Software transaction internal memory implementing method based on delaying policy

An implementation method and technology of transactional memory, which is applied in the field of software transactional memory, can solve problems such as complex program design, deadlock, escort, etc., and achieve the effect of alleviating low efficiency, simple and efficient conflict arbitration strategy, and improving performance

Inactive Publication Date: 2009-08-19
ZHEJIANG UNIV
View PDF0 Cites 16 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

But the lock will bring many additional problems, making the program design complicated and time-consuming
The main problems are: deadlock, escort, priority inversion
[0005] Hardware transactional memory provides good performance but lacks generality

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Software transaction internal memory implementing method based on delaying policy
  • Software transaction internal memory implementing method based on delaying policy
  • Software transaction internal memory implementing method based on delaying policy

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0033] When implementing the implementation method of the software transactional memory based on the delay strategy, the specific method is as follows:

[0034] 1) Transaction creation

[0035] The execution process of software transactions includes: creating transactions, performing read and write operations, detecting conflicts, waiting for submission and submission, the whole process is as follows figure 1 shown;

[0036] This method provides four states for software transactions: Active, Aborted, Committed, and Committed, respectively indicating that the transaction is running, the transaction has terminated, the software transaction has completed the operation on the object and is waiting to be submitted, and the transaction has been committed successfully, such as figure 2 shown;

[0037] A transaction is created when an object needs to be read and written during program execution, and a transaction is a series of continuous instruction sets that operate on the same o...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a realization technique of software transaction memory based on a multicomputer system, and aims at providing a realization method of software transaction memory based on time delay strategy. The method comprises the steps of transaction creation, transaction conflict generation, transaction conflict time delay arbitration, and transaction submittal or termination. The invention adopts the time delay strategy to arbitrate the situation of conflict among transactions, the conflict arbitration strategy is simple and efficient, effectively relieves low efficiency caused by improper arbitration strategy, and improves the performances of the software transaction memory system.

Description

technical field [0001] The invention relates to the realization technology of the software transactional memory based on the multiprocessor system, in particular to a method for realizing the software transactional memory based on the delay strategy. Background technique [0002] In the multi-thread programming model of parallel computing, it is inevitable to introduce the problem of how to ensure the synchronization of shared data. At present, the lock mechanism is a more common method to achieve mutually exclusive access to shared data. The process of using the lock mechanism is generally like this: the programmer first correctly identifies the parallelism in the algorithm, and then writes the code to distribute independent tasks to parallel machines, usually running a thread on a processor. For tasks that must be executed sequentially, such as updating operations on shared resources, programmers must use synchronization mechanisms to coordinate the execution order betwee...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F9/46
Inventor 陈天洲马建良曹满乔福明章铁飞项凌翔王春昊刘敬伟陈剑缪良华
Owner ZHEJIANG UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products