2019
DOI: 10.1109/tnet.2019.2939040
|View full text |Cite
|
Sign up to set email alerts
|

Randomized Work Stealing Versus Sharing in Large-Scale Systems With Non-Exponential Job Sizes

Abstract: Work sharing and work stealing are two scheduling paradigms to redistribute work when performing distributed computations. In work sharing, processors attempt to migrate pending jobs to other processors in the hope of reducing response times. In work stealing, on the other hand, underutilized processors attempt to steal jobs from other processors. Both paradigms generate a certain communication overhead and the question addressed in this paper is which of the two reduces the response time the most given that t… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
10
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
3
1
1

Relationship

2
3

Authors

Journals

citations
Cited by 5 publications
(10 citation statements)
references
References 30 publications
0
10
0
Order By: Relevance
“…More recent work based on mean field models for work stealing and sharing includes [8,15,22,25]. A model for stealing in a network composed of a number of homogeneous clusters and exponential job sizes is presented in [8], where an important difference with prior work lies in the fact that half of the jobs are stolen instead of just one job at a time.…”
Section: Related Workmentioning
confidence: 99%
See 3 more Smart Citations
“…More recent work based on mean field models for work stealing and sharing includes [8,15,22,25]. A model for stealing in a network composed of a number of homogeneous clusters and exponential job sizes is presented in [8], where an important difference with prior work lies in the fact that half of the jobs are stolen instead of just one job at a time.…”
Section: Related Workmentioning
confidence: 99%
“…A model for stealing in a network composed of a number of homogeneous clusters and exponential job sizes is presented in [8], where an important difference with prior work lies in the fact that half of the jobs are stolen instead of just one job at a time. The main motivation for the work presented in [15,22,25] was to provide a more fair comparison between load stealing and sharing strategies. For the more traditional strategies considered in [6,17] the communication overhead of the stealing and sharing strategies is not the same, which made the comparison somewhat biased.…”
Section: Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…In this example it is possible to show that for λ < 1 the set of ODEs has a unique fixed point that can be computed by determining the invariant distribution of an ergodic asi-Birth-Death Markov chain [32]. Note that the issue of global a raction is not addressed in [32]. Assumption A1 is readily verified.…”
Section: Pull and Push Strategiesmentioning
confidence: 99%