Publication | Closed Access
PREDATOR
33
Citations
18
References
2014
Year
Unknown Venue
EngineeringNotorious ProblemComputer ArchitectureMultithreading (Computer Architecture)Memory Model (Programming)Software AnalysisHardware SecurityShared MemoryHigh-performance ArchitectureParallel ComputingCompilersFalse SharingMemory ManagementComputer EngineeringComputer ScienceMultithreaded ApplicationsProgram AnalysisSoftware TestingParallel ProgrammingSystem Software
False sharing is a notorious problem for multithreaded applications that can drastically degrade both performance and scalability. Existing approaches can precisely identify the sources of false sharing, but only report false sharing actually observed during execution; they do not generalize across executions. Because false sharing is extremely sensitive to object layout, these detectors can easily miss false sharing problems that can arise due to slight differences in memory allocation order or object placement decisions by the compiler. In addition, they cannot predict the impact of false sharing on hardware with different cache line sizes.
| Year | Citations | |
|---|---|---|
Page 1
Page 1