Abstract—Load balancing techniques (e.g. work stealing) are important to obtain the best performance for distributed task scheduling systems that have multiple schedulers making scheduling decisions. In work stealing, tasks are randomly migrated from heavy-loaded schedulers to idle ones. However, for data-intensive applications where tasks are dependent and task execution involves processing a large amount of data, migrating tasks blindly yields poor data-locality and incurs significant data-transferring overhead. This work improves work stealing by using both dedicated and shared queues. Tasks are organized in queues based on task data size and location. We implement our technique in MATRIX, a distributed task scheduler for many-task compu...
International audienceWork-stealing schedulers are common in shared memory environments. However, la...
Computational task DAGs are executed on parallel computers by a task scheduling algorithm. Intellige...
International audienceWith data intensive applications it can be interesting to resort to a distribu...
Abstract — Load balancing techniques (e.g. work stealing) are important to obtain the best performan...
Abstract. We present a work-stealing algorithm for runtime scheduling of data-parallel operations in...
Abstract. We present a work-stealing algorithm for runtime scheduling of data-parallel operations in...
The fork-join paradigm of concurrent expression has gained popularity in conjunction with work-steal...
Work-stealing systems are typically oblivious to the nature of the tasks they are scheduling. They d...
Scheduling large amount of jobs/tasks over large-scale distributed systems play a significant role t...
Work-stealing systems are typically oblivious to the nature of the tasks they are scheduling. They d...
Lazy-task creation is an efficient method of overcoming the overhead of the grain-size problem in pa...
Work-stealing systems are typically oblivious to the nature of the tasks theyare scheduling. For ins...
Load balancing is a technique which allows efficient parallelization of irregular workloads, and a k...
In systems with complex many-core cache hierarchy, exploiting data locality can significantly reduce...
In today\u27s large scale clusters, running tasks with high degrees of parallelism allows interactiv...
International audienceWork-stealing schedulers are common in shared memory environments. However, la...
Computational task DAGs are executed on parallel computers by a task scheduling algorithm. Intellige...
International audienceWith data intensive applications it can be interesting to resort to a distribu...
Abstract — Load balancing techniques (e.g. work stealing) are important to obtain the best performan...
Abstract. We present a work-stealing algorithm for runtime scheduling of data-parallel operations in...
Abstract. We present a work-stealing algorithm for runtime scheduling of data-parallel operations in...
The fork-join paradigm of concurrent expression has gained popularity in conjunction with work-steal...
Work-stealing systems are typically oblivious to the nature of the tasks they are scheduling. They d...
Scheduling large amount of jobs/tasks over large-scale distributed systems play a significant role t...
Work-stealing systems are typically oblivious to the nature of the tasks they are scheduling. They d...
Lazy-task creation is an efficient method of overcoming the overhead of the grain-size problem in pa...
Work-stealing systems are typically oblivious to the nature of the tasks theyare scheduling. For ins...
Load balancing is a technique which allows efficient parallelization of irregular workloads, and a k...
In systems with complex many-core cache hierarchy, exploiting data locality can significantly reduce...
In today\u27s large scale clusters, running tasks with high degrees of parallelism allows interactiv...
International audienceWork-stealing schedulers are common in shared memory environments. However, la...
Computational task DAGs are executed on parallel computers by a task scheduling algorithm. Intellige...
International audienceWith data intensive applications it can be interesting to resort to a distribu...