BibSLEIGH
BibSLEIGH corpus
BibSLEIGH tags
BibSLEIGH bundles
BibSLEIGH people
CC-BY
Open Knowledge
XHTML 1.0 W3C Rec
CSS 2.1 W3C CanRec
email twitter
Used together with:
work (17)
schedul (8)
adapt (4)
scalabl (3)
base (3)

Stem steal$ (all stems)

23 papers:

HPDCHPDC-2015-AkiyamaT #concurrent #scalability #thread
Uni-Address Threads: Scalable Thread Management for RDMA-Based Work Stealing (SA, KT), pp. 15–26.
HPDCHPDC-2015-WangZQLMR #consistency #distributed #scalability #towards
Towards Scalable Distributed Workload Manager with Monitoring-Based Weakly Consistent Resource Stealing (KW, XZ, KQ, ML, BM, IR), pp. 219–222.
ASPLOSASPLOS-2014-MorrisonA #bound
Fence-free work stealing on bounded TSO processors (AM, YA), pp. 413–426.
ASPLOSASPLOS-2014-RibicY #energy
Energy-efficient work-stealing language runtimes (HR, YDL), pp. 513–528.
DATEDATE-2013-WangJSZ #fault tolerance #framework #scheduling
A work-stealing scheduling framework supporting fault tolerance (YW, WJ, FS, QZ), pp. 695–700.
PLDIPLDI-2013-LifflanderKK
Steal Tree: low-overhead tracing of work stealing schedulers (JL, SK, LVK), pp. 507–518.
PPoPPPPoPP-2013-0003CTT #configuration management #scheduling
Work-stealing with configurable scheduling strategies (MW, DC, JLT, PT), pp. 315–316.
PPoPPPPoPP-2013-AcarCR #parallel #scheduling #source code
Scheduling parallel programs by work stealing with private deques (UAA, AC, MR), pp. 219–228.
PPoPPPPoPP-2013-LePCN #memory management #modelling #performance
Correct and efficient work-stealing for weak memory models (NML, AP, AC, FZN), pp. 69–80.
HILTHILT-2012-Taft #divide and conquer #manycore #named #programming #tutorial #using
Tutorial: multicore programming using divide-and-conquer and work stealing (STT), pp. 13–14.
OOPSLAOOPSLA-2012-KumarFBGT
Work-stealing without the baggage (VK, DF, SMB, DG, OT), pp. 297–314.
HPDCHPDC-2012-LifflanderKK
Work stealing and persistence-based load balancers for iterative overdecomposed applications (JL, SK, LVK), pp. 137–148.
PPoPPPPoPP-2012-TardieuWL #parallel
A work-stealing scheduler for X10’s task parallelism with suspension (OT, HW, HL), pp. 267–276.
ICSMEICSM-2011-Kemmerer #how #what
How to steal a botnet and what can happen when you do (RAK), p. 1.
CGOCGO-2010-WangCDLFY #adaptation #scheduling
An adaptive task creation strategy for work-stealing scheduling (LW, HC, YD, FL, XF, PCY), pp. 266–277.
PPoPPPPoPP-2010-GuoZCS #adaptation #manycore #named #scalability
SLAW: a scalable locality-aware adaptive work-stealing scheduler for multi-core systems (YG, YZ, VC, VS), pp. 341–342.
PPoPPPPoPP-2010-TzannesCBV #adaptation #lazy evaluation #runtime
Lazy binary-splitting: a run-time adaptive work-stealing scheduler (AT, GCC, RB, UV), pp. 179–190.
DACDAC-2009-KluterBIC #automation #set
Way Stealing: cache-assisted automatic instruction set extensions (TK, PB, PI, EC), pp. 31–36.
PPoPPPPoPP-2009-MichaelVS
Idempotent work stealing (MMM, MTV, VAS), pp. 45–54.
PPoPPPPoPP-2007-AgrawalHL #adaptation #feedback #parallel
Adaptive work stealing with parallelism feedback (KA, YH, CEL), pp. 112–120.
OOPSLAOOPSLA-1998-Simons #canonical
Borrow, Copy or Steal? Loans and Larceny in the Orthodox Canonical Form (AJHS), pp. 65–83.
LCTESLCT-RTS-1995-HuangL #concurrent #execution #predict #worst-case
Predicting the Worst-Case Execution Time of the Concurrent Execution of Instructions and Cycle-Stealing DMA I/O Operations (TYH, JWSL), pp. 1–6.
DACDAC-1992-LinLE
Analyzing Cycle Stealing on Synchronous Circuits with Level-Sensitive Latches (IL, JAL, KE), pp. 393–398.

Bibliography of Software Language Engineering in Generated Hypertext (BibSLEIGH) is created and maintained by Dr. Vadim Zaytsev.
Hosted as a part of SLEBOK on GitHub.