Proceedings of the Twentieth Annual Symposium on Parallelism in Algorithms and Architectures 2008
DOI: 10.1145/1378533.1378588
|View full text |Cite
|
Sign up to set email alerts
|

Practical weak-atomicity semantics for java stm

Abstract: As memory transactions have been proposed as a languagelevel replacement for locks, there is growing need for welldefined semantics. In contrast to database transactions, transaction memory (TM) semantics are complicated by the fact that programs may access the same memory locations both inside and outside transactions. Strongly atomic semantics, where non-transactional accesses are treated as implicit single-operation transactions, remain difficult to provide without specialized hardware support or significan… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
5

Citation Types

1
114
0

Year Published

2008
2008
2015
2015

Publication Types

Select...
6

Relationship

0
6

Authors

Journals

citations
Cited by 98 publications
(127 citation statements)
references
References 27 publications
1
114
0
Order By: Relevance
“…2 Conversely, in an STM system based on undo logs, a privatizing thread may see erroneous updates made (temporarily) by a transaction that has aborted but not yet cleaned up. As observed by Menon et al [11], such reads appear to be fundamentally incompatible with the prohibition against "out of thin air" reads. We therefore assume a redo log in the remainder of this paper.…”
Section: Introductionmentioning
confidence: 87%
See 4 more Smart Citations
“…2 Conversely, in an STM system based on undo logs, a privatizing thread may see erroneous updates made (temporarily) by a transaction that has aborted but not yet cleaned up. As observed by Menon et al [11], such reads appear to be fundamentally incompatible with the prohibition against "out of thin air" reads. We therefore assume a redo log in the remainder of this paper.…”
Section: Introductionmentioning
confidence: 87%
“…It specifies that transactions behave as if they acquired a single global mutual exclusion lock. Unfortunately, as several groups have noted [7,11,18], SLA requires behavior that can be expensive to enforce, particularly when a thread privatizes shared data (rendering it logically inaccessible to other threads), works on it for a while (ideally without incurring transactional overheads), and then publishes it again [10,11,18].…”
Section: Introductionmentioning
confidence: 99%
See 3 more Smart Citations