2006
DOI: 10.1007/11752578_2
|View full text |Cite
|
Sign up to set email alerts
|

Checkpointing Speculative Distributed Shared Memory

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2006
2006
2006
2006

Publication Types

Select...
2

Relationship

2
0

Authors

Journals

citations
Cited by 2 publications
(2 citation statements)
references
References 6 publications
0
2
0
Order By: Relevance
“…Therefore, we investigate other possibilities, discussed in depth in [3]. Here we present one which solves all the problems described above.…”
Section: P2(x)mentioning
confidence: 99%
“…Therefore, we investigate other possibilities, discussed in depth in [3]. Here we present one which solves all the problems described above.…”
Section: P2(x)mentioning
confidence: 99%
“…In the previous work on reliable speculative DSM systems ( [4], [3]), it has been shown that a naive implementation of the speculation and, more specifically, prefetching may reduce DSM efficiency by introducing false dependencies, which in turn increase the number of unnecessary checkpoints. Since prefetches are seen by the object owner as read accesses, they create dependencies.…”
Section: Previous Workmentioning
confidence: 99%