International audienceIn this paper, the focus is put on multi-core Branch-and-Bound algorithms for solving large scalepermutation-based optimization problems. We investigate five work stealing (WS) strategies with a new data structure called Integer-Vector-Matrix (IVM). In these strategies, each thread has a private IVM allowing the local management of a set of subproblems enumerated using a factorial system. The WS strategies differ in the way the victim thread is selected and the granularity of stolen work units (intervals of factoradics). To assess the efficiency of the private IVM-based WS approach, the five WS strategies have been extensively experimented on the flowshop scheduling permutation problem and compared to their conventiona...
Lazy-task creation is an efficient method of overcoming the overhead of the grain-size problem in pa...
Blumofe and Leiserson [6] gave the first provably good work-stealing work scheduler for mul-tithread...
This is the full version of the paper, which includes more detailed proofs than the conference versi...
International audienceMany combinatorial optimization problems are modeled in practice as permutatio...
International audienceMany real-world problems in different industrial and economic fields are permu...
International audienceTree-based exploratory methods, like Branch-and-Bound (B&B) algorithms, are hi...
Solving large permutation Combinatorial Optimization Problems (COPs) using Branch-and-Bound (B&B) al...
Blumofe and Leiserson [6] gave the first provably good work-stealing work scheduler for mul-tithread...
International audienceThe irregularity of Branch-and-Bound (B&B) algorithms makes their design and i...
Thesis: M. Eng., Massachusetts Institute of Technology, Department of Electrical Engineering and Com...
This paper is about a new framework for high perfor-mance thread scheduling based on the work steali...
The fork-join paradigm of concurrent expression has gained popularity in conjunction with work-steal...
Load balancing is a technique which allows efficient parallelization of irregular workloads, and a k...
This paper investigates a variant of the work-stealing algorithm that we call the localized work-ste...
Abstract—Load balancing techniques (e.g. work stealing) are important to obtain the best performance...
Lazy-task creation is an efficient method of overcoming the overhead of the grain-size problem in pa...
Blumofe and Leiserson [6] gave the first provably good work-stealing work scheduler for mul-tithread...
This is the full version of the paper, which includes more detailed proofs than the conference versi...
International audienceMany combinatorial optimization problems are modeled in practice as permutatio...
International audienceMany real-world problems in different industrial and economic fields are permu...
International audienceTree-based exploratory methods, like Branch-and-Bound (B&B) algorithms, are hi...
Solving large permutation Combinatorial Optimization Problems (COPs) using Branch-and-Bound (B&B) al...
Blumofe and Leiserson [6] gave the first provably good work-stealing work scheduler for mul-tithread...
International audienceThe irregularity of Branch-and-Bound (B&B) algorithms makes their design and i...
Thesis: M. Eng., Massachusetts Institute of Technology, Department of Electrical Engineering and Com...
This paper is about a new framework for high perfor-mance thread scheduling based on the work steali...
The fork-join paradigm of concurrent expression has gained popularity in conjunction with work-steal...
Load balancing is a technique which allows efficient parallelization of irregular workloads, and a k...
This paper investigates a variant of the work-stealing algorithm that we call the localized work-ste...
Abstract—Load balancing techniques (e.g. work stealing) are important to obtain the best performance...
Lazy-task creation is an efficient method of overcoming the overhead of the grain-size problem in pa...
Blumofe and Leiserson [6] gave the first provably good work-stealing work scheduler for mul-tithread...
This is the full version of the paper, which includes more detailed proofs than the conference versi...