{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:29:29Z","timestamp":1750220969406,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":41,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,8,5]],"date-time":"2019-08-05T00:00:00Z","timestamp":1564963200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["ACI-1053575"],"award-info":[{"award-number":["ACI-1053575"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,8,5]]},"DOI":"10.1145\/3337821.3337878","type":"proceedings-article","created":{"date-parts":[[2019,7,25]],"date-time":"2019-07-25T12:34:36Z","timestamp":1564058076000},"page":"1-10","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":5,"title":["Accelerated Work Stealing"],"prefix":"10.1145","author":[{"given":"D. Brian","family":"Larkins","sequence":"first","affiliation":[{"name":"Rhodes College, Memphis, TN"}]},{"given":"John","family":"Snyder","sequence":"additional","affiliation":[{"name":"Duke University, Durham, NC"}]},{"given":"James","family":"Dinan","sequence":"additional","affiliation":[{"name":"Intel Corporation, Hudson, MA"}]}],"member":"320","published-online":{"date-parts":[[2019,8,5]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/2442516.2442538"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.5555\/2388996.2389086"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/232627.232650"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/SFCS.1994.365680"},{"volume-title":"Proc. USENIX Annual Technical Conference (ATEC). 10--10","author":"Robert","key":"e_1_3_2_1_6_1","unstructured":"Robert D. Blumofe and Philip A. Lisiecki. 1997. Adaptive and reliable parallel computing on networks of workstations . In Proc. USENIX Annual Technical Conference (ATEC). 10--10 . Robert D. Blumofe and Philip A. Lisiecki. 1997. Adaptive and reliable parallel computing on networks of workstations. In Proc. USENIX Annual Technical Conference (ATEC). 10--10."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/MM.2006.65"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/IPDPS.2007.370258"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/1094811.1094852"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICPP.2008.88"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/HOTI.2015.15"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICPP.2008.44"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/1654059.1654113"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.simpat.2008.06.004"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/3095770.3095774"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.1982.235257"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/277650.277725"},{"key":"e_1_3_2_1_18_1","volume-title":"Proc. 23rd Intl. Parallel and Distributed ProcessingSymposium (IPDPS).","author":"Guo Yi","year":"2009","unstructured":"Yi Guo , Rajkishore Barik , Raghavan Raman , and Vivek Sarkar . 2009 . Work-First and Help-First Scheduling Policies for Terminally Strict Parallel Programs . In Proc. 23rd Intl. Parallel and Distributed ProcessingSymposium (IPDPS). Yi Guo, Rajkishore Barik, Raghavan Raman, and Vivek Sarkar. 2009. Work-First and Help-First Scheduling Policies for Terminally Strict Parallel Programs. In Proc. 23rd Intl. Parallel and Distributed ProcessingSymposium (IPDPS)."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/1693453.1693504"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/571825.571876"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/3126908.3126970"},{"key":"e_1_3_2_1_22_1","volume-title":"FlexNIC: Rethinking Network DMA. In 15th Workshop on Hot Topics in Operating Systems (HotOS XV). USENIX Association","author":"Kaufmann Antoine","year":"2015","unstructured":"Antoine Kaufmann , Simon Peter , Thomas Anderson , and Arvind Krishnamurthy . 2015 . FlexNIC: Rethinking Network DMA. In 15th Workshop on Hot Topics in Operating Systems (HotOS XV). USENIX Association , Kartause Ittingen, Switzerland. https:\/\/www.usenix.org\/conference\/hotos15\/workshop-program\/presentation\/kaufmann Antoine Kaufmann, Simon Peter, Thomas Anderson, and Arvind Krishnamurthy. 2015. FlexNIC: Rethinking Network DMA. In 15th Workshop on Hot Topics in Operating Systems (HotOS XV). USENIX Association, Kartause Ittingen, Switzerland. https:\/\/www.usenix.org\/conference\/hotos15\/workshop-program\/presentation\/kaufmann"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1006\/jpdc.1994.1070"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"crossref","unstructured":"Vivek Kumar Karthik Murthy Vivek Sarkar and Yili Zheng. 2016. Optimized Distributed Work-Stealing. 74--77.   Vivek Kumar Karthik Murthy Vivek Sarkar and Yili Zheng. 2016. Optimized Distributed Work-Stealing. 74--77.","DOI":"10.1109\/IA3.2016.019"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/344588.344618"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.5555\/3018058.3018060"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/3225058.3225092"},{"volume-title":"2016 IEEE High Performance Extreme Computing Conference (HPEC). 1--7.","author":"Mattson T. G.","key":"e_1_3_2_1_28_1","unstructured":"T. G. Mattson , R. Cledat , V. Cav\u00e9 , V. Sarkar , Z. Budimli\u0107 , S. Chatterjee , J. Fryman , I. Ganev , R. Knauerhase , B. Meister , B. Nickerson , N. Pepperling , B. Seshasayee , S. Tasirlar , J. Teller , and N. Vrvilo . 2016. The Open Community Runtime: Aruntime system for extreme scale computing . In 2016 IEEE High Performance Extreme Computing Conference (HPEC). 1--7. T. G. Mattson, R. Cledat, V. Cav\u00e9, V. Sarkar, Z. Budimli\u0107, S. Chatterjee, J. Fryman, I. Ganev, R. Knauerhase, B. Meister, B. Nickerson, N. Pepperling, B. Seshasayee, S. Tasirlar, J. Teller, and N. Vrvilo. 2016. The Open Community Runtime: Aruntime system for extreme scale computing. In 2016 IEEE High Performance Extreme Computing Conference (HPEC). 1--7."},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/1504176.1504186"},{"key":"e_1_3_2_1_30_1","volume-title":"MPI: A Message-Passing Interface Standard Version 3.1. Technical Report","author":"Forum MPI","year":"2015","unstructured":"MPI Forum . 2015 . MPI: A Message-Passing Interface Standard Version 3.1. Technical Report . University of Tennessee , Knoxville. MPI Forum. 2015. MPI: A Message-Passing Interface Standard Version 3.1. Technical Report. University of Tennessee, Knoxville."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.5555\/645611.662053"},{"key":"e_1_3_2_1_32_1","unstructured":"OpenSHMEM Specification Committee 2016. OpenSHMEM Application Programming Interface Version 1.3. http:\/\/www.openshmem.org.  OpenSHMEM Specification Committee 2016. OpenSHMEM Application Programming Interface Version 1.3. http:\/\/www.openshmem.org."},{"key":"e_1_3_2_1_33_1","unstructured":"Portals 4 2018. Portals 4 Reference Implementation. Online: https:\/\/github.com\/Portals4\/portals4.  Portals 4 2018. Portals 4 Reference Implementation. Online: https:\/\/github.com\/Portals4\/portals4."},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/1941553.1941582"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/IPPS.1993.262887"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/2370036.2145850"},{"key":"e_1_3_2_1_37_1","unstructured":"Mellanox Technologies. 2014. MellanoX 2.1 Messaging Library User Manual. Technical Report.  Mellanox Technologies. 2014. MellanoX 2.1 Messaging Library User Manual. Technical Report."},{"key":"e_1_3_2_1_38_1","volume-title":"Proc. Cray Users Group (CUG '09)","author":"Thornton W Scott","year":"2009","unstructured":"W Scott Thornton , Nicholas Vence , and Robert Harrison . 2009 . Introducing the MADNESS numerical framework for petascale computing . In Proc. Cray Users Group (CUG '09) . W Scott Thornton, Nicholas Vence, and Robert Harrison. 2009. Introducing the MADNESS numerical framework for petascale computing. In Proc. Cray Users Group (CUG '09)."},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jpdc.2007.11.002"},{"volume-title":"UPC Language and Library Specifications, v1.3","author":"UPC Consortium","key":"e_1_3_2_1_40_1","unstructured":"UPC Consortium . 2013. UPC Language and Library Specifications, v1.3 . Technical Report LBNL-6623E. Lawrence Berkeley National Lab . UPC Consortium. 2013. UPC Language and Library Specifications, v1.3. Technical Report LBNL-6623E. Lawrence Berkeley National Lab."},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"crossref","unstructured":"Ke Wang Xiaobing Zhou Tonglin Li Dongfang Zhao Michael Lang and Ioan Raicu. 2014. Optimizing Load Balancing and Data-Locality with Data-aware Scheduling.  Ke Wang Xiaobing Zhou Tonglin Li Dongfang Zhao Michael Lang and Ioan Raicu. 2014. Optimizing Load Balancing and Data-Locality with Data-aware Scheduling.","DOI":"10.1109\/BigData.2014.7004220"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1063\/1.1768161"}],"event":{"name":"ICPP 2019: 48th International Conference on Parallel Processing","sponsor":["University of Tsukuba University of Tsukuba"],"location":"Kyoto Japan","acronym":"ICPP 2019"},"container-title":["Proceedings of the 48th International Conference on Parallel Processing"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3337821.3337878","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3337821.3337878","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3337821.3337878","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:54:26Z","timestamp":1750204466000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3337821.3337878"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,8,5]]},"references-count":41,"alternative-id":["10.1145\/3337821.3337878","10.1145\/3337821"],"URL":"https:\/\/doi.org\/10.1145\/3337821.3337878","relation":{},"subject":[],"published":{"date-parts":[[2019,8,5]]},"assertion":[{"value":"2019-08-05","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}