Filters








16 Hits in 8.1 sec

Extending Hardware Transactional Memory Capacity via Rollback-Only Transactions and Suspend/Resume * †

Shady Issa, Pascal Felber, Alexander Matveev, Paolo Romano
unpublished
Transactional memory (TM) aims at simplifying concurrent programming via the familiar abstraction of atomic transactions.  ...  Only Transaction-based update transactions, HTM-friendly (software-based) read-set tracking, and self-tuning.  ...  Finally, P8TM builds on and extends on HERWL [16] , where we introduced the idea of using POWER8's suspend-resume and ROT facilities to elide read-write locks.  ... 
fatcat:6pbr25yc45aohermzohubwgini

Robust architectural support for transactional memory in the power architecture

Harold W. Cain, Maged M. Michael, Brad Frey, Cathy May, Derek Williams, Hung Le
2013 SIGARCH Computer Architecture News  
On the twentieth anniversary of the original publication [10], following ten years of intense activity in the research literature, hardware support for transactional memory (TM) has finally become a commercial  ...  , atomic read-modify-write primitives, and our weakly consistent memory model.  ...  Rollback-only Transactions Rollback-only transactions (ROTs) are used for single thread algorithmic speculation, and can be initiated by an extra parameter to tbegin.  ... 
doi:10.1145/2508148.2485942 fatcat:5a57nba23fcxzoydwisggrmf7e

Robust architectural support for transactional memory in the power architecture

Harold W. Cain, Maged M. Michael, Brad Frey, Cathy May, Derek Williams, Hung Le
2013 Proceedings of the 40th Annual International Symposium on Computer Architecture - ISCA '13  
On the twentieth anniversary of the original publication [10], following ten years of intense activity in the research literature, hardware support for transactional memory (TM) has finally become a commercial  ...  , atomic read-modify-write primitives, and our weakly consistent memory model.  ...  Rollback-only Transactions Rollback-only transactions (ROTs) are used for single thread algorithmic speculation, and can be initiated by an extra parameter to tbegin.  ... 
doi:10.1145/2485922.2485942 dblp:conf/isca/CainMFMWL13 fatcat:yn4uooo6sbbu7kwaso3biiefu4

Stretching the capacity of hardware transactional memory in IBM POWER architectures

Ricardo Filipe, Shady Issa, Paolo Romano, João Barreto
2019 Proceedings of the 24th Symposium on Principles and Practice of Parallel Programming - PPoPP '19  
The hardware transactional memory (HTM) implementations in commercially available processors are significantly hindered by their tight capacity constraints.  ...  When compared to HTM- and software-based concurrency control alternatives, SI-HTM exhibits improved scalability, achieving speedups of up to 300% relatively to HTM on in-memory database benchmarks.  ...  When running transactions in P8-HTM, the program can resort to an advanced suspend-resume mechanism.  ... 
doi:10.1145/3293883.3295714 dblp:conf/ppopp/FilipeI0019 fatcat:k7rc6vxamfg37ffq7zennhfhxi

A Taxonomy of Virtualization Security Issues in Cloud Computing Environments

Nadiah M. Almutairy, Khalil H. A. Al-Shqeerat, Husam Ahmed Al Hamad
2019 Indian Journal of Science and Technology  
In this study, the systematic literature review is performed to find out the vulnerabilities and risks of virtualization in cloud computing and to identify threats, and attacks result from those vulnerabilities  ...  Furthermore, we discover and analyze the effective mitigation techniques that are used to protect, secure, and manage virtualization environments.  ...  VM rollback attack: The attacker exploits the suspend/resume feature in a virtualized environment to attack VMs 75 .  ... 
doi:10.17485/ijst/2019/v12i3/139557 fatcat:es5fn7pxcvaqtocri6qen7ccj4

Bringing Virtualization to the x86 Architecture with the Original VMware Workstation

Edouard Bugnion, Scott Devine, Mendel Rosenblum, Jeremy Sugerman, Edward Y. Wang
2012 ACM Transactions on Computer Systems  
The hosted architecture enabled a simple user experience and offered broad hardware compatibility.  ...  By relying on x86 hardware segmentation as a protection mechanism, the binary translator could execute translated code at near hardware speeds.  ...  This enabled subsequent innovations such as suspend/resume, checkpointing, and the transparent migration of live virtual machines across physical boundaries [Nelson et al. 2005] .  ... 
doi:10.1145/2382553.2382554 fatcat:zmbouiju6rhxxaenuur67bjgw4

Dependable embedded systems

2008 2008 6th IEEE International Conference on Industrial Informatics  
This Series addresses current and future challenges pertaining to embedded hardware, software, specifications and techniques.  ...  Titles in the Series cover a focused set of embedded topics relating to traditional computing devices as well as hightech appliances used in newer, personal devices, and related topics.  ...  KA 3171/2-3, LO 1719/1-3, and SP 968/5-3.  ... 
doi:10.1109/indin.2008.4618103 fatcat:hal6brsgsjg5rlo3u5xil46pxi

Study and evaluation of an Irregular Graph Algorithm on Multicore and GPU Processor Architectures [article]

Varun Nagpal
2016 arXiv   pre-print
Such applications have very little computation and unpredictable memory access patterns making them memory-bound in contrast to compute-bound applications.  ...  To the best of our knowledge, this algorithm has only been accelerated on supercomputer class computer named Cray XMT and no work exists that demonstrates performance evaluation and comparison of this  ...  modify resources of the parent process only • Can acquire or create new resources • Can communicate and control other peers i.e. create, suspend, resume, terminate peers • Have a scope: Process or System  ... 
arXiv:1603.02655v1 fatcat:nklt3op66vdfdpmd3ygeckhwla

A survey of software aging and rejuvenation studies

Domenico Cotroneo, Roberto Natella, Roberto Pietrantuono, Stefano Russo
2014 ACM Journal on Emerging Technologies in Computing Systems  
been used to forecast software aging phenomena and to plan rejuvenation, the kind of systems and aging effects that have been studied, and the techniques that have been proposed to rejuvenate complex  ...  The analysis is useful to identify key results from SAR research, and it is leveraged in this paper to highlight trends and open issues.  ...  This operation can be quickly performed by adopting an on-memory suspend/resume mechanism, in which the memory images of VMs is preserved in main memory during the VMM restart, in order to avoid slow read  ... 
doi:10.1145/2539117 fatcat:pdu55ummb5eyzeiccwcq2xnzw4

LogTM: Log-based Transactional Memory

K.E. Moore, J. Bobba, M.J. Moravan, M.D. Hill, D.A. Wood
The Twelfth International Symposium on High-Performance Computer Architecture, 2006.  
Before I began work on LogTM, the only published hardware transactional memory systems relied heavily on the cache. The size and associativity of the cache limited the scope of transactions.  ...  In my doctoral research, I developed Log-Based Transactional Memory (LogTM), a transactional memory system that combines software-based version management (with limited hardware support) and conservative  ...  LogTM-SE exposes conflict detection state to software, allowing the OS to suspend, resume and migrate threads without aborting active transactions.  ... 
doi:10.1109/hpca.2006.1598134 dblp:conf/hpca/MooreBMHW06 fatcat:7joai4xgm5b2tbgdgx3vvwxh3q

Security through isolation for cloud and mobile

Patrick Colp
2021
Today's mobile platforms provide isolation through passwords and process boundaries. However, these protection mechanisms do little once an attacker can access the physical memory directly.  ...  We encrypt sensitive data while it is in memory to prevent direct, physical access to it.  ...  This also had a steep energy price: a single full-memory (2 GB) encryption consumed over 70 Joules, completely depleting the battery after 410 suspend/resume cycles only.  ... 
doi:10.14288/1.0401793 fatcat:aofnehnz2jhbrd6vtfqy7qkcau

Quality of Experience: From Assessment to Application (Dagstuhl Seminar 15022) Understanding Complexity in Multiobjective Optimization (Dagstuhl Seminar 15031) Model-driven Algorithms and Architectures for Self-Aware Computing Systems (Dagstuhl Seminar 15041) Artificial and Computational Intelligence in Games: Integration (Dagstuhl Seminar 15051)

Michael Philippsen, Pascal Felber, Michael Scott, J Eliot, Katrien De Moor, Markus Fiedler, Peter Reichl, Martín Varela, Salvatore Greco, Kathrin Klamroth, Joshua Knowles, Günter Rudolph (+13 others)
2015 unpublished
associated optimization models, and the development and critical evaluation of efficient solution methods.  ...  interacting with and within virtual environments.  ...  Power8: Power8 has suspend/resume. Allows even system calls within the transactions. Suspends current transaction, allows non-transactional execution until resume.  ... 
fatcat:ckaercgotnenhidbwsz7zufttq

Mobile Agents in Telecommunications [article]

Ingo Busse, Technische Universität Berlin, Technische Universität Berlin, Radu Popescu-Zeletin
1999
It allows to dynamically extend the functionality of software components and therefore to make them adaptable to application needs.  ...  With this mechanism and by turning remote communication to local communication, intelligent mobile agents help to save network and computing resources.  ...  Managing Places Places can be created, suspended, resumed, and removed selecting the corresponding command from the "Place" menu.  ... 
doi:10.14279/depositonce-108 fatcat:onm4wq27rbhszg7eznjdatckiy

An event- and repository-based component framework for workflow system architecture

Dimitrios Tombros
1999
Events are the only component integration mechanism used in REWORK systems.  ...  The architecture metamodel defines the component and connector abstractions necessary for describing the static and dynamic aspects of a workflow system.  ...  I thank the Swiss National Fund and the Ministry of Education of the Kanton of Zurich for funding my position.  ... 
doi:10.5167/uzh-73128 fatcat:5qmg5szxwrfxng4qyid3jwhfoq

ICAS 2012 Committee ICAS Advisory Chairs ICAS 2012 Technical Program Committee

St Maarten, Netherlands Antilles, Michael Bauer, Michael Grottke, Bruno Dillenseger, Michael Bauer, Michael Grottke, Bruno Dillenseger, Jemal Abawajy, Javier Alonso, Richard Anthony, Mark Balas (+66 others)
unpublished
., constraints and critics, have been also developed and tested.  ...  These technical challenges led the context-aware system developers to use improved and new concepts for specifying and modeling these systems to ensure quality and to reduce the development effort and  ...  funded by the Swedish Foundation for Strategic Research, the Complex Service Systems focus project, a part of the ICT-TNG Strategic Research Area initiative at the KTH Royal Institute of Technology, and  ... 
fatcat:ctehnlqxqzfythqddv4uuzepza
« Previous Showing results 1 — 15 out of 16 results