skip to main content
article
Free Access

Evaluation of memory system extensions

Authors Info & Claims
Published:01 April 1991Publication History
First page image

References

  1. Bel66 L.A. Belady. A study of replacement algorithms for virtual storage computers. IBM Systems Journal, 5(2):78-101, 1966.Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. BFS89 W.J. Bolosky, R.P. Fitzgerald, and M.L. Scott. Simple but effective techniques for numa memory management. In Proceedings of the Twelfth Symposium on Operating Systems Principles, pages 19-31, December 1989. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. BG68 B.Brawn and F.G. Gustavson. Program behavior in a paging environment. In 1968 AFIPS Procvvding of thv Fall Joint Computing Conference, pages 1019-1032, 1968.Google ScholarGoogle Scholar
  4. CF89 A.L. Cox and R.J. Fowler. The implementation of a coherent memory abstraction on a numa multiprocessor: Experiences with platinum. In Proceedings of the Twelfth Symposium on Operating Systems Principles, pages 32-44, December 1989. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. CG90 D. Comer and J. Griffoen. A new design for distributed systems: The remote memory model. In Proceedings of the USENIX Summer Conference, pages 127-135, Anaheim, California, June 1990.Google ScholarGoogle Scholar
  6. CKB89 E.I. Cohen, G. M. King, and J. T. Brady. Storage hierarchies. IBM Systems Journal, 28(1), 1989. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Den70 Peter J. Denning. Virtual memory. ACM Computing Surveys, 2(3):153-189, September 1970. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. Den80 Peter J. Denning. Working sets past and present. IEEE Transactions on Software Engineering, SE-6(1):64-84, January 1980.Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. Ekl J.O. Eklundh. Efficient matrix transposition. In T. S. Huang, editor, Topics in Applied Physics, Two Dimensional Digital Processing II, volume 43, pages 9-35. Springer Verlag, Berlin Heidelberg New York.Google ScholarGoogle Scholar
  10. Fel90 Edward Felten. Distributed virtual memory. Presentation in Topaz User Group Meeting, DECSRC, June 1990.Google ScholarGoogle Scholar
  11. Gec74 J. Gecsei. Determining hit ratios for multilevel hierarchies. IBM Journal of Research and Development, 18(4):316-327, July 1974.Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. GMCHL84 H. Garcia-Molina, R. Cullingford, P. Honeyman, and R. Lipton. Mmm performance on certain database benchmarks. Technical Report 327, Department of EE and Computer Science, Princeton University, May 1984.Google ScholarGoogle Scholar
  13. GMLV83 H. Garcia-Molina, R. J. Lipton, and J. Valdes. Analysis of the massive memory architectures. Technical Report 313, Department of EE and Computer Science, Princeton University, May 1983.Google ScholarGoogle Scholar
  14. GMLV84 H. Garcia-Molina, R. J. Lipton, and J. Valdes. A massive memory machine. IEEE Transactions on Computers, C-33(5):391-399, May 1984.Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. LE90 Richard P. LaRowe and Carla S. Ellis. Experimental comparison of memory management policies for numa multiprocessors. Technical Report CS-1990-10, Duke University, 1990. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. LH89 Kai Li and Paul Hudak. Memory coherence in shared virtual memory systems. ACM Transactions on Computer Systems, 7(4):321-359, November 1989. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. LN88 Kai Li and Jeffrey F. Naughton. Multiprocessot main memory transaction processing. In Proceedings of the International Symposium on Database in Parallel and Distributed Systems, pages 177-187, December 1988. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. LS89 Kai Li and Richard Schaefer. A hypercube shared virtual memory. In Proceedings of the 1989 international Parallel Processing Conference, volume Vol:I Architecture, pages 125- 132, August 1989.Google ScholarGoogle Scholar
  19. MGST70 R.L. Mattson, J. Gecsei, D.R. Shtz, and I.L. Traiger. Evaluation techniques for storage hierarchies. IBM Systems Journal, 9(2):78-117, 1970.Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. Ous90 J.K. Ousterhout. Why aren't operating systems getting faster as fast as }hardware? In Proceedings o/ the USENIX Summer Conference, pages 247-256, Anaheim, California, June 1990.Google ScholarGoogle Scholar
  21. PACS73 A.V. Pohm, O.P. Agrawal, C.\~. Cheng, and A.C. Shimp. An efficient flexible buffered memory system. IEEE Transactions on Magnetics, MAG-9(3):173-179, SepLember 1973.Google ScholarGoogle Scholar
  22. RTY+88 R.F. Rashid, A. Tevanian, M. Young, D. Golub, R. Baron, D. Black, W. Bolosky, and J. Chew. Machine-independent virtual memory management for paged uniprocessor and multiprocessor architectures. ~rEEE Transactions on Computers, 37(8):896-908, August 1988. Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. SGM90 Kenneth Salem and Hector Garcia-Molina. System m: A transaction processing testbed for memory resident data. JrEEE Transactions on Knowledge and Data Engineering, 2(1):161-172, March 1990. Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. Smi82 Alan J. Smith. Cache memories. A CM Computing Surveys, 14(3):473-530, September 1982. Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. Smi85 Alan J. Smith. Disk cachemmiss ratio analysis and design considerations. ACM Transactions on Computer Systems, 3(3):161-203, August 1985. Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. Sto84 Michael Stonebraker. Virtual memory transaction processing. Operating Systems Review, 18(2):8-16, April 1984. Google ScholarGoogle ScholarDigital LibraryDigital Library
  27. Tuc86 S.G. Tucker. The ibm 3090 sytem: An overview. IBM Systems Journal, 25(1), 1986.Google ScholarGoogle ScholarDigital LibraryDigital Library
  28. VME85 Vmebus specification manual. Revision C, February 1985.Google ScholarGoogle Scholar
  29. You89 M. Young. Exporting a User ln~.erface to Memory Management from a Communication Oriented Operating System. PhD thesis, Carnegie Mellon University, 1989. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Evaluation of memory system extensions

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in

      Full Access

      • Published in

        cover image ACM SIGARCH Computer Architecture News
        ACM SIGARCH Computer Architecture News  Volume 19, Issue 3
        Special Issue: Proceedings of the 18th annual international symposium on Computer architecture (ISCA '91)
        May 1991
        375 pages
        ISSN:0163-5964
        DOI:10.1145/115953
        Issue’s Table of Contents
        • cover image ACM Conferences
          ISCA '91: Proceedings of the 18th annual international symposium on Computer architecture
          April 1991
          399 pages
          ISBN:0897913949
          DOI:10.1145/115952

        Copyright © 1991 Authors

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 1 April 1991

        Check for updates

        Qualifiers

        • article

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader