skip to main content
10.1145/3489517.3530469acmconferencesArticle/Chapter ViewAbstractPublication PagesdacConference Proceedingsconference-collections
research-article

SS-LRU: a smart segmented LRU caching

Published: 23 August 2022 Publication History

Abstract

Many caching policies use machine learning to predict data reuse, but they ignore the impact of incorrect prediction on cache performance, especially for large-size objects. In this paper, we propose a smart segmented LRU (SS-LRU) replacement policy, which adopts a size-aware classifier designed for cache scenarios and considers the cache cost caused by misprediction. Besides, SS-LRU enhances the migration rules of segmented LRU (SLRU) and implements a smart caching with unequal priorities and segment sizes based on prediction and multiple access patterns. We conducted Extensive experiments under the real-world workloads to demonstrate the superiority of our approach over state-of-the-art caching policies.

References

[1]
Wang Y, Yang Y, Han C, et al. LR-LRU: A PACS-Oriented Intelligent Cache Replacement Policy. IEEE Access, 7:58073--58084, 2019.
[2]
Ke Zhou and Si Sun et al. Improving Cache Performance for Large-Scale Photo Stores via Heuristic Prefetching Scheme. IEEE Transactions on Parallel and Distributed Systems, 30(9):2033--2045, 2019.
[3]
Hua Wang and Jiawei Zhang et al. Cache What You Need to Cache: Reducing Write Traffic in Cloud Cache via "One-Time-Access-Exclusion" Policy. ACM Transactions on Storage, 16(3):1--24, 2020.
[4]
Ramakrishna Karedla and J. Spencer Love et al. Caching Strategies to Improve Disk System Performance. Computer, 27(3):38--46, 1994.
[5]
Nimrod Megiddo and Dharmendra S. Modha. ARC: A Self-tuning, Low Overhead Replacement Cache. In Proceedings of the 2Nd USENIX Conference on File and Storage Technologies (FAST'03). USENIX Association, 115--130, 2003.
[6]
Chao Wang. Web cache intelligent replacement strategy combined with GDSF and SVM network re-accessed probability prediction. Journal of Ambient Intelligence & Humanized Computing, 11(2):581--587, 2020.
[7]
Kuttuva Rajendran Baskaran and Kalaiarasan Chellan. Improved Performance by Combining Web Pre-Fetching Using Clustering with Web Caching Based on SVM Learning Method. International Journal of Computers Communications & Control, 11(2):67, 2016.
[8]
Phet Aimtongkham and Chakchai So-In et al. A novel web caching scheme using hybrid least frequently used and support vector machine. In 13th International Joint Conference on Computer Science and Software Engineering. IEEE, 2016.
[9]
Ke Zhou and Yu Zhang et al. LEA: A Lazy Eviction Algorithm for SSD Cache in Cloud Block Storage. In 36th IEEE International Conference on Computer Design, pages 569--572. IEEE Computer Society, 2018.
[10]
Vietri G, Rodriguez L V, Martinez W A, et al (2018). Driving cache replacement with ML-based LeCaR. HotStorage'18: the 10th USENIX Conference on Hot Topics in Storage and File Systems.
[11]
Keramidas G., Petoumenos P., Kaxiras S. (2007). Cache replacement based on reuse-distance prediction. International Conference on Computer Design. IEEE, 245--250.
[12]
Ke Zhou and Si Sun et al. Demystifying Cache Policies for Photo Stores at Scale: A Tencent Case Study. In Proceedings of the 32nd International Conference on Supercomputing, pages 284--295. ACM, 2018.
[13]
P. Cao, S. Irani. Cost-aware www proxy caching algorithms. In: Proceedings of the USENIX Symposium on Internet Technologies and Systems, USENIX, 1997(12):193--206
[14]
Qi Huang and Ken Birman et al. An analysis of Facebook photo caching. In ACM SIGOPS 24th Symposium on Operating Systems Principles, pages 167--181. ACM, 2013.
[15]
Ethem Alpaydin. 2014. Introduction to Machine Learning. MIT Press, Cambridge, MA.
[16]
Belady and A. L. A study of replacement algorithms for a virtual-storagecomputer.Imb Syst J, 5(2):78--101, 1966.

Cited By

View all
  • (2024)Sparsified federated learning with differential privacy for intrusion detection in VANETs based on Fisher Information MatrixPLOS ONE10.1371/journal.pone.030189719:4(e0301897)Online publication date: 17-Apr-2024
  • (2024)AI-Enhanced Cloud-Edge-Terminal Collaborative Network: Survey, Applications, and Future DirectionsIEEE Communications Surveys & Tutorials10.1109/COMST.2023.333815326:2(1322-1385)Online publication date: Oct-2025
  • (2024)Private and utility enhanced intrusion detection based on attack behavior analysis with local differential privacy on IoVComputer Networks10.1016/j.comnet.2024.110560250(110560)Online publication date: Aug-2024
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
DAC '22: Proceedings of the 59th ACM/IEEE Design Automation Conference
July 2022
1462 pages
ISBN:9781450391429
DOI:10.1145/3489517
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 23 August 2022

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. cache replacement
  2. cost-sensitive
  3. machine learning
  4. smart

Qualifiers

  • Research-article

Conference

DAC '22
Sponsor:
DAC '22: 59th ACM/IEEE Design Automation Conference
July 10 - 14, 2022
California, San Francisco

Acceptance Rates

Overall Acceptance Rate 1,770 of 5,499 submissions, 32%

Upcoming Conference

DAC '25
62nd ACM/IEEE Design Automation Conference
June 22 - 26, 2025
San Francisco , CA , USA

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)77
  • Downloads (Last 6 weeks)9
Reflects downloads up to 05 Mar 2025

Other Metrics

Citations

Cited By

View all
  • (2024)Sparsified federated learning with differential privacy for intrusion detection in VANETs based on Fisher Information MatrixPLOS ONE10.1371/journal.pone.030189719:4(e0301897)Online publication date: 17-Apr-2024
  • (2024)AI-Enhanced Cloud-Edge-Terminal Collaborative Network: Survey, Applications, and Future DirectionsIEEE Communications Surveys & Tutorials10.1109/COMST.2023.333815326:2(1322-1385)Online publication date: Oct-2025
  • (2024)Private and utility enhanced intrusion detection based on attack behavior analysis with local differential privacy on IoVComputer Networks10.1016/j.comnet.2024.110560250(110560)Online publication date: Aug-2024
  • (2023)Learning-based Data Separation for Write Amplification Reduction in Solid State Drives2023 60th ACM/IEEE Design Automation Conference (DAC)10.1109/DAC56929.2023.10247795(1-6)Online publication date: 9-Jul-2023

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media