Sciweavers

211 search results - page 12 / 43
» Implementing and Exploiting Inevitability in Software Transa...
Sort
View
170
Voted
HASKELL
2009
ACM
15 years 10 months ago
A compositional theory for STM Haskell
We address the problem of reasoning about Haskell programs that use Software Transactional Memory (STM). As a motivating example, we consider Haskell code for a concurrent non-det...
Johannes Borgström, Karthikeyan Bhargavan, An...
129
Voted
EUROPAR
2004
Springer
15 years 9 months ago
Exploiting Spatial Store Locality Through Permission Caching in Software DSMs
Abstract. Fine-grained software-based distributed shared memory (SWDSM) systems typically maintain coherence with in-line checking code at load and store operations to shared memor...
Håkan Zeffer, Zoran Radovic, Oskar Grenholm,...
129
Voted
ISCA
2007
IEEE
149views Hardware» more  ISCA 2007»
15 years 10 months ago
An effective hybrid transactional memory system with strong isolation guarantees
We propose signature-accelerated transactional memory (SigTM), a hybrid TM system that reduces the overhead of software transactions. SigTM uses hardware signatures to track the r...
Chi Cao Minh, Martin Trautmann, JaeWoong Chung, Au...
130
Voted
CODES
2011
IEEE
14 years 3 months ago
SoC-TM: integrated HW/SW support for transactional memory programming on embedded MPSoCs
Two overriding concerns in the development of embedded MPSoCs are ease of programming and hardware complexity. In this paper we present SoC-TM, an integrated HW/SW solution for tr...
Cesare Ferri, Andrea Marongiu, Benjamin Lipton, R....
252
Voted
POPL
2009
ACM
16 years 4 months ago
The semantics of progress in lock-based transactional memory
Transactional memory (TM) is a promising paradigm for concurrent programming. Whereas the number of TM implementations is growing, however, little research has been conducted to p...
Rachid Guerraoui, Michal Kapalka