List of Figures
| Table of Contents | List of Figures | List of Tables |
- Figure 1-1. Policy Module
- Figure 1-2. Scenario after Attaching Section of Address Space to Policy Module
- Figure 1-3. Basic Scenario
- Figure 1-4. Memory Access Reference Patterns
- Figure 1-5. An Application Badly Mapped to Hardware
- Figure 1-6. Chaotic Mapping to Hardware
- Figure 1-7. Desired Placement, Physical View
- Figure 1-8. Memory Locality Domains
- Figure 1-9. Desired Placement Based on MLDs
- Figure 1-10. Placement Hints Specifying a Topology
- Figure 1-11. Memory Locality Domain Sets
- Figure 1-12. MLDSET Placement
- Figure 1-13. Policy Module, Memory Locality Domains, and Memory Locality Domain
Sets
- Figure 1-14. Processes Linked to MLDs