2006
DOI: 10.1145/1152649.1152653
|View full text |Cite
|
Sign up to set email alerts
|

Exploiting reference idempotency to reduce speculative storage overflow

Abstract: Recent proposals for multithreaded architectures employ speculative execution to allow threads with unknown dependences to execute speculatively in parallel. The architectures use hardware speculative storage to buffer speculative data, track data dependences and correct incorrect executions through roll-backs. Because all memory references access the speculative storage, current proposals implement speculative storage using small memory structures to achieve fast access. The limited capacity of the speculativ… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
9
0

Year Published

2010
2010
2018
2018

Publication Types

Select...
5

Relationship

0
5

Authors

Journals

citations
Cited by 15 publications
(9 citation statements)
references
References 12 publications
0
9
0
Order By: Relevance
“…Table 1 classifies prior work in terms of its application domain and the level at which idempotence is used and identified [2,9,10,12,16,19,21,23,25,31,36]. One of the earliest uses is by Mahlke et al in using restartable instruction sequences for exception recovery in speculative processors [23].…”
Section: Introductionmentioning
confidence: 99%
“…Table 1 classifies prior work in terms of its application domain and the level at which idempotence is used and identified [2,9,10,12,16,19,21,23,25,31,36]. One of the earliest uses is by Mahlke et al in using restartable instruction sequences for exception recovery in speculative processors [23].…”
Section: Introductionmentioning
confidence: 99%
“…The concept of idempotence has been leveraged by Kim et al in the context of thread-level speculation to allow idempotent references to see speculative state [30]. Additionally, Shivers et al use idempotence to achieve atomicity guarantees for garbage collectors [36].…”
Section: Related Workmentioning
confidence: 99%
“…In [7], Garzarán et al analyzed the trade-offs between the various approaches for buffering memory state in the context of TLS. Recently, Kim et al proposed a mechanism based on exploiting reference idempotency to reduce buffer overflow [8]. However, they used the train data set which are significantly smaller than the reference data sets.…”
Section: Recursionmentioning
confidence: 99%