Deadlock-free buffer configuration for stream computing

Peng Li, Jonathan Beard, Jeremy Buhler

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

4 Scopus citations

Abstract

Stream computing is a popular paradigm for parallel and distributed computing, which features computing nodes connected by first-in first-out (FIFO) data channels. To increase the efficiency of communication links and boost application throughput, output buffers are often used. However, the connection between the configuration of output buffers and application deadlocks has not been studied. In this paper, we show that bad configuration of output buffers can lead to application deadlock. We prove necessary and sufficient condition for deadlock-free buffer configurations. We also propose an efficient method based on all-pair shortest path algorithms to detect unsafe buffer configurations. We also sketch a method to adjust an unsafe buffer configuration to a safe one.

Original languageEnglish
Title of host publicationProceedings of the 6th International Workshop on Programming Models and Applications for Multicores and Manycores, PMAM 2015
EditorsPavan Balaji, Minyi Guo, Zhiyi Huang
PublisherAssociation for Computing Machinery
Pages164-169
Number of pages6
ISBN (Electronic)9781450334044
DOIs
StatePublished - Feb 7 2015
Event6th International Workshop on Programming Models and Applications for Multicores and Manycores, PMAM 2015 - San Francisco Bay Area, United States
Duration: Feb 7 2015Feb 8 2015

Publication series

NameProceedings of the 6th International Workshop on Programming Models and Applications for Multicores and Manycores, PMAM 2015

Conference

Conference6th International Workshop on Programming Models and Applications for Multicores and Manycores, PMAM 2015
Country/TerritoryUnited States
CitySan Francisco Bay Area
Period02/7/1502/8/15

Keywords

  • Buffer Configuration
  • Deadlock Avoidance
  • Stream Computing

Fingerprint

Dive into the research topics of 'Deadlock-free buffer configuration for stream computing'. Together they form a unique fingerprint.

Cite this