In this paper, we study the auction model for resource management using the SimGrid simulation framework. We investigate three types of auction allocation protocols: (i) First-Price Auction, (ii) Vickrey Auction and (...
详细信息
In this paper, we study the auction model for resource management using the SimGrid simulation framework. We investigate three types of auction allocation protocols: (i) First-Price Auction, (ii) Vickrey Auction and (iii) Double Auction. the goal is to find which one is best suitable for the grid environment from users' perspective as well as from resources' perspective. the results showed that when we consider a mix of risk-averse and risk-neutral users First-Price Auction favors resources while Vickrey Auction favors users. On the other hand the Doubly Auction favors both users and resources.
For interconnection networks, designing shortest path routing algorithms is in general more difficult than designing simple routing algorithms. In this paper, we derive a shortest path routing algorithm for pyramid ne...
详细信息
For interconnection networks, designing shortest path routing algorithms is in general more difficult than designing simple routing algorithms. In this paper, we derive a shortest path routing algorithm for pyramid networks. the proposed algorithm takes O(l) time to determine a shortest path between any two nodes in a pyramid network. We also design a distributed routing algorithm such that an intermediate node takes O(1) time to confirm the next node along the shortest path without any centralized controller.
this paper describes a distributed coordinated checkpointing protocol that always ensures a consistent set of checkpoints. A checkpoint initiator initiates checkpointing activity and the protocol followed is two phase...
详细信息
this paper describes a distributed coordinated checkpointing protocol that always ensures a consistent set of checkpoints. A checkpoint initiator initiates checkpointing activity and the protocol followed is two phase with each process maintaining a tentative checkpoint till it is made permanent or aborted. However, there is no central checkpoint initiator, but each of the processes takes turn to act as the initiator. Processes take local checkpoints only after being notified by the initiator. the guaranty that no message would be lost in the system (where processes communicate via messages only) in case of failure is maintained in this work by forcing processes to refrain from sending computation messages for a certain period of time that generally equals the time a message in a network takes to reach its destination from the sender. Processes carry out local computations only during that period that eventually gets included in the current permanent checkpoint.
In this paper, we present the improving capability of accuracy and the parallel efficiency of self-organizing neural groves (SONGs) for classification on a MIMD parallel computer. Self-generating neural networks (SGNN...
详细信息
In this paper, we present the improving capability of accuracy and the parallel efficiency of self-organizing neural groves (SONGs) for classification on a MIMD parallel computer. Self-generating neural networks (SGNNs) are originally proposed on adopting to classification or clustering by automatically constructing self-generating neural tree (SGNT) from given training data. the SONG is composed of plural SGNTs each of which is independently generated by shuffling the order of the given training data, and the output of the SONG is voted all outputs of the SGNTs. We allocate each of SGNTs to each of processors in the MIMD parallel computer. Experimental results show that the more the number of processors increases, the more the classification accuracy increases for all problems.
Quality of Service (QoS) management in today's distributedcomputing environments requires that application level resource requirements be considered from the user's perspective since user satisfaction is the ...
详细信息
Quality of Service (QoS) management in today's distributedcomputing environments requires that application level resource requirements be considered from the user's perspective since user satisfaction is the ultimate goal of QoS management. the variety of applications and diversity of user requirements creates challenges for management systems to attempt to satisfy user requirements. In this paper, a policy-driven architecture for user-defined differentiated services is proposed and an overview of the implementation given. the key contribution of this paper is the use of application categories, each characterizing different sets of applications with similar QoS requirements, to determine groups of policies for use by the management system. this approach can reduce the number of policies that much be defined and provide flexibility in meeting individual user QoS requirements. Experience withthe prototype is also reported.
We have proposed and implemented a distributed asynchronous Web-based training (WBT) system. In order to improve the scalability and robustness of this system, all exercises and functions, such as scores user's an...
详细信息
ISBN:
(纸本)9780889867048
We have proposed and implemented a distributed asynchronous Web-based training (WBT) system. In order to improve the scalability and robustness of this system, all exercises and functions, such as scores user's answers are realized on mobile agents. these agents are distributed to computers, and they can be constructed with a P2P network that modified Content-Addressable Network (CAN). In this paper, we present the exercise management scheme for the proposed WBT system. In a WBT system based on client/server model, management of exercises is simply achieved by manipulating data, since all contents are concentrated in one server computer. In the proposed system, however, we need to pay attention to distributed agents for management of exercises. In order to achieve operation of exercise management, i.e., adding, deleting and updating exercises on the distributed WBT system, we use steps with considering multi-agent based distributed environment: specifying an agent which provides an exercise and searching its node as pre-operation, and sending an agent to the expected node and notifying other cooperating agents as post-operation.
A wide variety of systems from many different fields use geospatial data to represent physical environments. these systems, and the data on which they operate, are not only becoming more complex, but they are increasi...
详细信息
A wide variety of systems from many different fields use geospatial data to represent physical environments. these systems, and the data on which they operate, are not only becoming more complex, but they are increasingly being connected together. Although each system may be interested in very different aspects of the environment, the geospatial data they use must be consistent and correlated with each other. As these "systems of systems" grow and as the amount of geospatial data gathered each day increases, the collection and preparation of these data has become the most time consuming and costly processes in the use of many of these systems. the solution to this problem lies in the creation of a geospatial dataset generation system that can efficiently collect, manipulate, and correlate geospatial data to the requirements of the end user. In this paper, we use the unique requirements of building geospatial datasets to derive a distributed software architecture for such a system.
Volunteer computing projects use donated CPU time to solve problems that would otherwise be too computationally intensive to solve. the donated CPU time comes from computers whose owners install a volunteer computing ...
详细信息
ISBN:
(纸本)9780889867741
Volunteer computing projects use donated CPU time to solve problems that would otherwise be too computationally intensive to solve. the donated CPU time comes from computers whose owners install a volunteer computing client program on their computer, allowing a project to use the computer's idle time. the low participation rate in volunteer computing and the increasing number of volunteer computing projects make improvements that more effectively use the donated CPU cycles very important. Past work showed that using certain task retrieval policies could increase the number of tasks volunteer computing clients complete. However, the past work assumed that the volunteered computers had a single CPU and the task retrieval methods that resulted in more completed tasks required the client to be connected to the Internet more often than the other policies. We simulated the task retrieval policies for computers with multi-core CPUs and found that in most cases, the multi-core architecture can lead to a slightly greater than linear increase in the number of tasks that the clients complete, relative to the number of cores the computer running the client has. Additionally, the multi-core architecture can reduce the performance gap between the best and worst performing policies significantly, affecting which policies are used.
Recent years have witnessed the enormous popularity of distributed interactive applications (DIAs), which allow participants that are distributed in the network to interact with each other concurrently. the rapid grow...
详细信息
ISBN:
(纸本)9781467345651
Recent years have witnessed the enormous popularity of distributed interactive applications (DIAs), which allow participants that are distributed in the network to interact with each other concurrently. the rapid growth of DIAs has raised stringent requirements on providing realistic sense of interaction between participants, whose quality is heavily influenced by network latencies. Although network latencies cannot be eliminated due to geographical spreads of participants, it is possible to reduce them by a smart selection of the locations where the servers of the DIAs are placed. the locations of servers affect not only the inter-server latencies but also the latencies from participants to servers, both of which are involved in the interactions among participants. thus, the placement of servers is an important factor to the interactivity performance of DIAs. We formulate the server placement problem, and propose to solve it by an enhanced genetic algorithm, whose genetic operators are specially designed based on the nature of the problem. Experimental results using various datasets show that our algorithm leads to appreciable improvement of the interaction quality in DIAs.
A cluster system can potentially provide features of high availability, extended scalability and fault tolerance. However, there are few cluster systemsthat have transactional capability withdistributed lock manager...
详细信息
A cluster system can potentially provide features of high availability, extended scalability and fault tolerance. However, there are few cluster systemsthat have transactional capability withdistributed lock managers to provide a single system image for transactional applications. We propose a distributed lock manager architecture called SSDLM for a cluster system, which is based on self-management of shared locks in a node to decrease lock management overhead in a cluster system. this paper describes the algorithm and the design of the lock management in SSDLM using data structures and processes. Finally, we test it through our experiments in terms of transaction response time and lock response time. the experimental results show that the overall performance improves with a small increase of nodes but becomes saturated soon, and that the locality of shared locks in SSDLM is effective for all experiments, and especially outstanding in the lock response time for read intensive transactions.
暂无评论