2017
DOI: 10.1109/tpds.2016.2630695
|View full text |Cite
|
Sign up to set email alerts
|

Scalable Adaptive NUMA-Aware Lock

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2017
2017
2021
2021

Publication Types

Select...
4
3

Relationship

1
6

Authors

Journals

citations
Cited by 10 publications
(3 citation statements)
references
References 27 publications
0
3
0
Order By: Relevance
“…Delegation locks [37,38,41,50,53,55,61] reduce the data movement by executing all critical sections in one core (the lock server), which significantly improves the throughput in NUMA. Although placing the lock server on big cores can hide the weak computing capacity of little cores (similar to [43,44,56], but big cores are dedicated for acceleration), it requires the big cores busy polling, which wastes a big core and violates the energy target when the contention is low.…”
Section: Related Workmentioning
confidence: 99%
“…Delegation locks [37,38,41,50,53,55,61] reduce the data movement by executing all critical sections in one core (the lock server), which significantly improves the throughput in NUMA. Although placing the lock server on big cores can hide the weak computing capacity of little cores (similar to [43,44,56], but big cores are dedicated for acceleration), it requires the big cores busy polling, which wastes a big core and violates the energy target when the contention is low.…”
Section: Related Workmentioning
confidence: 99%
“…This category includes lock algorithms implementing mechanisms that detect situations in which a lock needs to adapt itself, for example to cope with changing levels of contention (i.e., how many threads concurrently attempt to acquire a lock), or to avoid lock-related pathological behaviors (e.g., preemption of the lock holder to execute a thread waiting for the lock). This category includes MCS-TimePub 4 [46], GLS [9], SANL [98], LC [52], AHMCS 5 [21] and so-called Malthusian algorithms like Malth_Spin and Malth_STP 6 [30].…”
Section: Categorizing Lock Algorithmsmentioning
confidence: 99%
“…The work by Lim et al [60] considers switching among three lock algorithms (TTAS, MCS and a delegation-based one), depending on the level of contention on the lock instance. SANL [98] switches between local and remote (i.e., delegation-based) locking schemes. As explained in Section 2, delegation-based algorithms require critical sections to be expressed as a form of closure, which is incompatible with our transparent approach (i.e., without source code modification).…”
Section: Adaptive Algorithmsmentioning
confidence: 99%