Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 225,545,105 papers from all fields of science
Search
Sign In
Create Free Account
False sharing
In computer science, false sharing is a performance-degrading usage pattern that can arise in systems with distributed, coherent caches at the size…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
10 relations
Bus (computing)
Byte
CPU cache
Computer science
Expand
Broader (1)
Computer memory
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2015
2015
TSXProf: Profiling Hardware Transactions
Yujie Liu
,
Justin Emile Gottschlich
,
Gilles A. Pokam
,
Michael F. Spear
International Conference on Parallel…
2015
Corpus ID: 1623566
The availability of commercial hardware transactionalmemory (TM) systems has not yet been met with a rise in the numberof large…
Expand
2010
2010
Reducing False Aborts in STM Systems
D. Nicácio
,
G. Araújo
International Conference on Algorithms and…
2010
Corpus ID: 7107638
Transactional memory (TM) continues to be the most promising approach replacing locks in concurrent programming, but TM systems…
Expand
2010
2010
Parallelization of Face Detection Engine
T. Shekhar
,
Kiran Varaganti
39th International Conference on Parallel…
2010
Corpus ID: 17698871
Video processing is computationally intensive and often has accompanying real-time or super-real-time requirements. For example…
Expand
2009
2009
Improving Signatures by Locality Exploitation for Transactional Memory
Ricardo Quislant
,
E. Gutiérrez
,
O. Plata
,
E. Zapata
International Conference on Parallel…
2009
Corpus ID: 18685173
Writing multithreaded programs is a fairly complex task that poses a major obstacle to exploit multicore processors…
Expand
2007
2007
The Coming Wave of Multithreaded Chip Multiprocessors
J. Laudon
,
Lawrence Spracklen
International journal of parallel programming
2007
Corpus ID: 708482
The performance of microprocessors has increased exponentially for over 35 years. However, process technology challenges, chip…
Expand
2003
2003
New parallel algorithms for frequent itemset mining in very large databases
Adriano Veloso
,
Wagner Meira Jr
,
S. Parthasarathy
Proceedings. 15th Symposium on Computer…
2003
Corpus ID: 11712120
Frequent itemset mining is a classic problem in data mining. It is a nonsupervised process which concerns in finding frequent…
Expand
1998
1998
Configuration independent analysis for characterizing shared-memory applications
Gheith A. Abandah
,
E. Davidson
Proceedings of the First Merged International…
1998
Corpus ID: 11932675
The paper demonstrates that configuration independent analysis of shared memory applications is useful tool to characterize…
Expand
Review
1997
Review
1997
An evaluation of Penny: a system for fine grain implicit parallelism
J. Montelius
,
Seif Haridi
International Workshop on Parallel Symbolic…
1997
Corpus ID: 6735694
The Penny system is an implementation of AKL(cid:1) a con(cid:2) current constraint language with deep guards(cid:1) on shared…
Expand
1992
1992
Region-Oriented Main Memory Management in Shared-Memory NUMA Multiprocessors
Benjamin Gamsa
1992
Corpus ID: 59833874
The need to achieve higher performance through greater degrees of parallelism necessitates distributing the memory throughout a…
Expand
1980
1980
The Use of Comparative Impairment to Resolve True Conflicts: An Evaluation of the California Experience
H. Kay
1980
Corpus ID: 55953046
Dating from the period when Chief Justice Roger Traynor gave distinction to its conflict of laws decisions,' the California…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE