Concurrent kernel execution and interference analysis on GPUs using deep learning approaches

Mohammed Ayub, Tarek Helmy*

*Corresponding author for this work

Research output: Contribution to journalArticlepeer-review

1 Scopus citations


Graphic processing units (GPUs) are becoming gradually popular in large-scale data centers and cloud computing. Sharing a GPU across different applications is an important feature in these platforms to improve resource utilization and system productivity. However, in situations where GPUs are competitively shared, some challenges arise. In this paper, concurrent kernel execution and interference detection are investigated using Extreme Gradient Boosting, Convolutional Neural Network, Gated Recurrent Unit, and Conditional Generative Adversarial Network learning techniques on Tesla P100 and RTX-2080 GPU architectures. The experimental results obtained by applying the deep learning models on the dataset, which consists of four GPU resources: blocks per grid, threads per block, number of registers, and shared memory, show that the Extreme Gradient Boosting and Multi-Channel Convolutional Neural Network models have the promising capability of concurrent kernel execution classification and interference detection. In comparison to the existing work, the proposed models investigated using real and synthesized datasets show clear outperformance and generalization capability in terms of recall and precision.

Original languageEnglish
Pages (from-to)10193-10204
Number of pages12
JournalJournal of King Saud University - Computer and Information Sciences
Issue number10
StatePublished - Nov 2022

Bibliographical note

Publisher Copyright:
© 2022 The Authors


  • Concurrent kernel execution
  • Datasets
  • Deep learning
  • Interference analysis in GPUs
  • Performance evaluation

ASJC Scopus subject areas

  • General Computer Science


Dive into the research topics of 'Concurrent kernel execution and interference analysis on GPUs using deep learning approaches'. Together they form a unique fingerprint.

Cite this