|
|
|
|
LEADER |
01318 am a22002173u 4500 |
001 |
103329 |
042 |
|
|
|a dc
|
100 |
1 |
0 |
|a Leiserson, Charles E.
|e author
|
100 |
1 |
0 |
|a Massachusetts Institute of Technology. Computer Science and Artificial Intelligence Laboratory
|e contributor
|
100 |
1 |
0 |
|a Massachusetts Institute of Technology. Department of Electrical Engineering and Computer Science
|e contributor
|
100 |
1 |
0 |
|a Leiserson, Charles E.
|e contributor
|
100 |
1 |
0 |
|a Schardl, Tao Benjamin
|e contributor
|
700 |
1 |
0 |
|a Schardl, Tao Benjamin
|e author
|
700 |
1 |
0 |
|a Suksompong, Warut
|e author
|
245 |
0 |
0 |
|a Upper Bounds on Number of Steals in Rooted Trees
|
260 |
|
|
|b Springer US,
|c 2016-06-24T17:36:38Z.
|
856 |
|
|
|z Get fulltext
|u http://hdl.handle.net/1721.1/103329
|
520 |
|
|
|a Abstract Inspired by applications in parallel computing, we analyze the setting of work stealing in multithreaded computations. We obtain tight upper bounds on the number of steals when the computation can be modeled by rooted trees. In particular, we show that if the computation with n processors starts with one processor having a complete k-ary tree of height h (and the remaining n−1 processors having nothing), the maximum possible number of steals is ∑ni=1(k−1)i(hi).
|
546 |
|
|
|a en
|
655 |
7 |
|
|a Article
|
773 |
|
|
|t Theory of Computing Systems
|