We use cookies to improve your experience with our site.

Indexed in:

SCIE, EI, Scopus, INSPEC, DBLP, CSCD, etc.

Submission System
(Author / Reviewer / Editor)
Hu Weiwu, Xia Peisu. Out-of-Order Execution in Sequentially Consistent Shared-Memory Systems:Theory and Experiments[J]. Journal of Computer Science and Technology, 1998, 13(2): 125-140.
Citation: Hu Weiwu, Xia Peisu. Out-of-Order Execution in Sequentially Consistent Shared-Memory Systems:Theory and Experiments[J]. Journal of Computer Science and Technology, 1998, 13(2): 125-140.

Out-of-Order Execution in Sequentially Consistent Shared-Memory Systems:Theory and Experiments

More Information
  • Published Date: March 09, 1998
  • Thaditional implementation of sequential consistency in shared-memory systems requires memory accesses to be globally performed in program order. Based on an event ordering model for correct executions in shared-memory systems, this paper proposes and proves that out-of-order execution does not influence the correctness of an execution providing certain condition is met. Simulation results show that out-of-order execution proposed in this paper is an effective way to improve the performance of a sequentiall…
  • [1]
    Lamport L. How to make a multiprocessor computer that correctly executes multiprocessor programs. IEEE Transactions on Computers, 1979, C-28(9): 690-691.
    [2]
    Gharachorloo K, Lenoski D, Laudon J et al. Memory consistency and event ordering in scalable shared-memory multiprocessors. In Proceedings of the 17th Annual International Symposium on Computer Architecture, 1990, pp.15-26.
    [3]
    Shasha D, Snir M. Ellrcient and correct execution of parallel programs that share memory. ACM Transactions on Programming Languages and System, 1988,10(2): 282-312. ……….
  • Related Articles

    [1]Fereshteh Amini, Moazzam Khan, Jelena Misic, Hossein Pourreza. Performance of IEEE 802.15.4 Clusters with Power Management and Key Exchange[J]. Journal of Computer Science and Technology, 2008, 23(3): 377-388.
    [2]Wei-Wu Hu, Ji-Ye Zhao, Shi-Qiang Zhong, Xu Yang, Elio Guidetti, Chris Wu. Implementing a 1GHz Four-Issue Out-of-Order Execution Microprocessor in a Standard Cell ASIC Methodology[J]. Journal of Computer Science and Technology, 2007, 22(1): 1-0.
    [3]Yong Xiao, Xing-Ming Zhou. Performance Evaluation of Different Data Value PredictionSchemes[J]. Journal of Computer Science and Technology, 2005, 20(5): 615-623.
    [4]Swapan Bhattacharya, Anirban Banerjee, Shibdas Bandyopadhyay. CORBA-Based Analysis of Multi Agent Behavior[J]. Journal of Computer Science and Technology, 2005, 20(1).
    [5]FENG Jinhui, CHEN Yanyun, YAN Tao, WU Enhua. Leaf Movement Simulation[J]. Journal of Computer Science and Technology, 2001, 16(2).
    [6]ZHAN Yongzhao, SONG Snunlin, XIE Li. Demand Priority Protocol Simulation and Evaluation[J]. Journal of Computer Science and Technology, 1999, 14(6): 599-605.
    [7]SHU Yantai, XUE Fei, JIN Zhigang, Oliver Yang. The Impact of Self-Similar Traffic on Network Delay[J]. Journal of Computer Science and Technology, 1999, 14(6): 585-589.
    [8]Xu Yingqing, Su Cheng, Qi Dongxu, Li Hua, Liu Shenquan. Simulation of Waters[J]. Journal of Computer Science and Technology, 1997, 12(5): 408-413.
    [9]Lin Chengiiang, Li Sanli. Strategy and Simulation of Adaptive RID for Distributed Dynamic Load Balancing in Parallel Systems[J]. Journal of Computer Science and Technology, 1997, 12(2): 113-120.
    [10]Xu Meihe, Tang Zesheng. A Boundary Element Method for Simulation of Deformable Objects[J]. Journal of Computer Science and Technology, 1996, 11(5): 497-506.

Catalog

    Article views (34) PDF downloads (1714) Cited by()
    Related

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return