23 papers:
- HPDC-2015-AkiyamaT #concurrent #scalability #thread
- Uni-Address Threads: Scalable Thread Management for RDMA-Based Work Stealing (SA, KT), pp. 15–26.
- HPDC-2015-WangZQLMR #consistency #distributed #scalability #towards
- Towards Scalable Distributed Workload Manager with Monitoring-Based Weakly Consistent Resource Stealing (KW, XZ, KQ, ML, BM, IR), pp. 219–222.
- ASPLOS-2014-MorrisonA #bound
- Fence-free work stealing on bounded TSO processors (AM, YA), pp. 413–426.
- ASPLOS-2014-RibicY #energy
- Energy-efficient work-stealing language runtimes (HR, YDL), pp. 513–528.
- DATE-2013-WangJSZ #fault tolerance #framework #scheduling
- A work-stealing scheduling framework supporting fault tolerance (YW, WJ, FS, QZ), pp. 695–700.
- PLDI-2013-LifflanderKK
- Steal Tree: low-overhead tracing of work stealing schedulers (JL, SK, LVK), pp. 507–518.
- PPoPP-2013-0003CTT #configuration management #scheduling
- Work-stealing with configurable scheduling strategies (MW, DC, JLT, PT), pp. 315–316.
- PPoPP-2013-AcarCR #parallel #scheduling #source code
- Scheduling parallel programs by work stealing with private deques (UAA, AC, MR), pp. 219–228.
- PPoPP-2013-LePCN #memory management #modelling #performance
- Correct and efficient work-stealing for weak memory models (NML, AP, AC, FZN), pp. 69–80.
- HILT-2012-Taft #divide and conquer #manycore #named #programming #tutorial #using
- Tutorial: multicore programming using divide-and-conquer and work stealing (STT), pp. 13–14.
- OOPSLA-2012-KumarFBGT
- Work-stealing without the baggage (VK, DF, SMB, DG, OT), pp. 297–314.
- HPDC-2012-LifflanderKK
- Work stealing and persistence-based load balancers for iterative overdecomposed applications (JL, SK, LVK), pp. 137–148.
- PPoPP-2012-TardieuWL #parallel
- A work-stealing scheduler for X10’s task parallelism with suspension (OT, HW, HL), pp. 267–276.
- ICSM-2011-Kemmerer #how #what
- How to steal a botnet and what can happen when you do (RAK), p. 1.
- CGO-2010-WangCDLFY #adaptation #scheduling
- An adaptive task creation strategy for work-stealing scheduling (LW, HC, YD, FL, XF, PCY), pp. 266–277.
- PPoPP-2010-GuoZCS #adaptation #manycore #named #scalability
- SLAW: a scalable locality-aware adaptive work-stealing scheduler for multi-core systems (YG, YZ, VC, VS), pp. 341–342.
- PPoPP-2010-TzannesCBV #adaptation #lazy evaluation #runtime
- Lazy binary-splitting: a run-time adaptive work-stealing scheduler (AT, GCC, RB, UV), pp. 179–190.
- DAC-2009-KluterBIC #automation #set
- Way Stealing: cache-assisted automatic instruction set extensions (TK, PB, PI, EC), pp. 31–36.
- PPoPP-2009-MichaelVS
- Idempotent work stealing (MMM, MTV, VAS), pp. 45–54.
- PPoPP-2007-AgrawalHL #adaptation #feedback #parallel
- Adaptive work stealing with parallelism feedback (KA, YH, CEL), pp. 112–120.
- OOPSLA-1998-Simons #canonical
- Borrow, Copy or Steal? Loans and Larceny in the Orthodox Canonical Form (AJHS), pp. 65–83.
- LCT-RTS-1995-HuangL #concurrent #execution #predict #worst-case
- Predicting the Worst-Case Execution Time of the Concurrent Execution of Instructions and Cycle-Stealing DMA I/O Operations (TYH, JWSL), pp. 1–6.
- DAC-1992-LinLE
- Analyzing Cycle Stealing on Synchronous Circuits with Level-Sensitive Latches (IL, JAL, KE), pp. 393–398.