{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,28]],"date-time":"2025-09-28T15:25:44Z","timestamp":1759073144345,"version":"3.38.0"},"reference-count":38,"publisher":"SAGE Publications","issue":"2","license":[{"start":{"date-parts":[[2015,2,9]],"date-time":"2015-02-09T00:00:00Z","timestamp":1423440000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/journals.sagepub.com\/page\/policies\/text-and-data-mining-license"}],"content-domain":{"domain":["journals.sagepub.com"],"crossmark-restriction":true},"short-container-title":["The International Journal of High Performance Computing Applications"],"published-print":{"date-parts":[[2015,5]]},"abstract":"<jats:p> One of the emerging challenges to designing HPC systems is understanding and projecting the requirements of exascale applications. In order to determine the performance consequences of different hardware designs, analytic models are essential because they can provide fast feedback to the co-design centers and chip designers without costly simulations. However, current attempts to analytically model program performance typically rely on the user manually specifying a performance model. We introduce the ExaSAT framework that automates the extraction of parameterized performance models directly from source code using compiler analysis. The parameterized analytic model enables quantitative evaluation of a broad range of hardware design trade-offs and software optimizations on a variety of different performance metrics, with a primary focus on data movement as a metric. We demonstrate the ExaSAT framework\u2019s ability to perform deep code analysis of a proxy application from the Department of Energy Combustion Co-design Center to illustrate its value to the exascale co-design process. ExaSAT analysis provides insights into the hardware and software trade-offs and lays the groundwork for exploring a more targeted set of design points using cycle-accurate architectural simulators. <\/jats:p>","DOI":"10.1177\/1094342014568690","type":"journal-article","created":{"date-parts":[[2015,2,10]],"date-time":"2015-02-10T02:43:36Z","timestamp":1423536216000},"page":"209-232","update-policy":"https:\/\/doi.org\/10.1177\/sage-journals-update-policy","source":"Crossref","is-referenced-by-count":28,"title":["ExaSAT: An exascale co-design tool for performance modeling"],"prefix":"10.1177","volume":"29","author":[{"given":"Didem","family":"Unat","sequence":"first","affiliation":[{"name":"Computational Research Division, Lawrence Berkeley National Laboratory, USA"}]},{"given":"Cy","family":"Chan","sequence":"additional","affiliation":[{"name":"Computational Research Division, Lawrence Berkeley National Laboratory, USA"}]},{"given":"Weiqun","family":"Zhang","sequence":"additional","affiliation":[{"name":"Computational Research Division, Lawrence Berkeley National Laboratory, USA"}]},{"given":"Samuel","family":"Williams","sequence":"additional","affiliation":[{"name":"Computational Research Division, Lawrence Berkeley National Laboratory, USA"}]},{"given":"John","family":"Bachan","sequence":"additional","affiliation":[{"name":"Computational Research Division, Lawrence Berkeley National Laboratory, USA"}]},{"given":"John","family":"Bell","sequence":"additional","affiliation":[{"name":"Computational Research Division, Lawrence Berkeley National Laboratory, USA"}]},{"given":"John","family":"Shalf","sequence":"additional","affiliation":[{"name":"Computational Research Division, Lawrence Berkeley National Laboratory, USA"}]}],"member":"179","published-online":{"date-parts":[[2015,2,9]]},"reference":[{"key":"bibr1-1094342014568690","doi-asserted-by":"publisher","DOI":"10.1109\/Co-HPC.2014.4"},{"key":"bibr2-1094342014568690","doi-asserted-by":"publisher","DOI":"10.1109\/ISPASS.2013.6557153"},{"key":"bibr3-1094342014568690","doi-asserted-by":"publisher","DOI":"10.1145\/2024716.2024718"},{"key":"bibr4-1094342014568690","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-44863-2_91"},{"key":"bibr5-1094342014568690","doi-asserted-by":"publisher","DOI":"10.1109\/SC.2010.56"},{"key":"bibr6-1094342014568690","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-38750-0_15"},{"key":"bibr7-1094342014568690","unstructured":"Chen C, Chame J, Hall M (2008) CHiLL: A framework for composing high-level loop transformations. Technical report 08-897, University of Southern California, USA."},{"key":"bibr8-1094342014568690","doi-asserted-by":"publisher","DOI":"10.1088\/1749-4699\/2\/1\/015001"},{"key":"bibr9-1094342014568690","doi-asserted-by":"publisher","DOI":"10.1088\/1364-7830\/4\/4\/309"},{"key":"bibr10-1094342014568690","doi-asserted-by":"publisher","DOI":"10.1080\/13647830.2014.919410"},{"key":"bibr11-1094342014568690","doi-asserted-by":"publisher","DOI":"10.1006\/jcph.1995.1151"},{"key":"bibr12-1094342014568690","doi-asserted-by":"publisher","DOI":"10.1090\/S0025-5718-98-00913-2"},{"key":"bibr13-1094342014568690","doi-asserted-by":"publisher","DOI":"10.1109\/MSST.2012.6232389"},{"key":"bibr14-1094342014568690","doi-asserted-by":"publisher","DOI":"10.1137\/080740829"},{"key":"bibr15-1094342014568690","unstructured":"Kogge P, Bergman K, Borkar S, Campbell D, Carlson W, Dally W, et al. (2008) ExaScale computing study: Technology challenges in achieving exascale systems. Technical report, DARPA, Arlington, USA."},{"key":"bibr16-1094342014568690","doi-asserted-by":"publisher","DOI":"10.1109\/FPL.2007.4380625"},{"key":"bibr17-1094342014568690","doi-asserted-by":"publisher","DOI":"10.1145\/1555815.1555758"},{"key":"bibr18-1094342014568690","doi-asserted-by":"publisher","DOI":"10.1109\/IPDPS.2012.89"},{"key":"bibr19-1094342014568690","doi-asserted-by":"publisher","DOI":"10.1145\/1065010.1065034"},{"key":"bibr20-1094342014568690","doi-asserted-by":"publisher","DOI":"10.1145\/1654059.1654072"},{"key":"bibr21-1094342014568690","doi-asserted-by":"publisher","DOI":"10.1109\/ICPPW.2010.37"},{"key":"bibr22-1094342014568690","doi-asserted-by":"publisher","DOI":"10.1137\/S1064827503425298"},{"key":"bibr23-1094342014568690","doi-asserted-by":"publisher","DOI":"10.1109\/IPDPS.2002.1016490"},{"key":"bibr24-1094342014568690","doi-asserted-by":"publisher","DOI":"10.1145\/1555815.1555760"},{"key":"bibr25-1094342014568690","doi-asserted-by":"publisher","DOI":"10.1109\/SC.2000.10015"},{"key":"bibr26-1094342014568690","doi-asserted-by":"publisher","DOI":"10.1145\/1964218.1964225"},{"key":"bibr27-1094342014568690","doi-asserted-by":"publisher","DOI":"10.1145\/232973.232984"},{"key":"bibr28-1094342014568690","first-page":"1","volume-title":"High Performance Computing for Computational Science \u2013 VECPAR","volume":"6449","author":"Shalf J","year":"2010"},{"key":"bibr29-1094342014568690","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2011.300"},{"key":"bibr30-1094342014568690","doi-asserted-by":"publisher","DOI":"10.1109\/SC.2002.10004"},{"key":"bibr31-1094342014568690","doi-asserted-by":"publisher","DOI":"10.1109\/SC.2012.20"},{"key":"bibr32-1094342014568690","unstructured":"Thoziyoor S, Muralimanohar N, Ahn JH, Jouppi NP (2008) CACTI 5.1. Technical report no. HPL-2008-20, HP Labs."},{"volume-title":"Workshop on programming abstractions for data locality (PADAL\u201814)","year":"2014","author":"Unat D","key":"bibr33-1094342014568690"},{"key":"bibr34-1094342014568690","doi-asserted-by":"publisher","DOI":"10.1109\/HPCA.2002.995708"},{"volume-title":"Arithmetics on Intel\u2019s Sandy Bridge and Westmere CPUs: not all FLOPS are created equal","year":"2012","author":"Vladimirov A","key":"bibr35-1094342014568690"},{"key":"bibr36-1094342014568690","doi-asserted-by":"publisher","DOI":"10.1109\/MM.2007.39"},{"key":"bibr37-1094342014568690","doi-asserted-by":"publisher","DOI":"10.1145\/1498765.1498785"},{"key":"bibr38-1094342014568690","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2010.04.230"}],"container-title":["The International Journal of High Performance Computing Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/journals.sagepub.com\/doi\/pdf\/10.1177\/1094342014568690","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/journals.sagepub.com\/doi\/full-xml\/10.1177\/1094342014568690","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/journals.sagepub.com\/doi\/pdf\/10.1177\/1094342014568690","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,1]],"date-time":"2025-03-01T13:47:41Z","timestamp":1740836861000},"score":1,"resource":{"primary":{"URL":"https:\/\/journals.sagepub.com\/doi\/10.1177\/1094342014568690"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,2,9]]},"references-count":38,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2015,5]]}},"alternative-id":["10.1177\/1094342014568690"],"URL":"https:\/\/doi.org\/10.1177\/1094342014568690","relation":{},"ISSN":["1094-3420","1741-2846"],"issn-type":[{"type":"print","value":"1094-3420"},{"type":"electronic","value":"1741-2846"}],"subject":[],"published":{"date-parts":[[2015,2,9]]}}}