Recent developments in the international arena has meant the technology is now mature enough to bring together those required for the implementation of a grid computing facility. this paper examines the requirements a...
详细信息
ISBN:
(纸本)0769517722
Recent developments in the international arena has meant the technology is now mature enough to bring together those required for the implementation of a grid computing facility. this paper examines the requirements and applications for an eScience infrastructure with particular reference to developments in Europe.
A great number of scientific applications that access to a large amount of data have emerged last few years. For example in high Energy Physics, the volume of data will be measured in petabytes in the next years. Grid...
详细信息
ISBN:
(纸本)1424403073
A great number of scientific applications that access to a large amount of data have emerged last few years. For example in high Energy Physics, the volume of data will be measured in petabytes in the next years. Grids seek to aggregate geographically distributed resources for the need of these applications. It results that scientists have to deal with many problems to manage available data over the grid. Since grid resources are interconnected by WAN, the main speculation is that data transfers over the grid are bounded by network latency and bandwidth. Here, we point out some storage device issues which in many cases invalidate this assumption. Implicitly, we give a new direction that will lead to a better utilization of available resources on a grid.
Fog computing extends the Cloud computing paradigm to the edge of the network, developing a decentralized infrastructure in which services are distributed to locations that best meet the needs of the applications such...
详细信息
ISBN:
(纸本)9781538677698
Fog computing extends the Cloud computing paradigm to the edge of the network, developing a decentralized infrastructure in which services are distributed to locations that best meet the needs of the applications such as low communication latency, data caching or confidentiality. P2P-based platforms are good candidates to host Fog computing, but they usually lack important elements such as controlling where the data is stored and who will handle the computing tasks. As a consequence, controlling where the data is stored becomes as important as controlling who handle it. In this paper we propose different techniques to reinforce data-locality for P2P-based middlewares, and study how these techniques can be implemented. Experimental results demonstrate the interest of data locality on the data access performances.
Acceleration for the training process of Deep Neural Networks (DNNs) has been the focus of deep learning field. there were many researches of accelerating deep learning on different platforms. Among them, Intel Xeon P...
详细信息
ISBN:
(纸本)9781538637906
Acceleration for the training process of Deep Neural Networks (DNNs) has been the focus of deep learning field. there were many researches of accelerating deep learning on different platforms. Among them, Intel Xeon Phi Co-processor is a many-core platform which provides both strong programmability and highperformance. But previous work about Intel Many Integrated Core (MIC) focused on parallel computing only in MIC. In this paper, we speed up the training process of DNNs applied for automatic speech recognition with CPU+MIC architecture. In this architecture, the training process of DNNs is executed both on MIC and CPU. We apply several optimization methods for I/O and calculation and set up experiments to approve these methods. Putting all methods together, results show that our optimized algorithm acquires about 20x speedup compared withthe original sequential algorithm on CPU which uses one core.
the potential of truly large scale grids can only be realized with grid architectures and deployment strategies that lower the need for human administrative intervention, and therefore open the grid to wider participa...
详细信息
ISBN:
(纸本)1424403073
the potential of truly large scale grids can only be realized with grid architectures and deployment strategies that lower the need for human administrative intervention, and therefore open the grid to wider participation from resources and users. Self-organizing grids (SOGs) are characterized by services, protocols, and deployment strategies that promote true scalability by eliminating administrative bottlenecks. We describe four enabling mechanisms for SOGs-automatically inferring grid structure, tracking and making available dynamic resource state information, unifying the grid service deployment model, and making effective use of intermittently connected grid hosts via lightweight fault tolerance mechanisms that take advantage of the resource fault characteristics.
Grid applications that use a considerable number of processors for their computations need effective predictions of the expected computation times on the different nodes. Currently, there are no effective prediction m...
详细信息
ISBN:
(纸本)1424403073
Grid applications that use a considerable number of processors for their computations need effective predictions of the expected computation times on the different nodes. Currently, there are no effective prediction methods available that satisfactorily cope withthose ever-changing dynamics of computation times in a grid environment. Motivated by this, in this paper we develop the Dynamic Exponential Smoothing (DES) method to predict job processing times in a grid environment. To compare predictions of DES to those of the existing prediction methods, we have performed extensive experiments in a real large-scale grid environment. the results illustrate a strong and consistent improvement of DES in comparison withthe existing prediction methods.
In this paper we study how distributed scheduling systems can be designed most effectively;we focus on the problem of selecting an optimal arrangement of schedulers, or a deployment, for hierarchically organized syste...
详细信息
ISBN:
(纸本)1424403073
In this paper we study how distributed scheduling systems can be designed most effectively;we focus on the problem of selecting an optimal arrangement of schedulers, or a deployment, for hierarchically organized systems. We show that the optimal deployment is a complete spanning d-ary tree;this result conforms with results from the scheduling literature. More importantly, we present an approach for determining the optimal degree d for the tree. We test our approach using DIIET, a network-enabled server system that uses hierarchical schedulers. Finally, we demonstrate that our approach selects deployments that are near-optimal in practice.
Soft Errors have emerged as a key challenge to microprocessor design. Traditional soft error tolerance techniques (such as redundant multithreading and instruction duplication) can achieve high fault coverage but at t...
详细信息
ISBN:
(纸本)9780769538495
Soft Errors have emerged as a key challenge to microprocessor design. Traditional soft error tolerance techniques (such as redundant multithreading and instruction duplication) can achieve high fault coverage but at the cost of significant performance degradation. Prior research reports that soft errors can be masked at the architecture level, and the degree of such masking, named as architecture vulnerability factor (AVF), can vary significantly across workloads and individual structures, hence strict redundant execution may not be necessary for soft error tolerance. In this work, we exploit the AVF varying feature to adaptively tune reliability and performance. We present an infrastructure to online compute and predict AVF for three microprocessor structures (IQ, ROB, and LSQ), guiding when the protection scheme should be activated to improve reliability. Experimental results show that our method can efficiently compute the AVF for different structures independent of hardware configurations. the average differences between our method and a prior offline AVF computing method are 0.10, 0.01, and 0.039 for IQ, ROB, and LSQ, respectively.
the proceedings contain 65 papers. the topics discussed include: crowdsourcing-based architecture for post-disaster geolocation: a comparative performance evaluation;GeoTrie: a scalable architecture for location-tempo...
ISBN:
(纸本)9781509032167
the proceedings contain 65 papers. the topics discussed include: crowdsourcing-based architecture for post-disaster geolocation: a comparative performance evaluation;GeoTrie: a scalable architecture for location-temporal range queries over massive geotagged data sets;characterizing GPS outages: geodesic dead reckoning solution for VANETs and ITS;contextual geotracking service of incident markers in disaster search-and-rescue operations;a user level approach to schedule BoT applications on private clouds;heterogeneous resource allocation in cloud management;leveraging an homomorphic encryption library to implement a coordination service;and multi-phase proactive cloud scheduling framework based on high level workflow and resource characterization.
暂无评论