automatically exploiting cross-invocation parallelism using runtime ...

automatically exploiting cross-invocation parallelism using runtime ... automatically exploiting cross-invocation parallelism using runtime ...

dataspace.princeton.edu
from dataspace.princeton.edu More from this publisher
13.07.2015 Views

unnecessary overhead at runtime.Table 2.1 summarizes the related work. All existing cross-invocation parallelizationtechniques are either limited by the conservative nature of static analysis or require programmers’effort to achieve parallelization. This motives this thesis work to propose novelautomatic parallelization techniques which bridge the gap in the existing solution space.22

Technique Name Synchronization Speculative Runtime Software AutomaticInserted System Used OnlyStaticallyExploiting Intra-Invocation ParallelizationDOALL [1] None × None ̌ ̌DOANY [55, 75] Lock × None ̌ ̌DOACROSS [15] Thread-wise Syncs × None ̌ ̌DSWP [51] Produce and Consume × None ̌ ̌IE [53, 60, 65] None × Shadow Array ̌ ̌LRPD [62] None ̌ Shadow Array ̌ ̌STMLite [42] None ̌ STM ̌ ̌SMTX [58] None ̌ SMTX ̌ ×Exploiting Cross-Invocation ParallelizationFerrero et al. [22] None × None ̌ ̌Tseng [72] None × None ̌ ̌TCC [25] None ̌ Hardware TM × ×BOP [19] None ̌ Software TM ̌ ×DOMORE (this thesis work) None × Shadow Array ̌ ̌SPECCROSS (this thesis work) None ̌ Software Speculative Barrier ̌ ̌Table 2.1: Compared to related work, DOMORE and SPECCROSS improve the performance by automatically exploiting cross-invocationparallelism. Both take advantage of runtime information to synchronize threads only when necessary. And neither requires any specialhardware support.23

unnecessary overhead at <strong>runtime</strong>.Table 2.1 summarizes the related work. All existing <strong>cross</strong>-<strong>invocation</strong> parallelizationtechniques are either limited by the conservative nature of static analysis or require programmers’effort to achieve parallelization. This motives this thesis work to propose novelautomatic parallelization techniques which bridge the gap in the existing solution space.22

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!