Transactional Memory
Citations
340 citations
Cites background or methods from "Transactional Memory"
...The lack of strong isolation causes this code to behave unpredictably with all STM approaches [18]....
[...]
...Instead of arguing whether or not TM should eliminate the data races in lock-based synchronization, we examine the privatization code in Figure 3 [18]....
[...]
...An important feature for TM systems is strong isolation, which facilitates predictable code behavior [18]....
[...]
...There are several alternative implementations for both approaches [1, 18]....
[...]
...As as result, STM systems may produce incorrect or unpredictable results even for simple parallel programs that would work correctly with lock-based synchronization [18, 12, 24]....
[...]
324 citations
271 citations
256 citations
252 citations
References
7,390 citations
"Transactional Memory" refers background or methods in this paper
...A number of papers discuss transaction handlers that invoke arbitrary pieces of code when a transaction commits or aborts [3, 20, 29, 30]....
[...]
...A memory load first checks the write set (using a Bloom filter [29]), to determine if the transaction previously updated the object....
[...]
4,159 citations
"Transactional Memory" refers background or methods in this paper
...Scherer and Scott describe a number of contention resolution policies and provide examples to show that no policy is uniformly better than all other polices [26]....
[...]
...Another novel aspect of this system is that the STM algorithm is written in Promela, so it can be directly verified with the SPIN model checker [26]; an exercise that found several data races....
[...]
2,031 citations
"Transactional Memory" refers background in this paper
...This approach has subtleties that make automatic translation a challenge [5, 33]....
[...]
...1 Lomet, LDRS 77 Many of the concepts and implementation principles for STM were anticipated in a paper by Lomet in 1977 [4], which was published soon after the classic paper by Eswaran [5] on two-phase locking and transactions....
[...]
...[5] introduced the terms weak atomicity and strong atomicity....
[...]
...In a concurrent program, combining context-sensitive analysis with the synchronization analysis necessary to understand the communications between even two threads results in an undecidable problem [5]....
[...]
...Knowing the memory locations enabled the STM system to acquire ownership of them with the twophase locking protocol [5]....
[...]
1,369 citations
"Transactional Memory" refers background in this paper
...Herlihy and Wing [8] proposed linearizability as a correctness condition for operations on shared concurrent objects....
[...]
...Scientific programming languages, such as High Performance Fortran (HPF) [8], directly support data parallel programming with a collection of operators on matrices and ways to combine these operations....
[...]
...2 Shavit, Touitou, PODC 1995 Shavit and Touitou’s 1995 PODC paper [8] coined the term “software transactional memory” and described the first software implementation of transactional memory....
[...]
...Most papers assume the correctness criteria from database transactions (serializability [7]) or concurrent data structures (linearizability [8])....
[...]
...Scott [8] identifies four practical policies for detecting conflicts (Fig....
[...]
1,268 citations