2017 26th International Conference on Parallel Architectures and Compilation Techniques (PACT) 2017
DOI: 10.1109/pact.2017.58
|View full text |Cite
|
Sign up to set email alerts
|

Efficient Checkpointing of Loop-Based Codes for Non-volatile Main Memory

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
33
0

Year Published

2019
2019
2020
2020

Publication Types

Select...
6
2

Relationship

3
5

Authors

Journals

citations
Cited by 34 publications
(33 citation statements)
references
References 28 publications
0
33
0
Order By: Relevance
“…At this point, we would have a durable log of the data we are about to modify. Then, we begin the transaction execution (lines [22][23][24][25][26][27][28][29][30][31][32][33][34][35][36][37][38][39][40]. After finishing the transaction, we reset the insideTx bit and make it durable, indicating that the transaction has completed (lines 43-45).…”
Section: Durable Transactions With Write Ahead Loggingmentioning
confidence: 99%
See 1 more Smart Citation
“…At this point, we would have a durable log of the data we are about to modify. Then, we begin the transaction execution (lines [22][23][24][25][26][27][28][29][30][31][32][33][34][35][36][37][38][39][40]. After finishing the transaction, we reset the insideTx bit and make it durable, indicating that the transaction has completed (lines 43-45).…”
Section: Durable Transactions With Write Ahead Loggingmentioning
confidence: 99%
“…Thus, with Recompute, we eliminated the need for logging while updating the c elements and the lastPersistedII variable. However, we still use logging for updating the indices (lines [22][23][24][25][26][27][28][29][30][31][32][33][34][35]. From this technique, we can see that we remove much overhead from the normal execution path but add more burden on the recovery code to recompute all the previous parts of the elements of matrix c, from the beginning up until the point of the failure.…”
Section: Our Recompute Approachmentioning
confidence: 99%
“…Through either redo or undo logging, they enable data to be recovered if a failure occurs during a transaction. The overhead of logging can be significant and there are some recent works to either reduce the size of the logs using recomputation [3] or to improve the performance using hardware logging [17,18].…”
Section: Memory Persistency Models On Cpusmentioning
confidence: 99%
“…Persistent data storage in main memory provides an opportunity to achieve recoverable data structures (RDS), which allows programs to recover from crashes just by using data in main memory instead of a checkpoint. Recent research [3,4] showed that by relying on RDS instead of checkpoints, highly significant performance and write endurance improvements can be obtained. Achieving RDS requires persistency models along with instruction support, and a crash recovery technique such as logging.…”
Section: Introductionmentioning
confidence: 99%
“…Meanwhile, a checksum is calculated to discover persistence errors in NVM and recompute inconsistent results. In References [2,17], recomputing is used for a chunk of data whose consistency is questionable. Unlike lazy persistency, NVM instructions are inserted to force data flushing from cache to persistent memory periodically.…”
Section: Introductionmentioning
confidence: 99%