{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T12:18:35Z","timestamp":1763468315617,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":31,"publisher":"ACM","license":[{"start":{"date-parts":[[2016,7,11]],"date-time":"2016-07-11T00:00:00Z","timestamp":1468195200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100006435","name":"National Science Foundation","doi-asserted-by":"publisher","award":["CCF-1320563,CCF- 1408940"],"award-info":[{"award-number":["CCF-1320563,CCF- 1408940"]}],"id":[{"id":"10.13039\/100006435","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100006112","name":"Microsoft Research","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100006112","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2016,7,11]]},"DOI":"10.1145\/2935764.2935793","type":"proceedings-article","created":{"date-parts":[[2016,7,8]],"date-time":"2016-07-08T15:03:00Z","timestamp":1467990180000},"page":"71-82","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":15,"title":["Latency-Hiding Work Stealing"],"prefix":"10.1145","author":[{"given":"Stefan K.","family":"Muller","sequence":"first","affiliation":[{"name":"Carnegie Mellon University, Pittsburgh, PA, USA"}]},{"given":"Umut A.","family":"Acar","sequence":"additional","affiliation":[{"name":"Carnegie Mellon University, Pittsburgh, PA, USA"}]}],"member":"320","published-online":{"date-parts":[[2016,7,11]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"The data locality of work stealing. Theory of Computing Systems (TOCS), 35(3):321--347","author":"Acar U. A.","year":"2002","unstructured":"U. A. Acar , G. E. Blelloch , and R. D. Blumofe . The data locality of work stealing. Theory of Computing Systems (TOCS), 35(3):321--347 , 2002 . U. A. Acar, G. E. Blelloch, and R. D. Blumofe. The data locality of work stealing. Theory of Computing Systems (TOCS), 35(3):321--347, 2002."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_2_1","DOI":"10.1145\/2442516.2442538"},{"key":"e_1_3_2_1_3_1","volume-title":"A proof of work stealing for dedicated multiprocessors","author":"Acar U. A.","year":"2016","unstructured":"U. A. Acar and S. K. Muller . A proof of work stealing for dedicated multiprocessors . Technical Report Carnegie Mellon University-CS-16--114, Carnegie Mellon University School of Computer Science , Dec. 2016 . U. A. Acar and S. K. Muller. A proof of work stealing for dedicated multiprocessors. Technical Report Carnegie Mellon University-CS-16--114, Carnegie Mellon University School of Computer Science, Dec. 2016."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_4_1","DOI":"10.1145\/2612669.2612688"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_5_1","DOI":"10.1007\/s00224-001-0004-z"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_6_1","DOI":"10.1145\/1989493.1989553"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_7_1","DOI":"10.1145\/324133.324234"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_8_1","DOI":"10.1145\/321812.321815"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_9_1","DOI":"10.1145\/800223.806778"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_10_1","DOI":"10.1145\/1094811.1094852"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_11_1","DOI":"10.1145\/1073970.1073974"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_12_1","DOI":"10.1109\/12.21127"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_13_1","DOI":"10.1007\/11407522_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_14_1","DOI":"10.1017\/S0956796810000201"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_15_1","DOI":"10.1145\/277650.277725"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_16_1","DOI":"10.1145\/316686.316690"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_17_1","DOI":"10.1145\/800055.802017"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"crossref","DOI":"10.1017\/CBO9781139226424","volume-title":"Performance Modeling and Design of Computer Systems: Queueing Theory in Action","author":"Harchol-Balter M.","year":"2013","unstructured":"M. Harchol-Balter . Performance Modeling and Design of Computer Systems: Queueing Theory in Action . Cambridge University Press , 2013 . M. Harchol-Balter. Performance Modeling and Design of Computer Systems: Queueing Theory in Action. Cambridge University Press, 2013."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_19_1","DOI":"10.1145\/2647508.2647514"},{"volume-title":"Intel threading building blocks","year":"2011","unstructured":"Intel. Intel threading building blocks . 2011 . Intel. Intel threading building blocks. 2011.","key":"e_1_3_2_1_20_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_21_1","DOI":"10.1145\/1863543.1863582"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_22_1","DOI":"10.1145\/337449.337465"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_23_1","DOI":"10.1145\/1640089.1640106"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_24_1","DOI":"10.1007\/978-3-642-28293-5_15"},{"key":"e_1_3_2_1_25_1","volume-title":"Latency-hiding work stealing","author":"Muller S. K.","year":"2015","unstructured":"S. K. Muller and U. A. Acar . Latency-hiding work stealing . Technical Report Carnegie Mellon University-CS-16--112, Carnegie Mellon University School of Computer Science , May 2015 . S. K. Muller and U. A. Acar. Latency-hiding work stealing. Technical Report Carnegie Mellon University-CS-16--112, Carnegie Mellon University School of Computer Science, May 2015."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_26_1","DOI":"10.1145\/314602.314607"},{"key":"e_1_3_2_1_27_1","volume-title":"Operating system concepts (7. ed.)","author":"Silberschatz A.","year":"2005","unstructured":"A. Silberschatz , P. B. Galvin , and G. Gagne . Operating system concepts (7. ed.) . Wiley , 2005 . A. Silberschatz, P. B. Galvin, and G. Gagne. Operating system concepts (7. ed.). Wiley, 2005."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_29_1","DOI":"10.1145\/1411204.1411240"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_30_1","DOI":"10.1145\/2555243.2555245"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_31_1","DOI":"10.1016\/S0022-0000(75)80008-0"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_32_1","DOI":"10.1007\/978-3-319-29778-1_5"}],"event":{"sponsor":["SIGACT ACM Special Interest Group on Algorithms and Computation Theory","SIGARCH ACM Special Interest Group on Computer Architecture"],"acronym":"SPAA '16","name":"SPAA '16: 28th ACM Symposium on Parallelism in Algorithms and Architectures","location":"Pacific Grove California USA"},"container-title":["Proceedings of the 28th ACM Symposium on Parallelism in Algorithms and Architectures"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2935764.2935793","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2935764.2935793","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T03:39:57Z","timestamp":1750217997000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2935764.2935793"}},"subtitle":["Scheduling Interacting Parallel Computations with Work Stealing"],"short-title":[],"issued":{"date-parts":[[2016,7,11]]},"references-count":31,"alternative-id":["10.1145\/2935764.2935793","10.1145\/2935764"],"URL":"https:\/\/doi.org\/10.1145\/2935764.2935793","relation":{},"subject":[],"published":{"date-parts":[[2016,7,11]]},"assertion":[{"value":"2016-07-11","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}