Proceedings of the Fifth Annual ACM Symposium on Parallel Algorithms and Architectures - SPAA '93 1993
DOI: 10.1145/165231.165265
|View full text |Cite
|
Sign up to set email alerts
|

A method for implementing lock-free shared-data structures

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
128
0

Year Published

1998
1998
2020
2020

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 152 publications
(129 citation statements)
references
References 21 publications
0
128
0
Order By: Relevance
“…We also use two versions of a parallel quicksort application, together with a parallel solution to the traveling salesman problem, to compare the performance of the algorithms when used in a real application. 6 To ensure the accuracy of our results regarding the level of multiprogramming, we prevented other users from accessing the multiprocessor during the experiments. To evaluate the performance of the algorithms under different levels of multiprogramming, we used a feature of the Challenge's Irix operating system that allows programmers to pin processes to processors.…”
Section: Resultsmentioning
confidence: 99%
See 1 more Smart Citation
“…We also use two versions of a parallel quicksort application, together with a parallel solution to the traveling salesman problem, to compare the performance of the algorithms when used in a real application. 6 To ensure the accuracy of our results regarding the level of multiprogramming, we prevented other users from accessing the multiprocessor during the experiments. To evaluate the performance of the algorithms under different levels of multiprogramming, we used a feature of the Challenge's Irix operating system that allows programmers to pin processes to processors.…”
Section: Resultsmentioning
confidence: 99%
“…Alemany and Felten [1] and LaMarca [20] proposed techniques to reduce unnecessary copying and useless parallelism associated with Herlihy's methodologies using extra communication between the operating system kernel and application processes. Barnes [6] presented a general methodology in which processes record and timestamp their modifications to the shared object, and cooperate whenever conflicts arise. Shavit and Touitou [33] presented software transactional memory, which implements a -word compare-and-swap using load-linked/store-conditional.…”
Section: General Non-blocking Methodologiesmentioning
confidence: 99%
“…Barnes [10] presented a disjoint-access parallel universal construction, but the algorithms that result from this universal construction are only non-blocking. In Barnes' algorithm, a process p executing an operation op first simulates the execution of op locally, using a local dictionary where it stores the data items accessed during the simulation of op and their new values.…”
Section: Introductionmentioning
confidence: 99%
“…This can be done using methods such as software transactional memory [22] or the so-called locking without blocking techniques [7,25]. The basic idea of these methods is to use CAS in order to acquire virtual locks on the items-one item at a time, and help processes that hold virtual locks on desired items until they are released.…”
Section: Introductionmentioning
confidence: 99%