2007
DOI: 10.1109/pact.2007.4336226
|View full text |Cite
|
Sign up to set email alerts
|

JudoSTM: A Dynamic Binary-Rewriting Approach to Software Transactional Memory

Abstract: With the advent of chip-multiprocessors, we are faced with the challenge of parallelizing performance-critical software. Transactional memory (TM) has emerged as a promising programming model allowing programmers to focus on parallelism rather than maintaining correctness and avoiding deadlock. Many implementations of hardware, software, and hybrid support for TM have been proposed; of these, software-only implementations (STMs) are especially compelling since they can be used with current commodity hardware. … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
62
0

Year Published

2008
2008
2018
2018

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 51 publications
(63 citation statements)
references
References 18 publications
(26 reference statements)
0
62
0
Order By: Relevance
“…In a POSIX-compliant C/C++ implementation, such faults are encoded as synchronous signals. Olszewski et al [24] suggest either containing inconsistent signals inside the operating system by making the kernel transaction-aware, or relying on userspace signal handling to suppress inconsistent signals once received. They implemented the first option; we will use the second (Section 3.2).…”
Section: Faultsmentioning
confidence: 99%
See 2 more Smart Citations
“…In a POSIX-compliant C/C++ implementation, such faults are encoded as synchronous signals. Olszewski et al [24] suggest either containing inconsistent signals inside the operating system by making the kernel transaction-aware, or relying on userspace signal handling to suppress inconsistent signals once received. They implemented the first option; we will use the second (Section 3.2).…”
Section: Faultsmentioning
confidence: 99%
“…Previous systems have instrumented loop back edges with a check to force periodic validation [24,28]. This approach adds overhead that can be expensive for tighter loops, and pollutes hardware resources like branch predictors.…”
Section: Infinite Loops and Recursionmentioning
confidence: 99%
See 1 more Smart Citation
“…Extensions that reduce metadata updates and cache pressure appear in Section III. In Section IV we contrast with approaches based on serialization of both transaction commit and cleanup [3], [9], [16]. We also present a hybrid approach that combines strict ordering and partial visibility to give reasonably good performance for a variety of workloads.…”
Section: List L;mentioning
confidence: 99%
“…Working independently, Detlefs et al [3], Olszewski et al [9], and Spear et al [16] have developed STM systems which, while differing in many ways, all share a pair of design choices that together solve the delayed cleanup problem: (1) they buffer updates in a redo log; (2) they ensure that the commit and cleanup order of transactions is the same as their serialization order.…”
Section: Strict Ordering Of Writersmentioning
confidence: 99%