Scalable work stealing

J Dinan, DB Larkins, P Sadayappan… - Proceedings of the …, 2009 - dl.acm.org
… Prior work on work stealing has largely focused on shared memory machines. In this work
we investigate the design and scalability of work stealing on modern distributed memory …

Slaw: a scalable locality-aware adaptive work-stealing scheduler for multi-core systems

Y Guo, J Zhao, V Cave, V Sarkar - … of the 15th ACM SIGPLAN Symposium …, 2010 - dl.acm.org
This poster introduces SLAW, a Scalable Locality-aware Adaptive Work-stealing scheduler.
The SLAW features an adaptive task scheduling algorithm combined with a locality-aware …

[PDF][PDF] Hierarchical work stealing on manycore clusters

SJ Min, C Iancu, K Yelick - Fifth Conference on Partitioned Global Address …, 2011 - Citeseer
scalability, we propose a topology-aware hierarchical workscalability on distributed
memory, workstealing schedulers [4… [4] present a scalable implementation of work stealing for …

Randomized work stealing for large scale soft real-time systems

J Li, S Dinh, K Kieselbach, K Agrawal… - 2016 IEEE Real-Time …, 2016 - ieeexplore.ieee.org
… nature of work stealing, our experiments with benchmark programs found that work stealing
(in … To leverage randomized work stealing for scalable real-time computing, we present Real…

[HTML][HTML] A work stealing based approach for enabling scalable optimal sequence homology detection

J Daily, A Kalyanaraman, S Krishnamoorthy… - Journal of Parallel and …, 2015 - Elsevier
work focused primarily on the work stealing of the brute force n 2 set of sequence pairs. Our
work represents the first comprehensive solution to scalable … applies work stealing to the …

Energy-efficient work-stealing language runtimes

H Ribic, YD Liu - ACM SIGARCH Computer Architecture News, 2014 - dl.acm.org
… Naive Frequency Scaling Finally, we investigate the impact of naively applying frequency
scaling, ie, without the tempo control algorithm of HERMES. Figures 23-24 show the impact of …

Accelerating real-time applications with predictable work-stealing

F Fritz, M Schmid, J Mottok - International Conference on Architecture of …, 2020 - Springer
work-stealing and the libraries TBB and EMB $$^2$$ . Based on the state of the art we
introduce a novel resource-trading concept that allows static memory allocation in a work-stealing

Uni-address threads: scalable thread management for RDMA-based work stealing

S Akiyama, K Taura - Proceedings of the 24th International Symposium …, 2015 - dl.acm.org
work stealing. We implement a lightweight multithread library supporting RDMA-based work
stealing … its lightweight thread operations and scalable work stealing on Fujitsu FX10 super…

Accelerated work stealing

DB Larkins, J Snyder, J Dinan - … of the 48th International Conference on …, 2019 - dl.acm.org
… The introduction of NICs with support for one-sided Remote Direct Memory Access (RDMA)
operations was shown to provide an efficient and scalable basis for supporting work stealing […

Scalable distributed depth-first search with greedy work stealing

J Jaffar, AE Santosa, RHC Yap… - 16th IEEE International …, 2004 - ieeexplore.ieee.org
… Global work stealing algorithm We now introduce a global work stealing algorithm which works
… the largest amount of work – this is intended to ensure good work balancing between the …