Performance evaluation of Intel® transactional synchronization extensions for high-performance computing

RM Yoo, CJ Hughes, K Lai, R Rajwar - Proceedings of the International …, 2013 - dl.acm.org
Intel has recently introduced Intel® Transactional Synchronization Extensions (Intel® TSX)
in the Intel 4th Generation Core™ Processors. With Intel TSX, a processor can dynamically …

Software transactional memory: Why is it only a research toy?

C Cascaval, C Blundell, M Michael, HW Cain… - Communications of the …, 2008 - dl.acm.org
Software transactional memory: why is it only a research toy? Page 1 40 communications of the
acm | NovEmbER 2008 | vol. 51 | No. 11 practice trAnsActionAL MEMorY (TM)13 is a …

More than you ever wanted to know about synchronization: Synchrobench, measuring the impact of the synchronization on concurrent algorithms

V Gramoli - Proceedings of the 20th ACM SIGPLAN Symposium on …, 2015 - dl.acm.org
In this paper, we present the most extensive comparison of synchronization techniques. We
evaluate 5 different synchronization techniques through a series of 31 data structure …

Stretching transactional memory

A Dragojević, R Guerraoui, M Kapalka - ACM sigplan notices, 2009 - dl.acm.org
Transactional memory (TM) is an appealing abstraction for programming multi-core systems.
Potential target applications for TM, such as business software and video games, are likely …

Why STM can be more than a research toy

A Dragojević, P Felber, V Gramoli… - Communications of the …, 2011 - dl.acm.org
Why STM can be more than a research toy Page 1 70 CommuniCations oF the aCm | APRIL
2011 | vOL. 54 | nO. 4 contributed articles whILE muLTIcoRE ARchITEcTuRES are increasingly …

Graph-based authentication of digital streams

S Miner, J Staddon - … 2001 IEEE Symposium on Security and …, 2000 - ieeexplore.ieee.org
We consider the authentication of digital streams over a lossy network. The overall approach
taken is graph-based, as this yields simple methods for controlling overhead, delay, and the …

Zhuque: Failure is Not an Option,{it's} an Exception

G Hodgkins, Y Xu, S Swanson… - 2023 USENIX Annual …, 2023 - usenix.org
Persistent memory (PMEM) allows direct access to fast storage at byte granularity.
Previously, processor caches backed by persistent memory were not persistent …

Safe nondeterminism in a deterministic-by-default parallel language

RL Bocchino Jr, S Heumann, N Honarmand… - ACM SIGPLAN …, 2011 - dl.acm.org
A number of deterministic parallel programming models with strong safety guarantees are
emerging, but similar support for nondeterministic algorithms, such as branch and bound …

A speculation-friendly binary search tree

T Crain, V Gramoli, M Raynal - Acm Sigplan Notices, 2012 - dl.acm.org
We introduce the first binary search tree algorithm designed for speculative executions. Prior
to this work, tree structures were mainly designed for their pessimistic (non-speculative) …

[PDF][PDF] Anatomy of a scalable software transactional memory

Y Lev, V Luchangco, V Marathe, M Moir… - Proc. 4th ACM …, 2009 - cs.uwaterloo.ca
Existing software transactional memory (STM) implementations often exhibit poor scalability,
usually because of nonscalable mechanisms for read sharing, transactional consistency …