A plethora of optimized mutual exclusion lock algorithms have been designed over the past 25 years to mitigate performance bottlenecks related to critical sections and synchronization. Unfortunately, there is currently no broad study of the behavior of these optimized lock algorithms on realistic applications that consider different performance metrics, such as energy efficiency and tail latency. In this thesis, we perform a thorough and practical analysis, with the goal of providing software developers with enough information to achieve fast, scalable and energy-efficient synchronization in their systems. First, we provide a performance study of 28 state-of-the-art mutex lock algorithms, on 40 applications, and four different multicore mac...
The advent of chip multi-processors has led to an increase in computational performance in recent ye...
Over the past several decades, much research has been done in the area of modeling, simulating, and ...
A priori, locking seems easy: To protect shared data from concurrent accesses, it is sufficient to l...
A plethora of optimized mutual exclusion lock algorithms have been designed over the past 25 years t...
International audienceA plethora of optimized mutex lock algorithms have been designed over the past...
Une multitude d'algorithmes d'exclusion mutuelle ont été conçus au cours des vingt cinq dernières an...
International audienceNUMA multicore machines are pervasive and many multithreaded applications are ...
High parallelism of MPSoC applications increase the need of optimization for the synchronization mec...
The scalability of multithreaded applications on current multicore systems is hampered by the perfor...
Journal ArticleShared memory programs guarantee the correctness of concurrent accesses to shared dat...
Large-scale shared-memory multiprocessors typically have long latencies for remote data accesses. A...
International audienceThis paper investigate a mutual exclusion algorithm on distributed systems. We...
Today, the processing of large dataset is generally parallelised and performed on computers with man...
Summary In this article, we present mutable locks, a synchronization construct with the same semanti...
The scalability of multithreaded applications on current multicore systems is hampered by the perfor...
The advent of chip multi-processors has led to an increase in computational performance in recent ye...
Over the past several decades, much research has been done in the area of modeling, simulating, and ...
A priori, locking seems easy: To protect shared data from concurrent accesses, it is sufficient to l...
A plethora of optimized mutual exclusion lock algorithms have been designed over the past 25 years t...
International audienceA plethora of optimized mutex lock algorithms have been designed over the past...
Une multitude d'algorithmes d'exclusion mutuelle ont été conçus au cours des vingt cinq dernières an...
International audienceNUMA multicore machines are pervasive and many multithreaded applications are ...
High parallelism of MPSoC applications increase the need of optimization for the synchronization mec...
The scalability of multithreaded applications on current multicore systems is hampered by the perfor...
Journal ArticleShared memory programs guarantee the correctness of concurrent accesses to shared dat...
Large-scale shared-memory multiprocessors typically have long latencies for remote data accesses. A...
International audienceThis paper investigate a mutual exclusion algorithm on distributed systems. We...
Today, the processing of large dataset is generally parallelised and performed on computers with man...
Summary In this article, we present mutable locks, a synchronization construct with the same semanti...
The scalability of multithreaded applications on current multicore systems is hampered by the perfor...
The advent of chip multi-processors has led to an increase in computational performance in recent ye...
Over the past several decades, much research has been done in the area of modeling, simulating, and ...
A priori, locking seems easy: To protect shared data from concurrent accesses, it is sufficient to l...