ISMM is a premier forum for research specialized in memory management. This year we have accepted 12 papers out of 22 submissions from both academia and industry and from countries in Asia, Europe, Australia, and North America. Every accepted paper is assigned a shepherd who helps the authors improve the final version of their paper. Please browse the entire program here.
Accepted Papers
Call for Papers
ISMM solicits full-length submissions covering new work on memory management topics, as well as papers presenting confirmations or refutations of important prior results. Surveys and comparative analyses that shed new light on previously published techniques are also welcome.
All papers must be submitted on-line in Portable Document Format (PDF). The submission web site is: https://ismm16.hotcrp.com/
Submissions will be read by the program committee and designated reviewers, and judged on scientific merit, innovation, readability, and relevance. Papers previously published or already being reviewed by another conference are not eligible; if a closely related paper has been submitted elsewhere, the authors must notify the program chair (see the SIGPLAN republication policy). Submissions must be in English, formatted to print on US Letter (8.5 x 11 inches) paper, and no more than 10 pages (not including bibliography, excluding well marked appendices) in standard ACM SIGPLAN conference format: two columns, nine-point font (or larger) on a ten-point baseline (or larger), with columns 20pc (3.33in) wide and 54pc (9in) tall, and a column gutter of 2pc (0.33in). Detailed formatting guidelines are available at the URL below, along with formatting templates or style files for LaTeX. Papers should be self-contained and auxiliary material will not be accepted. Papers that violate these guidelines will be rejected by the program chair. Program committee members are not required to read appendices, and so a paper should be intelligible without them. All accepted papers will appear in the published proceedings. http://www.acm.org/sigs/sigplan/authorInformation.htm
Double-Blind Reviewing
The ISMM paper reviewing process uses double-blind reviewing and provides an opportunity for rebuttal. In double-blind reviewing, the authors are anonymous to the reviewers, just as reviewers are anonymous to the authors. Authors are required to make reasonable efforts not to disclose their identities to reviewers. For example, you should not give your names nor mention your institution, research group, project name, etc. Where necessary for flow, you could say “the XYZ project” and add in a footnote that the name is withheld. Discuss your own prior work in the third person, as you would other related work. Avoid making paper drafts too public, to reduce the possibility of inadvertently revealing your identities to reviewers. Reviewers, for their part, will be honor-bound not to try to discover authors’ identities, which will be known only by the program chair until a suitable point in the program committee’s deliberations. We are using this process because research indicates that author anonymity reduces bias in reviewing.
External Review Committee
ISMM 2016 follows the practice introduced in earlier ISMM’s of using a separate External Review Committee (ERC) as part of the reviewing process. The ERC complements the Program Committee (PC) by providing expert reviews. The same reviewing standards apply to the ERC as for the PC. However, ERC members review only around four papers each, do not participate in the PC meeting, but will review and determine the fate of PC submissions. The purpose of the ERC is to increase the breadth and depth of the reviewer pool, thus increasing the likelihood of conflict-free expert reviews. This approach should be more practical with double-blind reviewing than ad hoc expert review assignments (as used by a number of conferences). The formal selection process, transparency of its constituency, and the fact that each reviewer will review multiple papers should increase the quality and accountability of reviews as compared to traditional ad hoc expert review assignments. Rebuttal The rebuttal process will occur in March 2016 (see Important Dates), and will give the authors opportunity to respond succinctly to factual errors in reviews, before the program committee meets to make its decisions. The committee may, but need not, respond to rebuttals or revise reviews at or after the committee meeting.
Tue 14 JunDisplayed time zone: Tijuana, Baja California change
08:50 - 10:10 | |||
08:50 10mTalk | Opening Remarks ISMM Christine H. Flood Red Hat | ||
09:00 70mTalk | Keynote talk: Rethinking Memory System Design ISMM Onur Mutlu ETH Zurich Media Attached |
10:30 - 12:10 | |||
10:30 25mTalk | Block-Free Concurrent GC: Stack Scanning and Copying ISMM | ||
10:55 25mTalk | Characterizing Emerging Heterogeneous Memory ISMM | ||
11:20 25mTalk | Hardware Support for Protective and Collaborative Cache Sharing ISMM Raj Parihar University of Rochester, Jacob Brock University of Rochester, Chen Ding University of Rochester, Michael Huang University of Rochester | ||
11:45 25mTalk | Fast Non-intrusive Memory Reclamation for Highly-Concurrent Data Structures ISMM |
13:30 - 15:10 | Non-traditional and Datacenter Scale Memory SystemISMM at Sierra Madre South Chair(s): Steve Heller Two Sigma | ||
13:30 25mTalk | Understanding and Improving JVM GC Work Stealing at the Data Center Scale ISMM Wessam Hassanein Google | ||
13:55 25mTalk | Persistence Programming Models for Non-Volatile Memory ISMM | ||
14:20 25mTalk | CBufs: Efficient, System-Wide Memory Management and Sharing ISMM Yuxin Ren he George washington university, Gabriel Parmer The George Washington University, A: Gedare Bloom Howard University, Teo Georgiev The George Washington University | ||
14:45 25mTalk | A bounded memory allocator for software-defined global address spaces ISMM Fabrice Rastello INRIA, France, Albert Cohen INRIA, Francois Gindraud Joseph Fourier University, France;, Francois Broquedis Universite Joseph Fourier - Grenoble 1 |
15:30 - 17:10 | |||
15:30 25mTalk | Rust as a Language for High Performance GC Implementation ISMM Yi Lin Australian National University, Steve Blackburn Australian National University , Tony Hosking Australian National University, Data61, and Purdue University, Michael Norrish NICTA | ||
15:55 25mTalk | Prescient Memory: Exposing Weak Memory Model Behavior by Looking into the Future ISMM Man Cao Ohio State University, Jake Roemer Ohio State University, Aritra Sengupta Ohio State University, Michael D. Bond Ohio State University | ||
16:20 25mTalk | Rethinking a Heap Hierarchy as a Cache Hierarchy: A Higher-Order Theory of Memory Demand (HOTM) ISMM | ||
16:45 25mTalk | Liveness-Based Garbage Collection for Lazy Languages ISMM |