Sciweavers

111 search results - page 1 / 23
» Work Stealing Technique and Scheduling on the Critical Path
Sort
View
GPC
2008
Springer
13 years 5 months ago
Work Stealing Technique and Scheduling on the Critical Path
This paper is about a new framework for high performance thread scheduling based on the work stealing principle when processors may run at different speed. We also take into accou...
Christophe Cérin, Michel Koskas
PPOPP
2009
ACM
14 years 4 months ago
Idempotent work stealing
Load balancing is a technique which allows efficient parallelization of irregular workloads, and a key component of many applications and parallelizing runtimes. Work-stealing is ...
Maged M. Michael, Martin T. Vechev, Vijay A. Saras...
SPAA
2009
ACM
13 years 9 months ago
Brief announcement: a lower bound for depth-restricted work stealing
Work stealing is a common technique used in the runtime schedulers of parallel languages such as Cilk and parallel libraries such as Intel Threading Building Blocks (TBB). Depth-r...
Jim Sukha
ISAAC
2010
Springer
291views Algorithms» more  ISAAC 2010»
13 years 2 months ago
A Tighter Analysis of Work Stealing
Abstract. Classical list scheduling is a very popular and efficient technique for scheduling jobs in parallel platforms. However, with the increasing number of processors, the cost...
Marc Tchiboukdjian, Nicolas Gast, Denis Trystram, ...
EUROPAR
2010
Springer
13 years 5 months ago
Hierarchical Work-Stealing
Abstract. We study the problem of dynamic load-balancing on hierarchical platforms. In particular, we consider applications involving heavy communications on a distributed platform...
Jean-Noël Quintin, Frédéric Wag...