This thesis quantifies lock contention in multithreaded programs by expanding the theoretical model of task-parallel execution traces to account for mutual exclusion locks. While lock profiling and contention detection tools abound in software, empirical measurements of contention suffer from wide fluctuations across different executions of the same code due to scheduling variation and processor availability. In this work we present analytical bounds on the maximum possible contention incurred by a given program over all possible execution schedules, even when running alongside other programs in a busy environment or when scheduled by an adversary. Although we show that computing the exact optimum is NP-hard for general task graphs, in the ...
Scalable busy-wait synchronization algorithms are essential for achieving good parallel program perf...
Locks have been widely used as an effective synchroniza-tion mechanism among processes and threads. ...
This paper introduces operation-valency, a generalization of the valency proof technique originated ...
AbstractWe present two new algorithms for contention management in transactional memory, the determi...
International audienceNUMA multicore machines are pervasive and many multithreaded applications are ...
AbstractWe establish trade-offs between time complexity and write- and access-contention for solutio...
Abstract. Most complexity measures for concurrent algorithms for asynchronous shared-memory architec...
Lower and upper bounds on the maximum prior-ity inversion blocking (pi-blocking) that is gener-ally ...
Abstract. In this paper we propose a lock assignment technique to sim-plify the mutual exclusion enf...
This paper considers the modeling and the analysis of the performance of lock-free concurrent data s...
We establish trade-o s between time complexity and write- and access-contention for solutions to the...
Prior work on multiprocessor real-time locking protocols has shown how to support fine-grained lock ...
There has been much work done modeling, simulating, and measuring the performance of locking primiti...
It has been considered bon ton to blame locks for their fragility, especially since researchers iden...
This paper considers the modeling and the analysis of the performance of lock-free concurrent datast...
Scalable busy-wait synchronization algorithms are essential for achieving good parallel program perf...
Locks have been widely used as an effective synchroniza-tion mechanism among processes and threads. ...
This paper introduces operation-valency, a generalization of the valency proof technique originated ...
AbstractWe present two new algorithms for contention management in transactional memory, the determi...
International audienceNUMA multicore machines are pervasive and many multithreaded applications are ...
AbstractWe establish trade-offs between time complexity and write- and access-contention for solutio...
Abstract. Most complexity measures for concurrent algorithms for asynchronous shared-memory architec...
Lower and upper bounds on the maximum prior-ity inversion blocking (pi-blocking) that is gener-ally ...
Abstract. In this paper we propose a lock assignment technique to sim-plify the mutual exclusion enf...
This paper considers the modeling and the analysis of the performance of lock-free concurrent data s...
We establish trade-o s between time complexity and write- and access-contention for solutions to the...
Prior work on multiprocessor real-time locking protocols has shown how to support fine-grained lock ...
There has been much work done modeling, simulating, and measuring the performance of locking primiti...
It has been considered bon ton to blame locks for their fragility, especially since researchers iden...
This paper considers the modeling and the analysis of the performance of lock-free concurrent datast...
Scalable busy-wait synchronization algorithms are essential for achieving good parallel program perf...
Locks have been widely used as an effective synchroniza-tion mechanism among processes and threads. ...
This paper introduces operation-valency, a generalization of the valency proof technique originated ...