Back to Results
First PageMeta Content
Computer programming / Computer memory / Memory barrier / Deadlock / Double-checked locking / Parallel computing / Software transactional memory / Cilk / Eventing / Computing / Software engineering / Concurrency control


Asymmetric Memory Fences: Optimizing Both Performance and Implementability ∗ Yuelu Duan, Nima Honarmand, † and Josep Torrellas University of Illinois at Urbana-Champaign {duan11,torrella}@illinois.edu nhonarmand@cs.s
Add to Reading List

Document Date: 2015-01-19 15:13:18


Open Document

File Size: 180,23 KB

Share Result on Facebook

City

Istanbul / /

Company

Any Asymmetric / Intel / Any Asymmetric Fence Group / /

Country

Turkey / /

Currency

pence / USD / /

/

Facility

Fence Stall / Josep Torrellas University of Illinois / Watchlist stall / Stony Brook University / Other Stall / /

IndustryTerm

fence / software module / software routines / coherence protocol / software transactional memory / fence groups / bank / mesh network / runtime systems / lock-free mutualexclusion algorithm / work-stealing algorithm / wF-only groups / /

NaturalFeature

Performance Comparison Forest / /

Organization

National Science Foundation / PA PA / Stony Brook University / PS GRT / University of Illinois / Department of Computer Science / Illinois-Intel Parallelism Center / /

Person

Wee Counter / Wee heat / Wee knapsack / Wee List / Wee fft / Wee Tree / Wee Hash / Wee lu / Wee cilksort / Wee plu / Wee matmul / Wee fib / Wee ReadWriteN / Wee TreeOverwrite / Stream Architectures (Multiprocessors) / Nima Honarmand / All Fences / Wee cholesky / Wee bucket / /

/

Position

cache controller / single writer / concurrent writer / per-core 128KB WB / RT / Head Head / head / writer / .writer / entries Private 32KB WB / programmer / /

Product

Asymmetric / WeeFence NoGRTs / /

ProgrammingLanguage

Cilk / Java / RC / C++ / /

ProvinceOrState

Illinois / Pennsylvania / /

Technology

Virtual Machine / Cilk THE algorithm / Dekker-like protocol / TLRW algorithm / operating systems / Bakery algorithm / work-stealing algorithm / Java / coherence protocol / lock-free mutualexclusion algorithm / Sequential Consistency / Xeon E5530 processor / directory-based MESI coherence protocol / /

URL

http /

SocialTag