1991
DOI: 10.1016/0022-0000(91)90005-p
|View full text |Cite
|
Sign up to set email alerts
|

How to emulate shared memory

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
30
0

Year Published

1994
1994
2001
2001

Publication Types

Select...
6
3

Relationship

0
9

Authors

Journals

citations
Cited by 170 publications
(30 citation statements)
references
References 4 publications
0
30
0
Order By: Relevance
“…The rationale offered is that these tasks can be assigned to the physical processors, with each processor apportioning its time among the tasks assigned to it. This technique of multithreading is a convenient way of masking latency [16,19]. Since each physical processor simulates several virtual processors, computation does not have to be suspended during the processing of a remote request by one of the virtual processors.…”
Section: Discouraged Loopholes and Rewarded Techniquesmentioning
confidence: 99%
“…The rationale offered is that these tasks can be assigned to the physical processors, with each processor apportioning its time among the tasks assigned to it. This technique of multithreading is a convenient way of masking latency [16,19]. Since each physical processor simulates several virtual processors, computation does not have to be suspended during the processing of a remote request by one of the virtual processors.…”
Section: Discouraged Loopholes and Rewarded Techniquesmentioning
confidence: 99%
“…Fujimoto's Time Warp machine [17] applies optimistic PDES to hardware to implement a sequential program execution on parallel hardware using speculation. Ranade [36] proposed hardware to mimic a PRAM model using techniques derived from conservative PDES.…”
Section: Related Workmentioning
confidence: 99%
“…Logical time is updated using a token-passing method that inspired how the timestamp snooping network manages the guarantee time (GT). Ranade's network ensures that memory references arrive at the correct PRAM cycle [36]. Multicast snooping's network [9] ensures that address multicasts arrive in the logical order determined by the network roots.…”
Section: Related Workmentioning
confidence: 99%
“…Several such ingenious results are known for specific networks like the mesh, butterfly, hypercube etc. For instance, given any routing problem with N packets on art Nnode butterfly, there is a randomized online routing algorithm that with high probability, routes in O(log IV) time using 0(1)-sized queues [24].…”
Section: Introductionmentioning
confidence: 99%