The Twelfth International Symposium on High-Performance Computer Architecture, 2006.
DOI: 10.1109/hpca.2006.1598134
|View full text |Cite
|
Sign up to set email alerts
|

LogTM: Log-based Transactional Memory

Abstract: Transactional memory (TM)

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

1
446
0
4

Publication Types

Select...
3
3
1

Relationship

0
7

Authors

Journals

citations
Cited by 446 publications
(504 citation statements)
references
References 36 publications
1
446
0
4
Order By: Relevance
“…Eager versioning is common in hardware transactional memories [30,48,79], which do not perform ordered execution or speculative data forwarding. By contrast, most TLS systems use lazy versioning (buffering speculative data in caches) or more expensive multiversioning [11,25,28,29,56,60,61,66,68,69] to limit the cost of aborts.…”
Section: Speculative Execution and Versioningmentioning
confidence: 99%
See 3 more Smart Citations
“…Eager versioning is common in hardware transactional memories [30,48,79], which do not perform ordered execution or speculative data forwarding. By contrast, most TLS systems use lazy versioning (buffering speculative data in caches) or more expensive multiversioning [11,25,28,29,56,60,61,66,68,69] to limit the cost of aborts.…”
Section: Speculative Execution and Versioningmentioning
confidence: 99%
“…Swarm's speculative execution borrows from LogTM and LogTM-SE [48,63,79]. Our key contributions over these and other speculation schemes are (i) conflict detection (Sec.…”
Section: Speculative Execution and Versioningmentioning
confidence: 99%
See 2 more Smart Citations
“…Several proposals [1,7,12,20] seek to leverage cache coherence protocols to achieve lightweight hardware transactions. However, these hardware TMs generally fix the conflict detection policy at design time, with eager read-write conflict detection more common than lazy [20].…”
Section: Related Workmentioning
confidence: 99%