2008 41st IEEE/ACM International Symposium on Microarchitecture 2008
DOI: 10.1109/micro.2008.4771794
|View full text |Cite
|
Sign up to set email alerts
|

Notary: Hardware techniques to enhance signatures

Abstract: Hardware signatures have been recently proposed as an efficient mechanism to detect conflicts amongst concurrently running transactions in transactional memory systems (e.g., Bulk, LogTM-SE, and SigTM

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
42
0

Year Published

2010
2010
2015
2015

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 41 publications
(48 citation statements)
references
References 57 publications
0
42
0
Order By: Relevance
“…Bit extraction selects a predefined bit-field (address key) from a block address as a signature index (hash value). To spread the frequently occurring patterns over all indexes, more efficient hash functions such as bit-permutation hashing [6], XOR-based hashing [24], or H3 hashing [19,22] can be used. Each hash function sets one signature bit per address.…”
Section: A Backgroundmentioning
confidence: 99%
See 3 more Smart Citations
“…Bit extraction selects a predefined bit-field (address key) from a block address as a signature index (hash value). To spread the frequently occurring patterns over all indexes, more efficient hash functions such as bit-permutation hashing [6], XOR-based hashing [24], or H3 hashing [19,22] can be used. Each hash function sets one signature bit per address.…”
Section: A Backgroundmentioning
confidence: 99%
“…There are lots of applications using hardware signatures in computer design [22,24]. In this subsection, we focus on the previous work with signatures for conflict detection in TM systems.…”
Section: B Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…Yen, et al, describes the idea of using entropy to represent the randomness of instruction addresses [18]. According to Equation 1, in the case of memory entropy, variable x represents the memory addresses that appear in the program execution.…”
Section: B Memorymentioning
confidence: 99%