Proceedings of the 2007 International Workshop on Parallel Symbolic Computation 2007
DOI: 10.1145/1278177.1278185
|View full text |Cite
|
Sign up to set email alerts
|

Adaptive loops with kaapi on multicore and grid

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
7
0
1

Year Published

2007
2007
2010
2010

Publication Types

Select...
6
1

Relationship

3
4

Authors

Journals

citations
Cited by 9 publications
(8 citation statements)
references
References 9 publications
0
7
0
1
Order By: Relevance
“…Indeed, the latter depends on data computed during the iterations. To handle this issue we propose an adaptive parallel algorithm [5,24] and use the Kaapi library [6,16]. Its expressiveness in an adaptive setting guided our choice, together with the possibility to work on heterogenous networks.…”
Section: Parallelizationmentioning
confidence: 99%
See 1 more Smart Citation
“…Indeed, the latter depends on data computed during the iterations. To handle this issue we propose an adaptive parallel algorithm [5,24] and use the Kaapi library [6,16]. Its expressiveness in an adaptive setting guided our choice, together with the possibility to work on heterogenous networks.…”
Section: Parallelizationmentioning
confidence: 99%
“…In the following, we denote by T seq the time of the sequential execution and by T p the time of the parallel execution for p = 8 or p = 16 cores. All the matrices are from "Sparse Integer Matrix Collection" (SIMC) 6 . Table 3 gives the performance of the parallel computation of the determinant for small invertible matrices (less than a second) and larger ones (an hour CPU) of the SIMC/SPG and SIMC/Trefethen collections.…”
Section: Efficiencymentioning
confidence: 99%
“…Cipher parallelism On CPU, Roche et al [14] propose to use a block cipher in counter chaining mode, a mode that is well-suited for parallelization in addition to feature a high security level. The authors use a very effective method based on work-stealing and loop rescheduling for DES encryption.…”
Section: Related Workmentioning
confidence: 99%
“…Este escalonamento segue o mesmo mecanismo do Cilk, com roubo de tarefas, e atua no controle de granularidade entre os nós disponíveis à medida que os VT's ficam ociosos. Outros trabalhos em KAAPI [12,5] relatam a eficiência e estabilidade satisfatória do ambiente, no entanto, nenhum estudo avalia a complexidade de código necessária na programac ¸ão de aplicac ¸ões paralelas.…”
Section: Dinamismo E Aplicac ¸õEs Paralelas Irregularesunclassified