1982
DOI: 10.1109/tse.1982.235576
|View full text |Cite
|
Sign up to set email alerts
|

Performance of Synchronized Iterative Processes in Multiprocessor Systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
19
0
1

Year Published

1986
1986
2004
2004

Publication Types

Select...
5
3
1

Relationship

0
9

Authors

Journals

citations
Cited by 48 publications
(20 citation statements)
references
References 11 publications
0
19
0
1
Order By: Relevance
“…If the subset consists of all the processors than the synchronization is a barrier synchroniza-~()(j C. S. CHANG AND R. NELSON tion. A performance model of an iterative algorithm executed on different architectures using barrier synchronization can be found in Dubois and Briggs [1982] and of partial synchronization in Brochard et al [1989]. Barrier Our interest in this paper is to determine how the type of synchronization affects the average utilization of the processors (commonly called the efficiency of the system [Brochard 1989;Engle et al 19891 In Section 2 of this paper, we present our models for the computation and architecture of the system we study.…”
Section: Introductionmentioning
confidence: 99%
“…If the subset consists of all the processors than the synchronization is a barrier synchroniza-~()(j C. S. CHANG AND R. NELSON tion. A performance model of an iterative algorithm executed on different architectures using barrier synchronization can be found in Dubois and Briggs [1982] and of partial synchronization in Brochard et al [1989]. Barrier Our interest in this paper is to determine how the type of synchronization affects the average utilization of the processors (commonly called the efficiency of the system [Brochard 1989;Engle et al 19891 In Section 2 of this paper, we present our models for the computation and architecture of the system we study.…”
Section: Introductionmentioning
confidence: 99%
“…For a small s under the normal distribution, all involved processors in the system generate mutual exclusion requests in a short period of time, likely to render the memory module containing the lock a hot spot. The request patterns generated by processors are affected by several factors, such as random delays and nondeterministic processing requirements [12], memory contention [13], the program's internal structure and control dependence graph [6], and so on.…”
Section: Methodsmentioning
confidence: 99%
“…Both of these have been cited as arguments for assuming nondeterministic task times [Kruskal and Weiss 1985;Dubois and Briggs 1982].…”
Section: Motivation For a Deterministic Modelmentioning
confidence: 99%
“…In contrast, previous analytic models for more detailed analysis of parallel program execution time [Dubois and Briggs 1982;Mohan 1984;Kruskal and Weiss 1985;Thomasian and Bay 1986;Kapelnikov et al 1989;Ammar et al 1990;Mak and Lundstrom 1990;Vrsalovic et al 1988;Cvetanovic 1987;Tsuei and Vernon 1990;Harzallah and Sevcik 1995;Xu et al 1996;Jonkers et al 1995] have been less successful, and are also less well understood. In practice, these models either require a specialized model derivation for each new parallel program, or, as explained in Section 6, they are restricted to particular program synchronization structures, task scheduling algorithms, or task execution time distributions that can be analyzed.…”
Section: Introductionmentioning
confidence: 95%