315 research outputs found

    Efficient Logging in Non-Volatile Memory by Exploiting Coherency Protocols

    Get PDF
    Non-volatile memory (NVM) technologies such as PCM, ReRAM and STT-RAM allow processors to directly write values to persistent storage at speeds that are significantly faster than previous durable media such as hard drives or SSDs. Many applications of NVM are constructed on a logging subsystem, which enables operations to appear to execute atomically and facilitates recovery from failures. Writes to NVM, however, pass through a processor's memory system, which can delay and reorder them and can impair the correctness and cost of logging algorithms. Reordering arises because of out-of-order execution in a CPU and the inter-processor cache coherence protocol. By carefully considering the properties of these reorderings, this paper develops a logging protocol that requires only one round trip to non-volatile memory while avoiding expensive computations. We show how to extend the logging protocol to building a persistent set (hash map) that also requires only a single round trip to non-volatile memory for insertion, updating, or deletion

    Espaces du cinéma et labyrinthes de l'histoire

    Get PDF
    Espaces mobiles et immobiles dans M. Klein de Joseph Losey: la juxtaposition des labyrinthes horizontaux et verticaux, le dialogisme du plan et du tableau tracent le parcours de Klein jusqu'à la fin. Espace et histoire: impression de réalité. Espace de l'angoisse: un détour par Murnau et Rhomer. Du champ aveugle au labyrinthe: le hors-champ impose son obsédante évidence. Labyrinthe et cir-ularité allégorique.Mobile and static space in Joseph Loseys M. Klein: the juxtaposition of horizontaland vertical mazes and the constant cross reference from allegorical tapestry to city plan leads Klein to an inevitable « dead end». Impressions of reality created by space and history. Through the eyes of Murnau and Rohmer, space becomes a medium for the expression of anguish. From the hidden space to the maze: the hidden off-screen space reveals its overwhelming presence. Vertical and horizontal mazes merge into an all encompassing allegory

    EnergAt: Fine-Grained Energy Attribution for Multi-Tenancy

    Full text link
    In the post-Moore's Law era, relying solely on hardware advancements for automatic performance gains is no longer feasible without increased energy consumption, due to the end of Dennard scaling. Consequently, computing accounts for an increasing amount of global energy usage, contradicting the objective of sustainable computing. The lack of hardware support and the absence of a standardized, software-centric method for the precise tracing of energy provenance exacerbates the issue. Aiming to overcome this challenge, we argue that fine-grained software energy attribution is attainable, even with limited hardware support. To support our position, we present a thread-level, NUMA-aware energy attribution method for CPU and DRAM in multi-tenant environments. The evaluation of our prototype implementation, EnergAt, demonstrates the validity, effectiveness, and robustness of our theoretical model, even in the presence of the noisy-neighbor effect. We envisage a sustainable cloud environment and emphasize the importance of collective efforts to improve software energy efficiency.Comment: 8 pages, 4 figures; Published in HotCarbon 2023; Artifact available at https://github.com/HongyuHe/energa

    Brief Announcement: Survey of Persistent Memory Correctness Conditions

    Get PDF
    In this brief paper, we survey existing correctness definitions for concurrent persistent programs

    Epidemiological and Virological Characterization of Influenza B Virus Infections

    Get PDF
    While influenza A viruses comprise a heterogeneous group of clinically relevant influenza viruses, influenza B viruses form a more homogeneous cluster, divided mainly into two lineages: Victoria and Yamagata. This divergence has complicated seasonal influenza vaccine design, which traditionally contained two seasonal influenza A virus strains and one influenza B virus strain. We examined the distribution of the two influenza B virus lineages in Israel, between 2011-2014, in hospitalized and in non-hospitalized (community) influenza B virus-infected patients. We showed that influenza B virus infections can lead to hospitalization and demonstrated that during some winter seasons, both influenza B virus lineages circulated simultaneously in Israel. We further show that the influenza B virus Yamagata lineage was dominant, circulating in the county in the last few years of the study period, consistent with the anti-Yamagata influenza B virus antibodies detected in the serum samples of affected individuals residing in Israel in the year 2014. Interestingly, we found that elderly people were particularly vulnerable to Yamagata lineage influenza B virus infections

    Brief Announcement: A Persistent Lock-Free Queue for Non-Volatile Memory

    Get PDF
    Non-volatile memory is expected to coexist with (or even displace) volatile DRAM for main memory in upcoming architectures. As a result, there is increasing interest in the problem of designing and specifying durable data structures that can recover from system crashes. Data-structures may be designed to satisfy stricter or weaker durability guarantees to provide a balance between the strength of the provided guarantees and performance overhead. This paper proposes three novel implementations of a concurrent lock-free queue. These implementations illustrate the algorithmic challenges in building persistent lock-free data structures with different levels of durability guarantees. We believe that by presenting these challenges, along with the proposed algorithmic designs, and the possible levels of durability guarantees, we can shed light on avenues for building a wide variety of durable data structures. We implemented the various designs and evaluate their performance overhead compared to a simple queue design for standard (volatile) memory

    Viral infection reveals hidden sharing of TCR CDR3 sequences between individuals

    Get PDF
    The T cell receptor is generated by a process of random and imprecise somatic recombination. The number of possible T cell receptors which this process can produce is enormous, greatly exceeding the number of T cells in an individual. Thus, the likelihood of identical TCRs being observed in multiple individuals (public TCRs) might be expected to be very low. Nevertheless such public TCRs have often been reported. In this study we explore the extent of TCR publicity in the context of acute resolving Lymphocytic choriomeningitis virus (LCMV) infection in mice. We show that the repertoire of effector T cells following LCMV infection contains a population of highly shared TCR sequences. This subset of TCRs has a distribution of naive precursor frequencies, generation probabilities, and physico-chemical CDR3 properties which lie between those of classic public TCRs, which are observed in uninfected repertoires, and the dominant private TCR repertoire. We have named this set of sequences "hidden public" TCRs, since they are only revealed following infection. A similar repertoire of hidden public TCRs can be observed in humans after a first exposure to SARS-COV-2. The presence of hidden public TCRs which rapidly expand following viral infection may therefore be a general feature of adaptive immunity, identifying an additional level of inter-individual sharing in the TCR repertoire which may form an important component of the effector and memory response

    Identification and Inference with Many Invalid Instruments

    Get PDF
    We analyze linear models with a single endogenous regressor in the presence of many instrumental variables. We weaken a key assumption typically made in this literature by allowing all the instruments to have direct effects on the outcome. We consider restrictions on these direct effects that allow for point identification of the effect of interest. The setup leads to new insights concerning the properties of conventional estimators, novel identification strategies, and new estimators to exploit those strategies. A key assumption underlying the main identification strategy is that the product of the direct effects of the instruments on the outcome and the effects of the instruments on the endogenous regressor has expectation zero. We argue in the context of two specific examples with a group structure that this assumption has substantive content.
    • 

    corecore