A stealing mechanism for delegation methods
- 12 March 2021
- journal article
- research article
- Published by Springer Science and Business Media LLC in The Journal of Supercomputing
- Vol. 77 (10), 10827-10849
- https://doi.org/10.1007/s11227-021-03719-2
Abstract
No abstract availableKeywords
This publication has 33 references indexed in Scilit:
- Lock CohortingACM Transactions on Parallel Computing, 2015
- High performance locks for multi-level NUMA systemsPublished by Association for Computing Machinery (ACM) ,2015
- Whose cache line is it anyway?Published by Association for Computing Machinery (ACM) ,2013
- Revisiting the combining synchronization techniquePublished by Association for Computing Machinery (ACM) ,2012
- Revisiting the combining synchronization techniqueACM SIGPLAN Notices, 2012
- Modeling critical sections in Amdahl's law and its implications for multicore designACM SIGARCH Computer Architecture News, 2010
- A Hierarchical CLH Queue LockLecture Notes in Computer Science, 2006
- Preemption Adaptivity in Time-Published Queue-Based Spin LocksLecture Notes in Computer Science, 2005
- Algorithms for scalable synchronization on shared-memory multiprocessorsACM Transactions on Computer Systems, 1991
- The performance of spin lock alternatives for shared-money multiprocessorsIEEE Transactions on Parallel and Distributed Systems, 1990