{"id":184112,"date":"2005-05-11T00:00:00","date_gmt":"2009-10-31T13:23:21","guid":{"rendered":"https:\/\/www.microsoft.com\/en-us\/research\/msr-research-item\/instruction-based-prediction-techniques-in-operating-systems\/"},"modified":"2016-09-09T10:02:10","modified_gmt":"2016-09-09T17:02:10","slug":"instruction-based-prediction-techniques-in-operating-systems","status":"publish","type":"msr-video","link":"https:\/\/www.microsoft.com\/en-us\/research\/video\/instruction-based-prediction-techniques-in-operating-systems\/","title":{"rendered":"Instruction-based Prediction Techniques in Operating Systems"},"content":{"rendered":"<div class=\"asset-content\">\n<p>Program instructions uniquely identified by their program counters (PCs) provide a convenient and accurate means of recording the context of program execution and instruction-based prediction techniques have been widely used for performance optimizations at the architectural level. Operating systems, on the other hand, have not fully explored the benefits of instruction-based prediction for resource management. This research explores the potential benefits provided by instruction-based prediction in operating systems. In particular, we investigate the potential of using instruction-based prediction techniques for managing I\/O devices in operating systems.<\/p>\n<p>We first propose an instruction-based access pattern classification technique for buffer cache management. Our technique allows the operating system to correlate the I\/O operations with the program context in which they are issued via the program counters of the call instructions that trigger the I\/O requests. This correlation allows the operating system to classify I\/O access pattern on a per-call-site basis, which achieves significantly better accuracy than previous per-file or per-application classification techniques.<\/p>\n<p>We then propose an instruction-based technique for power management that dynamically learns the application I\/O access patterns and associated disk idle times to predict when an I\/O device can be shut down to save energy. The technique uses path-based correlation to observe a particular sequence of I\/O triggering instructions leading to each idle period, and accurately predicts future occurrences of that idle period.<\/p>\n<\/div>\n<p><!-- .asset-content --><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Program instructions uniquely identified by their program counters (PCs) provide a convenient and accurate means of recording the context of program execution and instruction-based prediction techniques have been widely used for performance optimizations at the architectural level. Operating systems, on the other hand, have not fully explored the benefits of instruction-based prediction for resource management. [&hellip;]<\/p>\n","protected":false},"featured_media":195325,"template":"","meta":{"msr-url-field":"","msr-podcast-episode":"","msrModifiedDate":"","msrModifiedDateEnabled":false,"ep_exclude_from_search":false,"_classifai_error":"","msr_hide_image_in_river":0,"footnotes":""},"research-area":[],"msr-video-type":[],"msr-locale":[268875],"msr-post-option":[],"msr-session-type":[],"msr-impact-theme":[],"msr-pillar":[],"msr-episode":[],"msr-research-theme":[],"class_list":["post-184112","msr-video","type-msr-video","status-publish","has-post-thumbnail","hentry","msr-locale-en_us"],"msr_download_urls":"","msr_external_url":"https:\/\/youtu.be\/ZYyldfFDKWo","msr_secondary_video_url":"","msr_video_file":"","_links":{"self":[{"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-video\/184112","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-video"}],"about":[{"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/types\/msr-video"}],"version-history":[{"count":0,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-video\/184112\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/media\/195325"}],"wp:attachment":[{"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/media?parent=184112"}],"wp:term":[{"taxonomy":"msr-research-area","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/research-area?post=184112"},{"taxonomy":"msr-video-type","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-video-type?post=184112"},{"taxonomy":"msr-locale","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-locale?post=184112"},{"taxonomy":"msr-post-option","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-post-option?post=184112"},{"taxonomy":"msr-session-type","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-session-type?post=184112"},{"taxonomy":"msr-impact-theme","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-impact-theme?post=184112"},{"taxonomy":"msr-pillar","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-pillar?post=184112"},{"taxonomy":"msr-episode","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-episode?post=184112"},{"taxonomy":"msr-research-theme","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-research-theme?post=184112"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}