We present a fault tolerant task pool execution environment that is capable of performing fine-grain selective restart using a lightweight, distributed task completion tracking mechanism. Compared with conventional ch...
详细信息
With the fast development of multi-core technology, future high performance computing system will be a system of many multi-core processors where parallelcomputing is a must. However, it is not an easy task in such a...
详细信息
A new implementation of seismic data processing approach based on parallel wavelet transform is presented in this paper. Firstly, the feasibility and necessity of the parallel processing method for seismic data are el...
详细信息
In this paper, we investigate distributed relay selection in OFDM-based cooperative wireless networks. A selective Decode-and-Forward relaying strategy is adopted, in which one relay is selected to forward the entire ...
详细信息
ISBN:
(纸本)9781424437092
In this paper, we investigate distributed relay selection in OFDM-based cooperative wireless networks. A selective Decode-and-Forward relaying strategy is adopted, in which one relay is selected to forward the entire OFDM symbol. Theoretical outage performance is analyzed and evaluated first. Then six relay selection schemes based on different selection criteria are given. The outage performance of one of the schemes coincides with the theoretical value and all the schemes need only local CSI and can thus be implemented in a distributed way. Monte Carlo simulations validate our analysis and show that significant performance gain can be obtained compared to that of direct transmission.
In this paper, we propose the PBDT, a novel secret sharing scheme which outperforms current constructions in the distributed wireless network environment. In our scheme, each participant selects his secret share respe...
详细信息
ISBN:
(纸本)9781424437092
In this paper, we propose the PBDT, a novel secret sharing scheme which outperforms current constructions in the distributed wireless network environment. In our scheme, each participant selects his secret share respectively without negotiating with a central node. One secret share can extract several messages without renewing when new participants are added or old participants are deleted. And its share verification phase allows any participant to verify its authenticity and validity. PBDT proves to be practically efficient and computationally secure to resist collision attack, especially for distributed wireless networks.
Good scheduling is important for ensuring effective use of Grid resources, while maximising parallel performance. In this paper, we show how a basic "Random-Stealing" load balancing algorithm for computation...
详细信息
Algorithmic skeletons encapsulate typical parallel programming patterns such that they can be easily applied by users. Existing skeleton libraries usually work on distributed memory machines. We present an extension o...
详细信息
This report is devoted to discussion of numerical and symbolic computing ratio in beam physics. We tray to draw attention on basic conceptual and computational problems first of all. It is known that the main problem ...
详细信息
This report is devoted to discussion of numerical and symbolic computing ratio in beam physics. We tray to draw attention on basic conceptual and computational problems first of all. It is known that the main problem in modern computational beam physics connected with high performance computing realization. The most of used approaches are not appropriate for computing using multiprocessing systems. Here we give some possible solutions, which based on a matrix presentation of necessary information and modern information technologies. (C) 2010 Published by Elsevier Ltd.
We analyze the topic structure of 10,299 publications from the internationalconference on Computational Science (ICCS) between 2001 and 2024 as well as the Journal of Computational Science (JoCS) between 2010 and 202...
详细信息
We analyze the topic structure of 10,299 publications from the internationalconference on Computational Science (ICCS) between 2001 and 2024 as well as the Journal of Computational Science (JoCS) between 2010 and 2023, using natural language processing techniques and network analysis. The computational science classification corpus was created into 15 main disciplines and 256 sub-disciplines sourced from Wikipedia. Among the 15 main disciplines, machine learning became the most popular topic after 2019, surpassing parallel & distributedcomputing, which peaked in the early 2010s. ICCS and JoCS show differences in research popularity in both first and second-level disciplines. Algorithm theory, Mathematical modeling, and network science are the most dominant topics in both ICCS and JoCS. Different disciplines present different trends in ICCS and JoCS. In the past 24 years, machine learning related topics have gained the most attention in both ICCS and JoCS. We also examined and compared the correlation between the trends in ICCS and Google search Trends. The collaboration of disciplinary networks of second-level disciplines exhibits a scale-free characteristic, and the network structures have undergone significant evolution over 24 years. Moreover, different disciplinary communities exhibit different ”introverted” and ”extroverted” community characteristics within the network. Additionally, we examined the life span of thematic workshops and the evolution of authors’ collaborations inside and after ICCS.
According to the features of Message Passing Interface (MPI) and OpenMP, the cloud computing application methods based on MPI and OpenMP, including the MPI and OpenMP cloud computing algorithm design model, cloud comp...
详细信息
暂无评论