this research presents an end-to-end IoT solution designed as a project, not a traditional lab setup. It simulates high-velocity data generation from smart meters and focuses on real-time data visualization within Azu...
详细信息
In this paper we study the power consumption of quantum computing platforms when integrated into high-performancecomputing (HPC) centers. We analyze the key components of leading quantum computers (superconducting ci...
详细信息
Building efficient large-scale quantum computers is a significant challenge due to limited qubit connectivities and noisy hardware operations. Transpilation is critical to ensure that quantum gates are on physically l...
详细信息
ISBN:
(纸本)9798350393132;9798350393149
Building efficient large-scale quantum computers is a significant challenge due to limited qubit connectivities and noisy hardware operations. Transpilation is critical to ensure that quantum gates are on physically linked qubits, while minimizing SWAP gates and simultaneously finding efficient decomposition into native basis gates. the goal of this multifaceted optimization step is typically to minimize circuit depth and to achieve the best possible execution fidelity. In this work, we propose MIRAGE, a collaborative design and transpilation approach to minimize SWAP gates while improving decomposition using mirror gates. Mirror gates utilize the same underlying physical interactions, but when their outputs are reversed, they realize a different or mirrored quantum operation. Given the recent attention to root iSWAP as a powerful basis gate with decomposition advantages over CNOT, we show how systems that implement the iSWAP family of gates can particularly benefit from mirror gates. Further, MIRAGE uses mirror gates to reduce routing pressure and reduce true circuit depth instead of just minimizing SWAPs. We explore the benefits of decomposition for root iSWAP and (4)root iSWAP using mirror gates, including both expanding Haar coverage and conducting a detailed fault rate analysis trading off circuit depth against approximate gate decomposition. We also describe a novel greedy approach accepting mirror substitution at different aggression levels within MIRAGE. For iSWAP systems that use square-lattice topologies, MIRAGE provides an average of 29.6% reduction in circuit depth by eliminating an average of 59.9% SWAP gates, with a relative decrease in infidelity of 28%. MIRAGE also improves circuit depth and decreases relative infidelity by 25% and 21% for CNOT-based and 23% and 19% SYC-based machines, respectively.
high-precision static analysis can effectively detect Null Pointer Dereference (NPD) vulnerabilities in C language, but the performance overhead is significant. In recent years, researchers have attempted to enhance t...
详细信息
ISBN:
(纸本)9798400707056
high-precision static analysis can effectively detect Null Pointer Dereference (NPD) vulnerabilities in C language, but the performance overhead is significant. In recent years, researchers have attempted to enhance the efficiency of static analysis by leveraging multicore resources. However, due to complex dependencies in the analysis process, the parallelization of static value-flow NPD analysis for large-scale software still faces significant challenges. It is difficult to achieve a good balance between detection efficiency and accuracy, which impacts its *** paper presents PANDA, the first parallel detector for high-precision static value-flow NPD analyzer in the C language. the core idea of PANDA is to utilize dependency analysis to ensure high precision while decoupling the strong dependencies between static value-flow analysis steps. this transforms the traditionally challenging-to-parallelize NPD analysis into two parallelizable algorithms: function summarization and combined query-based vulnerability analysis. PANDA introduces a task-level parallel framework and enhances it with a dynamic scheduling method to parallel schedule the above two key steps, significantly improving the performance and scalability of memory vulnerability *** implemented within the LLVM framework (version 15.0.7), PANDA demonstrates a significant advantage in balancing accuracy and efficiency compared to current popular open-source detection tools. In precision-targeted benchmark tests, PANDA maintains a false positive rate within 3.17% and a false negative rate within 5.16%;in historical CVE detection rate tests, its recall rate far exceeds that of comparative open-source tools. In performance evaluations, compared to its serial version, PANDA achieves up to an 11.23-fold speedup on a 16-node server, exhibiting outstanding scalability.
this paper first designs a hardware acceleration algorithm based on high-performance electronic devices to optimize the processing efficiency of computationally intensive tasks. By designing a specific algorithm archi...
详细信息
Cloud computing enabled users to easily implement what was previously a complex data center infrastructure, reducing its maintenance related costs. However, cloud costs can be challenging to predict with all its varie...
详细信息
ISBN:
(纸本)9798350381603
Cloud computing enabled users to easily implement what was previously a complex data center infrastructure, reducing its maintenance related costs. However, cloud costs can be challenging to predict with all its variety of resources and price schemes. Amazon Web Services offers the spot pricing mechanism for virtual machines (VM), in which an end user buys idle VM capacity for up to 90% cost reduction. But, these machines can be terminated by AWS at any given time, so not every application may be a good fit using them. We here explore the deployment of function as a service (FaaS) platforms in spots by using funcX, a distributed and highperformance FaaS project. We chose MASA-OpenMP, a DNA sequence comparison project, to be executed in two different scenarios: one with in-memory execution in spot VMs, orchestrated with HADS, a Hibernation-Aware Dynamic Scheduler for spot instances, and the other using a funcX client deployed in spot instances as well. Our initial results showed that costs using the funcX approach are potentially smaller, and it also offers more implementation flexibility. We also present possible next steps for more experiments and investigation.
In today's era, handling of big data poses significant challenges due to its massive volume and diverse formats. A rapid processing of such diverse data formats, spanning vast volumes, is essential for delivering ...
详细信息
the availability of computational resources changed significantly due to cloud computing. In addition, we have witnessed efforts to execute high-performancecomputing (HPC) applications in the cloud attracted by the a...
详细信息
ISBN:
(纸本)9798350381603
the availability of computational resources changed significantly due to cloud computing. In addition, we have witnessed efforts to execute high-performancecomputing (HPC) applications in the cloud attracted by the advantages of cost savings and scalable/elastic resource allocation. Allocating more powerful hardware and exclusivity allocating resources such as memory, storage, and CPU can improve performance in the cloud. For network interconnection, significant noise, and other inferences are generated by several simultaneous instances (multitenants) communicating using the same network. As increasing the network bandwidth may be an alternative, we designed an evaluation model, and performance analysis of NIC aggregation approaches in containerized private clouds. the experiments using NAS Parallel Benchmarks revealed that NIC aggregation approach outperforms the baseline up to similar to 98% of the executions with applications characterized by intensive network use. Also, the Balance Round-Robin aggregation mode performed better than the 802.3ad aggregation mode in most assessments.
Message Passing Interface (MPI) is a standard communication protocol utilized in parallel computing. In MPI programs, communication deadlock is one of the most serious problems. To detect deadlocks, existing methods u...
详细信息
ISBN:
(纸本)9798400707056
Message Passing Interface (MPI) is a standard communication protocol utilized in parallel computing. In MPI programs, communication deadlock is one of the most serious problems. To detect deadlocks, existing methods usually traverse all possible execution paths. However, withthe increase of wildcard receives, these methods face the problem of path explosion, resulting in low detection efficiency. To address the issue, we propose a deadlock detection approach with path compression and focus matching. In the approach, consecutive identical send operations within a process in an MPI program are combined to a new compressed operation, which reduces the number of communication operations to be analyzed. then, for each receive operation, a match-set containing all possible compressed send operations from which the receive operation can receive a message is formed based on the Lazy Lamport Clocks Protocol. Finally, a focus matching algorithm based on the match-sets is applied for deadlock detection. We have implemented our approach in a tool called PCMPI and evaluated PCMPI by experimenting on 16 test programs from the Umpire test suite and open-source projects in the real-world. the experimental results demonstrate that PCMPI exhibits higher efficiency in deadlock detection than the two most related tools SAMPI and PDMPI.
Image inpainting is a domain in which researchers have shown considerable interest, and when it comes to deep learning techniques, realistic problems become interesting and challenging. In image inpainting, a corrupte...
详细信息
暂无评论