14 Hits in 9.0 sec

Persistence semantics for weak memory: integrating epoch persistency with the TSO memory model

Azalea Raad, Viktor Vafeiadis
2018 Proceedings of the ACM on Programming Languages (PACMPL)  
To close this gap, we integrate the buffered epoch persistency model with the 'total-store-order' (TSO) memory model of the x86 and SPARC architectures.  ...  Integrating Epoch Persistency with the TSO Memory Model AZALEA RAAD, MPI-SWS, Germany VIKTOR VAFEIADIS, MPI-SWS, Germany Emerging non-volatile memory (NVM) technologies promise the durability of disks  ...  ACKNOWLEDGMENTS This research was supported in part by a European Research Council (ERC) Consolidator Grant for the project łRustBeltž, under the European Union Horizon 2020 Framework Programme (grant  ... 
doi:10.1145/3276507 fatcat:apqiufiqynafvn3w757zfefoom

Taming x86-TSO Persistency (Extended Version) [article]

Artem Khyzha, Ori Lahav
2020 arXiv   pre-print
We study the formal semantics of non-volatile memory in the x86-TSO architecture.  ...  The latter provides a novel model that is much closer to common developers' understanding of persistency semantics.  ...  ACKNOWLEDGMENTS We thank the POPL'21 reviewers for their helpful feedback and insights. This research was supported by the Israel Science Foundation (grant number 5166651).  ... 
arXiv:2010.13593v2 fatcat:swpqdfnd7jghxh3xhtyssmazbu

In-Memory Big Data Management and Processing: A Survey

Hao Zhang, Gang Chen, Beng Chin Ooi, Kian-Lee Tan, Meihui Zhang
2015 IEEE Transactions on Knowledge and Data Engineering  
We are witnessing a revolution in the design of database systems that exploits main memory as its data storage layer.  ...  Growing main memory capacity has fueled the development of in-memory big data management and processing. By eliminating disk I/O bottleneck, it is now possible to support interactive data analytics.  ...  We would like to thank the anonymous reviewers, and also Bingsheng He, Eric Lo and Bogdan Marius Tudor, for their insightful comments and suggestions.  ... 
doi:10.1109/tkde.2015.2427795 fatcat:u7r3rtvhxbainfeazfduxcdwrm

Weak persistency semantics from the ground up: formalising the persistency semantics of ARMv8 and transactional models

Azalea Raad, John Wickerson, Viktor Vafeiadis
2019 Proceedings of the ACM on Programming Languages (PACMPL)  
Emerging non-volatile memory (NVM) technologies promise the durability of disks with the performance of volatile memory (RAM).  ...  the persistency semantics of the ARMv8 architecture for the first time.  ...  ACKNOWLEDGMENTS We thank the OOPSLA'19 reviewers for their valuable feedback. We thank William Wang for his insightful feedback and helpful discussions.  ... 
doi:10.1145/3360561 fatcat:y5ugov4hnbcmjnnbkyokhxr5wy

A survey of checker architectures

Rajshekar Kalayappan, Smruti R. Sarangi
2013 ACM Computing Surveys  
Subsequently, for each class we present the ideas in some of the seminal papers that have defined the direction of the area along with important extensions published in later work.  ...  In this paper, we focus on the former aspect. We present a survey of different kinds of fault detection mechanisms for processors at the circuit, architecture, and software level.  ...  If there are cycles, then we can be sure that there is a violation of the underlying memory model, TSO.  ... 
doi:10.1145/2501654.2501662 fatcat:rmmc2ntqofgkvnbjhwpmekol4i

Reuse, don't Recycle: Transforming Lock-free Algorithms that Throw Away Descriptors [article]

Maya Arbel-Raviv, Trevor Brown
2017 arXiv   pre-print
We then develop a weak descriptor ADT which has weaker semantics, but can be implemented significantly more efficiently.  ...  We show how a large class of lock-free algorithms can be transformed to use weak descriptors, and demonstrate our technique by transforming several algorithms, including the leading k-compare-and-swap  ...  Acknowledgments We thank Faith Ellen for her gracious help in proving correctness for our transformations, and her insightful comments.  ... 
arXiv:1708.01797v1 fatcat:vgj6zscr7nexvcp2fmfhq7wtra

Faithful reproduction of network experiments

Dimosthenis Pediaditakis, Charalampos Rotsos, Andrew William Moore
2014 Proceedings of the tenth ACM/IEEE symposium on Architectures for networking and communications systems - ANCS '14  
Our results suggest that SELENA can accurately model networks with aggregate link speeds of 44 Gbps or more, while improving by four times the execution time in comparison to ns3 and exhibits near-linear  ...  In order to faithfully emulate faster and larger networks, SELENA adopts the technique of time-dilation and transparently slows down the passage of time for guest operating systems.  ...  The views, opinions, and/or findings  ... 
doi:10.1145/2658260.2658274 dblp:conf/ancs/PediaditakisRM14 fatcat:76zz4v5yqfhrfpesdied6jhl7u

Mitigating Memory-Safety Bugs with Efficient Out-of-Process Integrity Checking

Daming Chen
We implement this design inour HerQules [42] framework, which we use to develop new approaches for control-flow integrity and data-flow integrity that are more precise than past work.  ...  Computer programs written in low-level languages with manual memory management, like C and C++, can contain unintentional memory-safety bugs [175] due to developer error.  ...  However, one caveat is that under the x86-TSO [163] memory consistency model, if the protected memory operations are atomic, then our instrumentation must introduce additional synchronization, e.g.,  ... 
doi:10.1184/r1/16920076.v1 fatcat:faeonzhtbrfsvj55ksvgkdan3m

Poster Session II

2010 Neuropsychopharmacology  
Using ANCOVA for these 3 SNPs, with age and RNA integrity included in the model, we found that the risk allele (AA) for rs324420 in the gene coding FAAH was significantly associated with lower mRNA expression  ...  Discussion: Patients with Bipolar Disorder I under treatment with lithium needed to involve a great number of areas to complete the episodic memory with semantic association task.  ...  Models were built using training sets constructed with ca. 2/3 of the data from different parts of the HRSD17 response distribution, with the remaining 1/3 used for validation sets.  ... 
doi:10.1038/npp.2010.217 fatcat:gbcgyi35jbdndlwhlgwio7ts7y

A sequential distance-based approach for imputing missing data: Forward Imputation

Nadia Solaro, Alessandro Barbiero, Giancarlo Manzi, Pier Alda Ferrari
2016 Advances in Data Analysis and Classification  
at equally spaced epochs may be applied as models for stationary time series.  ...  of the Basque Country UPV/EHU, Spain Long Memory in Stochastic Volatility (LMSV) models are flexible tools for the modelling of persistent dynamic volatility, which is a typical characteristic of financial  ... 
doi:10.1007/s11634-016-0243-0 fatcat:yvrqlgllsbesbnvnzzci2egpl4

Hsin-Lun (New Treatise) and Other Writings by Huan T'an (43 B.C.-28 A.D.)

Chi-Yun Chen, Timoteus Pokora
1976 American Historical Review  
The text of this book is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License: ISBN 978-0-89264-020-1 (  ...  Shen Nung succeeded Fu Hsi as ruler of the Empire. Above, he looked for a model in Heaven; below, he took his model from the earth.  ...  Similarly, Huan T'an adopted Lu Chia T s Hsin-yu . as one of the models for his own work.  ... 
doi:10.2307/1853086 fatcat:hmla4d3hf5dexhkjjaleawy5ym

Quality of Experience: From Assessment to Application (Dagstuhl Seminar 15022) Understanding Complexity in Multiobjective Optimization (Dagstuhl Seminar 15031) Model-driven Algorithms and Architectures for Self-Aware Computing Systems (Dagstuhl Seminar 15041) Artificial and Computational Intelligence in Games: Integration (Dagstuhl Seminar 15051)

Michael Philippsen, Pascal Felber, Michael Scott, J Eliot, Katrien De Moor, Markus Fiedler, Peter Reichl, Martín Varela, Salvatore Greco, Kathrin Klamroth, Joshua Knowles, Günter Rudolph (+13 others)
2015 unpublished
The example problems mentioned in this report may serve as a first benchmark for such approaches.  ...  associated optimization models, and the development and critical evaluation of efficient solution methods.  ...  The proof explicitly accounts for both of these features, incorporating the x86-TSO model for relaxed memory semantics on x86 multiprocessors.  ... 

Principles of a 2nd quantum mechanics - indeterminism, non-locality, unification [article]

Mioara Mugur-Schächter
2018 arXiv   pre-print
Inside this reconstruction the measurement problem as well as the other major problems raised by the quantum mechanical formalism, dissolve.  ...  Then, using this representation as a reference-and-imbedding-structure, the foundations of an intelligible reconstruction of the Hilbert-Dirac formulation of Quantum Mechanics is developed.  ...  Below we communicate this integration by an enumeration of the postulates followed by a brief verbal description of the semantic contents tied with these postulates. is posited to be valid for any sort  ... 
arXiv:1310.1728v4 fatcat:nc65ndj33nharigbnctlvqlrwy

Improving sleep and cognition in young adults and the elderly

Maren Cordi
On the one hand, spontaneous reactivations, functionally associated with memory performance, exist in REM sleep.  ...  The first study was designed to clarify the role of induced reactivations for memory consolidation during sleep in different sleep stages.  ...  Acknowledgements We thank Fatime Bislimi and Pascal Kröni for assistance in data collection. This work was  ... 
doi:10.5167/uzh-111343 fatcat:ziolomu245cs7nmzb3t7agshl4