2011
DOI: 10.1145/2000832.2000833
|View full text |Cite
|
Sign up to set email alerts
|

Application-specific signatures for transactional memory in soft processors

Abstract: As reconfigurable computing hardware and in particular FPGA-based systems-on-chip comprise an increasing number of processor and accelerator cores, supporting sharing and synchronization in a way that is scalable and easy to program becomes a challenge. Transactional Memory (TM) is a potential solution to this problem, and an FPGA-based system provides the opportunity to support TM in hardware (HTM). Although there are many proposed approaches to HTM support for ASICs, these do not nece… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
15
0

Year Published

2011
2011
2012
2012

Publication Types

Select...
3
1
1

Relationship

1
4

Authors

Journals

citations
Cited by 8 publications
(15 citation statements)
references
References 15 publications
0
15
0
Order By: Relevance
“…Recent work that also utilizes MIPS soft cores focuses on the design of the conflict detection mechanism that uses Bloom filters for an FPGA-based HTM [14]. Application-specific signatures are compared to detect conflicts in a single pipeline stage.…”
Section: Related Workmentioning
confidence: 99%
“…Recent work that also utilizes MIPS soft cores focuses on the design of the conflict detection mechanism that uses Bloom filters for an FPGA-based HTM [14]. Application-specific signatures are compared to detect conflicts in a single pipeline stage.…”
Section: Related Workmentioning
confidence: 99%
“…Network intrusion detection [26] modified for packetized input and re-written to have arraybased reassembly buffers to avoid the overhead of queues, lists and maps that also reduced the effectiveness of signatures due to the large amount of malloc()/free() calls [27].…”
Section: Intruder2mentioning
confidence: 99%
“…To detect conflicts without introducing undue stalls in the system, we must be able to do so in a single cycle. This requirement led us to implement conflict detection via signatures, which are bit-vectors that track the memory locations accessed by a transaction via hash indexing [27], with each transaction owning two signatures to track its read and write sets.…”
Section: ) Online Conflict Detectionmentioning
confidence: 99%
See 2 more Smart Citations