automatically exploiting cross-invocation parallelism using runtime ...
automatically exploiting cross-invocation parallelism using runtime ...
automatically exploiting cross-invocation parallelism using runtime ...
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
[7] B. Blume, R. Eigenmann, K. Faigin, J. Grout, J. Hoeflinger, D. Padua, P. Petersen,B. Pottenger, L. Rauchwerger, P. Tu, and S. Weatherford. Polaris: The next generationin parallelizing compilers. In Proceedings of the 6th workshop on Languages andCompilers for Parallel Computing (LCPC), 1994.[8] R. D. Blumofe, C. F. Joerg, B. C. Kuszmaul, C. E. Leiserson, K. H. Randall, andY. Zhou. Cilk: An efficient multithreaded <strong>runtime</strong> system. In Proceedings of the5th ACM SIGPLAN symposium on Principles and Practice of Parallel Programming(PPoPP), 1995.[9] D. R. Butenhof. Programming with POSIX threads. Addison-Wesley Longman PublishingCo., Inc., 1997.[10] S. Campanoni, T. Jones, G. Holloway, V. J. Reddi, G.-Y. Wei, and D. Brooks. Helix:automatic parallelization of irregular programs for chip multiprocessing. In Proceedingsof the 10th international symposium on Code Generation and Optimization(CGO), 2012.[11] C. D. Carothers and B. K. Szymanski. Checkpointing multithreaded programs. Dr.Dobbs, August 2002.[12] L. Ceze, J. Tuck, J. Torrellas, and C. Cascaval. Bulk disambiguation of speculativethreads in multiprocessors. In Proceedings of the 33rd annual International Symposiumon Computer Architecture (ISCA), 2006.[13] G. Cong, S. Kodali, S. Krishnamoorthy, D. Lea, V. Saraswat, and T. Wen. Solvinglarge, irregular graph problems <strong>using</strong> adaptive work-stealing. In Proceedings of the37th International Conference on Parallel Processing (ICPP), 2008.[14] J. C. Corbett. Evaluating deadlock detection methods for concurrent software. IEEETransactions on Software Engineering, volume 22, pages 161–180, 1996.97