Filters








20 Hits in 5.0 sec

On Parallel Snapshot Isolation and Release/Acquire Consistency [chapter]

Azalea Raad, Ori Lahav, Viktor Vafeiadis
2018 Lecture Notes in Computer Science  
Parallel snapshot isolation (PSI) is a standard transactional consistency model used in databases and distributed systems.  ...  To address this, we develop a simple lock-based reference implementation for PSI built on top of the release-acquire memory model, a wellbehaved subset of the C/C++11 memory model.  ...  The second author was additionally partly supported by Len Blavatnik and the Blavatnik Family foundation.  ... 
doi:10.1007/978-3-319-89884-1_33 fatcat:ia6xooxlvzchtgqoexwlwobn5a

Taming release-acquire consistency

Ori Lahav, Nick Giannarakis, Viktor Vafeiadis
2016 Proceedings of the 43rd Annual ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages - POPL 2016  
Acknowledgments We would like to thank Marko Doko, Jeehoon Kang, Peter Sewell, Francesco Zappa Nardelli, and the POPL'16 reviewers for their helpful feedback.  ...  [11] proposed a framework for specifying such models, and studied several important ones in this framework. Among those, the closest to SRA is PSI ("Parallel Snapshot Isolation").  ...  Strong release-acquire.  ... 
doi:10.1145/2837614.2837643 dblp:conf/popl/LahavGV16 fatcat:lp4lgfkxzvbhtn4vdeaevjj6ei

Data Consistency in Distributed Systems: Algorithms, Programs, and Databases (Dagstuhl Seminar 18091)

Annette Bieniusa, Alexey Gotsman, Bettina Kemme, Marc Shapiro, Michael Wagner
2018 Dagstuhl Reports  
Available systems are hard to design, test and debug. Do existing testing and debugging tools suffice for identifying and isolating bugs due to weak consistency?  ...  Theoretical foundations: The seminar included a tutorial on specification of consistency guarantees provided by distributed systems and talks on comparing different styles of specification and expressing  ...  Snapshot isolation (SI) and parallel snapshot isolation (PSI) are two standard transactional consistency models that is used in databases and distributed systems.  ... 
doi:10.4230/dagrep.8.2.101 dblp:journals/dagstuhl-reports/BieniusaGKS18 fatcat:pdcbulwarbgdhc76ms3s563ebq

Robustness Against Transactional Causal Consistency [article]

Sidi Mohamed Beillahi, Ahmed Bouajjani, Constantin Enea
2021 arXiv   pre-print
Causal consistency for instance is one such model that is widely used in practice.  ...  In this paper, we investigate application-specific relationships between several variations of causal consistency and we address the issue of verifying automatically if a given transactional program is  ...  Assuming that transactions are constituted of either a read alone or a write alone, CCv is equivalent to Strong Release-Acquire (SRA), a strengthening of the standard Release-Acquire of the C11 memory  ... 
arXiv:1906.12095v5 fatcat:4y5o72jpzjfjbfl6ikq5n2zijm

Robustness Against Transactional Causal Consistency

Sidi Mohamed Beillahi, Ahmed Bouajjani, Constantin Enea
2019 Logical Methods in Computer Science  
Causal consistency for instance is one such model that is widely used in practice.  ...  In this paper, we investigate application-specific relationships between several variations of causal consistency and we address the issue of verifying automatically if a given transactional program is  ...  the primed variable z (lines (9.25) and (9.26)).  ... 
doi:10.23638/lmcs-17(1:12)2021 fatcat:luxermwtrrb37jsxkbauenyvaa

Data Consistency in Transactional Storage Systems: A Centralised Semantics

Shale Xiong, Andrea Cerone, Azalea Raad, Philippa Gardner, Robert Hirschfeld, Tobias Pape
2020 European Conference on Object-Oriented Programming  
Our semantics builds on abstract states comprising centralised, global key-value stores and partial client views.  ...  We explore two applications of our operational framework: 1) verifying that the COPS replicated database and the Clock-SI partitioned database satisfy their consistency models using trace refinement, and  ...  This weak behaviour is known as the lost update anomaly, which is allowed under causal consistency (CC), but not under parallel snapshot isolation (PSI) and snapshot isolation (SI).  ... 
doi:10.4230/lipics.ecoop.2020.21 dblp:conf/ecoop/XiongCRG19 fatcat:dsqhh5fykjgphjw2d7p2hkl3au

Data Consistency in Transactional Storage Systems: a Centralised Approach [article]

Shale Xiong, Andrea Cerone, Azalea Raad, Philippa Gardner
2019 arXiv   pre-print
Our semantics builds on abstract states comprising centralised, global key-value stores and partial client views.  ...  COPS) and partitioned databases (e.g.  ...  They capture consistency models such as snapshot isolation (SI) [Berenson et al. 1995] , but not weaker ones such as parallel snapshot isolation (PSI) [Sovran et al. 2011 ] and causal consistency (CC  ... 
arXiv:1901.10615v2 fatcat:vudgmqlgongppbm6a5yeonijy4

Consistency model for runtime objects in the Open Community Runtime

Jiri Dokulil
2018 Journal of Supercomputing  
However, it turns out that the consistency model that defines how the OCR programs are synchronized when executed in parallel is not sufficiently defined.  ...  In the following text, we complete the consistency model by filling in the missing pieces and extending the memory model given in the specification.  ...  "Leaked" changes when using RO and RW access modes The basic usage scenario is write-release-acquire-read, where one task modifies a data block, releases it and another synchronized task acquires the data  ... 
doi:10.1007/s11227-018-2681-2 fatcat:3yro6rf7efhxtjsg2qolqdk6i4

Database engines on multicores scale

Joao Soares, Nuno Preguica
2015 Proceedings of the 30th Annual ACM Symposium on Applied Computing - SAC '15  
This paper presents a practical study on In-Memory DBMS and shows that contention imposed by concurrency control mechanisms, such as locking, are limiting factors for both performance and scalability of  ...  We focus on In-Memory DBMS since these are becoming widely adopted, due to the increasing amount of memory installed in today's systems, and are expected to scale on multicore machines, by not incurring  ...  All commit operations release acquired locks and awaken existing waiting concurrent sessions.  ... 
doi:10.1145/2695664.3200145 fatcat:ytpt6ce4cbbkfizz3qhphseajy

On the Semantics of Snapshot Isolation [article]

Azalea Raad, Ori Lahav, Viktor Vafeiadis
2018 arXiv   pre-print
Snapshot isolation (SI) is a standard transactional consistency model used in databases, distributed systems and software transactional memory (STM).  ...  We introduce robust snapshot isolation (RSI), an adaptation of SI with similar semantics and guarantees in this mixed setting.  ...  .: On parallel snapshot isolation and release/acquire consistency. In: Proceedings of the 27th European Symposium on Programming (2018), to appear 31.  ... 
arXiv:1805.06196v2 fatcat:nplgds3yf5esvob2qwsw6vp73m

Efficient data distribution in a Web server farm

R.C. Burns, R.M. Rees, D.D.E. Long
2001 IEEE Internet Computing  
A novel locking protocol maintains data consistency in distributed and clustered file systems that are used as scalable infrastructure for Web server farms. 56  ...  In the best case, four messagesrevoke, release, acquire, and grant-are transmitted between each Web server and the file system server.  ...  Distributed file systems 10 support copy-on-write as part of a snapshot facility for backup-restore, which is how we implement out-of-place writing.  ... 
doi:10.1109/4236.939451 fatcat:dqvhtbnscvdbdn52wsje3ntwdu

Toward high performance nonblocking software transactional memory

Virendra Jayant Marathe, Mark Moir
2008 Proceedings of the 13th ACM SIGPLAN Symposium on Principles and practice of parallel programming - PPoPP '08  
We describe our work integrating the most important techniques and optimizations emerging from the recent work on blocking STMs into several variants of a nonblocking STM.  ...  and lazy) for writes made by transactions.  ...  We are also grateful to the anonymous reviewers, Michael Scott, and Micheal Spear for useful comments on the paper.  ... 
doi:10.1145/1345206.1345240 dblp:conf/ppopp/MaratheM08 fatcat:2rah6beyfrfmbgdhpohilnujdy

Making the java memory model safe

Andreas Lochbihler
2013 ACM Transactions on Programming Languages and Systems  
This work presents a machine-checked formalisation of the Java memory model and connects it to an operational semantics for Java and Java bytecode.  ...  For the whole model, I prove the data race freedom guarantee and type safety.  ...  The synchronises-with order ≤ ξ sw restricts ≤ ξ so to release-acquire pairs of events.  ... 
doi:10.1145/2518191 fatcat:bj7gkvmdhvdkzmbpv7zyvwlqbi

Report from Dagstuhl Seminar 15191 Compositional Verification Methods for Next-Generation Concurrency 1 Executive Summary

Lars Birkedal, Derek Dreyer, Philippa Gardner, Zhong Shao, Lars Birkedal, Derek Dreyer, Philippa Gardner, Zhong Shao, Lars Birkedal, Derek Dreyer, Philippa Gardner, Zhong Shao
unpublished
The seminar was successful and facilitated a stimulating interchange between the theory and practice of concurrent programming, and thereby laid the ground for the development of compositional verification  ...  This report documents the program and the outcomes of Dagstuhl Seminar 15191 "Composi-tional Verification Methods for Next-Generation Concurrency".  ...  In the talk I will concentrate on a promising consistency model of Parallel Snapshot Isolation (PSI), which weakens the classical snapshot isolation in a way that allows more efficient distributed implementations  ... 
fatcat:m4g3ki2k4vaj3eun3re3vmjoca

An empirical study of operating systems errors

Andy Chou, Junfeng Yang, Benjamin Chelf, Seth Hallem, Dawson Engler
2001 Proceedings of the eighteenth ACM symposium on Operating systems principles - SOSP '01  
We present a study of operating system errors found by automatic, static, compiler analysis applied to the Linux and OpenBSD kernels.  ...  Our approach differs from previous studies that consider errors found by manual inspection of logs, testing, and surveys because static analysis is applied uniformly to the entire kernel source, though  ...  These bugs fall into several categories including: not releasing acquired locks, calling blocking operations with interrupts disabled, using freed memory, and dereferencing potentially null pointers.  ... 
doi:10.1145/502039.502042 fatcat:jnwglrr2dne45dsy7vl5bkldhm
« Previous Showing results 1 — 15 out of 20 results