Why the grass may not be greener on the other side: a comparison of locking vs. transactional memory

作者: Paul E. McKenney , Maged M. Michael , Josh Triplett , Jonathan Walpole

DOI: 10.1145/1842733.1842749

关键词:

摘要: The advent of multi-core and multi-threaded processor architectures highlights the need to address well-known shortcomings ubiquitous lock-based synchronization mechanisms. To this end, transactional memory has been viewed by many as a promising alternative locking. This paper therefore presents constructive critique locking memory: their strengths, weaknesses, opportunities for improvement.

参考文章(22)
Paul E. Mckenney, Jonathan Walpole, Exploiting deferred destruction: an analysis of read-copy-update techniques in operating system kernels Oregon Health & Science University. ,(2004)
Maurice Herlihy, Victor Luchangco, Mark Moir, The repeat offender problem: a mechanism for supporting dynamic-sized lock-free data structures international symposium on distributed computing. pp. 339- 353 ,(2002) , 10.1007/3-540-36108-1_23
Leonidas I. Kontothanassis, Robert W. Wisniewski, Michael L. Scott, Scheduler-conscious synchronization ACM Transactions on Computer Systems. ,vol. 15, pp. 3- 40 ,(1997) , 10.1145/244764.244765
William N. Scherer, Michael L. Scott, Advanced contention management for dynamic software transactional memory principles of distributed computing. pp. 240- 248 ,(2005) , 10.1145/1073814.1073861
Maurice Herlihy, A methodology for implementing highly concurrent data objects ACM Transactions on Programming Languages and Systems. ,vol. 15, pp. 745- 770 ,(1993) , 10.1145/161468.161469
Maurice Herlihy, The transactional manifesto: software engineering and non-blocking synchronization programming language design and implementation. pp. 280- 280 ,(2005) , 10.1145/1065010.1065011
Butler W. Lampson, David D. Redell, Experience with processes and monitors in Mesa Communications of The ACM. ,vol. 23, pp. 105- 117 ,(1980) , 10.1145/358818.358824
Michael F. Spear, Virendra J. Marathe, Luke Dalessandro, Michael L. Scott, Privatization techniques for software transactional memory principles of distributed computing. pp. 338- 339 ,(2007) , 10.1145/1281100.1281161
M.M. Michael, Hazard pointers: safe memory reclamation for lock-free objects IEEE Transactions on Parallel and Distributed Systems. ,vol. 15, pp. 491- 504 ,(2004) , 10.1109/TPDS.2004.8