List of Figures

| Table of Contents | List of Figures | List of Tables |

Figure 1-1. Policy Module
Figure 1-2. Scenario after Attaching Section of Address Space to Policy Module
Figure 1-3. Basic Scenario
Figure 1-4. Memory Access Reference Patterns
Figure 1-5. An Application Badly Mapped to Hardware
Figure 1-6. Chaotic Mapping to Hardware
Figure 1-7. Desired Placement, Physical View
Figure 1-8. Memory Locality Domains
Figure 1-9. Desired Placement Based on MLDs
Figure 1-10. Placement Hints Specifying a Topology
Figure 1-11. Memory Locality Domain Sets
Figure 1-12. MLDSET Placement
Figure 1-13. Policy Module, Memory Locality Domains, and Memory Locality Domain Sets
Figure 1-14. Processes Linked to MLDs