2008
DOI: 10.1109/ipdps.2008.4536249
|View full text |Cite
|
Sign up to set email alerts
|

Intermediate checkpointing with conflicting access prediction in transactional memory systems

Abstract: Transactional memory systems promise to reduce the burden of exposing thread-level parallelism in programs by relieving programmers from analyzing complex inter-thread dependences in detail. By encapsulating large program code blocks and executing them as atomic blocks, dependence checking is deferred to run-time at which point one of many conflicting transactions will be committed whereas the others will have to roll-back and re-execute. In current proposals, a checkpoint is taken at the beginning of the atom… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
20
0

Year Published

2009
2009
2018
2018

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 25 publications
(20 citation statements)
references
References 20 publications
0
20
0
Order By: Relevance
“…Such repair is limited to simple cases such as counters. Other proposals learn repeated conflicts and avoid scheduling conflicting transactions in parallel [5] or take checkpoints to reduce the rollback extent [25]. Enforcing strict memory consistency models through outof-window speculation has received much attention (e.g., [6,10,13,21,26]).…”
Section: Related Workmentioning
confidence: 99%
“…Such repair is limited to simple cases such as counters. Other proposals learn repeated conflicts and avoid scheduling conflicting transactions in parallel [5] or take checkpoints to reduce the rollback extent [25]. Enforcing strict memory consistency models through outof-window speculation has received much attention (e.g., [6,10,13,21,26]).…”
Section: Related Workmentioning
confidence: 99%
“…Various mechanisms have been proposed to implicitly checkpoint transactions at runtime [3,37]. If a checkpointed transaction aborts, it is rolled back up to the earliest valid checkpoint.…”
Section: Checkpointsmentioning
confidence: 99%
“…Waliullah and Stenstrom [7] suggested the use of checkpoints and partial rollbacks in the context of HTMs. Our proposal is with reference to STMs rather than HTMs and further the other main differences are: (1) The algorithm in [7] is demonstrated on a TCC framework which uses lazy conflict detection, as compared to the continuous conflict detection that CCPR uses, (2) In their algorithm, whenever a transaction commits, all addresses in its write set are compared with the read set of each of the ongoing transactions, and if a match is found, a conflict is generated.…”
Section: Related Workmentioning
confidence: 99%
“…Our proposal is with reference to STMs rather than HTMs and further the other main differences are: (1) The algorithm in [7] is demonstrated on a TCC framework which uses lazy conflict detection, as compared to the continuous conflict detection that CCPR uses, (2) In their algorithm, whenever a transaction commits, all addresses in its write set are compared with the read set of each of the ongoing transactions, and if a match is found, a conflict is generated. This method of conflict detection is very costly since each active transaction irrespective of whether or not conflicts, needs to be interrupted and checked during any other transaction's commit.…”
Section: Related Workmentioning
confidence: 99%