40th Annual IEEE/ACM International Symposium on Microarchitecture (MICRO 2007) 2007
DOI: 10.1109/micro.2007.24
|View full text |Cite
|
Sign up to set email alerts
|

Implementing Signatures for Transactional Memory

Abstract: Transactional Memory (TM) systems must track the read and write sets-items read and written during a transaction-to detect conflicts among concurrent transactions. Several TMs use signatures, which summarize unbounded read/write sets in bounded hardware at a performance cost of false positives (conflicts detected when none exists).This paper examines different organizations to achieve hardware-efficient and accurate TM signatures. First, we find that implementing each signature with a single k-hashfunction Blo… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

3
76
0

Year Published

2010
2010
2020
2020

Publication Types

Select...
5
3
1

Relationship

1
8

Authors

Journals

citations
Cited by 95 publications
(79 citation statements)
references
References 32 publications
3
76
0
Order By: Relevance
“…Swarm's speculative execution borrows from LogTM and LogTM-SE [48,63,79]. Our key contributions over these and other speculation schemes are (i) conflict detection (Sec.…”
Section: Speculative Execution and Versioningmentioning
confidence: 99%
“…Swarm's speculative execution borrows from LogTM and LogTM-SE [48,63,79]. Our key contributions over these and other speculation schemes are (i) conflict detection (Sec.…”
Section: Speculative Execution and Versioningmentioning
confidence: 99%
“…Unless otherwise indicated, the sizes of the fields in a SigTable entry are those shown in Figure 8. To generate a signature, Pacman uses 8 128-bit Bloom filters in parallel using the H3 hash function from [25], for a total of 1,024 bits per signature.…”
Section: Methodsmentioning
confidence: 99%
“…An alternative approach to implement unbounded transactional memory is to use signatures [14,15,103,13,87]. Signatures are data structures that can store the access information, i.e., addresses and read-/write-sets, for a thread in a compact form using Bloom filters [7].…”
Section: Signature-based Transactional Memorymentioning
confidence: 99%
“…Various combinations of Bloom [7] and Cockoo hashing [73,74], called Cuckoo-Bloom Signatures have also been evaluated [87]. One filter encodes the read-set and one encodes the writeset.…”
Section: Signature-based Transactional Memorymentioning
confidence: 99%