Results 1 - 10
of
3,651
Optimizing main-memory join on modern hardware
- IEEE Transactions on Knowledge and Data Eng
, 2002
"... AbstractÐIn the past decade, the exponential growth in commodity CPU's speed has far outpaced advances in memory latency. A second trend is that CPU performance advances are not only brought by increased clock rate, but also by increasing parallelism inside the CPU. Current database systems hav ..."
Abstract
-
Cited by 64 (15 self)
- Add to MetaCart
that large joins can be accelerated almost an order of magnitude on modern RISC hardware when both memory and CPU resources are optimized. Index TermsÐMain-memory databases, query processing, memory access optimization, decomposed storage model, join algorithms, implementation techniques. 1
Efficiently Compiling Efficient Query Plans for Modern Hardware
- Proc. VLDB Endow
"... As main memory grows, query performance is more and more determined by the raw CPU costs of query processing itself. The classical iterator style query processing technique is very simple and flexible, but shows poor performance on modern CPUs due to lack of locality and frequent instruction mispred ..."
Abstract
-
Cited by 61 (18 self)
- Add to MetaCart
As main memory grows, query performance is more and more determined by the raw CPU costs of query processing itself. The classical iterator style query processing technique is very simple and flexible, but shows poor performance on modern CPUs due to lack of locality and frequent instruction
Efficient Locking Techniques for Databases on Modern Hardware
"... Traditional database systems are driven by the assumption that disk I/O is the primary bottleneck, overshadowing all other costs. However, future database systems will be dominated by many-core processors, large main memory, and low-latency semiconductor mass storage. In the increasingly common case ..."
Abstract
-
Cited by 2 (0 self)
- Add to MetaCart
for modern hardware. We devised new algorithms and methods to improve all components of database locking, including key range locking, intent locks, detection and recovery from deadlocks, and early lock release. Most of the techniques are easily applicable to other database systems. Experiments with Shore
LLAMA: A cache/storage subsystem for modern hardware
- Proc. VLDB Endow
"... LLAMA is a subsystem designed for new hardware environments that supports an API for page-oriented access methods, providing both cache and storage management. Caching (CL) and storage (SL) layers use a common mapping table that separates a page’s logical and physical location. CL supports data upda ..."
Abstract
-
Cited by 4 (1 self)
- Add to MetaCart
LLAMA is a subsystem designed for new hardware environments that supports an API for page-oriented access methods, providing both cache and storage management. Caching (CL) and storage (SL) layers use a common mapping table that separates a page’s logical and physical location. CL supports data
StagedDB: Designing Database Servers for Modern Hardware
- In IEEE Data
, 2005
"... Advances in computer architecture research yield increasingly powerful processors which can execute code at a much faster pace than they can access data in the memory hierarchy. Database management systems (DBMS), due to their intensive data processing nature, are in the front line of commercial app ..."
Abstract
-
Cited by 3 (0 self)
- Add to MetaCart
applications which cannot harness the available computing power. To prevent the CPU from idling, a multitude of hardware mechanisms and software optimizations have been proposed. Their effectiveness, however, is limited by the sheer volume of data accessed and by the unpredictable sequence of memory requests.
Worst-Case Execution Time Analysis for Modern Hardware Architectures
- In Proc. ACM SIGPLAN Workshop on Languages, Compilers and Tools for Real-Time Systems (LCT-RTS'97
, 1997
"... We present a method for determining the worst case execution time (WCET) for programs running on systems with modern hardware architectures, e.g. pipelined processors and cache memory. The method is based on the implicit path enumeration technique (IPET), in which all possible execution paths of a p ..."
Abstract
-
Cited by 49 (3 self)
- Add to MetaCart
We present a method for determining the worst case execution time (WCET) for programs running on systems with modern hardware architectures, e.g. pipelined processors and cache memory. The method is based on the implicit path enumeration technique (IPET), in which all possible execution paths of a
Consequences of modern hardware design for numerical simulations and their realization in
"... Abstract. This paper deals with the in
uence of hardware aspects of modern computer architectures to the design of software for numerical simulations. We present performance tests for various tasks arising in FEM computations and show under which circumstances performance loss can occur. Further we ..."
Abstract
- Add to MetaCart
Abstract. This paper deals with the in
uence of hardware aspects of modern computer architectures to the design of software for numerical simulations. We present performance tests for various tasks arising in FEM computations and show under which circumstances performance loss can occur. Further we
MultiLoop: Efficient Software Pipelining for Modern Hardware
"... This paper is motivated by trends in processor models of which the Cell BE is an exemplar, and by the need to reliably apply multilevel code optimizations in safety-critical code to achieve high performance and small code size. A MultiLoop is a loop specification construct designed to expose in a st ..."
Abstract
-
Cited by 2 (0 self)
- Add to MetaCart
structured way details of instruction scheduling needed for performance-enhancing transformations. We show by example how it may be used to make better use of underlying hardware features, including software branch prediction and SIMD instructions. In each case, the use of Multi-Loop transformations allows
Pitfalls of virtual machine introspection on modern hardware
"... Over the last few years there has been immense progress in developing powerful security tools based on Virtual Ma-chine Introspection (VMI). VMI offers unique capabilities which can be used to check and enforce security policies in the presence of a potentially compromised guest. With the introducti ..."
Abstract
- Add to MetaCart
. With the introduction of new hardware virtualization extensions, VMI can be further enhanced to provide lightweight, in-band control over the execution of virtual machines. In publica-tions released before the extensions were available, security researchers issued warnings that these new extensions may be used
RealTime Applications and Modern Hardware Architec
"... tures A realtime system is one in which the correctness of the system depends not only on the logical results but also on the time at which the results are produced Hard realtime systems are those where it is absolutely imperative that responses occur within the specied deadlines Examples of areas ..."
Abstract
- Add to MetaCart
tures A realtime system is one in which the correctness of the system depends not only on the logical results but also on the time at which the results are produced Hard realtime systems are those where it is absolutely imperative that responses occur within the specied deadlines Examples of areas where realtime systems are used include process control nuclear power plants agile manufacturing intelligent vehicle high way systems avionics air tra c control telecommuni cations the information super highway multimedia realtime simulation virtual reality medical applica tions eg telemedicine and intensive care monitoring and defense applications eg command control and
Results 1 - 10
of
3,651