Show simple item record

dc.contributor.authorKubiatowicz, Johnen_US
dc.contributor.authorChaiken, Daviden_US
dc.contributor.authorAgarwal, Ananten_US
dc.date.accessioned2023-03-29T14:36:16Z
dc.date.available2023-03-29T14:36:16Z
dc.date.issued1992-06
dc.identifier.urihttps://hdl.handle.net/1721.1/149196
dc.description.abstractMultiprocessor architects have begun to explore several mechanisms such as prefetching, context-switching and software-assisted dynamic cache-coherence, which transform single-phase memory transactions in conventional memory systems into multiphase operations. Multiphase operations introduce a window of vulnerability in which data can be lost before it is used either through protocol invalidation or cache conflicts. Losing data introduces damaging livelock situations. This paper discusses the origins of the window of vulnerability and proposes an architectural framework that closes it. The framework in implemented in Alwife, a large-scale multiprocessor being built at MIT.en_US
dc.relation.ispartofseriesMIT-LCS-TM-471
dc.titleClosing the Window of Vulnerability in Multiphase Memory Transcationsen_US
dc.identifier.oclc26707674


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record