Proceedings of the International Conference on Supercomputing 2011
DOI: 10.1145/1995896.1995905
|View full text |Cite
|
Sign up to set email alerts
|

Multiset signatures for transactional memory

Abstract: Transactional Memory (TM) systems must record the memory locations read and written (read and write sets) by concurrent transactions in order to detect conflicts. Some TM implementations use signatures for this purpose, which summarize read and write sets in bounded hardware at the cost of false positives (detection of non-existing conflicts).Read/write signatures are usually implemented as two separate Bloom filters with the same size. In contrast, transactions usually exhibit read/write sets of uneven cardin… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2012
2012
2021
2021

Publication Types

Select...
3
2
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 8 publications
(5 citation statements)
references
References 36 publications
0
5
0
Order By: Relevance
“…Another important aspect of our proposal is that it is independent of the underlying signature implementation. Therefore all the proposed techniques [3,4,10,15,16,21] to improve the efficiency of a signatures can be used in SnCTM as well.…”
Section: Resultsmentioning
confidence: 99%
See 2 more Smart Citations
“…Another important aspect of our proposal is that it is independent of the underlying signature implementation. Therefore all the proposed techniques [3,4,10,15,16,21] to improve the efficiency of a signatures can be used in SnCTM as well.…”
Section: Resultsmentioning
confidence: 99%
“…In order to reduce the impact on read-read dependencies signalling conflicts, they also proposed to use an small helper signature alongside the unified signature. Concurrently with work of Choi et al [4], Quislant et al proposed multiset signatures [16], which is also to combine read and write signatures into one. Their approach is enhanced using locality sensitive signatures [15] proposed by the same authors.…”
Section: Related Workmentioning
confidence: 98%
See 1 more Smart Citation
“…While signatures can be designed to minimize aliasing [20], [21], [22], [28], an inherent limitation of cache-based conflicting detection is that the bookkeeping metadata is always recorded on a per-core basis. Using a data structure simile and observing the transactional metadata from a global perspective, the typical organization resembles an array of n hash-tables, where n is the number of cores.…”
Section: Reducing False Positives Of Signaturesmentioning
confidence: 99%
“…Parallel multi-set bloom filters maintain one single parallel bloom filter for readset plus writeset addresses. Parallel multi-set shared bloom filters maintain one single parallel bloom filter for readset plus writeset addresses and treats both the readset plus writeset addresses as read-write address [14]. Parallel BF with BF indexing (PBF BF) uses BF to store inherent dependency values of an item, parallel BF by hash table indexing (PBF HT) utilizes hash table to accu-mulate inherent dependency values of an entity.…”
Section: Introductionmentioning
confidence: 99%