Atlas: Leveraging locks for non-volatile memory consistency
DR Chakrabarti, HJ Boehm, K Bhandari - ACM SIGPLAN Notices, 2014 - dl.acm.org
Non-volatile main memory, such as memristors or phase change memory, can revolutionize
the way programs persist data. In-memory objects can themselves be persistent without the …
the way programs persist data. In-memory objects can themselves be persistent without the …
Operating system transactions
DE Porter, OS Hofmann, CJ Rossbach, A Benn… - Proceedings of the …, 2009 - dl.acm.org
Applications must be able to synchronize accesses to operating system resources in order to
ensure correctness in the face of concurrency and system failures. System transactions …
ensure correctness in the face of concurrency and system failures. System transactions …
Adaptive locks: Combining transactions and locks for efficient concurrency
T Usui, R Behrends, J Evans, Y Smaragdakis - Journal of Parallel and …, 2010 - Elsevier
Transactional memory is being advanced as an alternative to traditional lock-based
synchronization for concurrent programming. Transactional memory simplifies the …
synchronization for concurrent programming. Transactional memory simplifies the …
[PDF][PDF] University of Chicago
J Chen, RA Shweder, GH Herdt - United States, 2016 - knowledge.uchicago.edu
Block copolymers consist of two or more different homopolymer chains that are covalently
bonded together. These chemically disparate components usually are not miscible with …
bonded together. These chemically disparate components usually are not miscible with …
Applying transactional memory to concurrency bugs
Multithreaded programs often suffer from synchronization bugs such as atomicity violations
and deadlocks. These bugs arise from complicated locking strategies and ad hoc …
and deadlocks. These bugs arise from complicated locking strategies and ad hoc …
Atomic boxes: Coordinated exception handling with transactional memory
In concurrent programs raising an exception in one thread does not prevent others from
operating on an inconsistent shared state. Instead, exceptions should ideally be handled in …
operating on an inconsistent shared state. Instead, exceptions should ideally be handled in …
Volumetric hierarchical heavy hitters
Hierarchical heavy hitters (HHH) identification is useful for various network utilities such as
anomaly detection, DDoS mitigation, and traffic analysis. However, the increasing support …
anomaly detection, DDoS mitigation, and traffic analysis. However, the increasing support …
Deadline-aware scheduling for software transactional memory
W Maldonado, P Marlier, P Felber… - 2011 IEEE/IFIP 41st …, 2011 - ieeexplore.ieee.org
Software Transactional Memory (STM) is an optimistic concurrency control mechanism that
simplifies the development of parallel programs. Still, the interest of STM has not yet been …
simplifies the development of parallel programs. Still, the interest of STM has not yet been …
Understanding transactional memory performance
Transactional memory promises to generalize transactional programming to mainstream
languages and data structures. The purported benefit of transactions is that they are easier …
languages and data structures. The purported benefit of transactions is that they are easier …
Practical experience with transactional lock elision
Transactional Memory (TM) promises both to provide a scalable mechanism for
synchronization in concurrent programs, and to offer ease-of-use benefits to programmers …
synchronization in concurrent programs, and to offer ease-of-use benefits to programmers …