47,561 research outputs found

    Pursue Some Path : Green Space as a Self-care Method

    Get PDF
    This action research begins with an exploration of “Green Space,” a theory that claims nature has a deep and meaningful impact on the psyche. Green Space has been shown to help reduce anxiety and increase attention, creativity, and memory. The Transactional Theory Framework is examined in tandem with Green Space theory. The transactional theory is a means to evaluate the processes of coping with stress and stressful events. I applied the concept of Green Space as a primary self-care method and then collected and analyzed data. I looked at how Green Space combats stress and burnout. Additionally, I explored in what ways Green Space impacts my work as an American Sign Language/ English interpreter. I did this by viewing and/or participating in a Green Space event, collecting data via daily journaling, as well as writing pre and post journal entries, and creating work sample

    ANTICIPATING THE MNEMONIC SHIFT: ORGANIZATIONAL REMEMBERING AND FORGETTING IN 2001

    Get PDF
    Following a review of prior work, the paper presents a model of organizational memory. Relying on structuration theory for its development, the model overcomes some of the problematic dualisms of conventional approaches (i.e., subjecUobject, social/technical, abstract/concrete). According to the model, co-memory (for collective memory) consists of rules and resources that recursively mediate both interactivity and structure in organizations. The model provides the basis for a taxonomy of existing and projected IT-based co-memory systems. Four classes of co-memory systems are described: transactional, managerial, strategic, and team. An analysis of driving trends concerning people, structure, and technology is used to project four scenarios for organizations in 2001: bureaucracy, factory, affiliation, and infocracy. Co-memory systems that can be expected in each scenario are discussed. Predictions indicate that a mnemonic s

    Privatization-Safe Transactional Memories

    Get PDF
    Transactional memory (TM) facilitates the development of concurrent applications by letting the programmer designate certain code blocks as atomic. Programmers using a TM often would like to access the same data both inside and outside transactions, and would prefer their programs to have a strongly atomic semantics, which allows transactions to be viewed as executing atomically with respect to non-transactional accesses. Since guaranteeing such semantics for arbitrary programs is prohibitively expensive, researchers have suggested guaranteeing it only for certain data-race free (DRF) programs, particularly those that follow the privatization idiom: from some point on, threads agree that a given object can be accessed non-transactionally. In this paper we show that a variant of Transactional DRF (TDRF) by Dalessandro et al. is appropriate for a class of privatization-safe TMs, which allow using privatization idioms. We prove that, if such a TM satisfies a condition we call privatization-safe opacity and a program using the TM is TDRF under strongly atomic semantics, then the program indeed has such semantics. We also present a method for proving privatization-safe opacity that reduces proving this generalization to proving the usual opacity, and apply the method to a TM based on two-phase locking and a privatization-safe version of TL2. Finally, we establish the inherent cost of privatization-safety: we prove that a TM cannot be progressive and have invisible reads if it guarantees strongly atomic semantics for TDRF programs

    The Transactional Conflict Problem

    Full text link
    The transactional conflict problem arises in transactional systems whenever two or more concurrent transactions clash on a data item. While the standard solution to such conflicts is to immediately abort one of the transactions, some practical systems consider the alternative of delaying conflict resolution for a short interval, which may allow one of the transactions to commit. The challenge in the transactional conflict problem is to choose the optimal length of this delay interval so as to minimize the overall running time penalty for the conflicting transactions. In this paper, we propose a family of optimal online algorithms for the transactional conflict problem. Specifically, we consider variants of this problem which arise in different implementations of transactional systems, namely "requestor wins" and "requestor aborts" implementations: in the former, the recipient of a coherence request is aborted, whereas in the latter, it is the requestor which has to abort. Both strategies are implemented by real systems. We show that the requestor aborts case can be reduced to a classic instance of the ski rental problem, while the requestor wins case leads to a new version of this classical problem, for which we derive optimal deterministic and randomized algorithms. Moreover, we prove that, under a simplified adversarial model, our algorithms are constant-competitive with the offline optimum in terms of throughput. We validate our algorithmic results empirically through a hardware simulation of hardware transactional memory (HTM), showing that our algorithms can lead to non-trivial performance improvements for classic concurrent data structures

    Inherent Limitations of Hybrid Transactional Memory

    Full text link
    Several Hybrid Transactional Memory (HyTM) schemes have recently been proposed to complement the fast, but best-effort, nature of Hardware Transactional Memory (HTM) with a slow, reliable software backup. However, the fundamental limitations of building a HyTM with nontrivial concurrency between hardware and software transactions are still not well understood. In this paper, we propose a general model for HyTM implementations, which captures the ability of hardware transactions to buffer memory accesses, and allows us to formally quantify and analyze the amount of overhead (instrumentation) of a HyTM scheme. We prove the following: (1) it is impossible to build a strictly serializable HyTM implementation that has both uninstrumented reads and writes, even for weak progress guarantees, and (2) under reasonable assumptions, in any opaque progressive HyTM, a hardware transaction must incur instrumentation costs linear in the size of its data set. We further provide two upper bound implementations whose instrumentation costs are optimal with respect to their progress guarantees. In sum, this paper captures for the first time an inherent trade-off between the degree of concurrency a HyTM provides between hardware and software transactions, and the amount of instrumentation overhead the implementation must incur
    corecore