T3: Transparent Tracking & Triggering for Fine-grained Overlap of Compute & Collectives
Abstract
References
Index Terms
- T3: Transparent Tracking & Triggering for Fine-grained Overlap of Compute & Collectives
Recommendations
FineLock: automatically refactoring coarse-grained locks into fine-grained locks
ISSTA 2020: Proceedings of the 29th ACM SIGSOFT International Symposium on Software Testing and AnalysisLock is a frequently-used synchronization mechanism to enforce exclusive access to a shared resource. However, lock-based concurrent programs are susceptible to lock contention, which leads to low performance and poor scalability. Furthermore, ...
Fine-grained adaptive biased locking
PPPJ '11: Proceedings of the 9th International Conference on Principles and Practice of Programming in JavaMutual-exclusion locking is the prevailing technique for protecting shared resources in concurrent programs. Fine-grained locking maximizes the opportunities for concurrent execution while preserving correctness, but increases both the number of locks ...
Fine-Grained Re-Execution for Efficient Batched Commit of Distributed Transactions
Distributed transaction systems incur extensive cross-node communication to execute and commit serializable OLTP transactions. As a result, their performance greatly suffers. Caching data at nodes that execute transactions can cut down remote reads. ...
Comments
Information & Contributors
Information
Published In
- General Chairs:
- Nael Abu-Ghazaleh,
- Rajiv Gupta,
- Program Chairs:
- Madan Musuvathi,
- Dan Tsafrir
Sponsors
In-Cooperation
Publisher
Association for Computing Machinery
New York, NY, United States
Publication History
Check for updates
Author Tags
Qualifiers
- Research-article
Funding Sources
Conference
Acceptance Rates
Contributors
Other Metrics
Bibliometrics & Citations
Bibliometrics
Article Metrics
- 0Total Citations
- 729Total Downloads
- Downloads (Last 12 months)729
- Downloads (Last 6 weeks)188
Other Metrics
Citations
View Options
Get Access
Login options
Check if you have access through your login credentials or your institution to get full access on this article.
Sign in