2016
DOI: 10.1145/3022671.2984029
|View full text |Cite
|
Sign up to set email alerts
|

Hybrid STM/HTM for nested transactions on OpenJDK

Abstract: Transactional memory (TM) has long been advocated as a promising pathway to more automated concurrency control for scaling concurrent programs running on parallel hardware. Software TM (STM) has the benefit of being able to run general transactional programs, but at the significant cost of overheads imposed to log memory accesses, mediate access conflicts, and maintain other transaction metadata. Recently, hardware manufacturers have begun to offer commodity hardware TM (HTM) support in their processors wherei… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2018
2018
2021
2021

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(3 citation statements)
references
References 21 publications
0
3
0
Order By: Relevance
“…It fulfills the TM interface standardized by the industrials and academics, and thus does not require the presence of explicit escape mechanisms like early release or snap to avoid extra TM bookkeeping (our uread optimization being optional), nor does it require high‐level conflict detection, like open nesting and transactional boosting . Such improvements rely on explicit calls or user‐defined abstract locks that require genuine refactoring to work with HTM . To make sure that the obtained results are not biased by the underlying TM algorithm, we evaluated the trees on top of scriptE‐STM, another TM library (on a 2 16 sized tree where scriptE‐STM proved efficient), on top of a different TM design from the one used so far, ie, with eager acquirement, as well as on Intel's restricted HTM.…”
Section: Experimental Analysismentioning
confidence: 51%
“…It fulfills the TM interface standardized by the industrials and academics, and thus does not require the presence of explicit escape mechanisms like early release or snap to avoid extra TM bookkeeping (our uread optimization being optional), nor does it require high‐level conflict detection, like open nesting and transactional boosting . Such improvements rely on explicit calls or user‐defined abstract locks that require genuine refactoring to work with HTM . To make sure that the obtained results are not biased by the underlying TM algorithm, we evaluated the trees on top of scriptE‐STM, another TM library (on a 2 16 sized tree where scriptE‐STM proved efficient), on top of a different TM design from the one used so far, ie, with eager acquirement, as well as on Intel's restricted HTM.…”
Section: Experimental Analysismentioning
confidence: 51%
“…Lock elision, whether in software or hardware or a hybrid fashion, including gaining insights into them, has been extensively studied [22,29,33,[35][36][37][38]43,44,56,57,62,70,70,71,73,79,89,90,92]. Our work uses many of those techniques; for example, the basic design of our runtime controller was inspired by Wang et al [89].…”
Section: Related Workmentioning
confidence: 99%
“…implemented entirely in software (STM) [38], and that transactional techniques could simplify parallel programing and even accelerate conventional lock-based programs, by replacing critical sections with transactions [25,32,33]. Interest in TM blossomed, leading to research proposals that integrated TM tightly into programming languages [1,6,7,17,21,30]. The enthusiasm surrounding TM also resulted in an effort to standardize TM in C++.…”
Section: Introductionmentioning
confidence: 99%