• Publications
  • Influence
LogTM: log-based transactional memory
Transactional memory (TM) simplifies parallel programming by guaranteeing that transactions appear to execute atomically and in isolation. Implementing these properties includes providing dataExpand
  • 705
  • 124
  • Open Access
LogTM-SE: Decoupling Hardware Transactional Memory from Caches
This paper proposes a hardware transactional memory (HTM) system called LogTM Signature Edition (LogTM-SE). LogTM-SE uses signatures to summarize a transactions read-and write-sets and detectsExpand
  • 354
  • 61
  • Open Access
Performance Pathologies in Hardware Transactional Memory
Transactional memory is a promising approach to ease parallel programming. Hardware transactional memory system designs reflect choices along three key design dimensions: conflict detection, versionExpand
  • 255
  • 32
  • Open Access
Supporting nested transactional memory in logTM
Nested transactional memory (TM) facilitates software composition by letting one module invoke another without either knowing whether the other uses transactions. Closed nested transactions extendExpand
  • 195
  • 16
  • Open Access
TokenTM: Efficient Execution of Large Transactions with Hardware Transactional Memory
Current hardware transactional memory systems seek to simplify parallel programming, but assume that large transactions are rare, so it is acceptable to penalize their performance or concurrency.Expand
  • 119
  • 13
  • Open Access
Karma: scalable deterministic record-replay
Recent research in deterministic record-replay seeks to ease debugging, security, and fault tolerance on otherwise nondeterministic multicore systems. The important challenge of handling sharedExpand
  • 45
  • 5
  • Open Access
Intel nGraph: An Intermediate Representation, Compiler, and Executor for Deep Learning
The Deep Learning (DL) community sees many novel topologies published each year. Achieving high performance on each new topology remains challenging, as each requires some level of manual effort.Expand
  • 42
  • 2
  • Open Access
Safe and efficient supervised memory systems
Supervised Memory systems use out-of-band metabits to control and monitor accesses to normal data memory for such purposes as transactional memory and memory typestate trackers. Previous proposalsExpand
  • 5
  • 1
  • Open Access
Enabling Cross-ISA Offloading for COTS Binaries
Work offloading allows a mobile device, i.e., the client, to execute its computation-intensive code remotely on a more powerful server to improve its performance and to extend its battery life.Expand
  • 16
StealthTest: Low Overhead Online Software Testing Using Transactional Memory
Software testing is hard. The emergence of multicore architectures and the proliferation of bugprone multithreaded software makes testing even harder. To this end, researchers have proposed methodsExpand
  • 9
  • Open Access