ACM/IEEE SC 2005 Conference (SC'05)
DOI: 10.1109/sc.2005.75
|View full text |Cite
|
Sign up to set email alerts
|

Transformations to Parallel Codes for Communication-Computation Overlap

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
40
0

Publication Types

Select...
4
1
1

Relationship

0
6

Authors

Journals

citations
Cited by 58 publications
(40 citation statements)
references
References 22 publications
0
40
0
Order By: Relevance
“…In [21] the overlapping schedule for the class of applications under consideration was proposed, while in [13] this schedule was coupled with an underlying SCI network [27] to implement actual overlapping. Danalis et al [14] present a method to transform MPI programs directed towards improving communication-computation overlap in MPI collective operations. The approach is verified using Myrinet.…”
Section: Related Workmentioning
confidence: 99%
“…In [21] the overlapping schedule for the class of applications under consideration was proposed, while in [13] this schedule was coupled with an underlying SCI network [27] to implement actual overlapping. Danalis et al [14] present a method to transform MPI programs directed towards improving communication-computation overlap in MPI collective operations. The approach is verified using Myrinet.…”
Section: Related Workmentioning
confidence: 99%
“…Brightwell et al [7] classifies the source of performance advantage for overlap and Dimitrov [8] uses overlapping as fundamental approach to optimize parallel applications for cluster systems. Other studies, as [9,10,11,12] apply several transformations to parallel codes to enable overlapping. However, little research has been done in the field of non-blocking collectives.…”
Section: Related Workmentioning
confidence: 99%
“…We can classify previous works into three kinds. Some of researches are achieved by compiled methods [1,2,3,4,5]; some of them have been performed in the field of Global Address Space languages [6,7,8] or achieved by particular hardware [9,10,11]. However, these techniques may be effective for overlapping communication and computation only in a single loop.…”
Section: Introductionmentioning
confidence: 99%