this paper presents the scheduling strategies framework for distributedcomputing. the fact that architecture of the computational environment is distributed, heterogeneous, and dynamic along with autonomy of processo...
详细信息
ISBN:
(纸本)9783642032745
this paper presents the scheduling strategies framework for distributedcomputing. the fact that architecture of the computational environment is distributed, heterogeneous, and dynamic along with autonomy of processor nodes, makes it much more difficult to manage and assign resources for job execution which fulfils user expectations for quality of service (QoS). the strategies are implemented using a combination of job-flow and application-level techniques of scheduling and resource co-allocation within virtual organizations of Grid. applications are regarded as compound jobs with a complex structure containing several tasks. Strategy is considered as a set of possible job scheduling variants with a coordinated allocation of the tasks to the processor nodes. the choice of the specific variant depends on the load level of the resource dynamics and is formed as a resource request, which is sent to a local batch-job management system.
this paper presents Tupleware, a cluster middleware which provides a distributed tuple space intended for use by computationally intensive scientific and numerical applications. It aims to add no extra burden to the a...
详细信息
ISBN:
(纸本)9780769534435
this paper presents Tupleware, a cluster middleware which provides a distributed tuple space intended for use by computationally intensive scientific and numerical applications. It aims to add no extra burden to the application programmer due to the distribution of the tuple space, and uses a decentralised approach and intelligent tuple search and retrieval to provide a scalable and efficient execution environment. Tupleware is evaluated using two applications: a modified quicksort and an ocean model, which demonstrates good scalability and a low system overhead.
the Architecture Tradeoff Analysis Method (ATAM) is an architecture evaluation technique for analyzing risks, tradeoffs, and sensitivity points of architectures. In this paper we describe an experience of evaluating a...
详细信息
ISBN:
(纸本)9780769536422
the Architecture Tradeoff Analysis Method (ATAM) is an architecture evaluation technique for analyzing risks, tradeoffs, and sensitivity points of architectures. In this paper we describe an experience of evaluating and improving the architecture of VAN-Core system which requires to run 24 hours a day, 365 days a year, for online credit card transaction services. the goal of the architecture evaluation for VAN-Core system includes establishing risk mitigation strategies for identified risky and suggesting architecture improvements in addition to architecture evaluation.
this paper introduces invasive computing, a new paradigm for programming parallel architectures. the goals are to enable the development and execution of resource aware programs that can dynamically allocate and free ...
详细信息
ISBN:
(纸本)9780889868649
this paper introduces invasive computing, a new paradigm for programming parallel architectures. the goals are to enable the development and execution of resource aware programs that can dynamically allocate and free new resources in phases with more parallelism. To allocate more resources, applications use the invade operation and to free them the retreat. the research is conducted within the framework of the Transregional Collaborative Research Centre 89 funded by the German Science Foundation.
In a nominative proxy ring signature scheme, an original signer delegates his nominative signing power to some proxies forming a ring. the member of the ring can generate a nominative signature on behalf of the origin...
详细信息
ISBN:
(纸本)9780769536422
In a nominative proxy ring signature scheme, an original signer delegates his nominative signing power to some proxies forming a ring. the member of the ring can generate a nominative signature on behalf of the original signer and the ring. In a nominative proxy ring signature scheme, only the nominee can verify the ring signature and if necessary, only the nominee can prove its validity to the third party. In this paper, we present the first nominative proxy ring signature scheme and we prove its security
though XML is applied intensively in a lot of applications, XML parsing is not practical in many fields because of its poor performance. parallel XML parsing on multi-core is a promising choice. Previous methods all a...
详细信息
ISBN:
(纸本)9781424452910
though XML is applied intensively in a lot of applications, XML parsing is not practical in many fields because of its poor performance. parallel XML parsing on multi-core is a promising choice. Previous methods all adopt data parallel approach on XML parsing. As the semi-structured nature of XML, they were obliged to divide the data into well-formed XML chunks and then parse these chunks parallel. the division process is named as preparsing. As the preparsing is serial, it becomes the bottleneck of parallel XML parsing. Related work Simultaneous Finite Transducer (SFTXP) :parallelized the preparsing stage. It maintained multiple preparser results for each equal sized chunk according to enumerated all possible parsing states. In spite of finite states for each XML, the overhead by SFTXP is tremendous, including CPU time and memory for multiple results generating and storing, respectively. In this work, we address parallel XML parsing by Key Element Parse Tracing (KEPT) method which parallelizes the preparsing and parsing at element level. It remolds the preparsing as a key element extracting process and schedules the processing of key elements in 1:he framework of KEPT. then parsing process is parallelized as a whole. To demonstrate the effectiveness, we implement it on libxml2 and obtain good scalability on both an 8-core Linux machine and an 8-core 24 SMT Sun machine running Solaris.
Semantic annotation plays a central role in building Semantic Web, which in general could be completed by committing a web resource to a domain ontology. However, there exist many circumstances in which semantic annot...
详细信息
ISBN:
(纸本)0780378407
Semantic annotation plays a central role in building Semantic Web, which in general could be completed by committing a web resource to a domain ontology. However, there exist many circumstances in which semantic annotation needs more than one ontologies In this paper, we propose an approach based distributed Description Logics(DDL) with intention to deal withthese circumstances, in which ontologies form a distributed system, and no extra conditions and. changes are imposed to those component ontologies.
Peer-to-peer (P2P) systems are, in contrast to client-server (C/S) systems, fault-tolerant, robust, and scalable. While C/S distributed file systems, such as NFS (Network File System) or SMB (Server Message Block), do...
详细信息
ISBN:
(纸本)9781424452910
Peer-to-peer (P2P) systems are, in contrast to client-server (C/S) systems, fault-tolerant, robust, and scalable. While C/S distributed file systems, such as NFS (Network File System) or SMB (Server Message Block), do not scale with respect to the number of clients and exhibit a single point of failure, P2P file systems have the potential to cope with an increasing number of participants. thus, this paper presents DRFS (distributed Reliable File System), a P2P file system for cooperative environments. DRFS uses random, content-independent identifiers for data storage, while maintaining high performance and low overhead with many concurrent reads and writes. A dynamic replication mechanism ensures data availability, even under high churn. the application scenario considers an office environment, where DRFS is installed on employees' machines, who store and request files. DRFS has been implemented using the Filesystem in Userspace (FUSE) interface, in order to provide users with transparent read and write operations. Experiments show the benefits of such a peer-to-peer architecture, when a small number of peers reads or writes in parallel: DRFS performs better than NFS, as soon as 6 peers read or write in parallel a 32 MB file. For unpopular files, it is also more reliable than IgorFS.
this work presents a study undertaken to characterise the FINISTERRAE supercomputer, one of the biggest NUMA systems in Europe. the main objective was to determine the performance effect of bus contention and cache co...
详细信息
ISBN:
(纸本)9781424452910
this work presents a study undertaken to characterise the FINISTERRAE supercomputer, one of the biggest NUMA systems in Europe. the main objective was to determine the performance effect of bus contention and cache coherency as well as the suitability of porting strategies regarding irregular codes in such a complex architecture. Results show that: (1) cores which share a socket can be considered as independent processors in this context;(2) for big data sizes, the effect of sharing a bus degrades the final performance but masks the cache coherency effects;(3) the NUMA factor (remote to local memory latency ratio) is an important factor on irregular codes and (4) the default kernel allocation policy is not optimal in this system. these results allow us to understand the behaviour of thread-to-core mappings and memory allocation policies.
this paper first defines a format for capturing and distributing contributed resources called an eContract and then proposes an agreement protocol along with a simple distributed algorithm for negotiating the eContrac...
ISBN:
(纸本)9780769530499
this paper first defines a format for capturing and distributing contributed resources called an eContract and then proposes an agreement protocol along with a simple distributed algorithm for negotiating the eContract in the context of dynamic collaborations. the insights gained from the analysis of the proposed negotiation algorithm lead us to the development of an efficient "message piggybacking" negotiation algorithm.
暂无评论