Amanote Research
Register
Sign In
Analysis of Randomized Work Stealing With False Sharing
doi 10.1109/ipdps.2013.86
Full Text
Open PDF
Abstract
Available in
full text
Date
May 1, 2013
Authors
Richard Cole
Vijaya Ramachandran
Publisher
IEEE
Related search
A Tighter Analysis of Work Stealing
Lecture Notes in Computer Science
Computer Science
Theoretical Computer Science
Energy-Efficient Work-Stealing Language Runtimes
Analysis of Electricity Stealing and Research of Anti-Stealing Measures
Efficient Resource Oblivious Algorithms for Multicores With False Sharing
Correct and Efficient Work-Stealing for Weak Memory Models
ACM SIGPLAN Notices
Computer Science
Correct and Efficient Work-Stealing for Weak Memory Models
Employment Effects of Work Sharing - An Econometric Analysis for West Germany
SSRN Electronic Journal
Stealing Thunder I
Journal of Cell Science
Cell Biology
Understanding and Improving JVM GC Work Stealing at the Data Center Scale
ACM SIGPLAN Notices
Computer Science