accuracy aware
play

Accuracy-Aware Program Transformations Sasa Misailovic MIT CSAIL - PowerPoint PPT Presentation

Accuracy-Aware Program Transformations Sasa Misailovic MIT CSAIL Collaborators Martin Rinard , Michael Carbin, Stelios Sidiroglou, Henry Hoffmann, Deokhwan Kim, Daniel Roy, Zeyuan Allen Zhu, Michael Kling, Jonathan Kelner, Anant Agarwal


  1. Accuracy-Aware Program Transformations Sasa Misailovic MIT CSAIL

  2. Collaborators Martin Rinard , Michael Carbin, Stelios Sidiroglou, Henry Hoffmann, Deokhwan Kim, Daniel Roy, Zeyuan Allen Zhu, Michael Kling, Jonathan Kelner, Anant Agarwal

  3. Emerging Software and Hardware

  4. Emerging Software and Hardware Big Data; Approximate

  5. Emerging Software and Hardware Big Data; Approximate Energy Conscious

  6. Emerging Software and Hardware Automatically Transform Computations to Trade Accuracy for Performance and Energy Big Data; Approximate Energy Conscious

  7. Solving Problems with Transformations Program is Hand held needs Data center taking too to go longer needs to draw long to run between charges less power Automatically Transform Computations to Trade Accuracy for Performance and Energy Lose cores, Voltage drops, clock start missing ticks slower, start System gets deadlines missing deadlines loaded, start missing deadlines

  8. Consider This Transformation for (i = 0; i < n; i++) { … } for (i = 0; i < n; i += 2) { … }

  9. Loop Perforation for (i = 0; i < n; i++) { … } for (i = 0; i < n; i += 2) { … } Effects:  Should improve performance  Broadly applicable

  10. Loop Perforation for (i = 0; i < n; i++) { … } for (i = 0; i < n; i += 2) { … } Common Reaction: But it changes the program semantics! The result will be wrong ?!

  11. Loop Perforation for (i = 0; i < n; i++) { … } for (i = 0; i < n; i += 2) { … } Common Reaction: But it changes the program semantics! The result will be wrong ?! The result can be less accurate!

  12. Acceptability = Accuracy + Integrity

  13. Acceptability = Accuracy + Integrity Optimization problem: minimize execution time given constraints on accuracy and integrity of the computation

  14. Optimization Inputs Input & Original Program Accuracy Program Transformation Specification for (i = 0; i < n; i++) { … } for (i = 0; i < n; i += 2) { … }

  15. for (i = 0; i < n; i++) { … } for (i = 0; i < n; i += 2) { … } Optimization Framework • Find Candidates for Transformation • Analyze Effects of the Transformations • Navigate Tradeoff Space c c c

  16. for (i = 0; i < n; i++) { … } for (i = 0; i < n; i += 2) { … } Time Error c c c

  17. for (i = 0; i < n; i++) { … } for (i = 0; i < n; i += 2) { … } Time Error c c c

  18. Time Error

  19. Time Error

  20. Time Property: the result of the optimized program is within the specified error bound Query: Return the program that executes in minimal time Error

  21. Explicit Search Algorithm for Perforation Find Transformation Candidates: • Profile program to find time-consuming for loops Analyze the Effects of Perforation: • Integrity: memory safety, well formed output • Performance: Compare execution times • Accuracy: Compare the quality of the results Navigate Tradeoff Space: • Combine multiple perforatable loops Prioritize loops by their individual performance and accuracy Greedy or Exhaustive Search with Pruning

  22. Accuracy Analysis of Computation Original Output Abstraction Program (Application-Specific) Input Output δ < Bound Difference c Transformed Program

  23. Analysis for Individual Loop Perforation 1. Perforate one time-consuming loop at a time 2. Execute perforated program 3. Filter out critical loops : a) Program crashes b) Accuracy loss > δ max c) Execution slows down d) Latent memory errors (Valgrind) 4. Repeat 1-3 for all loops, inputs, perforation rates

  24. From [ICSE 2010] Individual Loop Perforation Results 40 35 30 25 # loops Perforatable 20 Latent Errors 15 Bad Speedup 10 Bad Accuracy 5 Crash 0

  25. From [ICSE 2010] Individual Loop Perforation Results 40 35 30 25 # loops Perforatable 20 Latent Errors 15 Bad Speedup 10 Bad Accuracy 5 Crash 0

  26. From [ICSE 2010] Individual Loop Perforation Results 40 35 30 25 # loops Perforatable 20 Latent Errors 15 Bad Speedup 10 Bad Accuracy 5 Crash 0

  27. From [ICSE 2010] Individual Loop Perforation Results 40 35 30 25 # loops Perforatable 20 Latent Errors 15 Bad Speedup 10 Bad Accuracy 5 Crash 0

  28. From [ICSE 2010] Individual Loop Perforation Results 40 35 30 25 # loops Perforatable 20 Latent Errors 15 Bad Speedup 10 Bad Accuracy 5 Crash 0

  29. From [ICSE 2010] Individual Loop Perforation Results 40 35 30 25 # loops Perforatable 20 Latent Errors 15 Bad Speedup 10 Bad Accuracy 5 Crash 0

  30. Percentage of Work Done in Perforatable Loops 120 100 80 % instructions 60 40 20 0

  31. Performance Increase of the T op Perforatable Loop (Relative Error < 0.1) 2.2 2 1.8 Speedup 1.6 1.4 1.2 1

  32. Result Interpretation Manual inspection of perforatable computations: x264: motion estimation bodytrack: MCMC swaptions: Monte Carlo simulation ferret: similarity hashing blackscholes: redundant computation canneal: simulated annealing streamcluster: cluster center search Common: Approximate/heuristic computations

  33. From [FSE 2011] x264 Cumulative Loop Scores Mean Normalized Time Accuracy loss

  34. From [FSE 2011] x264 Cumulative Loop Scores Mean Normalized Time Accuracy loss

  35. Status Good: Profitable accuracy/performance tradeoffs Matches the approximate computations But: No guarantees on accuracy No guarantees on safety How to improve it? How often large errors happen? What safety guarantees can we provide?

  36. Reasoning About Transformed Programs Accuracy Probabilistic Reasoning [SAS ’11, POPL ‘12] (with Z. Zhu, J. Kelner, D. Roy, M. Rinard) Integrity Relational Logic Reasoning [PLDI ‘12, PEPM ‘13] (with M. Carbin, D. Kim, M. Rinard)

  37. From [POPL ‘12] … … … … … • Nodes represent computation • Edges represent flow of data

  38. … … … … … • Functions – process individual data • Reduction nodes – aggregate data

  39. … … … … avg avg avg avg … min • Functions – process individual data • Reduction nodes – aggregate data

  40. … … … … avg avg avg avg f 1 f 2 f 3 … min Function substitution • Multiple implementations • Each has expected error/time (𝐹, 𝑈)

  41. … … … … avg avg avg avg … min Function substitution • Multiple implementations • Each has expected error/time (𝐹, 𝑈)

  42. [a,b] [c,d] … [a,b] [c,d] … [a,b] [c,d] … [a,b] [c,d] … … … … avg avg avg avg … min Function substitution • Inputs of functions have specified ranges • Each function has Lipschitz property

  43. … … … … avg avg avg avg … min Sampling inputs of reduction nodes • Reductions consume fewer inputs

  44. … … … … avg avg … min Sampling inputs of reduction nodes • Reductions consume fewer inputs

  45. Search for Optimized Programs Property: With high probability Time the result of the optimized program is within the specified error bound Error

  46. Search for Optimized Programs Property: With high probability Time the result of the optimized program is within the specified error bound 𝐒𝐟𝐭 − 𝐒𝐟𝐭 ′ < 𝐂 𝐐𝐬 > 𝟐 − 𝛆 Error

  47. Search for Optimized Programs Property: Time 𝐒𝐟𝐭 − 𝐒𝐟𝐭 ′ < 𝐂 𝐐𝐬 > 𝟐 − 𝛆 Query: Generate randomized program that executes in minimal time Error

  48. From [POPL ‘12] Constraint Based Search Algorithm Find Transformation Candidates: • User provides function implementations and specs Analyze Transformed Computations: • Construct analytic expressions for (1) performance and (2) error emergence and propagation • Variables: probabilities of executing alternate versions Navigate Tradeoff Space: • Construct mathematical optimization problem: Using expressions for performance and error • Non-linear Non-convex tradeoff space: 1 + 𝜁 -approximation of globally optimal tradeoff curve

  49. Tradeoff Curve Construction Algorithm Divide and conquer • For each subcomputation m m avg construct tradeoff curve avg • Dynamic programming n n Properties • Polynomial time 1 + 𝜁 -approximation of • n true tradeoff curve min 1

  50. Tradeoff Curve Construction Algorithm Divide and conquer • For each subcomputation m m avg construct tradeoff curve avg • Dynamic programming n n Properties • Polynomial time 1 + 𝜁 -approximation of • n true tradeoff curve min 1

  51. Tradeoff Curve Construction Algorithm Divide and conquer • For each subcomputation m avg construct tradeoff curve • Dynamic programming n n Properties • Polynomial time 1 + 𝜁 -approximation of • n true tradeoff curve min 1

  52. Tradeoff Curve Construction Algorithm Divide and conquer • For each subcomputation construct tradeoff curve • Dynamic programming n n Properties • Polynomial time 1 + 𝜁 -approximation of • n true tradeoff curve min 1

  53. Tradeoff Curve Construction Algorithm Divide and conquer • For each subcomputation construct tradeoff curve • Dynamic programming Properties • Polynomial time 1 + 𝜁 -approximation of • n true tradeoff curve min 1

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend