PPT-An Analysis of Persistent Memory Use with WHISPER

Author : natalia-silvester | Published Date : 2018-10-06

S anketh Nalli Swapnil Haria Michael M Swift Mark D Hill H aris Volos Kimberly Keeton University of WisconsinMadison amp HewlettPackard Labs Facilitate

Presentation Embed Code

Download Presentation

Download Presentation The PPT/PDF document "An Analysis of Persistent Memory Use wit..." is the property of its rightful owner. Permission is granted to download and print the materials on this website for personal, non-commercial use only, and to display it on your personal computer provided you do not modify the materials and that you retain all copyright notices contained in the materials. By downloading content from our website, you accept the terms of this agreement.

An Analysis of Persistent Memory Use with WHISPER: Transcript


S anketh Nalli Swapnil Haria Michael M Swift Mark D Hill H aris Volos Kimberly Keeton University of WisconsinMadison amp HewlettPackard Labs Facilitate better system support for Persistent . Extract Illegitimate . Code for Malware Analysis. Carsten. Willems. 1. , . Thorsten . Holz. 1. , . Felix . Freiling. 2. 1. Ruhr-University Bochum, Germany. 2. University of Erlangen, Germany. Annual Computer Security Applications Conference (ACSAC) 2012. Dark: Analysis . of an Anonymous Social Network . Gang Wang. , Bolun Wang, Tianyi Wang, Ana Nika, . Haitao . Zheng, Ben Y. Zhao . UC Santa Barbara. gangw@cs.ucsb.edu. IMC’14. Concerns of Using Online Social Networks. Dark: Analysis . of an Anonymous Social Network . Gang Wang. , Bolun Wang, Tianyi Wang, Ana Nika, . Haitao . Zheng, Ben Y. Zhao . UC Santa Barbara. gangw@cs.ucsb.edu. IMC’14. Concerns of Using Online Social Networks. S. anketh. . Nalli. , Swapnil . Haria. Michael . M. . Swift. , Mark D. Hill. H. aris. Volos*, Kimberly Keeton*. University of Wisconsin-Madison &. *Hewlett-Packard . Labs . (HP. L. ). WHISPER. Facilitate better system support for Persistent . Emerging Persistent . Memory Technologies. Phase change memory. Heat changes memory . cells . between crystalline and amorphous states. Spin torque memory/MRAM. Magnetic layers within . m. emory cells . a prayer in the morning,. Whisper . a prayer at noon,. Whisper . a prayer in the evening,. To . keep your heart in tune. . . . God . answers prayer in the morning,. God . answers prayer at noon,. Youyou. Lu. 1. , . Jiwu. Shu. 1. , . Long Sun. 1. , . Onur. Mutlu. 2. 1. Tsinghua University. 2. Carnegie Mellon University. Problem:. . Strict write ordering . required for storage consistency dramatically degrades performance in persistent memory. S. anketh. Nalli. , Swapnil . Haria. , . Michael . M. . Swift. , . Mark D. Hill, H. aris. Volos*, Kimberly Keeton*. University of Wisconsin-Madison &. *Hewlett-Packard . Labs. Facilitate better system support for Persistent . Koo. sm.koo1989@gmail.com. “NVM Duet: Unified Working Memory and Persistent Store Architecture”. Ren-. Shuo. Liu, De-Yu Shen, Chia-Lin Yang, Shun-. Chih. Yu, Cheng-Yuan Michael Wang. Index. Background. Emerging Persistent . Memory Technologies. Phase change memory. Heat changes memory . cells . between crystalline and amorphous states. Spin torque memory/MRAM. Magnetic layers within . m. emory cells . Jihye . Seo. , . Wook-Hee. Kim, . Woongki. . Baek. , . Beomseok. Nam, Sam H. Noh. UNIST . (Ulsan National Institute of Science and Technology) . ASPLOS’17,. Contents. Introduction. Leveraging Persistent Memory in DBMS. S. anketh. . Nalli. , Swapnil . Haria. Michael . M. . Swift. , Mark D. Hill. H. aris. Volos*, Kimberly Keeton*. University of Wisconsin-Madison &. *Hewlett-Packard . Labs . (HP. L. ). WHISPER. Facilitate better system support for Persistent . BYTE ADDR. NONVOLATILE. PERSISTENT MEMORY. CPU. PERSISTENTMEMORY. Provides an opportunity to manipulate persistent data directly. Ld/St. NVM. FAST. BYTE ADDR. NONVOLATILE. WHAT HAPPENS WHEN . WE RUN AN APPLICATION?. Prof. Onur Mutlu. Carnegie Mellon University. Emerging Memory Technologies Lectures. These slides are . from the . Scalable . Memory Systems. course . taught at . ACACES . 2013 (July 15-19, 2013). Course Website:.

Download Document

Here is the link to download the presentation.
"An Analysis of Persistent Memory Use with WHISPER"The content belongs to its owner. You may download and print it for personal use, without modification, and keep all copyright notices. By downloading, you agree to these terms.

Related Documents