2019 IEEE/ACM 9th Workshop on Irregular Applications: Architectures and Algorithms (IA3) 2019
DOI: 10.1109/ia349570.2019.00008
|View full text |Cite
|
Sign up to set email alerts
|

Extending a Work-Stealing Framework with Priorities and Weights

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
2

Relationship

1
1

Authors

Journals

citations
Cited by 2 publications
(3 citation statements)
references
References 13 publications
0
3
0
Order By: Relevance
“…The retry loop corresponds to "all workers" in the node in steps ( 3 ) and ( 5) in Section 2.1. Unlike [7], [8], [9], we enable the retryloop option for all evaluations below. Furthermore, unlike [9], priority-based selection is properly applied even for task requests from external nodes.…”
Section: Evaluationsmentioning
confidence: 99%
See 2 more Smart Citations
“…The retry loop corresponds to "all workers" in the node in steps ( 3 ) and ( 5) in Section 2.1. Unlike [7], [8], [9], we enable the retryloop option for all evaluations below. Furthermore, unlike [9], priority-based selection is properly applied even for task requests from external nodes.…”
Section: Evaluationsmentioning
confidence: 99%
“…Unlike [7], [8], [9], we enable the retryloop option for all evaluations below. Furthermore, unlike [9], priority-based selection is properly applied even for task requests from external nodes.…”
Section: Evaluationsmentioning
confidence: 99%
See 1 more Smart Citation