Sciweavers

211 search results - page 9 / 43
» Implementing and Exploiting Inevitability in Software Transa...
Sort
View
77
Voted
ICPP
2008
IEEE
15 years 4 months ago
Scalable Techniques for Transparent Privatization in Software Transactional Memory
—We address the recently recognized privatization problem in software transactional memory (STM) runtimes, and introduce the notion of partially visible reads (PVRs) to heuristic...
Virendra J. Marathe, Michael F. Spear, Michael L. ...
ICA3PP
2009
Springer
15 years 2 months ago
A Software Transactional Memory Service for Grids
In-memory data sharing for grids allow location-transparent access to data stored in volatile memory. Existing Grid middlewares typ- ically support only explicit data transfer betw...
Kim-Thomas Möller, Marc-Florian Müller, ...
EUROSYS
2007
ACM
15 years 1 months ago
Whodunit: transactional profiling for multi-tier applications
This paper is concerned with performance debugging of multitier applications, such as commonly found in servers and dynamic-content web sites. Existing tools and techniques for pr...
Anupam Chanda, Alan L. Cox, Willy Zwaenepoel
PPOPP
2009
ACM
15 years 10 months ago
Transactional memory with strong atomicity using off-the-shelf memory protection hardware
This paper introduces a new way to provide strong atomicity in an implementation of transactional memory. Strong atomicity lets us offer clear semantics to programs, even if they ...
Martín Abadi, Tim Harris, Mojtaba Mehrara
ISLPED
2010
ACM
158views Hardware» more  ISLPED 2010»
14 years 8 months ago
STM versus lock-based systems: an energy consumption perspective
The shift towards multicore processors and the well-known drawbacks imposed by lock-based synchronization have forced researchers to devise new alternatives for building concurren...
Felipe Klein, Alexandro Baldassin, Joao Moreira, P...