Guidelines for Data-Parallel Cycle-Stealing in Networks of Workstations I: On Maximizing Expected Output