Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/277651.277687acmconferencesArticle/Chapter ViewAbstractPublication PagesspaaConference Proceedingsconference-collections
Article
Free access

Analyses of load stealing models based on differential equations

Published: 01 June 1998 Publication History
First page of PDF

References

[1]
D. Achlioptas and M. Molloy. The analysis of a listcoloring algorithm on a random graph. In Proceedings of the 38th IEEE Symposium on Foundations of Computer Science, pages 204-212, 1997.
[2]
M. Alanyali and B. Hajek. Analysis of simple algorithms for dynamic load balancing. In INFOCOM 95, 1995.
[3]
Y. Azar, A. Broder, A. Karlin, and E. Upfal. Balanced allocations. In Proceedings of the 26th A CM Symposium on the Theory of Computing, pages 593-602, 1994.
[4]
R. Blumofe. Executing Multithreaded Program E#- ciently. PhD thesis, Massachusetts Institute of Technology, September 1995.
[5]
R. Blumofe, M. Frigo, C. Joerg, C. Leiserson, and K. Randall. An analysis of dag-consistent distributed shared-memory algorithms. In Proceedings of the 8th Annual A CM Syposium on Parallel Algorithms and Architectures, 1996.
[6]
R. Blumofe, C. Joerg, B. Kuszmaul, C. Leiserson, K. Randall, and Y. Zhou. Cilk: An efficient multithreaded runtime system. In Proceedings of the 5th A CM SIGPLAN Symposium on Principles and Practice of Parallel Programming, 1995.
[7]
R. Blumofe and C. Leiserson. Space-efficient scheduling of multithreaded computations. In Proceedings of the 25th Annual A CM Symposium on Theory of Computing, pages 362-371, 1993.
[8]
R. Blumofe and C. Leiserson. Scheduling multithreaded computations by work stealing. In Proceedings of the 35th Annual IEEE Conference on Foundations of Computer Science, 1994.
[9]
D. L. Eager, E. D. Lazokwska, and J. Zahorjan. A comparison of receiver-initiated and sender-initiated adaptive load sharing. Performance Evaluation Review, 16:53-68, March 1986.
[10]
S. N. Ethier and T. G. Kurtz. Markov Processes: Characterization and Convergence. John Wiley and Sons, 1986.
[11]
B. Hajek. Asymptotic analysis of an assignment problem arising in a distributed communications protocol. In Proceedings of the 2Tth Conference on Decision and Control, pages 1455-1459, 1988.
[12]
M. Harchol-Balter and D. Wolfe. Bounding delays in packet-routing networks. In Proceedings of the Twenty- Seventh Annual A CM Symposium on the Theory of Computing, pages 248-257, 1995.
[13]
R. M. Karp and M. Sipser. Maximum matchings in sparse random graphs. In Proceedings of the 22nd IEEE Symposium on Foundations of Computer Science, pages 364-375, 1981.
[14]
R. M. Karp, U. V. Vazirani, and V. V. Vazirani. An optimal algorithm for on-line bipartite matching. In Proceedings of the #2nd A CM Symposium on the Theory of Computing, pages 352-358, 1990.
[15]
R. M. Karp and Y. Zhang. A randomized parallel branch-and-bound procedure. In Proceedings of the 20th A CM Symposium on the Theory of Computing, pages 290-300, 1988.
[16]
L. Kleinrock. Queueing Systems, Volume i: Theory. John Wiley and Sons, 1976.
[17]
T. G. Kurtz. Solutions of ordinary differential equations as limits of pure jump Markov processes. Journal of Applied Probability, 7:49-58, 1970.
[18]
T. G. Kurtz. Limit theorems for sequences of jump Markov processes approximating ordinary differential processes. Journal of Applied Probability, 8:344-356, 1971.
[19]
T. G. Kurtz. Strong approximation theorems for density dependent Markov chains. Stochastic Processes and Applications, 6:223-240, 1978.
[20]
T. G. Kurtz. Approximation of Population Processes. CBMS-NSF Regional Conf. Series in Applied Math. SIAM, 1981.
[21]
M. Luby, M. Mitzenmacher, M. A. Shokrollahi, D. Spielman, and V. Stemann. Practical loss-resilient codes. In Proceedings of the 29th A CM Symposium on the Theory of Computing, pages 150-159, 1997.
[22]
J. Martin and Y. M. Suhov. Fast jackson networks. available at uw#.statslab, cam. ac.uk/~jmb, January 1998.
[23]
A. N. Michel and R. K. Miller. Qualitative Analysis of Large Scale Dynamical Systems. Academic Press, Inc., 1977.
[24]
R. Mirchandaney, D. Towsley, and J. A. Stankovic. Analysis of the effects of delays on load sharing. Journal of Parallel and Distributed Systems, 1513-1525:331- 346, November 1989.
[25]
R. Mirchandaney, D. Towsley, and J. A. Stankovic. Adaptive load sharing in heterogeneous systems. Journal of Parallel and Distributed Systems, 9:331-346, 1990.
[26]
M. Mitzenmacher. Bounds on the greedy routing algorithm for array networks. In Proceedings of the Sixth Annual A CM Symposium on Parallel Algorithms and Architectures, pages 248-259, 1994. To appear in the Journal of Computer Systems and Science.
[27]
M. Mitzenmacher. Constant time per edge is optimal on rooted tree networks. In Proceedings of the Eighth Annual A CM Symposium on Parallel Algorithms and Architectures, pages 162-169, 1996.
[28]
M. Mitzenmacher. Load balancing and density dependent jump Markov processes. In Proceedings of the 37th IEEE Symposium on Foundations of Computer Science, pages 213-222, 1996.
[29]
M. Mitzenmacher. The Power of Two Choices in Randomized Load Balancing. PhD thesis, University of California at Berkeley, September 1996.
[30]
M. Mitzenmacher. On the analysis of randomized load balancing schemes. In Proceedings of the 9th Annual Symposium on Parallel Algorithms and Architectures, pages 292-301, 1997.
[31]
M. Mitzenmacher. Tight thresholds for the pure literal rule. Technical Report Technical Note 1997-011, Digital Systems Research Center, June 1997.
[32]
B. Pittel, J. Spencer, and N. Wormald. Sudden emergence of a giant k-core in a random graph. Journal of Combinatorial Series B, 67:111-151, 1996.
[33]
R. Righter. and J. Shanthikumar. Extremal properties of the FIFO discipline in queueing networks. Journal of Applied Probability, 29:967-978, November 1992.
[34]
L. Rudolph, M. Slivkin-Allalouf, and E. Upfal. A simple load balancing scheme for task allocation in parallel machines. In Proceedings of the 3rd Annual A CM Syposium on Parallel Algorithms and Architectures, pages 237-245, 1991.
[35]
A. Shwartz and A. Weiss. Large Deviations for Performance Analysis. Chapman & Hall, 1995.
[36]
G. D. Stamoulis and J. N. Tsitsiklis. The efficiency of greedy routing in hypercubes and butterflies. IEEE Transactions on Communications, 42(11):3051-3061, November 1994. An early version appeared in the Proceedings of the Second Annual A CM Symposium on Parallel Algorithms and Architectures, p. 248-259, 1991.
[37]
N. D. Vvedensl#ya, R. L. Dobrushin, and F. I. Karpelevich. Queueing system with selection of the shortest of two queues: An asymptotic approach. Problems of Information Transmission, 32:15-27, 1996.
[38]
N. D. Vvedenskaya and Y. M. Suhov. Dobrushin's mean-field approximation for a queue with dynamic routing. Technical Report 3328, INRIA, December 1997.
[39]
N. C. Wormald. Differential equations for random processes and random graphs. Annals of A ppl. Prob., 5:1217-1235, 1995.

Cited By

View all
  • (2023)Stragglers in Distributed Matrix MultiplicationJob Scheduling Strategies for Parallel Processing10.1007/978-3-031-43943-8_4(74-96)Online publication date: 15-Sep-2023
  • (2021)About Optimal Management of Work-Stealing Deques in Two-Level MemoryLobachevskii Journal of Mathematics10.1134/S199508022107002742:7(1475-1482)Online publication date: 9-Aug-2021
  • (2019)The Optimal Control of Two Work-Stealing Deques, Moving One After Another in a Shared MemoryProgram Systems: Theory and ApplicationsПрограммные системы: теория и приложения10.25209/2079-3316-2019-10-1-3-1710:1(3-17)Online publication date: 2019
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
SPAA '98: Proceedings of the tenth annual ACM symposium on Parallel algorithms and architectures
June 1998
312 pages
ISBN:0897919890
DOI:10.1145/277651
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 01 June 1998

Permissions

Request permissions for this article.

Check for updates

Qualifiers

  • Article

Conference

SPAA/PODC98

Acceptance Rates

SPAA '98 Paper Acceptance Rate 30 of 84 submissions, 36%;
Overall Acceptance Rate 447 of 1,461 submissions, 31%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)21
  • Downloads (Last 6 weeks)3
Reflects downloads up to 09 Nov 2024

Other Metrics

Citations

Cited By

View all
  • (2023)Stragglers in Distributed Matrix MultiplicationJob Scheduling Strategies for Parallel Processing10.1007/978-3-031-43943-8_4(74-96)Online publication date: 15-Sep-2023
  • (2021)About Optimal Management of Work-Stealing Deques in Two-Level MemoryLobachevskii Journal of Mathematics10.1134/S199508022107002742:7(1475-1482)Online publication date: 9-Aug-2021
  • (2019)The Optimal Control of Two Work-Stealing Deques, Moving One After Another in a Shared MemoryProgram Systems: Theory and ApplicationsПрограммные системы: теория и приложения10.25209/2079-3316-2019-10-1-3-1710:1(3-17)Online publication date: 2019
  • (2018)Scheduling Parallel Computations by Work StealingInternational Journal of Parallel Programming10.1007/s10766-016-0484-846:2(173-197)Online publication date: 1-Apr-2018
  • (2018)Staccato: Cache-Aware Work-Stealing Task Scheduler for Shared-Memory SystemsComputational Science and Its Applications – ICCSA 201810.1007/978-3-319-95171-3_8(91-102)Online publication date: 4-Jul-2018
  • (2017)Modeling of the Memory Management Process for Dynamic Work-Stealing Schedulers2017 Ivannikov ISPRAS Open Conference (ISPRAS)10.1109/ISPRAS.2017.00009(12-15)Online publication date: Nov-2017
  • (2017)Enhancing application performance via DAG-driven scheduling in task parallelism for cloud centerPeer-to-Peer Networking and Applications10.1007/s12083-017-0576-2Online publication date: 16-Jun-2017
  • (2015)Mean-Field Analysis for Heterogeneous Work Stealing ModelsInformation Technologies and Mathematical Modelling - Queueing Theory and Applications10.1007/978-3-319-25861-4_3(28-40)Online publication date: 9-Dec-2015
  • (2015)The Mathematical Model and the Problem of Optimal Partitioning of Shared Memory for Work-Stealing DequesProceedings of the 13th International Conference on Parallel Computing Technologies - Volume 925110.1007/978-3-319-21909-7_11(102-106)Online publication date: 31-Aug-2015
  • (2014)Friendly barriersACM SIGPLAN Notices10.1145/2674025.257620749:7(165-176)Online publication date: 1-Mar-2014
  • Show More Cited By

View Options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Get Access

Login options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media