Transactional memory: architectural support for lock-free data structures
ISCA '93 Proceedings of the 20th annual international symposium on computer architecture
The SPLASH-2 programs: characterization and methodological considerations
ISCA '95 Proceedings of the 22nd annual international symposium on Computer architecture
Transactional Memory Coherence and Consistency
Proceedings of the 31st annual international symposium on Computer architecture
Unbounded Transactional Memory
HPCA '05 Proceedings of the 11th International Symposium on High-Performance Computer Architecture
Virtualizing Transactional Memory
Proceedings of the 32nd annual international symposium on Computer Architecture
Multifacet's general execution-driven multiprocessor simulator (GEMS) toolset
ACM SIGARCH Computer Architecture News - Special issue: dasCMP'05
An effective hybrid transactional memory system with strong isolation guarantees
Proceedings of the 34th annual international symposium on Computer architecture
Performance pathologies in hardware transactional memory
Proceedings of the 34th annual international symposium on Computer architecture
LogTM-SE: Decoupling Hardware Transactional Memory from Caches
HPCA '07 Proceedings of the 2007 IEEE 13th International Symposium on High Performance Computer Architecture
Characterization of Conflicts in Log-Based Transactional Memory (LogTM)
PDP '08 Proceedings of the 16th Euromicro Conference on Parallel, Distributed and Network-Based Processing (PDP 2008)
Hi-index | 0.00 |
One of the key design points of any hardware transactionalmemory (HTM) system is the conflict detection mechanism, and its efficientimplementation becomes critical when conflicts are not a rare event.While many contemporary proposals rely on the coherence protocol tocarry out conflict detection at the private cache levels, this approachis not optimal for systems that use a directory to maintain coherenceover an unordered, scalable network, such as tiled CMPs. In this paper,we present a new scheme of conflict detection for HTM systems, whichmoves this key mechanism from the private caches to the directory level.We propose a novel transactional book-keeping method and describe howthis detection can be carried out more efficiently at the directory. Simulationresults show that our approach obtains reductions in execution timebetween 25 and 55% for transactional benchmarks with a high numberof conflicts, with an average improvement over LogTM-SE of 15%.