hrcak mascot   Srce   HID

Izvorni znanstveni članak
https://doi.org/10.2498/cit.2002.03.08

Task Scheduling in Distributed Systems by Work Stealing and Mugging - A Simulation Study

Nenad Jovanović

Puni tekst: engleski, pdf (194 KB) str. 203-209 preuzimanja: 1.212* citiraj
APA 6th Edition
Jovanović, N. (2002). Task Scheduling in Distributed Systems by Work Stealing and Mugging - A Simulation Study. Journal of computing and information technology, 10 (3), 203-209. https://doi.org/10.2498/cit.2002.03.08
MLA 8th Edition
Jovanović, Nenad. "Task Scheduling in Distributed Systems by Work Stealing and Mugging - A Simulation Study." Journal of computing and information technology, vol. 10, br. 3, 2002, str. 203-209. https://doi.org/10.2498/cit.2002.03.08. Citirano 21.10.2019.
Chicago 17th Edition
Jovanović, Nenad. "Task Scheduling in Distributed Systems by Work Stealing and Mugging - A Simulation Study." Journal of computing and information technology 10, br. 3 (2002): 203-209. https://doi.org/10.2498/cit.2002.03.08
Harvard
Jovanović, N. (2002). 'Task Scheduling in Distributed Systems by Work Stealing and Mugging - A Simulation Study', Journal of computing and information technology, 10(3), str. 203-209. https://doi.org/10.2498/cit.2002.03.08
Vancouver
Jovanović N. Task Scheduling in Distributed Systems by Work Stealing and Mugging - A Simulation Study. Journal of computing and information technology [Internet]. 2002 [pristupljeno 21.10.2019.];10(3):203-209. https://doi.org/10.2498/cit.2002.03.08
IEEE
N. Jovanović, "Task Scheduling in Distributed Systems by Work Stealing and Mugging - A Simulation Study", Journal of computing and information technology, vol.10, br. 3, str. 203-209, 2002. [Online]. https://doi.org/10.2498/cit.2002.03.08

Sažetak
We model and simulate the execution of parallel jobs represented by directed acyclic graphs on a system of networked distributed heterogeneous computers. We tested two online schedulers, the Enhanced Cilk Scheduler (ECS) and the Central Manager (CM). ECS is a decentralized scheduler, which implementswork stealing and processor mugging techniques. CM is a centralized greedy scheduler. Our simulation results show that ECS is a well behaved scheduler particularly suited for scheduling task execution in dynamically changing systems because it is robust, requires little communication, and almost matches the performance of the CM scheduler.

Hrčak ID: 44780

URI
https://hrcak.srce.hr/44780

Posjeta: 1.318 *