{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,28]],"date-time":"2025-03-28T05:27:24Z","timestamp":1743139644670,"version":"3.40.3"},"publisher-location":"Cham","reference-count":22,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030105488"},{"type":"electronic","value":"9783030105495"}],"license":[{"start":{"date-parts":[[2018,12,31]],"date-time":"2018-12-31T00:00:00Z","timestamp":1546214400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2018,12,31]],"date-time":"2018-12-31T00:00:00Z","timestamp":1546214400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-030-10549-5_12","type":"book-chapter","created":{"date-parts":[[2018,12,31]],"date-time":"2018-12-31T00:03:31Z","timestamp":1546214611000},"page":"146-158","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Scalable Work-Stealing Load-Balancer for HPC Distributed Memory Systems"],"prefix":"10.1007","author":[{"given":"Clement","family":"Fontenaille","sequence":"first","affiliation":[]},{"given":"Eric","family":"Petit","sequence":"additional","affiliation":[]},{"given":"Pablo","family":"de Oliveira Castro","sequence":"additional","affiliation":[]},{"given":"Seijilo","family":"Uemura","sequence":"additional","affiliation":[]},{"given":"Devan","family":"Sohier","sequence":"additional","affiliation":[]},{"given":"Piotr","family":"Lesnicki","sequence":"additional","affiliation":[]},{"given":"Ghislain","family":"Lartigue","sequence":"additional","affiliation":[]},{"given":"Vincent","family":"Moureau","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,12,31]]},"reference":[{"key":"12_CR1","doi-asserted-by":"crossref","unstructured":"Acun, B., et al.: Parallel programming with migratable objects: Charm++ in practice. In: Proceedings of the International Conference for High Performance Computing, Networking, Storage and Analysis, pp. 647\u2013658. IEEE Press (2014)","DOI":"10.1109\/SC.2014.58"},{"issue":"2","key":"12_CR2","doi-asserted-by":"publisher","first-page":"187","DOI":"10.1002\/cpe.1631","volume":"23","author":"C Augonnet","year":"2011","unstructured":"Augonnet, C., Thibault, S., Namyst, R., Wacrenier, P.A.: StarPU: a unified platform for task scheduling on heterogeneous multicore architectures. Concurr. Comput. Pract. Exp. 23(2), 187\u2013198 (2011)","journal-title":"Concurr. Comput. Pract. Exp."},{"key":"12_CR3","first-page":"1","volume":"2","author":"D Bader","year":"2006","unstructured":"Bader, D.: Designing scalable synthetic compact applications for benchmarking high productivity computing systems. Cyberinfrastructure Technol. Watch. 2, 1\u201310 (2006)","journal-title":"Cyberinfrastructure Technol. Watch."},{"issue":"5","key":"12_CR4","doi-asserted-by":"publisher","first-page":"1260","DOI":"10.1137\/S0097539701399551","volume":"32","author":"P Berenbrink","year":"2003","unstructured":"Berenbrink, P., Friedetzky, T., Goldberg, L.A.: The natural work-stealing algorithm is stable. SIAM J. Comput. 32(5), 1260\u20131279 (2003)","journal-title":"SIAM J. Comput."},{"issue":"5","key":"12_CR5","doi-asserted-by":"publisher","first-page":"720","DOI":"10.1145\/324133.324234","volume":"46","author":"RD Blumofe","year":"1999","unstructured":"Blumofe, R.D., Leiserson, C.E.: Scheduling multithreaded computations by work stealing. J. ACM (JACM) 46(5), 720\u2013748 (1999)","journal-title":"J. ACM (JACM)"},{"key":"12_CR6","doi-asserted-by":"crossref","unstructured":"Broquedis, F., et al.: hwloc: a generic framework for managing hardware affinities in HPC applications. In: 2010 18th Euromicro International Conference on Parallel, Distributed and Network-Based Processing (PDP), pp. 180\u2013186. IEEE (2010)","DOI":"10.1109\/PDP.2010.67"},{"key":"12_CR7","doi-asserted-by":"crossref","unstructured":"Dinan, J., Larkins, D.B., Sadayappan, P., Krishnamoorthy, S., Nieplocha, J.: Scalable work stealing. In: Proceedings of the Conference on High Performance Computing Networking, Storage and Analysis, p. 53. ACM (2009)","DOI":"10.1145\/1654059.1654113"},{"key":"12_CR8","doi-asserted-by":"crossref","unstructured":"Frigo, M., Leiserson, C.E., Randall, K.H.: The implementation of the Cilk-5 multithreaded language. In: ACM Sigplan Notices, vol. 33, pp. 212\u2013223. ACM (1998)","DOI":"10.1145\/277652.277725"},{"key":"12_CR9","doi-asserted-by":"crossref","unstructured":"Gautier, T., Lima, J.V., Maillard, N., Raffin, B.: Xkaapi: a runtime system for data-flow task programming on heterogeneous architectures. In: 2013 IEEE 27th International Symposium on Parallel & Distributed Processing (IPDPS), pp. 1299\u20131308. IEEE (2013)","DOI":"10.1109\/IPDPS.2013.66"},{"key":"12_CR10","unstructured":"Gr\u00fcnewald, D., Simmendinger, C.: The GASPI API specification and its implementation GPI 2.0. In: 7th International Conference on PGAS Programming Models, vol. 243 (2013)"},{"key":"12_CR11","doi-asserted-by":"crossref","unstructured":"Kleinberg, J.: The small-world phenomenon: an algorithmic perspective. In: Proceedings of the Thirty-Second Annual ACM Symposium on Theory of Computing, pp. 163\u2013170 (2000)","DOI":"10.1145\/335305.335325"},{"key":"12_CR12","unstructured":"Kleinberg, J., Rubinfeld, R.: Short paths in expander graphs. In: Proceedings of the 37th Annual Symposium on Foundations of Computer Science, pp. 86\u201395. IEEE (1996)"},{"issue":"4","key":"12_CR13","doi-asserted-by":"publisher","first-page":"309","DOI":"10.1535\/itj.1104.05","volume":"11","author":"A Kukanov","year":"2007","unstructured":"Kukanov, A., Voss, M.J.: The foundations for scalable multi-core software in Intel Threading Building Blocks. Intel Technol. J. 11(4), 309\u2013322 (2007)","journal-title":"Intel Technol. J."},{"issue":"1","key":"12_CR14","first-page":"30","volume":"17","author":"EL Lusk","year":"2010","unstructured":"Lusk, E.L., Pieper, S.C., Butler, R.M., et al.: More scalability, less pain: a simple programming model and its implementation for extreme computing. SciDAC Rev. 17(1), 30\u201337 (2010)","journal-title":"SciDAC Rev."},{"key":"12_CR15","doi-asserted-by":"publisher","first-page":"229","DOI":"10.1007\/s00450-011-0163-3","volume":"26","author":"R Machado","year":"2011","unstructured":"Machado, R., Lojewski, C., Abreu, S., Pfreundt, F.J.: Unbalanced tree search on a manycore system using the GPI programming model. Comput. Sci. Res. Dev. 26, 229\u2013236 (2011)","journal-title":"Comput. Sci. Res. Dev."},{"issue":"6","key":"12_CR16","doi-asserted-by":"publisher","first-page":"35","DOI":"10.1145\/996893.996848","volume":"39","author":"MM Michael","year":"2004","unstructured":"Michael, M.M.: Scalable lock-free dynamic memory allocation. ACM Sigplan Not. 39(6), 35\u201346 (2004)","journal-title":"ACM Sigplan Not."},{"key":"12_CR17","unstructured":"Min, S.J., Iancu, C., Yelick, K.: Hierarchical work stealing on manycore clusters. In: 5th Conference on Partitioned Global Address Space programming Models (2011)"},{"key":"12_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"235","DOI":"10.1007\/978-3-540-72521-3_18","volume-title":"Languages and Compilers for Parallel Computing","author":"S Olivier","year":"2007","unstructured":"Olivier, S., et al.: UTS: an unbalanced tree search benchmark. In: Alm\u00e1si, G., Ca\u015fcaval, C., Wu, P. (eds.) LCPC 2006. LNCS, vol. 4382, pp. 235\u2013250. Springer, Heidelberg (2007). https:\/\/doi.org\/10.1007\/978-3-540-72521-3_18"},{"key":"12_CR19","doi-asserted-by":"crossref","unstructured":"Perarnau, S., Sato, M.: Victim selection and distributed work stealing performance: a case study. In: Parallel and Distributed Processing Symposium, vol. 28. IEEE (2014)","DOI":"10.1109\/IPDPS.2014.74"},{"key":"12_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"217","DOI":"10.1007\/978-3-642-15277-1_21","volume-title":"Euro-Par 2010 - Parallel Processing","author":"J-N Quintin","year":"2010","unstructured":"Quintin, J.-N., Wagner, F.: Hierarchical work-stealing. In: D\u2019Ambra, P., Guarracino, M., Talia, D. (eds.) Euro-Par 2010. LNCS, vol. 6271, pp. 217\u2013229. Springer, Heidelberg (2010). https:\/\/doi.org\/10.1007\/978-3-642-15277-1_21"},{"key":"12_CR21","doi-asserted-by":"publisher","first-page":"291","DOI":"10.1007\/978-3-642-17514-5_25","volume-title":"Algorithms and Computation","author":"Marc Tchiboukdjian","year":"2010","unstructured":"Tchiboukdjian, M., Gast, N., Trystram, D., Roch, J.L., Bernard, J.: A Tighter Analysis of Work Stealing. Angorithms and Computation, pp. 291\u2013302 (2010)"},{"key":"12_CR22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"76","DOI":"10.1007\/11846802_18","volume-title":"Recent Advances in Parallel Virtual Machine and Message Passing Interface","author":"TS Woodall","year":"2006","unstructured":"Woodall, T.S., Shipman, G.M., Bosilca, G., Graham, R.L., Maccabe, A.B.: High performance RDMA protocols in HPC. In: Mohr, B., Tr\u00e4ff, J.L., Worringen, J., Dongarra, J. (eds.) EuroPVM\/MPI 2006. LNCS, vol. 4192, pp. 76\u201385. Springer, Heidelberg (2006). https:\/\/doi.org\/10.1007\/11846802_18"}],"container-title":["Lecture Notes in Computer Science","Euro-Par 2018: Parallel Processing Workshops"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-10549-5_12","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T08:37:26Z","timestamp":1672562246000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-10549-5_12"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,12,31]]},"ISBN":["9783030105488","9783030105495"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-10549-5_12","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2018,12,31]]},"assertion":[{"value":"31 December 2018","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"Euro-Par","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"European Conference on Parallel Processing","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Turin","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Italy","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"27 August 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"31 August 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"24","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"europar2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/europar2018.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}