A Tighter Analysis of Work Stealing
- 575 Downloads
Classical list scheduling is a very popular and efficient technique for scheduling jobs in parallel platforms. However, with the increasing number of processors, the cost for managing a single centralized list becomes prohibitive. The objective of this work is to study the extra cost that must be paid when the list is distributed among the processors. We present a general methodology for computing the expected makespan based on the analysis of an adequate potential function which represents the load unbalance between the local lists. A bound on the deviation from the mean is also derived. Then, we apply this technique to show that the expected makespan for scheduling W unit independent tasks on m processors is equal to W/m with an additional term in 3.65log2 W. Moreover, simulations show that our bound is very close to the exact value, approximately 50% off. This new analysis also enables to study the influence of the initial repartition of tasks and the reduction of the number of steals when several thieves can simultaneously steal work in the same processor’s list.
KeywordsMarkov Decision Process List Schedule Independent Task Precedence Graph Load Unbalance
Unable to display preview. Download preview PDF.
- 2.Hoffmann, R., Korch, M., Rauber, T.: Performance evaluation of task pools based on hardware synchronization. In: Proc. of Supercomputing (2004)Google Scholar
- 3.Frigo, M., Leiserson, C.E., Randall, K.H.: The implementation of the Cilk-5 multithreaded language. In: Proceedings of PLDI (1998)Google Scholar
- 4.Robison, A., Voss, M., Kukanov, A.: Optimization via reflection on work stealing in TBB. In: Proceedings of IPDPS, pp. 1–8 (2008)Google Scholar
- 5.Gautier, T., Besseron, X., Pigeon, L.: KAAPI: A thread scheduling runtime system for data flow computations on cluster of multi-processors. In: Proceedings of PASCO, pp. 15–23 (2007)Google Scholar
- 9.Mitzenmacher, M.: Analyses of load stealing models based on differential equations. In: Proceedings of SPAA, pp. 212–221 (1998)Google Scholar
- 10.Hendler, D., Shavit, N.: Non-blocking steal-half work queues. In: Proceedings of PODC (2002)Google Scholar
- 11.Gast, N., Gaujal, B.: A Mean Field Model of Work Stealing in Large-Scale Systems. In: Proceedings of SIGMETRICS (2010)Google Scholar
- 12.Berenbrink, P., Friedetzky, T., Goldberg, L.A., Goldberg, P.W., Hu, Z., Martin, R.: Distributed selfish load balancing. SIAM Journal on Computing 37(4) (2007)Google Scholar