Randomized parallel algorithms for backtrack search and branch-and-bound computation
Citations
1,688 citations
1,202 citations
Cites background from "Randomized parallel algorithms for ..."
...This class of computations encompasses both backtrack search computations [Karp and Zhang 1993; Zhang and Ortynski 1994] and divide-and-conquer computations [Wu and Kung 1991], as well as dataflow computations [Arvind et al. 1989] in which threads may stall due to a data dependency....
[...]
985 citations
Cites background or methods from "Randomized parallel algorithms for ..."
...Cilk' s scheduler uses the technique of work stealing [4, 8, 14, 15, 16, 21, 29 , 30, 31, 37, 43] in which a processor (the thief) who runs out of work selects another processor (the victim) from whom to steal work, and then steals the shallowest ready thread in the victim' s spawn tree....
[...]
...Cilk' s strategy is for thieves to choose victims at random [4, 29 , 40]....
[...]
...With processors, the execution time cannot be less than or less than . The Cilk scheduler uses “work stealing” [4, 8, 14, 15, 16, 21, 29 , 30, 31, 37, 43] to achieve execution time very near to the sum of these two measures....
[...]
660 citations
472 citations
References
7,221 citations
"Randomized parallel algorithms for ..." refers methods in this paper
...An introduction to branch-and-bound method can be found in [7] and an in-depth account in [3]....
[...]
1,915 citations
681 citations
485 citations
214 citations