dc.contributor.author | Iordan, Alexandru Ciprian | |
dc.contributor.author | Jahre, Magnus | |
dc.contributor.author | Natvig, Lasse | |
dc.date.accessioned | 2016-06-16T09:45:30Z | |
dc.date.accessioned | 2016-06-17T06:58:49Z | |
dc.date.available | 2016-06-16T09:45:30Z | |
dc.date.available | 2016-06-17T06:58:49Z | |
dc.date.issued | 2015-11 | |
dc.identifier.citation | Journal of systems architecture 2015, 61(10):584-591 | nb_NO |
dc.identifier.issn | 1383-7621 | |
dc.identifier.uri | http://hdl.handle.net/11250/2392984 | |
dc.description.abstract | The wide adoption of Chip Multiprocessors (CMPs) in almost all ICT segments has triggered a change in the way software needs to be developed. Parallel programming maximizes the performance and energy efficiency of CMPs, but also comes with a new set of challenges. Parallelization overheads can account for sub-linear speedups and can increase the energy consumption of applications. In past experiments we looked at specific operations such as spawning new tasks, dequeuing the task queue and task stealing for Intel TBB. Our results showed that failed steals account for the largest overhead. In this work, we focus on TBB’s victim selection policy. We implement a new occupancy-aware policy and we improve the implementation of the pseudo-random policy we proposed in a previous paper. We compare the results of our new policies against an “oracle scheme” as well as against TBB’s random victim selection approach. Our results show improvements in execution times and energy-efficiency of up to 11.23% and 14.72% respectively when compared to TBB’s default policy. | nb_NO |
dc.language.iso | eng | nb_NO |
dc.publisher | Elsevier | nb_NO |
dc.relation.uri | http://www.sciencedirect.com/science/article/pii/S1383762115000740 | |
dc.title | Tuning the victim selection policy of Intel TBB | nb_NO |
dc.type | Journal article | nb_NO |
dc.type | Peer reviewed | nb_NO |
dc.date.updated | 2016-06-16T09:45:30Z | |
dc.source.pagenumber | 584-591 | nb_NO |
dc.source.volume | 61 | nb_NO |
dc.source.journal | Journal of systems architecture | nb_NO |
dc.source.issue | 10 | nb_NO |
dc.identifier.doi | 10.1016/j.sysarc.2015.07.004 | |
dc.identifier.cristin | 1297481 | |
dc.relation.project | Notur/NorStore: NN4650K | nb_NO |
dc.description.localcode | This document is the unedited Author's version of a Submitted Work that was subsequently accepted for publication in Journal of systems architecture , copyright (c) Elsevier after peer review. To access the final edited and published work see http://dx.doi.org/10.1016/j.sysarc.2015.07.004 | nb_NO |