{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:11:38Z","timestamp":1750306298803,"version":"3.41.0"},"reference-count":49,"publisher":"Association for Computing Machinery (ACM)","issue":"1","license":[{"start":{"date-parts":[[2016,1,7]],"date-time":"2016-01-07T00:00:00Z","timestamp":1452124800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61502266, 61232003"],"award-info":[{"award-number":["61502266, 61232003"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"National High Technology Research and Development Program of China","award":["2013AA013201"],"award-info":[{"award-number":["2013AA013201"]}]},{"DOI":"10.13039\/501100002858","name":"China Postdoctoral Science Foundation","doi-asserted-by":"publisher","award":["2015M580098"],"award-info":[{"award-number":["2015M580098"]}],"id":[{"id":"10.13039\/501100002858","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Beijing Municipal Science and Technology Commission of China","award":["D151100000815003"],"award-info":[{"award-number":["D151100000815003"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Trans. Storage"],"published-print":{"date-parts":[[2016,2,26]]},"abstract":"<jats:p>\n            Persistent memory provides data durability in main memory and enables memory-level storage systems. To ensure consistency of such storage systems, memory writes need to be transactional and are carefully moved across the boundary between the\n            <jats:italic>volatile<\/jats:italic>\n            CPU cache and the\n            <jats:italic>persistent<\/jats:italic>\n            main memory. Unfortunately, cache management in the CPU cache is hardware-controlled. Legacy transaction mechanisms, which are designed for disk-based storage systems, are inefficient in ordered data persistence of transactions in persistent memory. In this article, we propose the\n            <jats:italic>Blurred Persistence<\/jats:italic>\n            mechanism to reduce the transaction overhead of persistent memory by blurring the volatility-persistence boundary.\n            <jats:italic>Blurred Persistence<\/jats:italic>\n            consists of two techniques. First,\n            <jats:italic>Execution in Log<\/jats:italic>\n            executes a transaction in the log to eliminate duplicated data copies for execution. It allows persistence of the volatile uncommitted data, which are detectable with reorganized log structure. Second,\n            <jats:italic>Volatile Checkpoint with Bulk Persistence<\/jats:italic>\n            allows the committed data to aggressively stay volatile by leveraging the data durability in the log, as long as the commit order across threads is kept. By doing so, it reduces the frequency of forced persistence and improves cache efficiency. Evaluations show that our mechanism improves system performance by 56.3% to 143.7% for a variety of workloads.\n          <\/jats:p>","DOI":"10.1145\/2851504","type":"journal-article","created":{"date-parts":[[2016,1,7]],"date-time":"2016-01-07T14:04:54Z","timestamp":1452175494000},"page":"1-29","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":24,"title":["Blurred Persistence"],"prefix":"10.1145","volume":"12","author":[{"given":"Youyou","family":"Lu","sequence":"first","affiliation":[{"name":"Tsinghua University, Beijing, China"}]},{"given":"Jiwu","family":"Shu","sequence":"additional","affiliation":[{"name":"Tsinghua University, Beijing, China"}]},{"given":"Long","family":"Sun","sequence":"additional","affiliation":[{"name":"Tsinghua University, Beijing, China"}]}],"member":"320","published-online":{"date-parts":[[2016,1,7]]},"reference":[{"key":"e_1_2_1_1_1","unstructured":"AMD. 2011. AMD64 Architecture Programmer\u2019s Manual Volume 3: General Purpose and System Instructions.  AMD. 2011. AMD64 Architecture Programmer\u2019s Manual Volume 3: General Purpose and System Instructions."},{"volume-title":"Proceedings of the 10th USENIX Conference on File and Storage Technologies (FAST). USENIX","author":"Chidambaram Vijay","key":"e_1_2_1_2_1","unstructured":"Vijay Chidambaram , Tushar Sharma , Andrea C. Arpaci-Dusseau , and Remzi H . Arpaci-Dusseau. 2012. Consistency without ordering . In Proceedings of the 10th USENIX Conference on File and Storage Technologies (FAST). USENIX , Berkeley, CA. Vijay Chidambaram, Tushar Sharma, Andrea C. Arpaci-Dusseau, and Remzi H. Arpaci-Dusseau. 2012. Consistency without ordering. In Proceedings of the 10th USENIX Conference on File and Storage Technologies (FAST). USENIX, Berkeley, CA."},{"key":"e_1_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/2517349.2522724"},{"key":"e_1_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/1950365.1950380"},{"key":"e_1_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/1629575.1629589"},{"key":"e_1_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/2592798.2592814"},{"key":"e_1_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/1345206.1345241"},{"key":"e_1_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/1294261.1294291"},{"key":"e_1_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/356842.356847"},{"key":"e_1_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.5555\/2342821.2342850"},{"edition":"2","volume-title":"Tim Harris, Jim Larus, and Ravi Rajwar. 2010. Transactional Memory (Synthesis Lectures on Computer Architecture)","key":"e_1_2_1_11_1","unstructured":"Tim Harris, Jim Larus, and Ravi Rajwar. 2010. Transactional Memory (Synthesis Lectures on Computer Architecture) ( 2 nd ed.). Morgan & Claypool , San Francisco, CA . Tim Harris, Jim Larus, and Ravi Rajwar. 2010. Transactional Memory (Synthesis Lectures on Computer Architecture) (2nd ed.). Morgan & Claypool, San Francisco, CA."},{"key":"e_1_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/165123.165164"},{"key":"e_1_2_1_13_1","unstructured":"Intel. 2013. Intel architecture instruction set extensions programming reference 319433-015.  Intel. 2013. Intel architecture instruction set extensions programming reference 319433-015."},{"volume-title":"Prototype Edition. Retrieved","year":"2014","key":"e_1_2_1_14_1","unstructured":"Intel. 2014 . Intel\u00a9 C++ STM Compiler , Prototype Edition. Retrieved December 15, 2015 from https:\/\/software.intel.com\/en-us\/articles\/intel-c-stm-compiler-prototype-edition. Intel. 2014. Intel\u00a9 C++ STM Compiler, Prototype Edition. Retrieved December 15, 2015 from https:\/\/software.intel.com\/en-us\/articles\/intel-c-stm-compiler-prototype-edition."},{"key":"e_1_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISPASS.2013.6557176"},{"key":"e_1_2_1_16_1","volume-title":"Retrieved","author":"Lab FAL","year":"2014","unstructured":"FAL Lab . 2014 . Tokyo Cabinet: A modern implementation of DBM . Retrieved December 15, 2015 http:\/\/fallabs.com\/tokyocabinet\/. FAL Lab. 2014. Tokyo Cabinet: A modern implementation of DBM. Retrieved December 15, 2015 http:\/\/fallabs.com\/tokyocabinet\/."},{"key":"e_1_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/1555754.1555758"},{"volume-title":"Proceedings of the 11th USENIX Conference on File and Storage Technologies (FAST). USENIX","author":"Lee Eunji","key":"e_1_2_1_18_1","unstructured":"Eunji Lee , Hyokyung Bahn , and Sam H. Noh . 2013. Unioning of the buffer cache and journaling layers with non-volatile memory . In Proceedings of the 11th USENIX Conference on File and Storage Technologies (FAST). USENIX , Berkeley, CA. Eunji Lee, Hyokyung Bahn, and Sam H. Noh. 2013. Unioning of the buffer cache and journaling layers with non-volatile memory. In Proceedings of the 11th USENIX Conference on File and Storage Technologies (FAST). USENIX, Berkeley, CA."},{"key":"e_1_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/268998.266665"},{"key":"e_1_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCD.2013.6657033"},{"key":"e_1_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2015.2389828"},{"key":"e_1_2_1_22_1","volume-title":"Supporting system consistency with differential transactions in flash-based SSDs","author":"Lu Youyou","year":"2015","unstructured":"Youyou Lu , Jiwu Shu , Jia Guo , and Peng Zhu . 2015b. Supporting system consistency with differential transactions in flash-based SSDs . IEEE Transactions on Computers ( 2015 ). DOI:http:\/\/dx.doi.org\/10.1109\/ TC.2015.2419664 to appear. Youyou Lu, Jiwu Shu, Jia Guo, and Peng Zhu. 2015b. Supporting system consistency with differential transactions in flash-based SSDs. IEEE Transactions on Computers (2015). DOI:http:\/\/dx.doi.org\/10.1109\/ TC.2015.2419664 to appear."},{"key":"e_1_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSST.2015.7208274"},{"key":"e_1_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCD.2014.6974684"},{"key":"e_1_2_1_25_1","volume-title":"Proceedings of the 12th USENIX Conference on File and Storage Technologies (FAST). USENIX","author":"Lu Youyou","year":"2014","unstructured":"Youyou Lu , Jiwu Shu , and Wei Wang . 2014 b. ReconFS: A reconstructable file system on flash storage . In Proceedings of the 12th USENIX Conference on File and Storage Technologies (FAST). USENIX , Berkeley, CA, 75--88. Youyou Lu, Jiwu Shu, and Wei Wang. 2014b. ReconFS: A reconstructable file system on flash storage. In Proceedings of the 12th USENIX Conference on File and Storage Technologies (FAST). USENIX, Berkeley, CA, 75--88."},{"key":"e_1_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.5555\/2591272.2591299"},{"key":"e_1_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/NVMSA.2014.6927193"},{"key":"e_1_2_1_28_1","volume-title":"Proceedings of 5th Workshop on Energy Efficient Design.","author":"Meza Justin","year":"2013","unstructured":"Justin Meza , Yixin Luo , Samira Khan , Jishen Zhao , Yuan Xie , and Onur Mutlu . 2013 . A case for efficient hardware\/software cooperative management of storage and memory . In Proceedings of 5th Workshop on Energy Efficient Design. Justin Meza, Yixin Luo, Samira Khan, Jishen Zhao, Yuan Xie, and Onur Mutlu. 2013. A case for efficient hardware\/software cooperative management of storage and memory. In Proceedings of 5th Workshop on Energy Efficient Design."},{"key":"e_1_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/128765.128770"},{"key":"e_1_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/2150976.2151018"},{"key":"e_1_2_1_32_1","volume-title":"Proceedings of the 7th Symposium on Operating Systems Design and Implementation (OSDI). USENIX","author":"Nightingale Edmund B.","year":"2006","unstructured":"Edmund B. Nightingale , Kaushik Veeraraghavan , Peter M. Chen , and Jason Flinn . 2006 . Rethink the sync . In Proceedings of the 7th Symposium on Operating Systems Design and Implementation (OSDI). USENIX , Berkeley, CA, 1--14. Edmund B. Nightingale, Kaushik Veeraraghavan, Peter M. Chen, and Jason Flinn. 2006. Rethink the sync. In Proceedings of the 7th Symposium on Operating Systems Design and Implementation (OSDI). USENIX, Berkeley, CA, 1--14."},{"volume-title":"Proceedings of the 17th IEEE International Symposium on High Performance Computer Architecture (HPCA). IEEE, 301--311","author":"Ouyang Xiangyong","key":"e_1_2_1_33_1","unstructured":"Xiangyong Ouyang , David Nellans , Robert Wipfel , David Flynn , and Dhabaleswar K. Panda . 2011. Beyond block I\/O: Rethinking traditional storage primitives . In Proceedings of the 17th IEEE International Symposium on High Performance Computer Architecture (HPCA). IEEE, 301--311 . Xiangyong Ouyang, David Nellans, Robert Wipfel, David Flynn, and Dhabaleswar K. Panda. 2011. Beyond block I\/O: Rethinking traditional storage primitives. In Proceedings of the 17th IEEE International Symposium on High Performance Computer Architecture (HPCA). IEEE, 301--311."},{"volume-title":"Proceedings of the 41st ACM\/IEEE International Symposium on Computer Architecture (ISCA). 265--276","author":"Pelley Steven","key":"e_1_2_1_34_1","unstructured":"Steven Pelley , Peter M. Chen , and Thomas F. Wenisch . 2014. Memory persistency . In Proceedings of the 41st ACM\/IEEE International Symposium on Computer Architecture (ISCA). 265--276 . Steven Pelley, Peter M. Chen, and Thomas F. Wenisch. 2014. Memory persistency. In Proceedings of the 41st ACM\/IEEE International Symposium on Computer Architecture (ISCA). 265--276."},{"key":"e_1_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/1095810.1095830"},{"key":"e_1_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.5555\/1855741.1855752"},{"key":"e_1_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.5555\/2208008"},{"key":"e_1_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/1555754.1555760"},{"volume-title":"Database Management Systems. Osborne\/McGraw-Hill","author":"Ramakrishnan Raghu","key":"e_1_2_1_39_1","unstructured":"Raghu Ramakrishnan and Johannes Gehrke . 2000. Database Management Systems. Osborne\/McGraw-Hill , New York, NY . Raghu Ramakrishnan and Johannes Gehrke. 2000. Database Management Systems. Osborne\/McGraw-Hill, New York, NY."},{"key":"e_1_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/174613.174615"},{"volume-title":"Proceedings of 2000 USENIX Annual Technical Conference. USENIX","author":"Seltzer Margo I.","key":"e_1_2_1_41_1","unstructured":"Margo I. Seltzer , Gregory R. Ganger , Marshall K. McKusick , Keith A. Smith , Craig A. N. Soules , and Christopher A. Stein . 2000. Journaling versus soft updates: Asynchronous meta-data protection in file systems . In Proceedings of 2000 USENIX Annual Technical Conference. USENIX , Berkeley, CA, 71--84. Margo I. Seltzer, Gregory R. Ganger, Marshall K. McKusick, Keith A. Smith, Craig A. N. Soules, and Christopher A. Stein. 2000. Journaling versus soft updates: Asynchronous meta-data protection in file systems. In Proceedings of 2000 USENIX Annual Technical Conference. USENIX, Berkeley, CA, 71--84."},{"key":"e_1_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/2742854.2742864"},{"key":"e_1_2_1_43_1","volume-title":"The Fourth Annual Linux Expo.","author":"Tweedie Stephen C.","year":"1998","unstructured":"Stephen C. Tweedie . 1998 . Journaling the Linux ext2fs filesystem . In The Fourth Annual Linux Expo. Stephen C. Tweedie. 1998. Journaling the Linux ext2fs filesystem. In The Fourth Annual Linux Expo."},{"key":"e_1_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.5555\/1960475.1960480"},{"key":"e_1_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/1950365.1950379"},{"key":"e_1_2_1_46_1","unstructured":"Z. Wang H. Yi R. Liu M. Dong and H. Chen. 2014. Persistent transactional memory. Computer Architecture Letters (2014).  Z. Wang H. Yi R. Liu M. Dong and H. Chen. 2014. Persistent transactional memory. Computer Architecture Letters (2014)."},{"volume-title":"Retrieved","year":"2015","key":"e_1_2_1_47_1","unstructured":"Wikipedia. ( 2015 ) NVDIMM . Retrieved December 15, 2015 from http:\/\/en.wikipedia.org\/wiki\/NVDIMM. Wikipedia. (2015) NVDIMM. Retrieved December 15, 2015 from http:\/\/en.wikipedia.org\/wiki\/NVDIMM."},{"key":"e_1_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1145\/2063384.2063436"},{"key":"e_1_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1145\/2540708.2540744"},{"key":"e_1_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1145\/1555754.1555759"}],"container-title":["ACM Transactions on Storage"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2851504","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2851504","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:39:15Z","timestamp":1750221555000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2851504"}},"subtitle":["Efficient Transactions in Persistent Memory"],"short-title":[],"issued":{"date-parts":[[2016,1,7]]},"references-count":49,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2016,2,26]]}},"alternative-id":["10.1145\/2851504"],"URL":"https:\/\/doi.org\/10.1145\/2851504","relation":{},"ISSN":["1553-3077","1553-3093"],"issn-type":[{"type":"print","value":"1553-3077"},{"type":"electronic","value":"1553-3093"}],"subject":[],"published":{"date-parts":[[2016,1,7]]},"assertion":[{"value":"2015-11-01","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2015-11-01","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2016-01-07","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}