Back to Results
First PageMeta Content
Concurrency control / Scheduling algorithms / Computer programming / Double-ended queue / Non-blocking algorithm / FIFO / Algorithm / Cilk / Stack / Computing / Concurrent computing / Abstract data types


Idempotent Work Stealing Maged M. Michael Martin T. Vechev Vijay A. Saraswat
Add to Reading List

Document Date: 2011-10-04 10:23:56


Open Document

File Size: 371,88 KB

Share Result on Facebook

City

Raleigh / /

Company

IBM / AMD / Intel / /

Country

United States / /

Currency

USD / /

/

IndustryTerm

parallel spanning tree algorithm / conventional work stealing algorithms / performance computing / work queue algorithms / parallel algorithms / correct concurrent algorithms / al. algorithm / work-stealing algorithms / tree algorithms / present several new algorithms / classic solution / work stealing algorithms using graph applications / published algorithms / software mechanisms / art algorithms / mutual exclusion protocol / lower overheads than existing algorithms / static algorithmic solution / graph algorithms / non-blocking algorithms / performance algorithms / work stealing algorithm / concurrent algorithms / work stealing algorithms / representative non-trivial graph applications / irregular applications / mainstream processors / performing load balancing algorithms / space search exploration / tree algorithm / graph applications / non-uniform cluster computing / /

Organization

Idempotent Work Stealing Maged M. Michael Martin T. Vechev Vijay A. Saraswat IBM Thomas J. Watson Research Center / /

Person

Xiaolan Zhang / Mark Moir / Vivek Sarkar / Bradley C. Kuszmaul / Philippe Charles / Christian Grothoff / David Chase / Vijay A. Saraswat / Allan Kielstra / Charles E. Leiserson / Nimar S. Arora / John Greiner / Danny Hendler / Thomas J. Watson / Nir Shavit / M. Michael Martin / Doug Lea / David Detlefs / Yuli Zhou / Kemal Ebcioglu / Christopher Donawa / C. Greg Plaxton / Robert D. Blumofe / David A. Bader / Yossi Lev / Guojing Cong / Keith H. Randall / Christoph von Praun / Geometric Graph (Kgraph) / Chase / Matteo Frigo / Christopher F. Joerg / /

Position

head / algorithm designer / representative / /

ProgrammingLanguage

Cilk / Java / /

ProvinceOrState

South Carolina / North Carolina / /

Technology

Object-Oriented Programming / Virtual Machine / three algorithms / correct concurrent algorithms / t-1 / Chase-Lev algorithms / Cilk THE algorithm / mutual exclusion protocol / conventional work stealing algorithms / work stealing algorithm / 52 LIFO algorithm / shared memory / Operating Systems / art algorithms / performance algorithms / graph algorithms / non-blocking algorithms / 3.3 Algorithm / al. algorithm / spanning tree algorithms / double-ended algorithms / Load balancing / Java / idempotent FIFO algorithm / Chase-Lev algorithm / parallel spanning tree algorithm / existing algorithms / 3.2 Algorithm / work-stealing algorithms / work queue algorithms / third algorithm / spanning tree algorithm / high-performing load balancing algorithms / THE work stealing algorithm / second algorithm / work stealing algorithms / sequential consistency / existing work stealing algorithms / idempotent LIFO algorithm / 3.4 Algorithm / mainstream processors / /

SocialTag