Quarantining Weakness

نویسندگان

  • Radha Jagadeesan
  • Gustavo Petri
  • Corin Pitcher
  • James Riely
چکیده

In sequential computing, every method of an object can be described in isolation via preconditions and postconditions. However, reasoning in a concurrent setting requires a characterization of all possible interactions across method invocations. Herlihy and Wing [1990]’s notion of linearizability simplifies such reasoning by intuitively ensuring that each method invocation “takes effect” between its invocation and response events. This approach had two basic shortcomings. Firstly, in Herlihy and Wing’s definition of linearizability, the interfaces are not expressive enough to codify external calls emanating from the component. Thus, objects are closed and passive. Secondly, the definitions are for a memory model with a global total order on memory operations, thus satisfying sequential consistency (SC). SC is not realized by all architectures or runtime systems [Adve and Gharachorloo 1996; Adve and Boehm 2010], motivating models of relaxed memory in hardware, such as TSO [Sewell et al. 2010], PSO [SPARC, Inc. 1994], Power [Sarkar et al. 2011], and runtime systems, such as Java [Manson et al. 2005; Sevcík 2008] and C++ [Boehm and Adve 2008; Batty et al. 2011]. This has motivated recent definitions of linearizability specific to the TSO [Burckhardt et al. 2012; Gotsman et al. 2012] and C11 [Batty et al. 2013] memory models. We propose new definitions to address both of these limitations. Our methodology aims to keep the interfaces free of the intricacies of particular relaxed memory models. Our approach has the following characteristics. (1) We model calls to component functions process-algebraically. This allows us to treat callbacks and to give a symmetric definition of composition between clients and libraries. Thus, our definitions encompass active components (that can evolve autonomously even without input from the environment) and open components (that invoke methods on components provided by the environment) and environment assumptions (pre/postconditions and the permitted sequences of method calls to a component). (2) Our definitions are not specific to a particular memory model. Rather, we identify the criteria that a relaxed memory model needs to satisfy in order to fit into our framework: the examples that satisfy our criteria include SC, TSO, PSO and a variant of the Java Memory Model (JMM).

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Quarantine Plasma: Quo vadis?

Upon the introduction of mandatory nucleic acid amplification technology (NAT) testing in Germany for HCV, quarantining of fresh frozen plasma (FFP) was reduced in 2002 from 6 to 4 months. In 2004 HIV-1 NAT and in 2005 anti-HBc testing were introduced to further reduce the residual transmission risks for transfusion relevant viruses. After testing more than 40 million donations by HCV NAT it be...

متن کامل

On Optimal Screening and Quarantining Policy in a Network of Prisons

Abstract. In this paper, we propose mathematical models for the spread of HIV in a network of prisons. We study the effect of both screening prisoners and quarantining infectives. Efficient algorithms based on Newton’s method are then developed for computing the equilibrium values of the infectives in each prison. We also give an optimization formulation for obtaining the optimal screening and ...

متن کامل

Fall 2016 - CMPS 242 - The Final Report of Quarantine deceiving Yelp's users by detecting unreliable rating reviews

The purpose of this paper is to describe the authors’ focus on quarantining deceiving Yelp’s users that employs both review spike detection (RSD) algorithm and spam detection technique in bridging review networks (BRN), on extracted key features.

متن کامل

A Reputation-based System for the Quarantine of Random Scanning Worms

The Internet infrastructure, which has become so critical in our everyday lives, needs automated protection from worm attacks. We propose a system that uses the ideas of reputation and recommendation to effectively quarantine random scanning worms on the Internet. A trust model, based on the passing of recommendations among participating autonomous systems, is used to modulate a localized reput...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2013