MEMORY-CONSTRAINED TASK SCHEDULING ON A NETWORK OF DUAL PROCESSORS.

被引:0
|
作者
Fuchs, Ken [1 ]
Kafura, Dennis [1 ]
机构
[1] Iowa State Univ, Ames, IA, USA, Iowa State Univ, Ames, IA, USA
来源
Journal of the ACM | 1985年 / 32卷 / 01期
关键词
COMPUTER NETWORKS - Protocols - COMPUTER OPERATING SYSTEMS - Storage Allocation - COMPUTER SYSTEMS PROGRAMMING - Time Sharing Programs - COMPUTERS - Operating Procedures - COMPUTERS; DIGITAL; -; Circuits;
D O I
暂无
中图分类号
学科分类号
摘要
One aspect of network design is the extent to which memory is shared among the processing elements. In this paper a model with limited sharing (only two processors connected to each memory) is analyzed and its performance compared with the performance of two other models that have appeared in the literature. One of these is a model of multiple processors sharing a single memory; the other model considers a multiprocessor configuration in which each processor has its own dedicated memory. The tasks processed by these networks are described by both time and memory requirements. The largest-memory-first (LMF) scheduling algorithm is employed and its performance with respect to an enumerative optimal scheduling algorithm is bounded. On the basis of this measure it is concluded that memory sharing is only desirable on very small networks and is disadvantageous on networks of larger size.
引用
收藏
页码:102 / 129
相关论文
共 50 条
  • [41] SLICE Matrix: A Memory Access Scheduling Policy for Multicore Network Processors
    Yue, Shipeng
    Liang, Honghao
    Xing, Xinpeng
    Feng, Haigang
    2024 IEEE 35TH INTERNATIONAL CONFERENCE ON APPLICATION-SPECIFIC SYSTEMS, ARCHITECTURES AND PROCESSORS, ASAP 2024, 2024, : 174 - 175
  • [42] Dual power aware task scheduling in sensor network
    Department of Computer Science, Changshu Institute of Technology, Changshu 215500, China
    不详
    Tien Tzu Hsueh Pao, 2006, 5 (778-783):
  • [43] TASO: Time and Space Optimization for Memory-Constrained DNN Inference
    Wen, Yuan
    Anderson, Andrew
    Radu, Valentin
    O'Boyle, Michael F. P.
    Gregg, David
    2020 IEEE 32ND INTERNATIONAL SYMPOSIUM ON COMPUTER ARCHITECTURE AND HIGH PERFORMANCE COMPUTING (SBAC-PAD 2020), 2020, : 199 - 208
  • [44] Flexible Intrusion Detection Systems for Memory-Constrained Embedded Systems
    Tabrizi, Farid Molazem
    Pattabiraman, Karthik
    2015 ELEVENTH EUROPEAN DEPENDABLE COMPUTING CONFERENCE (EDCC), 2015, : 1 - 12
  • [45] Mapping Large Memory-constrained Workflows onto Heterogeneous Platforms*
    Kulagina, Svetlana
    Meyerhenke, Henning
    Benoit, Anne
    53RD INTERNATIONAL CONFERENCE ON PARALLEL PROCESSING, ICPP 2024, 2024, : 305 - 316
  • [46] Tracking Recurrent Concepts Using Context in Memory-constrained Devices
    Bartolo Gomes, Joao
    Menasalvas, Ernestina
    Sousa, Pedro A. C.
    UBICOMM 2010: THE FOURTH INTERNATIONAL CONFERENCE ON MOBILE UBIQUITOUS COMPUTING, SYSTEMS, SERVICES AND TECHNOLOGIES, 2010, : 446 - 451
  • [47] Using Tabu Search for Optimization of Memory-Constrained Hybrid BIST
    Kruus, Helena
    Jervan, Gert
    Ubar, Raimund
    BEC 2008: 2008 INTERNATIONAL BIENNIAL BALTIC ELECTRONICS CONFERENCE, PROCEEDINGS, 2008, : 155 - 158
  • [48] Summarizing Stream Data for Memory-Constrained Online Continual Learning
    Gu, Jianyang
    Wang, Kai
    Jiang, Wei
    You, Yang
    THIRTY-EIGHTH AAAI CONFERENCE ON ARTIFICIAL INTELLIGENCE, VOL 38 NO 11, 2024, : 12217 - 12225
  • [49] VOICE TO ACTION : SPOKEN LANGUAGE UNDERSTANDING FOR MEMORY-CONSTRAINED SYSTEMS
    Gupta, Ashutosh
    Jayasimha, Aditya
    Maghan, Aman
    Singh, Shatrughan
    Gowda, Dhananjaya
    Kim, Chanwoo
    2021 IEEE AUTOMATIC SPEECH RECOGNITION AND UNDERSTANDING WORKSHOP (ASRU), 2021, : 473 - 479
  • [50] Predictive scheduling of network processors
    Wolf, T
    Pappu, P
    Franklin, MA
    COMPUTER NETWORKS, 2003, 41 (05) : 601 - 621