2010
DOI: 10.1007/978-3-642-17514-5_25
|View full text |Cite
|
Sign up to set email alerts
|

A Tighter Analysis of Work Stealing

Abstract: Abstract. Classical list scheduling is a very popular and efficient technique for scheduling jobs in parallel platforms. However, with the increasing number of processors, the cost for managing a single centralized list becomes prohibitive. The objective of this work is to study the extra cost that must be paid when the list is distributed among the processors. We present a general methodology for computing the expected makespan based on the analysis of an adequate potential function which represents the load … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
21
0

Year Published

2011
2011
2023
2023

Publication Types

Select...
4
2
2

Relationship

2
6

Authors

Journals

citations
Cited by 26 publications
(21 citation statements)
references
References 16 publications
0
21
0
Order By: Relevance
“…X-KAAPI favors request aggregation [17]: N pending requests from N thieves to a same victim are handled in one operation, reducing the number of ready task detections. A theoretical analysis in [26] shows a reduction of the total steal request number. In our protocol, one of the thieves is elected to reply to all requests.…”
Section: Execution With Worktealing Algorithmmentioning
confidence: 99%
See 1 more Smart Citation
“…X-KAAPI favors request aggregation [17]: N pending requests from N thieves to a same victim are handled in one operation, reducing the number of ready task detections. A theoretical analysis in [26] shows a reduction of the total steal request number. In our protocol, one of the thieves is elected to reply to all requests.…”
Section: Execution With Worktealing Algorithmmentioning
confidence: 99%
“…The main thief tries to split [b t , e) into k + 1 equal slices, leaving one slice for the victim. Then, for each of the k requests, the thief returns approximately the same amount of work for balancing purpose [26].…”
Section: E Adaptive Tasks For Parallel Loopsmentioning
confidence: 99%
“…Indeed, traditional work stealing assumes that victims are selected following an uniform random distribution. Most theoretical proofs of the efficiency of work stealing also rely on this assumption [1], [3]. However, all the implementations provided in the public source code release of UTS use a deterministic scheme.…”
Section: A Work Stealing Implementationmentioning
confidence: 99%
“…One can show that r/(−m log 2 h(r)) is increasing in r (see Apx.B of Tchiboukdjian et al (2010) for details). Thus its maximum is attained for r = m. This shows that…”
Section: Bound On the Makespanmentioning
confidence: 99%