GPU Computing Gems Jade Edition 2012
DOI: 10.1016/b978-0-12-385963-1.00004-6
|View full text |Cite
|
Sign up to set email alerts
|

Building an Efficient Hash Table on the GPU

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
90
0

Year Published

2013
2013
2023
2023

Publication Types

Select...
4
2
2

Relationship

0
8

Authors

Journals

citations
Cited by 54 publications
(90 citation statements)
references
References 5 publications
0
90
0
Order By: Relevance
“…3). 2. We evaluate our approach on seven GPUs spanning three Nvidia architectures, across ten application case-studies, showing that we can provoke errors related to weak memory and discovering previously unknown weak memory issues in two applications (Sec.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…3). 2. We evaluate our approach on seven GPUs spanning three Nvidia architectures, across ten application case-studies, showing that we can provoke errors related to weak memory and discovering previously unknown weak memory issues in two applications (Sec.…”
Section: Introductionmentioning
confidence: 99%
“…(Background on CUDA is provided in Sec. 2.) The application incorporates a spinlock, and correctness depends on the source code ordering between the atomic operations on the lock (lines 19,22) and the memory operations in the critical section (line 15) being preserved.…”
Section: Introductionmentioning
confidence: 99%
“…The parallelization of the hashing technique is usually based on the fact that the indices of the keys can be calculated independently. The study [31] proposes GPU parallelizations of several hashing algorithms, such as "Open adressing", "Chaining" or "Cuckoo hashing". However, these works mainly focus on the speed of the hash table building phase and on subsequent dynamic updates.…”
Section: A Hashing and Parallel Hashingmentioning
confidence: 99%
“…At the same time, it is expressive enough to implement all required operations: All major database operators -including aggregation [24], selection [19], sorting [16,22,30,31], joins [20], hashing [2,3,14] and string operations [10] -, have been shown to be efficiently implementable within the constraints of the model. We therefore believe that the kernel programming model is a good choice to form the basis of a hardware-oblivious parallel database engine.…”
Section: The Kernel Programming Modelmentioning
confidence: 99%
“…Our parallel hashing algorithm builds on ideas from [2,3,14]. It begins with an optimistic round, letting each thread insert its keys without any form of synchronization.…”
Section: Hashingmentioning
confidence: 99%