Skip to search formSkip to main contentSkip to account menu

False sharing

In computer science, false sharing is a performance-degrading usage pattern that can arise in systems with distributed, coherent caches at the size… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2015
2015
The availability of commercial hardware transactionalmemory (TM) systems has not yet been met with a rise in the numberof large… 
2010
2010
Transactional memory (TM) continues to be the most promising approach replacing locks in concurrent programming, but TM systems… 
2010
2010
Video processing is computationally intensive and often has accompanying real-time or super-real-time requirements. For example… 
2009
2009
Writing multithreaded programs is a fairly complex task that poses a major obstacle to exploit multicore processors… 
2007
2007
The performance of microprocessors has increased exponentially for over 35 years. However, process technology challenges, chip… 
2003
2003
Frequent itemset mining is a classic problem in data mining. It is a nonsupervised process which concerns in finding frequent… 
1998
1998
The paper demonstrates that configuration independent analysis of shared memory applications is useful tool to characterize… 
Review
1997
Review
1997
The Penny system is an implementation of AKL(cid:1) a con(cid:2) current constraint language with deep guards(cid:1) on shared… 
1992
1992
The need to achieve higher performance through greater degrees of parallelism necessitates distributing the memory throughout a… 
1980
1980
Dating from the period when Chief Justice Roger Traynor gave distinction to its conflict of laws decisions,' the California…