![](https://www.pdfsearch.io/img/7a42704538c2e7e1c296ba4e42d081f4.jpg)
| Document Date: 2012-07-02 14:58:32 Open Document File Size: 440,22 KBShare Result on Facebook
City Copenhagen / / Company GPU / Meta-Par / Meta-Par Resources / Red Hat / NVIDIA / Intel / / Country Denmark / / Currency USD / GHS / / Facility Meta-Par library / Newton Indiana University / Haskell library / bar baz / $(mkClosure bar / Par Int bar / / IndustryTerm divide-and-conquer algorithm / work-stealing algorithms / external device / active work item startup / software artifacts / recursive algorithm / it to more applications / cluster infrastructure / divide-and-conquer parallel algorithms / parallel computing hardware demands / work-stealing algorithm / larger systems / / OperatingSystem Red Hat Enterprise Linux / / Organization Indiana University / / Person Jiang Ryan / Hackage / Meta-Par / / Position Resource Stack The scheduler / original Par scheduler / work-stealing scheduler / CPU scheduler / single worker / work-stealing Par-monad scheduler / General / original Par-monad scheduler / community package manager / interpreter / previously published scheduler / parallel scheduler / calling worker / previously published Par-monad scheduler / stealee worker / particular scheduler / incompatible scheduler / GHC event manager / writer / worker / composed scheduler / representative / scheduler / programmer / / Product Resource / Monoid / HdpH (r0661a3) / Linux / Resources / / ProgrammingLanguage Cilk / Java / Erlang / Haskell / C++ / / TVStation Wand / / Technology Adam / functional programming / divide-and-conquer parallel algorithms / LAN / 270 processors / taskscheduling algorithm / Linux / API / 30 algorithm / operating system / shared memory / recursive algorithm / divide-and-conquer algorithm / Cilk algorithm / load balancing / work-stealing algorithm / Java / work-stealing algorithms / comparison-based CPU sorting algorithm / Gigabit Ethernet / / URL http /
SocialTag |