Non-blocking Hashtables with Open Addressing
نویسندگان
چکیده
We present the first non-blocking hashtable based on open addressing that provides the following benefits: it combines good cache locality, accessing a single cacheline if there are no collisions, with short straight-line code; it needs no storage overhead for pointers and memory allocator schemes, having instead an overhead of two words per bucket; it does not need to periodically reorganise or replicate the table; and it does not need garbage collection, even with arbitrary-sized keys. Open problems include resizing the table and replacing, rather than erasing, entries. The result is a highly-concurrent set algorithm that approaches or outperforms the best externally-chained implementations we tested, with fixed memory costs and no need to select or fine-tune a garbage collector or locking strategy.
منابع مشابه
Efficient Almost Wait - free Parallel Accessible Dynamic
In multiprogrammed systems, synchronization often turns out to be a performance bottleneck and the source of poor fault-tolerance. Wait-free and lock-free algorithms can do without locking mechanisms, and therefore do not suffer from these problems. We present an efficient almost wait-free algorithm for parallel accessible hashtables, which promises more robust performance and reliability than ...
متن کاملar X iv : c s / 03 03 01 1 v 1 [ cs . D C ] 1 8 M ar 2 00 3 EawPadh : 1 Efficient Almost Wait - free Parallel Accessible Dynamic
In multiprogrammed systems, synchronization often turns out to be a performance bottleneck and the source of poor fault-tolerance. Wait-free and lock-free algorithms can do without locking mechanisms, and therefore do not suffer from these problems. We present an efficient almost wait-free algorithm for parallel accessible hashtables, which promises more robust performance and reliability than ...
متن کاملImplementing User-level Value-weak Hashtables
Value weak hashtables retain only weak references to the values associated with either a strongly or weakly referenced key. Value-weak hashtables automatically remove entries with invalid weak references, which occur when the collector reclaims a weakly referenced value. Value-weak hashtables provide a convenient way to automatically manage a table of information whose entries do not need to ex...
متن کاملDigital Fountains and Their Application to Informed Content Delivery over Adaptive Overlay Networks
Securing the net : challenges, failures and directions p. 2 Coeterie availability in sites p. 3 Keeping denial-of-service attackers in the dark p. 18 On conspiracies and hyperfairness in distributed computing p. 33 On the availability of non-strict quorum systems p. 48 Musical benches p. 63 Obstruction-free algorithms can be practically wait-free p. 78 Efficient reduction for wait-free terminat...
متن کاملA Single-Phase Non-Blocking Atomic Commitment Protocol1
Transactional standards have been promoted by OMG and X/Open to allow heterogeneous resources to participate in an Atomic Commitment Protocol (ACP), namely the two-phase commit protocol (2PC). Although widely accepted, 2PC is a blocking protocol and it introduces a substantial time delay (two phases to commit). Several optimized protocols and non-blocking protocols have been proposed. Optimized...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2005