Proceedings of the 1st ACM SIGOPS/EuroSys European Conference on Computer Systems 2006 2006
DOI: 10.1145/1217935.1217965
|View full text |Cite
|
Sign up to set email alerts
|

Predictive log-synchronization

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
5

Citation Types

0
6
0

Year Published

2010
2010
2015
2015

Publication Types

Select...
3
2
1

Relationship

1
5

Authors

Journals

citations
Cited by 13 publications
(6 citation statements)
references
References 14 publications
0
6
0
Order By: Relevance
“…It uses a single Fetch&Add object in addition to an LL/SC object, thus proving that the lower bound in [22] can be beaten, if we use just a single Fetch&Add object in addition to an LL/SC object. Sim exploits the well-known technique [16,26,27,30] of having a thread executing an operation helping other already announced operations. The high-level idea of the algorithm is as simple as follows.…”
Section: Introductionmentioning
confidence: 99%
“…It uses a single Fetch&Add object in addition to an LL/SC object, thus proving that the lower bound in [22] can be beaten, if we use just a single Fetch&Add object in addition to an LL/SC object. Sim exploits the well-known technique [16,26,27,30] of having a thread executing an operation helping other already announced operations. The high-level idea of the algorithm is as simple as follows.…”
Section: Introductionmentioning
confidence: 99%
“…In the full version of the paper [9] we show that our transformation preserves the external behavior (e.g., linearizability, serializability, and deadlock-freedom) of the original lock-based code; Moreover, our transformation preserves disjoint access parallelism [34], (the property that threads that access disjoint data objects do not contend on low level shared memory locations), as it refrains from introducing a shared global clock (as some STM systems do [45]) or other sources of contention.…”
Section: Introductionmentioning
confidence: 86%
“…The advantage of our approach is in its generic nature, which allows us to parallelize existing code without requiring experts to perform manual optimizations. Other generic approaches we are familiar with are domination locking [26] and STM [45], both of which perform worse than our transformed code in our experiments. Further discussion of related work appears in Section 4.…”
Section: Introductionmentioning
confidence: 92%
See 1 more Smart Citation
“…Sim is an efficient wait-free implementation of the well-known combining technique [29,34,37,52,54,56,60]. Most of the previous implementations of this technique, including the algorithm presented in [52] (which we will call OyamaAlg from now on) and flatcombining [34], employ locks and therefore they are blocking (i.e.…”
Section: Chapter 1 Introductionmentioning
confidence: 99%