alternative-id":["10.1145\/3008661"],"URL":"https:\/\/doi.org\/10.1145\/3008661","relation":{},"ISSN":["1544-3566","1544-3973"],"issn-type":[{"type":"print","value":"1544-3566"},{"type":"electronic","value":"1544-3973"}],"subject":[],"published":{"date-parts":[[2016,12,12]]},"assertion":[{"value":"2016-04-01","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2016-10-01","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2016-12-12","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}