Hazard pointers: Safe memory reclamation for lock-free objects

MM Michael - IEEE Transactions on Parallel and Distributed …, 2004 - ieeexplore.ieee.org
Lock-free objects offer significant performance and reliability advantages over conventional
lock-based objects. However, the lack of an efficient portable lock-free method for the …

Software transactional memory for dynamic-sized data structures

M Herlihy, V Luchangco, M Moir… - Proceedings of the twenty …, 2003 - dl.acm.org
We propose a new form of software transactional memory (STM) designed to support
dynamic-sized data structures, and we describe a novel non-blocking implementation. The …

{OSv—Optimizing} the Operating System for Virtual Machines

A Kivity, D Laor, G Costa, P Enberg, N Har'El… - 2014 usenix annual …, 2014 - usenix.org
Virtual machines in the cloud typically run existing general-purpose operating systems such
as Linux. We notice that the cloud's hypervisor already provides some features, such as …

A scalable lock-free stack algorithm

D Hendler, N Shavit, L Yerushalmi - Proceedings of the sixteenth annual …, 2004 - dl.acm.org
The literature describes two high performance concurrent stack algorithms based on
combining funnels and elimination trees. Unfortunately, the funnels are linearizable but …

[KIRJA][B] Handbook of data structures and applications

DP Mehta, S Sahni - 2004 - taylorfrancis.com
Although there are many advanced and specialized texts and handbooks on algorithms,
until now there was no book that focused exclusively on the wide variety of data structures …

Transactional lock-free execution of lock-based programs

R Rajwar, JR Goodman - ACM SIGOPS Operating Systems Review, 2002 - dl.acm.org
This paper is motivated by the difficulty in writing correct high-performance programs. Writing
shared-memory multi-threaded programs imposes a complex trade-off between …

Split-ordered lists: Lock-free extensible hash tables

O Shalev, N Shavit - Journal of the ACM (JACM), 2006 - dl.acm.org
We present the first lock-free implementation of an extensible hash table running on current
architectures. Our algorithm provides concurrent insert, delete, and find operations with an …

Zero-shot kernel learning

H Zhang, P Koniusz - … of the IEEE conference on computer …, 2018 - openaccess.thecvf.com
In this paper, we address an open problem of zero-shot learning. Its principle is based on
learning a map** that associates feature vectors extracted from ie images and attribute …

GPS: Navigating weak memory with ghosts, protocols, and separation

A Turon, V Vafeiadis, D Dreyer - Proceedings of the 2014 ACM …, 2014 - dl.acm.org
Weak memory models formalize the inconsistent behaviors that one can expect to observe
in multithreaded programs running on modern hardware. In so doing, however, they …

Fastforward for efficient pipeline parallelism: a cache-optimized concurrent lock-free queue

J Giacomoni, T Moseley, M Vachharajani - Proceedings of the 13th ACM …, 2008 - dl.acm.org
Low overhead core-to-core communication is critical for efficient pipeline-parallel software
applications. This paper presents FastForward, a cache-optimized single-producer/single …