An Efficient Framework for Implementing Persistent Data Structures on Asymmetric NVM Architecture

Total Page:16

File Type:pdf, Size:1020Kb

An Efficient Framework for Implementing Persistent Data Structures on Asymmetric NVM Architecture AsymNVM: An Efficient Framework for Implementing Persistent Data Structures on Asymmetric NVM Architecture Teng Ma Mingxing Zhang Kang Chen∗ [email protected] [email protected] [email protected] Tsinghua University Tsinghua University & Sangfor Tsinghua University Beijing, China Shenzhen, China Beijing, China Zhuo Song Yongwei Wu Xuehai Qian [email protected] [email protected] [email protected] Alibaba Tsinghua University University of Southern California Beijing, China Beijing, China Los Angles, CA Abstract We build AsymNVM framework based on AsymNVM ar- The byte-addressable non-volatile memory (NVM) is a promis- chitecture that implements: 1) high performance persistent ing technology since it simultaneously provides DRAM-like data structure update; 2) NVM data management; 3) con- performance, disk-like capacity, and persistency. The cur- currency control; and 4) crash-consistency and replication. rent NVM deployment with byte-addressability is symmetric, The key idea to remove persistency bottleneck is the use of where NVM devices are directly attached to servers. Due to operation log that reduces stall time due to RDMA writes and the higher density, NVM provides much larger capacity and enables efficient batching and caching in front-end nodes. should be shared among servers. Unfortunately, in the sym- To evaluate performance, we construct eight widely used metric setting, the availability of NVM devices is affected by data structures and two transaction applications based on the specific machine it is attached to. High availability canbe AsymNVM framework. In a 10-node cluster equipped with achieved by replicating data to NVM on a remote machine. real NVM devices, results show that AsymNVM achieves However, it requires full replication of data structure in local similar or better performance compared to the best possible memory — limiting the size of the working set. symmetric architecture while enjoying the benefits of disag- This paper rethinks NVM deployment and makes a case gregation. We found the speedup brought by the proposed for the asymmetric byte-addressable non-volatile memory optimizations is drastic, — 5∼12× among all benchmarks. architecture, which decouples servers from persistent data CCS Concepts • Computer systems organization → storage. In the proposed AsymNVM architecture, NVM de- Processors and memory architectures; • Information vices (i.e., back-end nodes) can be shared by multiple servers systems → Data centers; • Hardware → Non-volatile mem- (i.e., front-end nodes) and provide recoverable persistent data ory. structures. The asymmetric architecture, which follows the industry trend of resource disaggregation, is made possible Keywords memory architectures; persistent memory; RDMA due to the high-performance network (e.g., RDMA). At the ACM Reference Format: same time, AsymNVM leads to a number of key problems Teng Ma, Mingxing Zhang, Kang Chen, Zhuo Song, Yongwei Wu, such as, still relatively long network latency, persistency bot- and Xuehai Qian. 2020. AsymNVM: An Efficient Framework for Im- tleneck, and simple interface of the back-end NVM nodes. plementing Persistent Data Structures on Asymmetric NVM Archi- tecture. In Proceedings of the Twenty-Fifth International Conference ∗Corresponding Author. on Architectural Support for Programming Languages and Operating Permission to make digital or hard copies of all or part of this work for Systems (ASPLOS ’20), March 16–20, 2020, Lausanne, Switzerland. personal or classroom use is granted without fee provided that copies are not ACM, New York, NY, USA, 17 pages. https://doi.org/10.1145/3373376. made or distributed for profit or commercial advantage and that copies bear 3378511 this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to 1 Introduction redistribute to lists, requires prior specific permission and/or a fee. Request Emerging non-volatile memory (NVM) is blurring the line permissions from [email protected]. between memory and storage. These kinds of memories, such ASPLOS ’20, March 16–20, 2020, Lausanne, Switzerland © 2020 Association for Computing Machinery. as Intel Optane DC persistent memory [43], phase change ACM ISBN 978-1-4503-7102-5/20/03...$15.00 memory (PCM) [9, 54, 103], spin-transfer torque magnetic https://doi.org/10.1145/3373376.3378511 memory (STTM) [4], and memristor are byte-addressable, ASPLOS ’20, March 16–20, 2020, Lausanne, Switzerland Teng Ma, Mingxing Zhang, Kang Chen, Zhuo Song, Yongwei Wu, and Xuehai Qian and provide DRAM-like performance (300ns/100ns latency disaggregated resources that are not associated with any for read/write), high density (TB-scale), and persistency at server. It also improves the availability since the crash of a the same time [45, 99]. To unleash the potential of NVM, most server will not affect NVM devices. existing solutions attach NVM directly to processors [14, 28, The main principle of AsymNVM architecture is to use 62, 92, 94], enabling high-performance implementations of high-performance network (RDMA) to access remote NVM persistent data structures using load and store instructions and local DRAM as cache to ensure high performance. The on local memory. concrete design poses several key challenges. First, directly While accessing NVM via local memory provides promis- replacing local store and load instructions with RDMA_Write ing performance, it is not the most suitable setting in the and RDMA_Read still suffers from long network latency. Al- context of data center due to the desire of sharing NVM. Due though the throughput of RDMA over InfiniBand is compa- to the higher density, NVM can provide much larger ca- rable to the throughput of NVM, NIC still cannot provide pacity [45, 64], which may exceed the need of a single ma- enough IOPS for fine-grained data structure accesses. Second, chine [5]. In data center servers, the resources are often using local DRAM as cache should be carefully considered under utilized [19, 23], — Google’s study [29] shows the re- with the persistency semantics. Third, we need to ensure that source utilization lower than 40% on average. We expect that the interface of back-end nodes is both simple and efficient. persistent resource utilization will follow the same trend. Based on AsymNVM architecture, this paper builds Asym- To enable NVM sharing, recent work [81] builds a dis- NVM framework that implements byte-level data structures tributed shared persistent memory system, which provides updates with high performance and availability. To efficiently a global, shared, and persistent memory space for a pool of solve the three challenges, the framework efficiently imple- machines with NVMs attached to each at the main memory ments four components: 1) to remove persistency bottleneck, bus. This setting inherently affect availability: once an NVM high performance byte-level persistent data structure update device is attached to a specific machine, its data become un- is supported by operation log that reduces the stall due to available when the host machine goes down. One solution RDMA writes and enables efficient communication batch- to this problem is to replicate the data to a remote NVM [44]. ing and DRAM caching (Section4); 2) NVM data manage- However, it requires full replication of data structures in ment that handles non-volatile memory allocation and free, local memory, limiting the size of the working set. To access and metadata storage (Section5); 3) concurrency control that the replicated data, the lower-bound of network overhead is supports both lock-free and lock-based data structures (Sec- at least one network round-trip for each operation. tion6); and 4) crash-consistency and replication that ensures In essence, these challenges are due to the symmetric na- correct recovery and availability (Section7). Moreover, we ture of most of the current NVM deployment [44, 81, 83]. To apply several data structure specific optimizations to further fundamentally overcome the drawbacks, we rethink NVM improve performance (Section8). deployment and propose the byte-addressable asymmetric To evaluate the performance of AsymNVM framework, NVM architecture, in which NVM devices are not associ- we choose eight widely used data structures and two appli- ated with the individual machine and accessed at byte-level cations (TATP/SmallBank), and use traces of industry work- only passively via fast network. In AsymNVM architecture, loads. The data structures/applications are executed in a the number of NVM devices, which can be provided as spe- 10-node cluster, in which at most three machines are used as cialized “blades”, can be much smaller than the number of the back-end node and mirror nodes. The results show that machines. AsymNVM achieves similar or better performance compared AsymNVM architecture follows the recent trend of dis- to the best possible symmetric architecture while enjoying aggregation architecture, which was first proposed for ca- benefits of disaggregation. Speedup brought by the proposed pacity expansion and memory resource sharing by Lim et optimizations is drastic, — 5∼12× among all benchmarks. al. [59, 60]. As described by Gao et al. [26], disaggregated architecture is a paradigm shift from servers each tightly integrated with a small amount of various resources (e.g., CPU, memory [30, 67, 68], storage [65]) to the disaggregated 2 Background data center built as a pool of standalone resource blades and Single-Node Local NVM. In this setting, NVM device is interconnected using a network fabric. In industry, Intel’s directly accessed via the processor-memory bus using load- RSD [39] and HP’s “The Machine” [74] are state-of-the-art /store instructions. It avoids the overhead of legacy block- disaggregation architecture products. Such systems are not oriented file-systems/databases. Instead, it allows persistent limited by the capability of a single machine and can pro- data structure updates at byte level without the need for vide better resource utilization and the ease of hardware serialization.
Recommended publications
  • The Hmong Culture: Kinship, Marriage & Family Systems
    THE HMONG CULTURE: KINSHIP, MARRIAGE & FAMILY SYSTEMS By Teng Moua A Research Paper Submitted in Partial Fulfillment of the Requirements for the Master of Science Degree With a Major in Marriage and Family Therapy Approved: 2 Semester Credits _________________________ Thesis Advisor The Graduate College University of Wisconsin-Stout May 2003 i The Graduate College University of Wisconsin-Stout Menomonie, Wisconsin 54751 ABSTRACT Moua__________________________Teng_____________________(NONE)________ (Writer) (Last Name) (First) (Initial) The Hmong Culture: Kinship, Marriage & Family Systems_____________________ (Title) Marriage & Family Therapy Dr. Charles Barnard May, 2003___51____ (Graduate Major) (Research Advisor) (Month/Year) (No. of Pages) American Psychological Association (APA) Publication Manual_________________ (Name of Style Manual Used In This Study) The purpose of this study is to describe the traditional Hmong kinship, marriage and family systems in the format of narrative from the writer’s experiences, a thorough review of the existing literature written about the Hmong culture in these three (3) categories, and two structural interviews of two Hmong families in the United States. This study only gives a general overview of the traditional Hmong kinship, marriage and family systems as they exist for the Hmong people in the United States currently. Therefore, it will not cover all the details and variations regarding the traditional Hmong kinship, marriage and family which still guide Hmong people around the world. Also, it will not cover the ii whole life course transitions such as childhood, adolescence, adulthood, late adulthood or the aging process or life core issues. This study is divided into two major parts: a review of literature and two interviews of the two selected Hmong families (one traditional & one contemporary) in the Minneapolis-St.
    [Show full text]
  • A Re-Evaluation of Pelliot Tibétain 1257: an Early Tibet- An-Chinese Glossary from Dunhuang1
    A Re-evaluation of Pelliot tibétain 1257: An Early Tibet- an-Chinese Glossary from Dunhuang1 James B. Apple and Shinobu A. Apple Introduction elliot tibétain 1257 (hereafter, PT1257) is an early manuscript preserved from the ancient city-state of Dunhuang kept P among the materials of the Paul Pelliot collection conserved at the Bibliothéque Nationale de France in Paris, France. Digital images of the manuscript are found at the web site of Gallica Digital Library (http://gallica.bnf.fr) and the International Dunhuang Project (http:// idp.bl.uk/; hereafter, IDP). French scholars Marcelle Lalou (1939) and R.A. Stein (1983 [English translation 2010]) have previously dis- cussed in an abbreviated manner the content and characteristics of this manuscript. A more extensive discussion of PT1257 is found among Japanese Buddhologists and specialists in Dunhuang studies. Akira Fujieda (1966), Zuihō Yamaguchi (1975), and Noriaki Haka- maya (1984) have provided initial insights into the structure and con- tent of PT1257 while the work of Ryūtoku Kimura (1985) and Kōsho Akamatsu (1988) have furnished more detailed points of analysis that have contributed to our current understanding of this manu- script. Other scholarship related to PT1257 has suggested that the manuscript was from a Chinese monastery and that it was utilized to help Chinese scholars translate Tibetan. This paper re-evaluates this presumption based upon a close analysis of the material components of the manuscript, the scribal writing, its list of Buddhist scriptures, and its vocabulary. Our assessment argues that PT1257 was a copy of a document initiated and circulated by Tibetans, presumably among Chinese monasteries in Dunhuang, to learn the Chinese equivalents to Tibetan translation terminology that was already in use among Tibet- ans.
    [Show full text]
  • Gateless Gate Has Become Common in English, Some Have Criticized This Translation As Unfaithful to the Original
    Wú Mén Guān The Barrier That Has No Gate Original Collection in Chinese by Chán Master Wúmén Huìkāi (1183-1260) Questions and Additional Comments by Sŏn Master Sǔngan Compiled and Edited by Paul Dōch’ŏng Lynch, JDPSN Page ii Frontspiece “Wú Mén Guān” Facsimile of the Original Cover Page iii Page iv Wú Mén Guān The Barrier That Has No Gate Chán Master Wúmén Huìkāi (1183-1260) Questions and Additional Comments by Sŏn Master Sǔngan Compiled and Edited by Paul Dōch’ŏng Lynch, JDPSN Sixth Edition Before Thought Publications Huntington Beach, CA 2010 Page v BEFORE THOUGHT PUBLICATIONS HUNTINGTON BEACH, CA 92648 ALL RIGHTS RESERVED. COPYRIGHT © 2010 ENGLISH VERSION BY PAUL LYNCH, JDPSN NO PART OF THIS BOOK MAY BE REPRODUCED OR TRANSMITTED IN ANY FORM OR BY ANY MEANS, GRAPHIC, ELECTRONIC, OR MECHANICAL, INCLUDING PHOTOCOPYING, RECORDING, TAPING OR BY ANY INFORMATION STORAGE OR RETRIEVAL SYSTEM, WITHOUT THE PERMISSION IN WRITING FROM THE PUBLISHER. PRINTED IN THE UNITED STATES OF AMERICA BY LULU INCORPORATION, MORRISVILLE, NC, USA COVER PRINTED ON LAMINATED 100# ULTRA GLOSS COVER STOCK, DIGITAL COLOR SILK - C2S, 90 BRIGHT BOOK CONTENT PRINTED ON 24/60# CREAM TEXT, 90 GSM PAPER, USING 12 PT. GARAMOND FONT Page vi Dedication What are we in this cosmos? This ineffable question has haunted us since Buddha sat under the Bodhi Tree. I would like to gracefully thank the author, Chán Master Wúmén, for his grace and kindness by leaving us these wonderful teachings. I would also like to thank Chán Master Dàhuì for his ineptness in destroying all copies of this book; thankfully, Master Dàhuì missed a few so that now we can explore the teachings of his teacher.
    [Show full text]
  • Last Name First Name/Middle Name Course Award Course 2 Award 2 Graduation
    Last Name First Name/Middle Name Course Award Course 2 Award 2 Graduation A/L Krishnan Thiinash Bachelor of Information Technology March 2015 A/L Selvaraju Theeban Raju Bachelor of Commerce January 2015 A/P Balan Durgarani Bachelor of Commerce with Distinction March 2015 A/P Rajaram Koushalya Priya Bachelor of Commerce March 2015 Hiba Mohsin Mohammed Master of Health Leadership and Aal-Yaseen Hussein Management July 2015 Aamer Muhammad Master of Quality Management September 2015 Abbas Hanaa Safy Seyam Master of Business Administration with Distinction March 2015 Abbasi Muhammad Hamza Master of International Business March 2015 Abdallah AlMustafa Hussein Saad Elsayed Bachelor of Commerce March 2015 Abdallah Asma Samir Lutfi Master of Strategic Marketing September 2015 Abdallah Moh'd Jawdat Abdel Rahman Master of International Business July 2015 AbdelAaty Mosa Amany Abdelkader Saad Master of Media and Communications with Distinction March 2015 Abdel-Karim Mervat Graduate Diploma in TESOL July 2015 Abdelmalik Mark Maher Abdelmesseh Bachelor of Commerce March 2015 Master of Strategic Human Resource Abdelrahman Abdo Mohammed Talat Abdelziz Management September 2015 Graduate Certificate in Health and Abdel-Sayed Mario Physical Education July 2015 Sherif Ahmed Fathy AbdRabou Abdelmohsen Master of Strategic Marketing September 2015 Abdul Hakeem Siti Fatimah Binte Bachelor of Science January 2015 Abdul Haq Shaddad Yousef Ibrahim Master of Strategic Marketing March 2015 Abdul Rahman Al Jabier Bachelor of Engineering Honours Class II, Division 1
    [Show full text]
  • A Dictionary of Kristang (Malacca Creole Portuguese) with an English-Kristang Finderlist
    A dictionary of Kristang (Malacca Creole Portuguese) with an English-Kristang finderlist PacificLinguistics REFERENCE COpy Not to be removed Baxter, A.N. and De Silva, P. A dictionary of Kristang (Malacca Creole Portuguese) English. PL-564, xxii + 151 pages. Pacific Linguistics, The Australian National University, 2005. DOI:10.15144/PL-564.cover ©2005 Pacific Linguistics and/or the author(s). Online edition licensed 2015 CC BY-SA 4.0, with permission of PL. A sealang.net/CRCL initiative. Pacific Linguistics 564 Pacific Linguistics is a publisher specialising in grammars and linguistic descriptions, dictionaries and other materials on languages of the Pacific, Taiwan, the Philippines, Indonesia, East Timor, southeast and south Asia, and Australia. Pacific Linguistics, established in 1963 through an initial grant from the Hunter Douglas Fund, is associated with the Research School of Pacific and Asian Studies at The Australian National University. The authors and editors of Pacific Linguistics publications are drawn from a wide range of institutions around the world. Publications are refereed by scholars with relevant expertise, who are usually not members of the editorial board. FOUNDING EDITOR: Stephen A. Wurm EDITORIAL BOARD: John Bowden, Malcolm Ross and Darrell Tryon (Managing Editors), I Wayan Arka, Bethwyn Evans, David Nash, Andrew Pawley, Paul Sidwell, Jane Simpson EDITORIAL ADVISORY BOARD: Karen Adams, Arizona State University Lillian Huang, National Taiwan Normal Peter Austin, School of Oriental and African University Studies
    [Show full text]
  • Efficient Support of Position Independence on Non-Volatile Memory
    Efficient Support of Position Independence on Non-Volatile Memory Guoyang Chen Lei Zhang Richa Budhiraja Qualcomm Inc. North Carolina State University Qualcomm Inc. [email protected] Raleigh, NC [email protected] [email protected] Xipeng Shen Youfeng Wu North Carolina State University Intel Corp. Raleigh, NC [email protected] [email protected] ABSTRACT In Proceedings of MICRO-50, Cambridge, MA, USA, October 14–18, 2017, This paper explores solutions for enabling efficient supports of 13 pages. https://doi.org/10.1145/3123939.3124543 position independence of pointer-based data structures on byte- addressable None-Volatile Memory (NVM). When a dynamic data structure (e.g., a linked list) gets loaded from persistent storage into 1 INTRODUCTION main memory in different executions, the locations of the elements Byte-Addressable Non-Volatile Memory (NVM) is a new class contained in the data structure could differ in the address spaces of memory technologies, including phase-change memory (PCM), from one run to another. As a result, some special support must memristors, STT-MRAM, resistive RAM (ReRAM), and even flash- be provided to ensure that the pointers contained in the data struc- backed DRAM (NV-DIMMs). Unlike on DRAM, data on NVM tures always point to the correct locations, which is called position are durable, despite software crashes or power loss. Compared to independence. existing flash storage, some of these NVM technologies promise This paper shows the insufficiency of traditional methods in sup- 10-100x better performance, and can be accessed via memory in- porting position independence on NVM. It proposes a concept called structions rather than I/O operations.
    [Show full text]
  • Data Structures Are Ways to Organize Data (Informa- Tion). Examples
    CPSC 211 Data Structures & Implementations (c) Texas A&M University [ 1 ] What are Data Structures? Data structures are ways to organize data (informa- tion). Examples: simple variables — primitive types objects — collection of data items of various types arrays — collection of data items of the same type, stored contiguously linked lists — sequence of data items, each one points to the next one Typically, algorithms go with the data structures to manipulate the data (e.g., the methods of a class). This course will cover some more complicated data structures: how to implement them efficiently what they are good for CPSC 211 Data Structures & Implementations (c) Texas A&M University [ 2 ] Abstract Data Types An abstract data type (ADT) defines a state of an object and operations that act on the object, possibly changing the state. Similar to a Java class. This course will cover specifications of several common ADTs pros and cons of different implementations of the ADTs (e.g., array or linked list? sorted or unsorted?) how the ADT can be used to solve other problems CPSC 211 Data Structures & Implementations (c) Texas A&M University [ 3 ] Specific ADTs The ADTs to be studied (and some sample applica- tions) are: stack evaluate arithmetic expressions queue simulate complex systems, such as traffic general list AI systems, including the LISP language tree simple and fast sorting table database applications, with quick look-up CPSC 211 Data Structures & Implementations (c) Texas A&M University [ 4 ] How Does C Fit In? Although data structures are universal (can be imple- mented in any programming language), this course will use Java and C: non-object-oriented parts of Java are based on C C is not object-oriented We will learn how to gain the advantages of data ab- straction and modularity in C, by using self-discipline to achieve what Java forces you to do.
    [Show full text]
  • Software II: Principles of Programming Languages
    Software II: Principles of Programming Languages Lecture 6 – Data Types Some Basic Definitions • A data type defines a collection of data objects and a set of predefined operations on those objects • A descriptor is the collection of the attributes of a variable • An object represents an instance of a user- defined (abstract data) type • One design issue for all data types: What operations are defined and how are they specified? Primitive Data Types • Almost all programming languages provide a set of primitive data types • Primitive data types: Those not defined in terms of other data types • Some primitive data types are merely reflections of the hardware • Others require only a little non-hardware support for their implementation The Integer Data Type • Almost always an exact reflection of the hardware so the mapping is trivial • There may be as many as eight different integer types in a language • Java’s signed integer sizes: byte , short , int , long The Floating Point Data Type • Model real numbers, but only as approximations • Languages for scientific use support at least two floating-point types (e.g., float and double ; sometimes more • Usually exactly like the hardware, but not always • IEEE Floating-Point Standard 754 Complex Data Type • Some languages support a complex type, e.g., C99, Fortran, and Python • Each value consists of two floats, the real part and the imaginary part • Literal form real component – (in Fortran: (7, 3) imaginary – (in Python): (7 + 3j) component The Decimal Data Type • For business applications (money)
    [Show full text]
  • Purely Functional Data Structures
    Purely Functional Data Structures Chris Okasaki September 1996 CMU-CS-96-177 School of Computer Science Carnegie Mellon University Pittsburgh, PA 15213 Submitted in partial fulfillment of the requirements for the degree of Doctor of Philosophy. Thesis Committee: Peter Lee, Chair Robert Harper Daniel Sleator Robert Tarjan, Princeton University Copyright c 1996 Chris Okasaki This research was sponsored by the Advanced Research Projects Agency (ARPA) under Contract No. F19628- 95-C-0050. The views and conclusions contained in this document are those of the author and should not be interpreted as representing the official policies, either expressed or implied, of ARPA or the U.S. Government. Keywords: functional programming, data structures, lazy evaluation, amortization For Maria Abstract When a C programmer needs an efficient data structure for a particular prob- lem, he or she can often simply look one up in any of a number of good text- books or handbooks. Unfortunately, programmers in functional languages such as Standard ML or Haskell do not have this luxury. Although some data struc- tures designed for imperative languages such as C can be quite easily adapted to a functional setting, most cannot, usually because they depend in crucial ways on as- signments, which are disallowed, or at least discouraged, in functional languages. To address this imbalance, we describe several techniques for designing functional data structures, and numerous original data structures based on these techniques, including multiple variations of lists, queues, double-ended queues, and heaps, many supporting more exotic features such as random access or efficient catena- tion. In addition, we expose the fundamental role of lazy evaluation in amortized functional data structures.
    [Show full text]
  • Heapmon: a Low Overhead, Automatic, and Programmable Memory Bug Detector ∗
    Appears in the Proceedings of the First IBM PAC2 Conference HeapMon: a Low Overhead, Automatic, and Programmable Memory Bug Detector ∗ Rithin Shetty, Mazen Kharbutli, Yan Solihin Milos Prvulovic Dept. of Electrical and Computer Engineering College of Computing North Carolina State University Georgia Institute of Technology frkshetty,mmkharbu,[email protected] [email protected] Abstract memory bug detection tool, improves debugging productiv- ity by a factor of ten, and saves $7,000 in development costs Detection of memory-related bugs is a very important aspect of the per programmer per year [10]. Memory bugs are not easy software development cycle, yet there are not many reliable and ef- to find via code inspection because a memory bug may in- ficient tools available for this purpose. Most of the tools and tech- volve several different code fragments which can even be in niques available have either a high performance overhead or require different files or modules. The compiler is also of little help a high degree of human intervention. This paper presents HeapMon, in finding heap-related memory bugs because it often fails to a novel hardware/software approach to detecting memory bugs, such fully disambiguate pointers [18]. As a result, detection and as reads from uninitialized or unallocated memory locations. This new identification of memory bugs must typically be done at run- approach does not require human intervention and has only minor stor- time [1, 2, 3, 4, 6, 7, 8, 9, 11, 13, 14, 18]. Unfortunately, the age and execution time overheads. effects of a memory bug may become apparent long after the HeapMon relies on a helper thread that runs on a separate processor bug has been triggered.
    [Show full text]
  • The Incidental Learning of L2 Chinese Vocabulary Through Reading
    Reading in a Foreign Language October 2020, Volume 32, No. 2 ISSN 1539-0578 pp. 169–193 The Incidental Learning of L2 Chinese Vocabulary through Reading Jing Zhou Pomona College United States Richard R. Day University of Hawai’i at Mānoa United States Abstract The study investigated the effect of marginal glossing and frequency of occurrence on the incidental learning of six aspects of vocabulary knowledge through reading in the second language (L2) Chinese. Participants were 30 intermediate L2 Chinese learners in an American public university. The MACOVA tests indicated that the treatment group who read with marginal glossing significantly outperformed (F = 6.686, p < 0.01) the control group who did not read with marginal glossing on six aspects of vocabulary knowledge after reading two stories. Significant differences were found on receptive word form, productive word form, receptive word meaning, and productive word grammatical function. The two-way ANOVA test suggested that the treatment group performed consistently better on learning words repeated three times and one time, and there was no interaction between the groups and the frequency of occurrence the words. The findings indicated that reading interesting and comprehensible Chinese stories can be beneficial for the learning of Chinese words. Keywords: L2 reading, marginal glossing, frequency of occurrence, incidental learning, receptive knowledge, productive knowledge, word form, word meaning, word grammatical function Vocabulary is one of the most important aspects of second or foreign language (L2) learning. However, the number of words needed to be learned to become proficient in the L2 is too large to learn through direct learning alone.
    [Show full text]
  • A04 FES Background Docs
    Attachment 4: SSC MRIP Workshop Aug 2019 Documentation and Information FES Calibration and Review The collection of documents contained in this pdf are only a part of the resources available on the FES calibration and review workshop website. That website also includes recorded webinar presentations given during the review workshop for the calibration models. That information can be found at the address below. https://www.fisheries.noaa.gov/event/fishing-effort-survey-calibration-model-peer-review 1 Attachment 4: SSC MRIP Workshop Aug 2019 A Small Area Estimation Approach for Reconciling Mode Differences in Two Surveys of Recreational Fishing Effort draft: please do not cite or distribute F. Jay Breidt Teng Liu Jean D. Opsomer Colorado State University June 10, 2017 Abstract For decades, the National Marine Fisheries Service has conducted a telephone survey of United States coastal households to estimate recreational effort (the number of fishing trips) in saltwater. The ef- fort estimates are computed for each of 17 US states along the coast of the Gulf of Mexico and the Atlantic Ocean, during six two-month waves (January-February through November-December). Recently, concerns about coverage errors in the telephone survey have led to implementation of a mail survey of the same population. Results from the mail survey are quite different from those of the telephone survey, due to coverage differences and mode effects, and a means of \cali- brating" or reconciling the two sets of estimates is needed by fisheries managers and stock assessment scientists. We develop a log-normal model for the estimates from the two surveys, accounting for tempo- ral dynamics through regression on population size and state-by-wave seasonal factors, and accounting in part for changing coverage prop- erties through regression on wireless telephone penetration.
    [Show full text]