2013
DOI: 10.1145/2517327.2442562
|View full text |Cite
|
Sign up to set email alerts
|

Work-stealing with configurable scheduling strategies

Abstract: Work-stealing systems are typically oblivious to the nature of the tasks they are scheduling. They do not know or take into account how long a task will take to execute or how many subtasks it will spawn. Moreover, task execution order is typically determined by an underlying task storage data structure, and cannot be changed. There are thus possibilities for optimizing task parallel executions by providing information on specific tasks and their preferred execution order to the scheduling system. … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
13
0

Year Published

2013
2013
2023
2023

Publication Types

Select...
4
2
2

Relationship

0
8

Authors

Journals

citations
Cited by 12 publications
(13 citation statements)
references
References 21 publications
0
13
0
Order By: Relevance
“…All these schedulers can be viewed as cooperative schedulers because they don't treat threads as competing for the same resources but schedule them cooperatively with the goal of maximizing throughput. Other work has shown that scheduling based on priorities [Imam and Sarkar 2015;Wimmer et al 2013Wimmer et al , 2014 can improve throughput in some applications.…”
Section: Related Workmentioning
confidence: 99%
“…All these schedulers can be viewed as cooperative schedulers because they don't treat threads as competing for the same resources but schedule them cooperatively with the goal of maximizing throughput. Other work has shown that scheduling based on priorities [Imam and Sarkar 2015;Wimmer et al 2013Wimmer et al , 2014 can improve throughput in some applications.…”
Section: Related Workmentioning
confidence: 99%
“…Some programming models expose an API that allows programmers to specify on which NUMA node/socket a collection of tasks should be executed (e.g., OmpSs [4]). Configurable work stealers that can be customized with scheduling hints have also been developed [71]. A more extreme option is to allow the application programmer to attach a custom work-stealing function to the application [48].…”
Section: State Of the Artmentioning
confidence: 99%
“…These early results have led to many more algorithms [1-3, 13, 16, 22, 26, 30, 49]. More recent papers showed that priority-based schedulers can improve performance in practice [34,63,64]. Our weighted-dag model builds on the model of Muller and Acar [45], who developed an algorithm for scheduling blocking parallel programs to hide latency, but did not consider responsiveness.…”
Section: Related Workmentioning
confidence: 99%