Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Review Help
Search
Scheduling multithreaded computations by work stealing
Blumofe R., Leiserson C. Journal of the ACM46 (5):720-748,1999.Type:Article
Date Reviewed: Jun 1 2000

A randomized work-stealing algorithm for scheduling fully strict multithreaded computation on MIMD computers is proposed. A formula bounding the algorithm’s expected execution time on a fixed number of processors is given and rigorously proven. Under the stated assumptions and for this type of computation, this first provably good work-stealing algorithm performs better than all known work-sharing algorithms.

The authors begin with a discussion of a simple scheduling algorithm (a “busy-leaves” algorithm), which is not really practical because it is centralized, but which clearly shows important characteristics of the general algorithm. The subsequent part of the paper presents the main algorithm itself. To analyze it, the authors introduce the atomic access model and prove important properties that hold for their computational model. The use of these results allows the authors to analyze the time, communication overhead, and space required by the algorithm.

The computational model, assumptions, and type of computation are very general and realistic, making the approach useful for many existing and potential applications.

In this well-written paper, the authors have succeeded in delivering their results in an attractive and convincing fashion. I have only one concern: the last part of the paper, which discusses the applications of the Cilk language, whose runtime incorporates the algorithm, looks too much like an advertisement. It would have been more appropriate to include technical information there.

Reviewer:  A. Romanovsky Review #: CR122757
Bookmark and Share
 
Threads (D.4.1 ... )
 
 
Parallel Programming (D.1.3 ... )
 
 
Scheduling (D.4.1 ... )
 
 
Concurrent Programming (D.1.3 )
 
Would you recommend this review?
yes
no
Other reviews under "Threads": Date
An analysis of operating system behavior on a simultaneous multithreaded architecture
Redstone J., Eggers S., Levy H.  Architectural support for programming languages and operating systems (Ninth international conference, Cambridge, Massachusetts, United States, Nov 12-15, 2000)245-256, 2000. Type: Proceedings
Sep 25 2003
Linear hashing with overflow-handling by linear probing
Larson P. ACM Transactions on Database Systems 10(1): 75-89, 1985. Type: Article
Dec 1 1985
Design of multithreaded software: the entity-life modeling approach
Sandén B., Wiley-IEEE Computer Society Pr, Hoboken, NJ, 2011.  320, Type: Book (978-0-470876-59-6)
Sep 20 2011

E-Mail This Printer-Friendly
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy