2007 IEEE 10th International Symposium on Workload Characterization 2007
DOI: 10.1109/iiswc.2007.4362186
|View full text |Cite
|
Sign up to set email alerts
|

Delaunay Triangulation with Transactions and Barriers

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
31
0

Year Published

2008
2008
2023
2023

Publication Types

Select...
6
2

Relationship

2
6

Authors

Journals

citations
Cited by 48 publications
(32 citation statements)
references
References 12 publications
0
31
0
Order By: Relevance
“…When there are mostly finds, the path length to a representative becomes one, and there the COP and STM have the same overhead and performance. However, in applications, usually there is a burst of unions when a new network structure is constructed and then the structure becomes read only, where instrumentation can be eliminated by a barrier [14]. Thus, the high contention scenario seems more important.…”
Section: Cop Union Findmentioning
confidence: 99%
“…When there are mostly finds, the path length to a representative becomes one, and there the COP and STM have the same overhead and performance. However, in applications, usually there is a burst of unions when a new network structure is constructed and then the structure becomes read only, where instrumentation can be eliminated by a barrier [14]. Thus, the high contention scenario seems more important.…”
Section: Cop Union Findmentioning
confidence: 99%
“…In some applications, program structure, such as barriers and thread join points, ensures that all threads agree that a datum is public or private [16]. Since these phase boundaries are ordered globally, and with respect to < t , no additional instrumentation is required for correctness on acquiring and releasing transactions.…”
Section: Phased Privatizationmentioning
confidence: 99%
“…For example, Scott et al [34] describe the use of four varieties of pointers which guard accesses to transactional objects. Two of these pointer types, sh_ptr<T> and un_ptr<T>, denote transactionally shared and transactionally private data, respectively.…”
Section: Exploiting Privatization 431 Prior Tm Privatization Approamentioning
confidence: 99%