Skip to main content
Log in

Upper Bounds on Number of Steals in Rooted Trees

  • Published:
Theory of Computing Systems Aims and scope Submit manuscript

Abstract

Inspired by applications in parallel computing, we analyze the setting of work stealing in multithreaded computations. We obtain tight upper bounds on the number of steals when the computation can be modeled by rooted trees. In particular, we show that if the computation with n processors starts with one processor having a complete k-ary tree of height h (and the remaining n − 1 processors having nothing), the maximum possible number of steals is \({\sum }_{i=1}^{n}(k-1)^{i}\binom {h}{i}\).

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5

Similar content being viewed by others

References

  1. Agrawal, K., He, Y., Leiserson, C.E.: An empirical evaluation of work stealing with parallelism feedback. In 26th IEEE International Conference on Distributed Computing Systems (ICDCS 2006) (2006)

  2. Arora, N.S., Blumofe, R.D., Greg Plaxton, C.: Thread scheduling for multiprogrammed multiprocessors. In: Proceedings of the Tenth Annual ACM Symposium on Parallel Algorithms and Architectures (SPAA), pp. 119–129 (1998)

  3. Blumofe, R.D., Leiserson, C.E.: Scheduling multithreaded computations by work stealing. J. ACM 46(5), 720–748 (1999)

    Article  MATH  MathSciNet  Google Scholar 

  4. Warren Burton, F., Ronan Sleep, M.: Executing functional programs on a virtual tree of processors. In: Proceedings of the 1981 Conference on Functional Programming Languages and Computer Architecture, 187–194 (1981)

  5. Cormen, T.H., Leiserson, C.E., Rivest, R.L., Stein, C.: Introduction to algorithms, 3rd edition. The MIT Press (2009)

  6. Dinan, J., Larkins, D.B., Sadayappan, P., Krishnamoorthy, S., Nieplocha, J.: Scalable work stealing. In Proceedings of the Conference on High Performance Computing Networking, Storage and Analysis (SC) (2009)

  7. Halstead Jr., R.H.: Implementation of Multilisp: Lisp on a multiprocessor. In: Proceedings of the 1984 ACM Symposium on LISP and Functional Programming, p. 9–17 (1984)

  8. Karp, R.M., Zhang, Y.: Randomized parallel algorithms for backtrack search and branch-and-bound computation. J. ACM 40(3), 765–789 (1993)

    Article  MATH  MathSciNet  Google Scholar 

  9. Suksompong, W.: Bounds on multithreaded computations by work stealing. Master’s Thesis, Massachusetts Institute of Technology (2014)

  10. Tomizawa, N.: On some techniques useful for solution of transportation network problems. Networks 1(2), 1972

Download references

Acknowledgments

We would like to thank the anonymous reviewers for their helpful feedback.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Warut Suksompong.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Leiserson, C.E., Schardl, T.B. & Suksompong, W. Upper Bounds on Number of Steals in Rooted Trees. Theory Comput Syst 58, 223–240 (2016). https://doi.org/10.1007/s00224-015-9613-9

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s00224-015-9613-9

Keywords

Navigation