Yuanchao Xu

College of Engineering

Works (13)

Updated: November 4th, 2024 08:52

2023 article

Reconciling Selective Logging and Hardware Persistent Memory Transaction

2023 IEEE INTERNATIONAL SYMPOSIUM ON HIGH-PERFORMANCE COMPUTER ARCHITECTURE, HPCA, pp. 664–676.

By: C. Ye*, Y. Xu n, X. Shen n, Y. Sha*, X. Liao*, H. Jin*, Y. Solihin*

TL;DR: An ISA extension is presented that enables selective logging for hardware persistent memory transactions for the first time and outperforms the state-of-the-art hardware counterpart by 1.8× on average. (via Semantic Scholar)
UN Sustainable Development Goal Categories
Sources: Web Of Science, NC State University Libraries
Added: June 5, 2023

2023 article

SpecPMT: Speculative Logging for Resolving Crash Consistency Overhead of Persistent Memory

PROCEEDINGS OF THE 28TH ACM INTERNATIONAL CONFERENCE ON ARCHITECTURAL SUPPORT FOR PROGRAMMING LANGUAGES AND OPERATING SYSTEMS, VOL 2, ASPLOS 2023, pp. 762–777.

By: C. Ye*, Y. Xu n, X. Shen n, Y. Sha*, X. Liao*, H. Jin*, Y. Solihin*

author keywords: persistent memory; transaction; logging; microarchitecture
TL;DR: This paper introduces speculative logging, a new method that forgoes most memory fences and reduces data persistence overhead by logging data values early, which enables a novel persistent transaction model, speculatively persistent memory transactions (SpecPMT). (via Semantic Scholar)
UN Sustainable Development Goal Categories
Sources: Web Of Science, NC State University Libraries
Added: November 6, 2023

2022 article

Brief Industry Paper: Enabling Level-4 Autonomous Driving on a Single $1k Off-the-Shelf Card

2022 IEEE 28TH REAL-TIME AND EMBEDDED TECHNOLOGY AND APPLICATIONS SYMPOSIUM (RTAS), pp. 297–300.

By: H. Sung n, Y. Xu n, J. Guan*, W. Niu*, B. Ren*, Y. Wang*, S. Liu, X. Shen n

TL;DR: It is shown that it is feasible to enable full leve1-4 autonomous driving workloads on a single off-the-shelf card (Jetson AGX Xavier) for less than 1.1 times less than the state-of- the-art systems, while meeting all the requirements of latency. (via Semantic Scholar)
UN Sustainable Development Goal Categories
9. Industry, Innovation and Infrastructure (OpenAlex)
Sources: Web Of Science, NC State University Libraries
Added: April 17, 2023

2022 article

FFCCD: Fence-Free Crash-Consistent Concurrent Defragmentation for Persistent Memory

PROCEEDINGS OF THE 2022 THE 49TH ANNUAL INTERNATIONAL SYMPOSIUM ON COMPUTER ARCHITECTURE (ISCA '22), pp. 274–288.

By: Y. Xu n, C. Ye*, Y. Solihin* & X. Shen n

author keywords: Non-volatile memory; Persistent memory; Memory management; Garbage collection; Defragmentation
TL;DR: Fence-Free Crash-consistent Concurrent Defragmentation (FFCCD) introduces architecture support for concurrent defragmentation that enables a fence-free design and fast read barrier, reducing two major overheads of defragmenting persistent memory. (via Semantic Scholar)
UN Sustainable Development Goal Categories
11. Sustainable Cities and Communities (Web of Science; OpenAlex)
Sources: Web Of Science, NC State University Libraries
Added: September 26, 2022

2022 journal article

Preserving Addressability Upon GC-Triggered Data Movements on Non-Volatile Memory

ACM TRANSACTIONS ON ARCHITECTURE AND CODE OPTIMIZATION, 19(2).

author keywords: Persistent memory; garbage collector; memory management
TL;DR: The article proposes the concept of movement-oblivious addressing (MOA), and develops and compares three novel solutions to materialize the concept for solving the addressability problem. (via Semantic Scholar)
Sources: Web Of Science, NC State University Libraries
Added: April 18, 2022

2022 article

Temporal Exposure Reduction Protection for Persistent Memory

2022 IEEE INTERNATIONAL SYMPOSIUM ON HIGH-PERFORMANCE COMPUTER ARCHITECTURE (HPCA 2022), pp. 908–924.

By: Y. Xu n, C. Ye*, X. Shen n & Y. Solihin*

author keywords: Memory Security; Persistent Memory; Memory Exposure Reduction; Hardware-Software Co-Design
TL;DR: This paper develops temporal exposure reduction protection (TERP) as a framework for enforcing memory safety and proposes programming system and architecture solutions for the key challenges for the adoption of TERP, which draws on novel supports in both compilers and hardware to efficiently meet the exposure time target. (via Semantic Scholar)
Sources: Web Of Science, NC State University Libraries
Added: August 29, 2022

2021 article

Hardware-Based Address-Centric Acceleration of Key-Value Store

2021 27TH IEEE INTERNATIONAL SYMPOSIUM ON HIGH-PERFORMANCE COMPUTER ARCHITECTURE (HPCA 2021), pp. 736–748.

TL;DR: This paper introduces an address-centric approach to speed up the addressing by creating a shortcut for the translation of a key to the physical address of the value, using a novel in-memory table, STLT, a virtual-physical address buffer, and two new instructions. (via Semantic Scholar)
UN Sustainable Development Goal Categories
Sources: Web Of Science, NC State University Libraries
Added: July 26, 2021

2021 article

Recurrent Neural Networks Meet Context-Free Grammar: Two Birds with One Stone

2021 21ST IEEE INTERNATIONAL CONFERENCE ON DATA MINING (ICDM 2021), pp. 1078–1083.

By: H. Guan*, U. Chaudhary*, Y. Xu n, L. Ning n, L. Zhang* & X. Shen n

author keywords: recurrent neural networks; data compression; context free grammar; tokenization
TL;DR: This work introduces CFG-guided compressed learning, an approach that creatively integrates Context-Free Grammar (CFG) and online tokenization into RNN learning and inference for streaming inputs through a hierarchical compression algorithm. (via Semantic Scholar)
UN Sustainable Development Goal Categories
4. Quality Education (OpenAlex)
Sources: Web Of Science, NC State University Libraries
Added: May 2, 2022

2021 article

Seeds of SEED: New Security Challenges for Persistent Memory

2021 INTERNATIONAL SYMPOSIUM ON SECURE AND PRIVATE EXECUTION ENVIRONMENT DESIGN (SEED 2021), pp. 83–88.

By: N. Ul Mustafa*, Y. Xu n, X. Shen n & Y. Solihin*

author keywords: Persistent memory objects; Security attacks; PMO vulnerability
TL;DR: Security implications of using the PMO, highlighting sample PMO-based attacks and potential strategies to defend against them, and threat vulnerabilities that are either new or increased in intensity under PMO programming model are discussed. (via Semantic Scholar)
UN Sustainable Development Goal Categories
16. Peace, Justice and Strong Institutions (OpenAlex)
Sources: Web Of Science, NC State University Libraries
Added: June 20, 2022

2021 article

Supporting Legacy Libraries on Non-Volatile Memory: A User-Transparent Approach

2021 ACM/IEEE 48TH ANNUAL INTERNATIONAL SYMPOSIUM ON COMPUTER ARCHITECTURE (ISCA 2021), pp. 443–455.

TL;DR: A new concept that allows programmers to reference a persistent object in the same way as reference a normal (volatile) object is presented, and compiler and simple architecture support for keeping performance overheads very low is described. (via Semantic Scholar)
UN Sustainable Development Goal Categories
Sources: Web Of Science, NC State University Libraries
Added: October 26, 2021

2021 journal article

UDF to SQL Translation through Compositional Lazy Inductive Synthesis

PROCEEDINGS OF THE ACM ON PROGRAMMING LANGUAGES-PACMPL, 5(OOPSLA).

By: G. Zhang n, Y. Xu n, X. Shen n & I. Dillig*

author keywords: program synthesis; source-to-source compiler; query optimization
TL;DR: A new technique for translating SQL queries with UDFs to pure SQL expressions using a novel compositional strategy that decomposes the synthesis task into simpler sub-problems and scales significantly better than traditional CEGIS. (via Semantic Scholar)
Sources: Web Of Science, ORCID, NC State University Libraries
Added: January 2, 2022

2020 article

Hardware-Based Domain Virtualization for Intra-Process Isolation of Persistent Memory Objects

2020 ACM/IEEE 47TH ANNUAL INTERNATIONAL SYMPOSIUM ON COMPUTER ARCHITECTURE (ISCA 2020), pp. 680–692.

By: Y. Xu n, C. Ye*, Y. Solihin* & X. Shen n

author keywords: Persistent Memory Objects; Memory Protection Keys; Intra-process Isolation
TL;DR: This paper presents two novel architecture supports, which provide 11 - 52 × higher efficiency while offering the first known domain-based protection for PMOs. (via Semantic Scholar)
UN Sustainable Development Goal Categories
Sources: Web Of Science, NC State University Libraries
Added: March 8, 2021

2020 article

MERR: Improving Security of Persistent Memory Objects via Efficient Memory Exposure Reduction and Randomization

TWENTY-FIFTH INTERNATIONAL CONFERENCE ON ARCHITECTURAL SUPPORT FOR PROGRAMMING LANGUAGES AND OPERATING SYSTEMS (ASPLOS XXV), pp. 987–1000.

By: Y. Xu n, Y. Solihin* & X. Shen n

author keywords: persistent memory objects; memory exposure reduction; runtime randomization
TL;DR: The paper discusses the complexities the technique brings, to permission controls and hardware implementations, and provides solutions, and shows that the new technique reduces memory exposure time by 60% with a 5% time overhead and allows much more frequent address randomizations, offering significant potential for enhancing memory security. (via Semantic Scholar)
UN Sustainable Development Goal Categories
Sources: Web Of Science, NC State University Libraries
Added: July 6, 2020

Citation Index includes data from a number of different sources. If you have questions about the sources of data in the Citation Index or need a set of data which is free to re-distribute, please contact us.

Certain data included herein are derived from the Web of Science© and InCites© (2024) of Clarivate Analytics. All rights reserved. You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.