2016 IEEE International Symposium on High Performance Computer Architecture (HPCA) 2016
DOI: 10.1109/hpca.2016.7446055
|View full text |Cite
|
Sign up to set email alerts
|

Atomic persistence for SCM with a non-intrusive backend controller

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
46
0

Year Published

2016
2016
2024
2024

Publication Types

Select...
5
3

Relationship

2
6

Authors

Journals

citations
Cited by 58 publications
(46 citation statements)
references
References 21 publications
0
46
0
Order By: Relevance
“…e hardware implements "undo logging" by recording the old value of each modi ed cache line. Another hardware solution was presented by Doshi et al (2016). eir system implements "redo logging" but avoids the overhead on reads by not ushing the cache to the NVM before the log is wri en.…”
Section: Related Workmentioning
confidence: 99%
“…e hardware implements "undo logging" by recording the old value of each modi ed cache line. Another hardware solution was presented by Doshi et al (2016). eir system implements "redo logging" but avoids the overhead on reads by not ushing the cache to the NVM before the log is wri en.…”
Section: Related Workmentioning
confidence: 99%
“…Strand persistency [99] enables the reordering of the commit sequence of transactions for better concurrency (instead of requiring a strict order in which transactions have to be committed). Mechanisms for isolation and concurrency have also been supported by enhancing the memory controller in various ways [23], [116], [126]. A recent work, ThyNVM [105], introduces checkpointing to the DRAM+NVM hybrid persistent memory to overlap application execution and hardware checkpointing, to provide transparent crash consistency.…”
Section: Related Workmentioning
confidence: 99%
“…Much of the early work to-date incorporating NVM in systems assumes basic hardware changes. New memory controllers are proposed (Doshi et al 2016;Qureshi et al 2009;Zhou et al 2009). Kiln (Zhao et al 2013) proposes a victim cache for buffering and Atom (Joshi et al 2017) deploys a hardware logging approach to eliminate software logging overhead.…”
Section: 2 Backgroundmentioning
confidence: 99%