An empirical comparison of monitoring algorithms for access anomaly detection
- 1 February 1990
- proceedings article
- Published by Association for Computing Machinery (ACM)
- Vol. 25 (3) , 1-10
- https://doi.org/10.1145/99163.99165
Abstract
One of the major disadvantages of parallel programming with shared memory is the nondeterministic behavior caused by uncoordinated access to shared variables, known as access anomalies. Monitoring program execution to detect access anomalies is a promising and relatively unexplored approach to this problem. We present a new algorithm, referred to as task recycling, for detecting anomalies, and compare it to an existing algorithm. Empirical results indicate several significant conclusions: (i) While space requirements are bounded by &Ogr;(T × V), where T is the maximum number of threads that may potentially execute in parallel and V is the number of variable monitored, for typical programs space requirements are on average &Ogr;(V). (ii) Task recycling is more efficient in terms of space requirements and often in performance. (iii) The general approach of monitoring to detect access anomalies is practical.Keywords
This publication has 5 references indexed in Scilit:
- On-the-fly detection of access anomaliesPublished by Association for Computing Machinery (ACM) ,1989
- Static analysis of low-level synchronizationPublished by Association for Computing Machinery (ACM) ,1988
- Automatic detection of nondeterminacy in parallel programsPublished by Association for Computing Machinery (ACM) ,1988
- A mechanism for efficient debugging of parallel programsPublished by Association for Computing Machinery (ACM) ,1988
- Time, clocks, and the ordering of events in a distributed systemCommunications of the ACM, 1978