Lightweight, robust adaptivity for software transactional memory
MF Spear - Proceedings of the twenty-second annual ACM …, 2010 - dl.acm.org
When a program uses Software TransactionalMemory (STM) to synchronize accesses to
shared memory, the performance often depends on which STM implementation is used …
shared memory, the performance often depends on which STM implementation is used …
FastLane: improving performance of software transactional memory for low thread counts
Software transactional memory (STM) can lead to scalable implementations of concurrent
programs, as the relative performance of an application increases with the number of …
programs, as the relative performance of an application increases with the number of …
{HydraVM}: Extracting Parallelism from Legacy Sequential Code Using {STM}
MM Saad, M Mohamedin, B Ravindran - 4th USENIX Workshop on Hot …, 2012 - usenix.org
We present a virtual machine prototype, called HydraVM, that automatically extracts
parallelism from legacy sequential code (at the bytecode level) through a set of techniques …
parallelism from legacy sequential code (at the bytecode level) through a set of techniques …
Pot: Deterministic transactional execution
This article presents Pot, a system that leverages the concept of preordered transactions to
achieve deterministic multithreaded execution of programs that use Transactional Memory …
achieve deterministic multithreaded execution of programs that use Transactional Memory …
Distributed speculative parallelization using checkpoint restart
Speculative software parallelism has gained renewed interest recently as a mechanism to
leverage multiple cores on emerging architectures. Two major mechanisms have been used …
leverage multiple cores on emerging architectures. Two major mechanisms have been used …
Adaptive conflict detection algorithm based on Rochester Software Transactional Memory
Y Liu, J Liu, F Gao - Journal of Physics: Conference Series, 2021 - iopscience.iop.org
When the transactional memory system detects conflicts, the more read-write addresses are,
the higher the false positive rate of this algorithm is. This paper studies the problem and …
the higher the false positive rate of this algorithm is. This paper studies the problem and …
Data-dependence profiling to enable safe thread level speculation
Data-dependence profiling is a technique that enables a compiler to judiciously decide
when the execution of a loop---which the compiler could not prove to be dependence free …
when the execution of a loop---which the compiler could not prove to be dependence free …
Improving continuation-powered method-level speculation for jvm applications
I Anjo, J Cachopo - Algorithms and Architectures for Parallel Processing …, 2013 - Springer
Most applications running on the Java Virtual Machine (JVM) make extensive use of
dynamic object-oriented programming features such as inheritance, polymorphism, and …
dynamic object-oriented programming features such as inheritance, polymorphism, and …
A software-based method-level speculation framework for the java platform
I Anjo, J Cachopo - International Workshop on Languages and Compilers …, 2012 - Springer
With multicore processors becoming ubiquitous on computing devices, the need for both
parallelizing existing sequential applications and designing new parallel applications is …
parallelizing existing sequential applications and designing new parallel applications is …
ReduxSTM: Optimizing STM designs for irregular applications
The exploitation of optimistic concurrency in modern multicore architectures via
Transactional Memory (TM) is becoming a mainstream programming paradigm. TM features …
Transactional Memory (TM) is becoming a mainstream programming paradigm. TM features …