49th International Conference on Parallel Processing - ICPP 2020
DOI: 10.1145/3404397.3404443
|View full text |Cite
|
Sign up to set email alerts
|

Safe, Fast Sharing of memcached as a Protected Library

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2020
2020
2022
2022

Publication Types

Select...
6
1

Relationship

1
6

Authors

Journals

citations
Cited by 7 publications
(3 citation statements)
references
References 10 publications
0
3
0
Order By: Relevance
“…To confirm the data structure results in a more realistic application, we use Montage to persist a variant of memcached developed by Kjellqvist et al [26]. This variant links directly to a multithreaded client application, dispensing with the usual socket-based communication.…”
Section: Hash Map Validation Using Memcachedmentioning
confidence: 99%
“…To confirm the data structure results in a more realistic application, we use Montage to persist a variant of memcached developed by Kjellqvist et al [26]. This variant links directly to a multithreaded client application, dispensing with the usual socket-based communication.…”
Section: Hash Map Validation Using Memcachedmentioning
confidence: 99%
“…Stack allocations are slightly more complex. Existing works convert shared stack allocations to shared heap allocations [6,32,44]. This approach is costly from a performance perspective: an allocation+free on the fast path for a modern allocator typically takes 30-60 cycles, and up to thousands of cycles on the slow path [40].…”
Section: Intel Mpk Isolation Backendmentioning
confidence: 99%
“…To protect database and hash table integrity, we store them in separate data domains and grant read-only access to the workers. Since domain heaps grow dynamically, we do not need preallocation as other PKU-based Memcached adaptations [55,82].…”
Section: Memcached With Sdrobmentioning
confidence: 99%