US20060136503A1 - Dynamic seamless reconfiguration of executing parallel software - Google Patents

Dynamic seamless reconfiguration of executing parallel software Download PDF

Info

Publication number
US20060136503A1
US20060136503A1 US11/338,580 US33858006A US2006136503A1 US 20060136503 A1 US20060136503 A1 US 20060136503A1 US 33858006 A US33858006 A US 33858006A US 2006136503 A1 US2006136503 A1 US 2006136503A1
Authority
US
United States
Prior art keywords
access
data object
module
value
data
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
US11/338,580
Inventor
Peter Elmendorf
Unmesh Ballal
Harry Beatty
Qi Yan
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to US11/338,580 priority Critical patent/US20060136503A1/en
Publication of US20060136503A1 publication Critical patent/US20060136503A1/en
Abandoned legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F8/00Arrangements for software engineering
    • G06F8/60Software deployment
    • G06F8/65Updates
    • G06F8/656Updates while running
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y10TECHNICAL SUBJECTS COVERED BY FORMER USPC
    • Y10STECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y10S707/00Data processing: database and file management or data structures
    • Y10S707/99951File or database maintenance
    • Y10S707/99956File allocation
    • Y10S707/99957Garbage collection

Landscapes

  • Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Stored Programmes (AREA)

Abstract

A method is described for dynamic stitching of a new module of executable code in a parallel processing environment, where access to a data object is shared by the new module and another module previously loaded. A new data object is created for shared access by the new module and by the other module; a data freshness indicator is updated in accordance therewith. A pointer value for the data pointer associated with the other module is modified, thereby terminating reference to an old data object previously accessed and substituting reference to the new data object. A second data freshness indicator is updated in accordance with access by the other module to the new data object. The old data object is deleted when a comparison between freshness indicators shows that access to the old data object is no longer required.

Description

    RELATED APPLICATIONS
  • This application is related to application Ser. Nos. 09/597,523, 09/597,524 and 09/597,525, all filed Jun. 20, 2000. All of these related applications are assigned to the same assignee as the present application. The disclosures of all these related applications are incorporated herein by reference.
  • FIELD OF THE INVENTION
  • This invention relates to parallel computer processing, and more particularly to the management of a parallel processing environment in which software is dynamically loaded, unloaded or modified.
  • BACKGROUND OF THE INVENTION
  • In parallel computer processing, a single program can simultaneously run different threads (that is, independent flows of control) managed by the program. An important feature of parallel processing is dynamic loading and unloading of executable modules which are portions of an executing program. This dynamic loading and unloading is performed by support code generally called the “runtime library.” The runtime library is designed to minimize the interruption of the execution of the previously loaded software while adding a new module or removing an existing module.
  • A typical parallel processing system is shown schematically in FIG. 1. Processors 11-1, 11-2, 11-3, . . . 11-n are each connected to a main memory 100, which holds the runtime library 101 and the driver application 102. The runtime library is physically separate from the driver application, but is linked thereto. Modules of executable code 103-1, 103-2, 103-3, . . . 103-n, provide services used by the driver application and are loaded in the main memory when needed. A module load can consist of a single module (as shown in FIG. 1) or a module tree.
  • A schematic representation of a single-threaded computing environment is shown in FIG. 2. A thread in combination with a specific set of data, for execution of a particular computation, is referred to as a “context.” As shown schematically in FIG. 2, the driver application 102 issues commands to create a context 200 having module trees 201-203, resulting in the modules 103-1-103-9 being loaded in the context. It is noteworthy that a given module (e.g. 103-6) may be shared between module trees. The format of the modules is monitored and updated by the runtime library 101. Execution in this environment proceeds sequentially through module trees 201, 202 and 203.
  • Modules in a context are loaded into main memory and “stitched” together for efficient execution. It is desirable, of course, that stitching of new modules to previously loaded modules be performed dynamically (that is, with minimum interruption of execution).
  • A “system context” is a context which the runtime library uses to perform certain functions, such as module loading, garbage collection (preparing old data for deletion) and dynamic stitching. The runtime library, which can run on any context simultaneously, creates and manages the system contexts and system threads.
  • A parallel execution environment consists of two or more contexts with threads running independently, accessing thread-specific data or accessing locally or globally shared data. A schematic representation of a parallel computing environment is shown in FIG. 3. The environment of FIG. 3 has two contexts 301, 302 with module trees 311-313 and 321-323 respectively. Certain modules (e.g. 103-11, 103-12) may be shared between the contexts. A parallel environment is thus characterized by a plurality of contexts (threads and module trees; see FIG. 3) running on a plurality of processors (see FIG. 1). However, there need not be a one-to-one correspondence between the contexts and processors.
  • The modules and module trees loaded in one context are generally not visible to other contexts. A problem therefore arises when it is desired to modify the software (specifically, add or remove modules) while multiple, parallel threads are executing. For example, if a loaded module is removed while a thread is executing code contained in that module, the execution will fail (or at best yield unreliable results). Similarly, if a group of modules is to be added to a running system, this should be performed in a controlled manner in order to prevent executing threads from accessing an incomplete configuration of the added modules.
  • One possible way to avoid this problem is to suspend the execution of all the threads whenever a module is to be added or deleted. This approach adds to the complexity of the driver application by requiring startup, pause and shutdown routines. Furthermore, system performance is degraded as the number of threads increases.
  • There is a need for a software design which provides for dynamic loading and unloading of modules in a parallel computing environment, wherein sections of the software may be modified in a multithreaded system while actively running.
  • SUMMARY OF THE INVENTION
  • The present invention addresses the above-described need by providing a method for performing dynamic stitching of a new module of executable code in a parallel processing environment. Access to a data object is shared by the new module and another module previously loaded; this access is performed using a data pointer, having a pointer value, associated with each module.
  • In accordance with one aspect of the invention, when the new module is loaded a new data object is created for shared access by the new module and by the previously loaded module (with the previously loaded module accessing the new data object in place of an old data object). A first data freshness indicator is updated in accordance with creation of the new data object. A value of the first freshness indicator is associated with the old data object (thus serving as a “freshness stamp” on the old data object). A pointer value is established for a data pointer associated with the new module, to permit access to the new data object by the new module. The pointer value for the data pointer associated with the other module is modified, thereby terminating reference to the old data object previously accessed by the other module and substituting reference to the new data object. A second data freshness indicator is updated in accordance with access by the other module to the new data object. The old data object is deleted when a comparison of the second data freshness indicator with the value associated with the old data object indicates that access to the old data object is no longer required.
  • In a preferred embodiment of the invention, the first and second pointer values are atomic data, and the second pointer value is modified in a atomic operation.
  • A list (“garbage list”) of old data objects subject to deletion may be established. An old data object is added to this list after creation of the new data object.
  • A plurality of previously loaded modules may share access to the new data object with the new module. Furthermore, the modules may comprise a plurality of contexts, with a freshness indicator being associated with each context. The old data object may be deleted after the context freshness indicators have been updated so that all such indicators are not less than the value associated with the old data object.
  • In accordance with another aspect of the invention, a method is provided for dynamic stitching of a new module in a parallel processing environment, where the new module and another previously loaded module include accessing code which, when executed, causes access to a data object. In this method, an instruction is first received to load the new module. New access to the data object is then prevented; however, continued access to the data object, already in progress when the instruction is received, is permitted to continue. The new module is loaded after this continued access is concluded. Initiation of access to the data object (invocation of the accessing code) is again permitted after the loading is performed. The loading may further include modification of the data object.
  • This method may further include establishing a usage counter associated with the data object, which is incremented and decremented in accordance with initiation and conclusion, respectively, of access to the data object. The value of the usage counter is changed to its own negative when an instruction to load a new module is received. This negative value is then incremented when each continued access is concluded. The value of the usage counter is compared with a predetermined value; the usage counter is reset when all continued access to the data object is concluded.
  • A negative value of the usage counter indicates that new access (invocation of the accessing code) is to be prevented; a value equal to the predetermined value (e.g. −1) indicates that new access may be resumed. Loading of the new module, and new access to the data object, are performed after the resetting of the usage counter.
  • In a preferred embodiment of this method, the value of the usage counter and the predetermined value are atomic data, so that the above-described incrementing, decrementing, changing comparing and resetting operations are atomic operations.
  • According to a further aspect of the invention, a method is provided for unloading a target module of executable code in a parallel processing environment, where the target module and another module share access to a data object. The access is performed using a data pointer having a pointer value; the target module and the other module comprise a context with a freshness indicator associated therewith. When an instruction is received to unload the target module, all new access to the module (invocation of the code in the module) is prevented; however, access already in progress (execution of the code in the module) is permitted to continue. The freshness indicator is updated, and old data associated with the target module is deleted in accordance with the updated value of the freshness indicator. The pointer value is modified after all access to the target module is concluded, thereby terminating reference to the data object by the target module. The target module is then unloaded.
  • The old data may have a freshness value associated therewith; the old data may be deleted when this freshness value is not greater than the updated value of the freshness indicator for the context.
  • According to another aspect of the invention, a computer-readable storage medium is provided which has stored therein instructions for performing the methods described above.
  • According to an additional aspect of the invention, a computer program product is provided which embodies instructions for performing the above-described methods.
  • An advantage of the present invention is that modules or groups of modules may be added while access to information and/or code is prevented until the added modules are in a usable state.
  • In a system using the method of the present invention, two cooperating programs may be managed without either program needing information regarding the internal details of the other. Furthermore, in the practice of the present invention, loading and unloading of a module group is a generalized concept from the programmer's point of view. Software design is greatly simplified by elimination of the need for startup, pause and shutdown routines that otherwise would be required when adding or deleting modules in an executing system.
  • BRIEF DESCRIPTION OF THE DRAWINGS
  • FIG. 1 is a schematic representation of a typical parallel processing environment.
  • FIG. 2 is a schematic representation of a single-threaded computing environment with a single context.
  • FIG. 3 is a schematic representation of a multi-threaded parallel processing environment with multiple contexts.
  • FIG. 4 shows a data pointer for a module.
  • FIG. 5 shows multiple data pointers for private data and shared data.
  • FIG. 6 shows modification of data pointers to reflect the addition of shared data during execution, according to an aspect of the present invention.
  • FIG. 7 is a flowchart showing steps in a method for dynamically loading a new module which shares data with other modules, during execution of those modules, in accordance with the present invention.
  • FIG. 8 is a flowchart showing steps in a method for updating freshness indicators and deleting old data, in accordance with the present invention.
  • FIG. 9 is a timing chart showing the effect of dynamic stitching of modules and updating of freshness indicators, in accordance with the method of FIG. 8.
  • FIG. 10 shows modification of data pointers to reflect the addition of data to a shared data aggregate during execution, according to another aspect of the present invention.
  • FIG. 11 shows steps in a method for dynamically stitching a new module when a data aggregate shared with other modules is modified during execution of those modules, in accordance with the present invention.
  • FIGS. 12A-12F are a schematic representation of the effect of the method of FIG. 11.
  • FIG. 13 shows steps in a method for unloading a module, in accordance with a further aspect of the present invention.
  • DETAILED DESCRIPTION OF THE PREFERRED EMBODIMENTS
  • In accordance with the present invention, the runtime library manages the parallel processing environment by using (1) a dynamic stitching or “hot plug” method, (2) data freshness indicators, and (3) a usage blocking method, as detailed below.
  • A module 103 accesses data using a data pointer unique to the module. This arrangement is shown in FIG. 4. Data pointer 400 is an indexed array; each index 411, 412, 413 points to data 421, 422, 423 respectively. The data can be any data required by the module to provide a service to the driver application 102. (The indexing scheme is described in greater detail in the related previously filed disclosures.) When the module is in a context, the data pointer is an index of where data may be found for that context. When a module is loaded in the memory 100, a data structure of the form shown in FIG. 4 is created for each module and managed by the system.
  • The data objects may be “private” data (that is, accessed by only one module), or alternatively may be shared by two or more modules in a given context. This arrangement is shown schematically in FIG. 5. In pointer 401, index 431 points to private data 451, while index 432 points to a shared data object 452 and index 433 points to a shared data object 453. Indices in pointer 402 also point to data objects 452 and 453, and an index in pointer 403 also points to data object 453.
  • Loading Modules: Dynamic Stitching
  • In this embodiment of the invention, old and new modules are stitched together in response to a load command from the runtime library. This dynamic stitching or “hot plug” method ensures that a consistent set of data is available to a module at any given time. In particular, a module may be added or deleted without hindering the execution among various threads.
  • FIG. 6 shows an arrangement of previously loaded modules 601 and 602, and another module 603 which is to be loaded. Modules 601 and 602 have data pointers 611, 612 respectively, which point to private data 621, 622 and shared data 650. In the example of FIG. 6, new module 603 has data requirements such that pointer 613 is to point to private data 623 and shared data 650. However, modules 601 and 602 may be actively executing, and indeed may be actively sharing data 650. It should be noted that a conventional method of loading module 603 would then require interruption of execution of both modules 601, 602.
  • When the driver application program 102 issues the module load command, the system uses the system context to load the module 603. A new shared data object 651 is then created from data 650. (Data object 651 is in general not identical to 650, but may incorporate changes due to the loading of module 603. For example, data 650 may include a list of modules accessing the data. In that case, data 651 will reflect access by module 603.) Data pointer 613, private data 623 and new shared data 651 are created in freshly allocated memory space, and at this point are not yet visible to the existing modules 601 and 602.
  • The runtime library then plugs in the new data objects by rewriting the pointers of modules 601 and 602 to point to the new data object 651. In this embodiment, the pointers are atomic data (that is, data which can be updated by an uninterruptible operation of the processor); accordingly, changing the pointers is said to be an atomic operation. It should be noted that, since only the pointers are updated, the execution of the program is not disrupted. At any given time, each module sees either data object 650 or data object 651, but not a mixture of the two. References to data object 650 are removed, and data object 651 is made available, as a result of rewriting the pointers. A freshness indicator (described in more detail below), associated with each context and maintained by the runtime library, is used to monitor when the old data object 650 may be deleted.
  • The steps for loading module 603 according to this “hot plug” method are detailed in FIG. 7. A new shared data object 651 is created in step 720. The runtime library gets the address of the new shared data object 651 (step 730). The runtime library rewrites the pointers in all the modules referencing data object 650 in the loading context (step 740) and in the execution context (step 750). (It is understood that in general there are plural execution contexts accessing data object 650.) This has the effect of removing references to the old data object 650 from the execution context. At this point the old data object is not deleted, since it may still be in use by another context. However, a reference to it is placed on the “garbage list” (that is, a list of data objects being prepared for deletion) and the freshness indicator is updated to reflect that a new data object is available (step 760).
  • Data Freshness Indicators
  • A freshness indicator (typically an integer) is incremented with each module load (regardless of the number of modules loaded in that module load), to signify that a new set of shared data has been created. A master freshness indicator, or “system freshness,” indicates the freshness level of all data in all contexts. This is used to manage “garbage collection;” when old data is no longer being accessed by any context, it may safely be deleted.
  • Each context also has a freshness indicator associated therewith, signifying the last known freshness of the data accessed in that context. Old data remains intact until all the contexts have registered the fact that they have caught up with the latest data. To ensure this, the old data is “stamped” with the current value of the master freshness indicator. When execution in a context accesses certain data, the context freshness indicator is set to the value of the master freshness indicator. The “garbage collector” thread, independently executing, uses this change to determine which data are no longer accessible and thus can be deleted. These determinations may be made at intervals or at times chosen to provide timely updates (but not so often that processor time is unduly wasted).
  • Steps in a method for managing old and new shared data objects by updating freshness indicators are shown in FIG. 8. When a new module (which is to share data with previously loaded modules) is loaded, a new shared data object is created (step 810). The system freshness indicator is incremented to reflect creation of the new data object (step 830). The old data object is placed on the “garbage list” and stamped with the current system freshness (step 820). At this point, the new shared data object is available for access by a context. Accordingly, if a context performs a new access of shared data, the new data object should be accessed instead of the old data object. Thus, when a context accesses the shared data (step 840), the freshness indicator for that context is set equal to the system freshness (step 850). When all the contexts have at least caught up to the freshness stamp of a given old data object (step 855), that old data object is deleted (step 860).
  • A timing chart showing an example of freshness indicator updates, when modules are loaded using the above-described “hot plug” method, is given in FIG. 9. For convenience the time axis is marked in equal intervals. At time t0, module M0 is loaded and new shared data (such as object 651 shown in FIG. 6) is created. The system freshness is set to 0. The garbage collector thread keeps track of all the old data (such as object 650 in FIG. 6); old shared data D0 is placed on the garbage list, with a freshness stamp of 0.
  • When a context accesses shared data, the context copies the system freshness value to the context's freshness indicator. This indicates that the context has accessed a new data aggregate, and thus could subsequently access any new data aggregate. At time t0, none of contexts C1, C2 or C3 have accessed the new data; accordingly, they each have a context freshness of −1.
  • At time t1, context C3 accesses some shared data. The data accessed by the context might not in fact be the new shared data created in the “hot plug” method; however, the freshness value for the context is updated to reflect the fact that the context could access the new shared data at time t1 or any subsequent time. The context freshness value for C3 is thus set to 0. At time t3, context C1 accesses shared data, and its freshness value is likewise set to 0.
  • At time t4, a new module M1 is loaded; additional new shared data is created, and the system freshness indicator is incremented to 1. Old data D1 is placed on the garbage list, with a freshness stamp of 1. There are now two sets of old data. At time t5, context C2 accesses the shared data; the freshness value for C2 is thus set to 1 (note that C2 made no access of shared data between the M0 and M1 module loads, so its freshness indicator was not set to 0). At time t6, the garbage collector thread examines the context freshness indicators and finds that all three indicators are now at least 0. This means that all of contexts C1, C2 and C3 have caught up to the freshness state when module M0 was loaded and data D0 was placed on the garbage list; accordingly, data D0 may be deleted. At time t6, data D0 is deleted. At time t8, module M2 is loaded, so that the system freshness indicator is incremented to 2 and old data D2 is placed on the garbage list. At times t9, t10 and t11 respectively, contexts C3, C1 and C2 access shared data and have their context freshness indicators set to 2. At time t12, the garbage collector thread again examines the context freshness indicators, and determines that all three contexts have accessed shared data since module M2 was loaded; this means that data D1 and D2 may both be safely deleted.
  • It should be emphasized that (1) a given context “catches up” to the current value of the system freshness when it performs a new access to shared data (thereby accessing data which is at least as new as the newly created shared data object), and (2) that an old data object in the garbage list is deleted only when all of the contexts have caught up to the freshness stamp associated with that old data object.
  • It will be appreciated that the new data object is made available to the old and new modules without the need to serialize access to the data object. This in turn facilitates parallel access to the data object, with consequent performance benefits.
  • Usage Blocking
  • In the preceding discussion, a new data object 651 was created from an old data object 650, and pointers to the new data object (to be shared by a newly loaded module) were modified in an atomic operation. Alternatively, the shared data object may be too large for a complete duplication thereof to be desirable, or it may be necessary to modify the data in an operation that is not an atomic operation. In such cases, access to the data must be temporarily blocked, as detailed below.
  • FIG. 10 shows an arrangement of modules where modules 1001 and 1002 have been previously loaded, and module 1003 is to be loaded in response to a module load command. Each module may have one or more threads, depending on how many flows of control are executing the code in that module. The modules have data pointers 1011, 1012, 1013 respectively; execution of code in the respective modules may cause private data 1021, 1022, 1023 to be accessed. Similarly, execution of code in modules 1001 and 1002 may cause access to a shared data aggregate (data object 1050), for example by calling a subroutine.
  • The loading of new module 1003 causes a modification of data object 1050; specifically, new data 1051 is appended to data 1050, resulting in formation of a new data object 1060. In this case, the modification of data aggregate 1050 is not an atomic operation. Access to this data by all contexts (other than access by the system context) must be prevented while the data aggregate is modified (in this example, while new data 1051 is added). More specifically, it is necessary to block execution of code involving access to the data object while the data object is being modified.
  • The usage blocking method prevents a given context from executing a specific piece of code. In particular, the method prevents a context from invoking code, the execution of which would result in accessing a data object, while the data object is being updated by the system context (such as data aggregate 1050 which is updated to yield data aggregate 1060).
  • FIG. 11 shows steps of the usage blocking method. The code (such as a subroutine for accessing the data aggregate, characterized simply as accessing code) may be for example a query, update or delete function. Each data aggregate has associated therewith a usage counter. This counter reflects the number of contexts in which accessing code is executing to cause access to a given data aggregate at a given time. The usage counter is initialized to +1 (step 1110). When a context enters a piece of accessing code (that is, invokes the code so that it begins to execute), the counter is incremented by 1; when the context exits the code (that is, when execution of the code is complete), the counter is decremented by 1 (step 1120). The incrementing and decrementing are atomic operations.
  • It should be noted that parallel execution of the code may be performed, so that more than one context may be in a given piece of accessing code at one time (that is, there may be multiple invocations of the code before execution of the code is finished).
  • When a new module is to be loaded (step 1125), the system context replaces the usage counter by its negative value in another atomic operation. The negative value signifies that entry to the accessing code by any context (that is, a new invocation of that code) is blocked, except for entry by the system context (step 1140). As long as the usage counter is negative, it is incremented by 1 when any context already in the code exits (step 1150). A usage counter value of −1 therefore serves as a signal to the system context that usage has successfully been blocked; no context may cause access to the data aggregate, and all contexts which were accessing the data aggregate have exited the accessing code (step 1155). The new module may then be loaded (step 1160), including any necessary updates of the shared data aggregate.
  • When loading of the new module is complete, the system context negates the usage counter value, so that it returns to its initial value of +1 (step 1170). Normal access of the data aggregate is again permitted (step 1180); any contexts waiting to access the data aggregate may do so.
  • It should be noted that the usage blocking method described herein facilitates parallel processing. If access to the data instead proceeded serially, with only one thread at a time permitted to access the data, access to the data could simply be locked as long as required for modification of the data. Such a scheme, however, would require serialized access to the data when normal operation resumed. In the present embodiment, by contrast, the incrementing, decrementing and resetting of the usage counter are atomic operations; an update of the counter may be performed very quickly (typically requiring about five instructions). It will be appreciated by those skilled in the art that this usage blocking method does not require the operating system to save the state of the executing thread while the access counter is updated. Accordingly, the delay in execution is very small.
  • The effect of this method is shown schematically in FIGS. 12A-12F. A piece of accessing code (e.g. a subroutine which when called results in access to the data) is represented by 1200 with entry point 1201 and exit point 1202. Initially, with no executing context in the code, the usage counter for a given data aggregate is +1 (FIG. 12A). When context C1 enters the code (that is, the accessing code is invoked to access the data object), the counter is incremented to +2 (FIG. 12B); when the context exits the code the counter is decremented to +1 (FIG. 12C). In FIG. 12D, two contexts C2 and C3 are executing in parallel, so that the usage counter is +3; two other contexts C4 and C5 are about to enter the code also. At this point, a module load is initiated; the system context negates the usage counter from +3 to −3, new invocation of the code is blocked, and contexts C2 and C3 continue to execute (FIG. 12E). When contexts C2 and C3 each exit the code, the usage counter is incremented by 1; accordingly, after all contexts which were in the code have exited, the usage counter is −1 (FIG. 12F). All new invocation of the code has been blocked, so that access to the data object is prevented and the new module load (together with modification of the data) can safely proceed.
  • It should be noted that only those executing contexts which are attempting to invoke the accessing code 1200 to access the particular data aggregate have their execution delayed; other executing contexts in the parallel processing environment, which may be accessing other data aggregates, are not affected.
  • Unloading a Module
  • When a module is to be unloaded, a “dynamic unstitching” process is initiated which employs features of the above-described “hot plug” and usage blocking methods.
  • Steps in the unloading process are shown in FIG. 13. All execution access to the module being unloaded is blocked using the above-described usage blocking method (step 1310). Executing contexts blocked at entry to the module return with an error code without entering the module. Executing contexts already in the module to be unloaded are allowed to execute and exit the module. When all contexts have exited the module, all access to the module is finished (step 1315). The freshness indicators of all the contexts associated with the module are updated by the system context (step 1320). All items on the garbage list which belong to the module and are not shared by any other modules may then be deleted (step 1330). If the module points to any shared data objects, the system context informs the system that the module no longer refers to those objects. As described above, this is done by rewriting the pointers associated with the module (step 1340). At this point the module is no longer accessible by executing contexts and no longer refers to any shared data objects; accordingly, the module may then be unloaded (step 1350).
  • Since new entry to the module to be unloaded is blocked, while current usage of the module is allowed to proceed to completion, it is not necessary for the system to determine whether the module to be unloaded still has a thread executing therein. It will be appreciated that this greatly simplifies development of parallel applications.
  • While the invention has been described in terms of specific embodiments, it is evident in view of the foregoing description that numerous alternatives, modifications and variations will be apparent to those skilled in the art. Accordingly, the invention is intended to encompass all such alternatives, modifications and variations which fall within the scope and spirit of the invention and the following claims.

Claims (33)

1-7. (canceled)
8. A method for performing dynamic stitching of a new module of executable code in a parallel processing environment, where said new module and another module previously loaded include accessing code which when executed causes access to a data object, the method comprising the steps of:
receiving an instruction to load the new module;
preventing initiation of access to the data object when the instruction is received, while permitting continued access to the data object in progress when the instruction is received;
loading the new module after said continued access is concluded; and
permitting initiation of access to the data object after said loading is performed.
9. The method of claim 8 wherein said loading step further comprises modifying the data object.
10. The method of claim 8, further comprising the steps of:
establishing a usage counter associated with the data object;
incrementing said usage counter when access to the data object is initiated prior to said preventing step;
decrementing said usage counter when access to the data object is concluded prior to said preventing step;
changing a value of said usage counter to the negative thereof when said instruction is received;
incrementing the negative value when a continued access to the data object is concluded;
comparing the value of said usage counter with a predetermined value to determine whether all said continued access is concluded; and
resetting the value of said usage counter when all said continued access is concluded.
11. The method of claim 10, wherein the value of said usage counter and said predetermined value are atomic data, so that said incrementing, decrementing, changing, comparing and resetting are atomic operations.
12. The method of claim 10, wherein said loading and permitting steps are performed after said resetting step.
13. The method of claim 10, wherein a negative value of said usage counter indicates that initiation of access to the data object is prevented, and a value of said usage counter equal to said predetermined value indicates that initiation of access to the data object may be resumed.
14. The method of claim 8, wherein said preventing comprises blocking invocation of the accessing code, and said permitting continued access to the data object comprises permitting continued execution of the accessing code.
15. A method for unloading a target module of executable code in a parallel processing environment, where the target module and another module share access to a data object, said access being performed using a data pointer associated with the target module and having a pointer value, and where the target module and the other module comprise a context having a freshness indicator associated therewith, the method comprising the steps of:
receiving an instruction to unload the target module;
preventing initiation of access to the target module when the instruction is received, while permitting continued access to the target module in progress when the instruction is received;
updating the freshness indicator;
deleting old data associated with the target module in accordance with an updated value of the freshness indicator;
modifying the pointer value after all access to the target module is concluded, thereby terminating reference to the data object by the target module; and
unloading the target module.
16. The method of claim 15, wherein said preventing comprises blocking invocation of the code in the target module, and said permitting comprises permitting continued execution of the code in the target module.
17. The method of claim 15, wherein the old data has a freshness value associated therewith, and said deleting is performed in accordance with said freshness value being not greater than the updated value of the freshness indicator.
18-24. (canceled)
25. A computer-readable storage medium having stored therein instructions for performing a method for performing dynamic stitching of a new module of executable code in a parallel processing environment, where said new module and another module previously loaded include accessing code which when executed causes access to a data object, the method comprising the steps of:
receiving an instruction to load the new module;
preventing initiation of access to the data object when the instruction is received, while permitting continued access to the data object in progress when the instruction is received;
loading the new module after said continued access is concluded; and
permitting initiation of access to the data object after said loading is performed.
26. The computer-readable storage medium of claim 25, wherein said loading step further comprises modifying the data object.
27. The computer-readable storage medium of claim 25, wherein the method further comprises the steps of:
establishing a usage counter associated with the data object;
incrementing said usage counter when access to the data object is initiated prior to said preventing step;
decrementing said usage counter when access to the data object is concluded prior to said preventing step;
changing a value of said usage counter to the negative thereof when said instruction is received;
incrementing the negative value when a continued access to the data object is concluded;
comparing the value of said usage counter with a predetermined value to determine whether all said continued access in concluded; and
resetting the value of said usage counter when all said continued access is concluded.
28. The computer-readable storage medium of claim 27, wherein the value of said usage counter and said predetermined value are atomic data, so that said incrementing, decrementing, changing, comparing and resetting are atomic operations.
29. The computer-readable storage medium of claim 27, wherein said loading and permitting steps are performed after said resetting step.
30. The computer-readable storage medium of claim 27, wherein a negative value of said usage counter indicates that initiation of access to the data object is prevented, and a value of said usage counter equal to said predetermined value indicates that initiation of access to the data object may be resumed.
31. The computer-readable storage medium of claim 25, wherein said preventing comprises blocking invocation of the accessing code, and said permitting continued access to the data object comprises permitting continued execution of the accessing code.
32. A computer-readable storage medium having stored therein instructions for performing a method for unloading a target module of executable code in a parallel processing environment, where the target module and another module share access to a data object, said access being performed using a data pointer associated with the target module and having a pointer value, and where the target module and the other module comprise a context having a freshness indicator associated therewith, the method comprising the steps of:
receiving an instruction to unload the target module;
preventing initiation of access to the target module when the instruction is received, while permitting continued access to the target module in progress when the instruction is received;
updating the freshness indicator;
deleting old data associated with the target module in accordance with an updated value of the freshness indicator;
modifying the pointer value after all access to the target module is concluded, thereby terminating reference to the data object by the target module; and
unloading the target module.
33. The computer-readable storage medium of claim 32, wherein said preventing comprises blocking invocation of the code in the target module, and said permitting comprises permitting continued execution of the code in the target module.
34. The computer-readable storage medium of claim 32, wherein the old data has a freshness value associated therewith, and said deleting is performed in accordance with said freshness value being not greater than the updated value of the freshness indicator.
35-41. (canceled)
42. A computer program product embodying instructions for performing a method for performing dynamic stitching of a new module of executable code in a parallel processing environment, where said new module and another module previously loaded include accessing code which when executed causes access to a data object, the method comprising the steps of:
receiving an instruction to load the new module;
preventing initiation of access to the data object when the instruction is received, while permitting continued access to the data object in progress when the instruction is received;
loading the new module after said continued access is concluded; and
permitting initiation of access to the data object after said loading is performed.
43. The computer program product of claim 42, wherein said loading step further comprises modifying the data object.
44. The computer program product of claim 42, wherein the method further comprises the steps of:
establishing a usage counter associated with the data object;
incrementing said usage counter when access to the data object is initiated prior to said preventing step;
decrementing said usage counter when access to the data object is concluded prior to said preventing step;
changing a value of said usage counter to the negative thereof when said instruction is received;
incrementing the negative value when a continued access to the data object is concluded;
comparing the value of said usage counter with a predetermined value to determine whether all said continued access is concluded; and
resetting the value of said usage counter when all said continued access is concluded.
45. The computer program product of claim 44, wherein the value of said usage counter and said predetermined value are atomic data, so that said incrementing, decrementing, changing, comparing and resetting are atomic operations.
46. The computer program product of claim 44, wherein said loading and permitting steps are performed after said resetting step.
47. The computer program product of claim 44, wherein a negative value of said usage counter indicates that initiation of access to the data object is prevented, and a value of said usage counter equal to said predetermined value indicates that initiation of access to the data object may be resumed.
48. The computer program product of claim 42, wherein said preventing comprises blocking invocation of the accessing code, and said permitting continued access to the data object comprises permitting continued execution of the accessing code.
49. A computer program product embodying instructions for performing a method for unloading a target module of executable code in a parallel processing environment, where the target module and another module share access to a data object, said access being performed using a data pointer associated with the target module and having a pointer value, and where the target module and the other module comprise a context having a freshness indicator associated therewith, the method comprising the steps of:
receiving an instruction to unload the target module;
preventing initiation of access to the target module when the instruction is received, while permitting continued access to the target module in progress when the instruction is received;
updating the freshness indicator;
deleting old data associated with the target module in accordance with an updated value of the freshness indicator;
modifying the pointer value after all access to the target module is concluded, thereby terminating reference to the data object by the target module; and
unloading the target module.
50. The computer program product of claim 49, wherein said preventing comprises blocking invocation of the code in the target module, and said permitting comprises permitting continued execution of the code in the target module.
51. The computer program product of claim 49, wherein the old data has a freshness value associated therewith, and said deleting is performed in accordance with said freshness value being not greater than the updated value of the freshness indicator.
US11/338,580 2001-02-26 2006-01-24 Dynamic seamless reconfiguration of executing parallel software Abandoned US20060136503A1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
US11/338,580 US20060136503A1 (en) 2001-02-26 2006-01-24 Dynamic seamless reconfiguration of executing parallel software

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US09/793,644 US7031989B2 (en) 2001-02-26 2001-02-26 Dynamic seamless reconfiguration of executing parallel software
US11/338,580 US20060136503A1 (en) 2001-02-26 2006-01-24 Dynamic seamless reconfiguration of executing parallel software

Related Parent Applications (1)

Application Number Title Priority Date Filing Date
US09/793,644 Division US7031989B2 (en) 2001-02-26 2001-02-26 Dynamic seamless reconfiguration of executing parallel software

Publications (1)

Publication Number Publication Date
US20060136503A1 true US20060136503A1 (en) 2006-06-22

Family

ID=25160441

Family Applications (2)

Application Number Title Priority Date Filing Date
US09/793,644 Expired - Fee Related US7031989B2 (en) 2001-02-26 2001-02-26 Dynamic seamless reconfiguration of executing parallel software
US11/338,580 Abandoned US20060136503A1 (en) 2001-02-26 2006-01-24 Dynamic seamless reconfiguration of executing parallel software

Family Applications Before (1)

Application Number Title Priority Date Filing Date
US09/793,644 Expired - Fee Related US7031989B2 (en) 2001-02-26 2001-02-26 Dynamic seamless reconfiguration of executing parallel software

Country Status (1)

Country Link
US (2) US7031989B2 (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20090172086A1 (en) * 2007-09-28 2009-07-02 Xcerion Ab Network operating system
US20100115503A1 (en) * 2008-11-05 2010-05-06 Samsung Electronics Co., Ltd. Image processing apparatus and control method thereof
US20130311995A1 (en) * 2012-05-18 2013-11-21 International Business Machines Corporation Resolving RCU-Scheduler Deadlocks

Families Citing this family (51)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6665671B2 (en) * 2001-04-04 2003-12-16 Hewlett-Packard Development Company, L.P. System and method for optimization of shared data
US6978452B2 (en) * 2003-04-02 2005-12-20 Beach Unlimited Llc Upgrading digital media servers
US20050204352A1 (en) * 2004-01-13 2005-09-15 Hewlett-Packard Development Company, L.P. Method, system and software for synchronising multiple threads which are using a resource
US7844665B2 (en) * 2004-04-23 2010-11-30 Waratek Pty Ltd. Modified computer architecture having coordinated deletion of corresponding replicated memory locations among plural computers
US20050257219A1 (en) * 2004-04-23 2005-11-17 Holt John M Multiple computer architecture with replicated memory fields
US20060253844A1 (en) * 2005-04-21 2006-11-09 Holt John M Computer architecture and method of operation for multi-computer distributed processing with initialization of objects
US7707179B2 (en) * 2004-04-23 2010-04-27 Waratek Pty Limited Multiple computer architecture with synchronization
US20060095483A1 (en) * 2004-04-23 2006-05-04 Waratek Pty Limited Modified computer architecture with finalization of objects
US20050262513A1 (en) * 2004-04-23 2005-11-24 Waratek Pty Limited Modified computer architecture with initialization of objects
US7849452B2 (en) * 2004-04-23 2010-12-07 Waratek Pty Ltd. Modification of computer applications at load time for distributed execution
EP1688841A1 (en) * 2005-02-04 2006-08-09 Sap Ag Dynamic parallel processing
US7707561B2 (en) * 2005-02-15 2010-04-27 International Business Machines Corporation Apparatus, system, and method for converting data
EP1729213A1 (en) * 2005-05-30 2006-12-06 Honda Research Institute Europe GmbH Development of parallel/distributed applications
US7823158B2 (en) * 2005-08-18 2010-10-26 International Business Machines Corporation Adaptive scheduling and management of work processing in a target context in resource contention
US8015236B2 (en) * 2005-10-25 2011-09-06 Waratek Pty. Ltd. Replication of objects having non-primitive fields, especially addresses
US7761670B2 (en) * 2005-10-25 2010-07-20 Waratek Pty Limited Modified machine architecture with advanced synchronization
US7849369B2 (en) * 2005-10-25 2010-12-07 Waratek Pty Ltd. Failure resistant multiple computer system and method
US7581069B2 (en) * 2005-10-25 2009-08-25 Waratek Pty Ltd. Multiple computer system with enhanced memory clean up
US20070100828A1 (en) * 2005-10-25 2007-05-03 Holt John M Modified machine architecture with machine redundancy
US7958322B2 (en) * 2005-10-25 2011-06-07 Waratek Pty Ltd Multiple machine architecture with overhead reduction
US7660960B2 (en) * 2005-10-25 2010-02-09 Waratek Pty, Ltd. Modified machine architecture with partial memory updating
US20080151902A1 (en) * 2006-10-05 2008-06-26 Holt John M Multiple network connections for multiple computers
US20080140762A1 (en) * 2006-10-05 2008-06-12 Holt John M Job scheduling amongst multiple computers
US20080126322A1 (en) * 2006-10-05 2008-05-29 Holt John M Synchronization with partial memory replication
US7958329B2 (en) * 2006-10-05 2011-06-07 Waratek Pty Ltd Hybrid replicated shared memory
US20100121935A1 (en) * 2006-10-05 2010-05-13 Holt John M Hybrid replicated shared memory
US20080130652A1 (en) * 2006-10-05 2008-06-05 Holt John M Multiple communication networks for multiple computers
US20080140801A1 (en) * 2006-10-05 2008-06-12 Holt John M Multiple computer system with dual mode redundancy architecture
US20100054254A1 (en) * 2006-10-05 2010-03-04 Holt John M Asynchronous data transmission
US8473564B2 (en) * 2006-10-05 2013-06-25 Waratek Pty Ltd. Contention detection and resolution
WO2008040083A1 (en) * 2006-10-05 2008-04-10 Waratek Pty Limited Adding one or more computers to a multiple computer system
US20080133869A1 (en) * 2006-10-05 2008-06-05 Holt John M Redundant multiple computer architecture
US20080184071A1 (en) * 2006-10-05 2008-07-31 Holt John M Cyclic redundant multiple computer architecture
US20080120478A1 (en) * 2006-10-05 2008-05-22 Holt John M Advanced synchronization and contention resolution
US20080133859A1 (en) * 2006-10-05 2008-06-05 Holt John M Advanced synchronization and contention resolution
US8095616B2 (en) * 2006-10-05 2012-01-10 Waratek Pty Ltd. Contention detection
US20080126506A1 (en) * 2006-10-05 2008-05-29 Holt John M Multiple computer system with redundancy architecture
WO2008040085A1 (en) * 2006-10-05 2008-04-10 Waratek Pty Limited Network protocol for network communications
US20080140973A1 (en) * 2006-10-05 2008-06-12 Holt John M Contention detection with data consolidation
US20080114962A1 (en) * 2006-10-05 2008-05-15 Holt John M Silent memory reclamation
US20080133862A1 (en) * 2006-10-05 2008-06-05 Holt John M Contention detection with modified message format
WO2008040072A1 (en) * 2006-10-05 2008-04-10 Waratek Pty Limited Advanced contention detection
US20080155127A1 (en) * 2006-10-05 2008-06-26 Holt John M Multi-path switching networks
US20080140858A1 (en) * 2006-10-05 2008-06-12 Holt John M Switch protocol for network communications
US20080250221A1 (en) * 2006-10-09 2008-10-09 Holt John M Contention detection with data consolidation
US8316190B2 (en) * 2007-04-06 2012-11-20 Waratek Pty. Ltd. Computer architecture and method of operation for multi-computer distributed processing having redundant array of independent systems with replicated memory and code striping
EP2320319A4 (en) * 2008-07-23 2013-02-20 Fujitsu Ltd Object linkage device for linking objects in statically linked executable format program file, method for linking objects, and program thereof
US9626119B2 (en) * 2014-11-14 2017-04-18 Intel Corporation Using counters and a table to protect data in a storage device
CN109079776A (en) * 2018-07-26 2018-12-25 福州大学 A kind of method of industrial robot control algolithm dynamic restructuring
DE102019134373A1 (en) * 2019-12-13 2021-06-17 Beckhoff Automation Gmbh Method for updating a control program of an automation system with data migration of a program status of the control program
DE102019134353A1 (en) * 2019-12-13 2021-06-17 Beckhoff Automation Gmbh Method for data migration of a pointer element in the course of a data migration of a program state of a control program of an automation system

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4812968A (en) * 1986-11-12 1989-03-14 International Business Machines Corp. Method for controlling processor access to input/output devices
US5319780A (en) * 1987-10-19 1994-06-07 International Business Machines Corporation System that implicitly locks a subtree or explicitly locks a node based upon whether or not an explicit lock request is issued
US5920725A (en) * 1997-07-02 1999-07-06 Adaptivity Inc. Run-time object-synthesis and transparent client/server updating of distributed objects using a meta server of all object descriptors

Family Cites Families (19)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5057997A (en) * 1989-02-13 1991-10-15 International Business Machines Corp. Interruption systems for externally changing a context of program execution of a programmed processor
US5410703A (en) * 1992-07-01 1995-04-25 Telefonaktiebolaget L M Ericsson System for changing software during computer operation
JPH06110678A (en) * 1992-09-30 1994-04-22 Toshiba Corp Program execution system and dynamic change method for execution program
US5675803A (en) * 1994-01-28 1997-10-07 Sun Microsystems, Inc. Method and apparatus for a fast debugger fix and continue operation
US5692193A (en) 1994-03-31 1997-11-25 Nec Research Institute, Inc. Software architecture for control of highly parallel computer systems
US5581737A (en) * 1994-09-12 1996-12-03 International Business Machines Corporation Method and apparatus for expansion, contraction, and reapportionment of structured external storage structures
US5812811A (en) 1995-02-03 1998-09-22 International Business Machines Corporation Executing speculative parallel instructions threads with forking and inter-thread communication
US6112253A (en) * 1995-10-12 2000-08-29 International Business Machines Corporation Object-oriented method maintenance mechanism that does not require cessation of the computer system or its programs
US6339787B1 (en) * 1995-11-30 2002-01-15 Stampede Technologies, Inc. Apparatus and method for increasing speed in a network file/object oriented server/client system
US6615275B2 (en) * 1995-11-30 2003-09-02 Stampede Technologies, Inc. System for increasing data access in network having compression device for determining and controlling data/object compression based on predetermined maximum percentage of CPU processing capacity
US6063128A (en) * 1996-03-06 2000-05-16 Bentley Systems, Incorporated Object-oriented computerized modeling system
US5875461A (en) 1997-04-03 1999-02-23 Sun Microsystems, Inc. Method of synchronizing one of the objects with one of the threads at a time
US6108754A (en) 1997-04-03 2000-08-22 Sun Microsystems, Inc. Thread-local synchronization construct cache
FR2762737B1 (en) * 1997-04-24 1999-06-11 Alsthom Cge Alcatel METHOD FOR CHANGING SOFTWARE VERSION IN A COMPUTER SYSTEM COMPRISING MULTIPLE STATIONS, AND COMPUTER SYSTEM FOR IMPLEMENTING SAID METHOD
US5924098A (en) * 1997-06-30 1999-07-13 Sun Microsystems, Inc. Method and apparatus for managing a linked-list data structure
US6477545B1 (en) * 1998-10-28 2002-11-05 Starfish Software, Inc. System and methods for robust synchronization of datasets
US6401104B1 (en) * 1999-07-03 2002-06-04 Starfish Software, Inc. System and methods for synchronizing datasets using cooperation among multiple synchronization engines
US6457170B1 (en) * 1999-08-13 2002-09-24 Intrinsity, Inc. Software system build method and apparatus that supports multiple users in a software development environment
US6226653B1 (en) * 2000-01-10 2001-05-01 International Business Machines Corporation Method and apparatus for performing generational garbage collection using remembered set counter

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4812968A (en) * 1986-11-12 1989-03-14 International Business Machines Corp. Method for controlling processor access to input/output devices
US5319780A (en) * 1987-10-19 1994-06-07 International Business Machines Corporation System that implicitly locks a subtree or explicitly locks a node based upon whether or not an explicit lock request is issued
US5920725A (en) * 1997-07-02 1999-07-06 Adaptivity Inc. Run-time object-synthesis and transparent client/server updating of distributed objects using a meta server of all object descriptors

Cited By (17)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8843942B2 (en) 2007-09-28 2014-09-23 Xcerion Aktiebolag Interpreting semantic application code
US9071623B2 (en) 2007-09-28 2015-06-30 Xcerion Aktiebolag Real-time data sharing
US20090172086A1 (en) * 2007-09-28 2009-07-02 Xcerion Ab Network operating system
US8615531B2 (en) 2007-09-28 2013-12-24 Xcerion Aktiebolag Programmatic data manipulation
US8954526B2 (en) 2007-09-28 2015-02-10 Xcerion Aktiebolag Network operating system
US8688627B2 (en) 2007-09-28 2014-04-01 Xcerion Aktiebolag Transaction propagation in a networking environment
US8959123B2 (en) 2007-09-28 2015-02-17 Xcerion Aktiebolag User interface framework
US11838358B2 (en) 2007-09-28 2023-12-05 Xcerion Aktiebolag Network operating system
US8620863B2 (en) 2007-09-28 2013-12-31 Xcerion Aktiebolag Message passing in a collaborative environment
US8738567B2 (en) 2007-09-28 2014-05-27 Xcerion Aktiebolag Network file system with enhanced collaboration features
US8996459B2 (en) * 2007-09-28 2015-03-31 Xcerion Aktiebolag Offline and/or client-side execution of a network application
US9621649B2 (en) 2007-09-28 2017-04-11 Xcerion Aktiebolag Network operating system
US20100115503A1 (en) * 2008-11-05 2010-05-06 Samsung Electronics Co., Ltd. Image processing apparatus and control method thereof
US20140089939A1 (en) * 2012-05-18 2014-03-27 International Business Machines Corporation Resolving RCU-Scheduler Deadlocks
US9003420B2 (en) * 2012-05-18 2015-04-07 International Business Machines Corporation Resolving RCU-scheduler deadlocks
US8997110B2 (en) * 2012-05-18 2015-03-31 International Business Machines Corporation Resolving RCU-scheduler deadlocks
US20130311995A1 (en) * 2012-05-18 2013-11-21 International Business Machines Corporation Resolving RCU-Scheduler Deadlocks

Also Published As

Publication number Publication date
US20020120601A1 (en) 2002-08-29
US7031989B2 (en) 2006-04-18

Similar Documents

Publication Publication Date Title
US7031989B2 (en) Dynamic seamless reconfiguration of executing parallel software
US6560627B1 (en) Mutual exclusion at the record level with priority inheritance for embedded systems using one semaphore
US7016923B2 (en) Multi-threaded garbage collector employing cascaded memory arrays of task identifiers to implement work stealing queues for task identification and processing
US7844665B2 (en) Modified computer architecture having coordinated deletion of corresponding replicated memory locations among plural computers
US6550060B1 (en) Method and system for dynamic injection of dynamic link libraries into a windowed operating system
US5414854A (en) Object-oriental system for managing shared libraries
US5734904A (en) Method and system for calling one of a set of routines designed for direct invocation by programs of a second type when invoked by a program of the first type
US20050262513A1 (en) Modified computer architecture with initialization of objects
Balzer et al. Mediating connectors
US20060095483A1 (en) Modified computer architecture with finalization of objects
US8176142B2 (en) Shared JAVA jar files
US20060020913A1 (en) Multiple computer architecture with synchronization
JPH0318935A (en) Serialization system for access to data list
JP2007534064A (en) Multicomputer architecture with synchronization.
JPH01303527A (en) Control method for shared resources
EP1224543A2 (en) FIXING INCOMPATIBLE APPLICATIONS BY PROVIDING STUBS FOR APIs
US6662364B1 (en) System and method for reducing synchronization overhead in multithreaded code
EP1394675A2 (en) Method call acceleration in virtual machines
US5063496A (en) Signaling attempted transfer to protected entry point bios routine
US7117496B1 (en) Event-based synchronization
US6336215B1 (en) Apparatus and method for on-line code only replacement of a running program using checkpoints
US20060031810A1 (en) Method and apparatus for referencing thread local variables with stack address mapping
US6430638B1 (en) Thread synchronization via selective object locking
US7334229B1 (en) Mutual exclusion at the record level with priority inheritance for embedded systems using one semaphore
Bernabéu-Aubán et al. The architecture of Ra: a kernel for Clouds

Legal Events

Date Code Title Description
STCB Information on status: application discontinuation

Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION