|
From: Greg P. <gp...@ap...> - 2012-06-20 00:37:25
|
On Jun 19, 2012, at 3:38 PM, Julian Seward <js...@ac...> wrote: > On Wednesday, June 20, 2012, Philippe Waroquiers wrote: >> For reference, this xor technique is described in: >> http://www.cis.uab.edu/hyatt/hashing.html > > I skimmed this, but failed to understand (1) why it works and > (2) how it can work without memory fences. Assuming it does work, it ought to be able to get away with cheaper barriers or no barriers on some architectures. -- Greg Parker gp...@ap... Runtime Wrangler |