WEKO3
アイテム
Work-stealing Strategies That Consider Work Amount and Hierarchy
https://ipsj.ixsq.nii.ac.jp/records/211642
https://ipsj.ixsq.nii.ac.jp/records/211642dc1b82f7-b1b3-4225-9270-b74fd6473c83
| 名前 / ファイル | ライセンス | アクション |
|---|---|---|
|
|
Copyright (c) 2021 by the Information Processing Society of Japan
|
|
| オープンアクセス | ||
| Item type | Trans(1) | |||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 公開日 | 2021-06-15 | |||||||||||||||
| タイトル | ||||||||||||||||
| タイトル | Work-stealing Strategies That Consider Work Amount and Hierarchy | |||||||||||||||
| タイトル | ||||||||||||||||
| 言語 | en | |||||||||||||||
| タイトル | Work-stealing Strategies That Consider Work Amount and Hierarchy | |||||||||||||||
| 言語 | ||||||||||||||||
| 言語 | eng | |||||||||||||||
| キーワード | ||||||||||||||||
| 主題Scheme | Other | |||||||||||||||
| 主題 | [通常論文] parallel programming languages, work stealing, priority, weight, concurrency, many-core, Barnes-Hut algorithm | |||||||||||||||
| 資源タイプ | ||||||||||||||||
| 資源タイプ識別子 | http://purl.org/coar/resource_type/c_6501 | |||||||||||||||
| 資源タイプ | journal article | |||||||||||||||
| 著者所属 | ||||||||||||||||
| Graduate School of Computer Science and Systems Engineering, Kyushu Institute of Technology | ||||||||||||||||
| 著者所属 | ||||||||||||||||
| Department of Computer Science and Networks, Kyushu Institute of Technology | ||||||||||||||||
| 著者所属 | ||||||||||||||||
| Graduate School of Computer Science and Systems Engineering, Kyushu Institute of Technology/Presently with Ad-Sol Nissin Corporation | ||||||||||||||||
| 著者所属 | ||||||||||||||||
| Academic Center for Computing and Media Studies, Kyoto University | ||||||||||||||||
| 著者所属 | ||||||||||||||||
| Department of Information Sciences, Faculty of Science, Kanagawa University | ||||||||||||||||
| 著者所属(英) | ||||||||||||||||
| en | ||||||||||||||||
| Graduate School of Computer Science and Systems Engineering, Kyushu Institute of Technology | ||||||||||||||||
| 著者所属(英) | ||||||||||||||||
| en | ||||||||||||||||
| Department of Computer Science and Networks, Kyushu Institute of Technology | ||||||||||||||||
| 著者所属(英) | ||||||||||||||||
| en | ||||||||||||||||
| Graduate School of Computer Science and Systems Engineering, Kyushu Institute of Technology / Presently with Ad-Sol Nissin Corporation | ||||||||||||||||
| 著者所属(英) | ||||||||||||||||
| en | ||||||||||||||||
| Academic Center for Computing and Media Studies, Kyoto University | ||||||||||||||||
| 著者所属(英) | ||||||||||||||||
| en | ||||||||||||||||
| Department of Information Sciences, Faculty of Science, Kanagawa University | ||||||||||||||||
| 著者名 |
Ryusuke, Nakashima
× Ryusuke, Nakashima
× Masahiro, Yasugi
× Hiroshi, Yoritaka
× Tasuku, Hiraishi
× Seiji, Umatani
|
|||||||||||||||
| 著者名(英) |
Ryusuke, Nakashima
× Ryusuke, Nakashima
× Masahiro, Yasugi
× Hiroshi, Yoritaka
× Tasuku, Hiraishi
× Seiji, Umatani
|
|||||||||||||||
| 論文抄録 | ||||||||||||||||
| 内容記述タイプ | Other | |||||||||||||||
| 内容記述 | This paper proposes work-stealing strategies for an idle worker (thief) to select a victim worker. These strategies avoid small tasks being stolen to reduce the total task-division cost. We implemented these strategies on a work-stealing framework called Tascell. First, we propose new types of priority- and weight-based steal strategies. Programmers can let each worker estimate and declare, as a real number, the amount of remaining work required to complete its current task so that declared values are used as “priorities” or “weights”. With a priority-based strategy, a thief selects the victim that has the highest known priority at that time. With a weight-based non-uniformly random strategy, a thief uses the relative weights of victim candidates as their selection probabilities. Second, we propose work-stealing strategies to alleviate excessive intra-node work stealing and excessive “steal backs” (or leapfroggings); for example, we allow workers to steal tasks from external nodes with some frequency even if work remains inside the current node. Our evaluation uses a parallel implementation of the “highly serial” version of the Barnes-Hut force-calculation algorithm in a shared memory environment and five benchmark programs in a distributed memory environment. ------------------------------ This is a preprint of an article intended for publication Journal of Information Processing(JIP). This preprint should not be cited. This article should be cited as: Journal of Information Processing Vol.29(2021) (online) ------------------------------ |
|||||||||||||||
| 論文抄録(英) | ||||||||||||||||
| 内容記述タイプ | Other | |||||||||||||||
| 内容記述 | This paper proposes work-stealing strategies for an idle worker (thief) to select a victim worker. These strategies avoid small tasks being stolen to reduce the total task-division cost. We implemented these strategies on a work-stealing framework called Tascell. First, we propose new types of priority- and weight-based steal strategies. Programmers can let each worker estimate and declare, as a real number, the amount of remaining work required to complete its current task so that declared values are used as “priorities” or “weights”. With a priority-based strategy, a thief selects the victim that has the highest known priority at that time. With a weight-based non-uniformly random strategy, a thief uses the relative weights of victim candidates as their selection probabilities. Second, we propose work-stealing strategies to alleviate excessive intra-node work stealing and excessive “steal backs” (or leapfroggings); for example, we allow workers to steal tasks from external nodes with some frequency even if work remains inside the current node. Our evaluation uses a parallel implementation of the “highly serial” version of the Barnes-Hut force-calculation algorithm in a shared memory environment and five benchmark programs in a distributed memory environment. ------------------------------ This is a preprint of an article intended for publication Journal of Information Processing(JIP). This preprint should not be cited. This article should be cited as: Journal of Information Processing Vol.29(2021) (online) ------------------------------ |
|||||||||||||||
| 書誌レコードID | ||||||||||||||||
| 収録物識別子タイプ | NCID | |||||||||||||||
| 収録物識別子 | AA11464814 | |||||||||||||||
| 書誌情報 |
情報処理学会論文誌プログラミング(PRO) 巻 14, 号 3, 発行日 2021-06-15 |
|||||||||||||||
| ISSN | ||||||||||||||||
| 収録物識別子タイプ | ISSN | |||||||||||||||
| 収録物識別子 | 1882-7802 | |||||||||||||||
| 出版者 | ||||||||||||||||
| 言語 | ja | |||||||||||||||
| 出版者 | 情報処理学会 | |||||||||||||||