Oceans 2002 Conference and Exhibition. Conference Proceedings (Cat. No.02CH37362)
DOI: 10.1109/pact.2003.1237997
|View full text |Cite
|
Sign up to set email alerts
|

Constraint graph analysis of multithreaded programs

Abstract: This paper presents a framework for analyzing the performance of multithreaded programs using a model called a constraint graph. We review previous constraint graph definitions for sequentially consistent systems, and extend these definitions for use in analyzing other memory consistency models. Using this framework, we present two constraint graph analysis case studies using several commercial and scientific workloads running on a full system simulator. The first case study illustrates how a constraint graph … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
5
0

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 10 publications
(5 citation statements)
references
References 38 publications
0
5
0
Order By: Relevance
“…We ignore reflexivity of by not explicitly adding an edge from each node to itself. Using directed graphs to model relations between memory operations for various purposes can also be found in prior work [4,7,15,16,18].…”
Section: Algorithmsmentioning
confidence: 99%
“…We ignore reflexivity of by not explicitly adding an edge from each node to itself. Using directed graphs to model relations between memory operations for various purposes can also be found in prior work [4,7,15,16,18].…”
Section: Algorithmsmentioning
confidence: 99%
“…The idea of using a constraint graph to model relations between memory operations has been used before in the context of verifying ordering, or analyzing the performance of multithreaded programs [5][11] [16].…”
Section: Related Workmentioning
confidence: 99%
“…Partial orders of multi-processor events, constructed from memory accesses and data dependencies, have been used to reason about weakly consistent memory systems [24], [21] and verify their implementations [25], [26], [27], [28]. Our solution uses a similar approach to establish ordering relationships between observed multi-processor events, adapted to the constraints of architectural coverage collection.…”
Section: Related Workmentioning
confidence: 99%