Notary: Hardware techniques to enhance signatures

  • Authors:
  • Luke Yen;Stark C. Draper;Mark D. Hill

  • Affiliations:
  • Department of Computer Sciences, University of Wisconsin-Madison, U.S.A.;Department of Electrical and Computer Engineering, University of Wisconsin-Madison, U.S.A.;Department of Computer Sciences, University of Wisconsin-Madison, U.S.A.

  • Venue:
  • Proceedings of the 41st annual IEEE/ACM International Symposium on Microarchitecture
  • Year:
  • 2008

Quantified Score

Hi-index 0.00

Visualization

Abstract

Hardware signatures have been recently proposed as an efficient mechanism to detect conflicts amongst concurrently running transactions in transactional memory systems (e.g., Bulk, LogTM-SE, and SigTM). Signatures use fixed hardware to represent an unbounded number of addresses, but may lead to false conflicts (detecting a conflict when none exists). Previous work recommends that signatures be implemented with parallel Bloom filters with two or four hash functions (e.g., H3).