• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Song Wei, Yang Xuejun. Error Detection by Redundant Transaction in Transactional Memory System[J]. Journal of Computer Research and Development, 2013, 50(5): 1085-1099.
Citation: Song Wei, Yang Xuejun. Error Detection by Redundant Transaction in Transactional Memory System[J]. Journal of Computer Research and Development, 2013, 50(5): 1085-1099.

Error Detection by Redundant Transaction in Transactional Memory System

More Information
  • Published Date: May 14, 2013
  • This paper addresses the issue of error detection in transactional memory, and proposes a new method of error detection based on redundant transaction (EDRT). This method creates a transaction copy for every transaction, and executes both original transactions and transaction copies on adequate processor cores, and achieves error detection by comparing the execution results. EDRT utilizes the data-versioning mechanism of transactional memory to achieve the acquisition of an approximate minimum error detection comparison data set, and the acquisition is transparent and online. This paper applies EDRT to the log-based transactional memory, and proposes the solution to the designing problems of the fault-tolerant log-based transactional memory. Finally, this paper validates the EDRT through five test programs, including four SPLASH-2 benchmarks. The experimental results show that the average error detecting cost is about 3.68% relative to the whole program, and it is only about 12.07% relative to the transaction parts of the program. Compared with the dual modular redundancy error detection mechanism (DMR), the average error detecting cost ratio between the EDRT and the DMR is only about 0.05%.
  • Related Articles

    [1]Huang Kezhen, Lian Yifeng, Feng Dengguo, Zhang Haixia, Liu Yuling, Ma Xiangliang. Cyber Security Threat Intelligence Sharing Model Based on Blockchain[J]. Journal of Computer Research and Development, 2020, 57(4): 836-846. DOI: 10.7544/issn1000-1239.2020.20190404
    [2]Deng Li, Wu Weinan, Zhu Zhengyi, Chen Ming. DiffSec: A Differentiated Intelligent Network Security Service Model[J]. Journal of Computer Research and Development, 2019, 56(5): 955-966. DOI: 10.7544/issn1000-1239.2019.20190019
    [3]Liu Yuling, Feng Dengguo, Lian Yifeng, Chen Kai, Wu Di. Network Situation Prediction Method Based on Spatial-Time Dimension Analysis[J]. Journal of Computer Research and Development, 2014, 51(8): 1681-1694. DOI: 10.7544/issn1000-1239.2014.20121050
    [4]Bu Ning, Liu Yuling, Lian Yifeng, Huang Liang. UML-Based Modeling Method of Network Security Infrastructure[J]. Journal of Computer Research and Development, 2014, 51(7): 1578-1593.
    [5]Wu Yue, Li Jianhua, Lin Chuang. Survey of Security and Trust in Opportunistic Networks[J]. Journal of Computer Research and Development, 2013, 50(2): 278-290.
    [6]Hu Jianli, Zhou Bin, Wu Quanyuan, Li Xiaohua. A Reputation Based Attack-Resistant Distributed Trust Management Model for P2P Networks[J]. Journal of Computer Research and Development, 2011, 48(12): 2235-2241.
    [7]Chen Feng, Liu Dehui, Zhang Yi, Su Jishu. A Hierarchical Evaluation Approach for Network Security Based on Threat Spread Model[J]. Journal of Computer Research and Development, 2011, 48(6): 945-954.
    [8]Lin Wangqun, Wang Hui, Liu Jiahong, Deng Lei, Li Aiping, Wu Quanyuan, and Jia Yan. Research on Active Defense Technology in Network Security Based on Non-Cooperative Dynamic Game Theory[J]. Journal of Computer Research and Development, 2011, 48(2): 306-316.
    [9]Luo Junhai and Fan Mingyu. Research on Trust Model Based on Game Theory in Mobile Ad-Hoc Networks[J]. Journal of Computer Research and Development, 2008, 45(10): 1704-1710.
    [10]Zhang Haixia, Su Purui, and Feng Dengguo. A Network Security Analysis Model Based on the Increase in Attack Ability[J]. Journal of Computer Research and Development, 2007, 44(12): 2012-2019.

Catalog

    Article views (869) PDF downloads (424) Cited by()

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return