Most of the actual approaches to address the problem of serial code executing on parallel multi-core processors try to exploit the parallelism of the code during compile time. Such a solution is very efficient but pla...
详细信息
ISBN:
(纸本)9780769534435
Most of the actual approaches to address the problem of serial code executing on parallel multi-core processors try to exploit the parallelism of the code during compile time. Such a solution is very efficient but places the burden on the programmer to know the code will be running on a parallel architecture. In addition, the programmer needs to know the details of the architecture in order to generate efficient parallel code. In this work we present an alternative approach, the layer disruption model, that improves the performance of serial code executing on parallel architectures. We present a small test case that shows the benefits of the model.
In this paper, we present usages of XML-RPC and the effectiveness in a mobile agent framework named Maglog which is implemented in a Java environment. XML-RPC is used for the following two purposes in Maglog. First, i...
详细信息
ISBN:
(纸本)9780889866386
In this paper, we present usages of XML-RPC and the effectiveness in a mobile agent framework named Maglog which is implemented in a Java environment. XML-RPC is used for the following two purposes in Maglog. First, it is a transport mechanism that an agent migrates from one computer to another one. Second, it is an interface which is accessible from applications, written in any other language, which support for XML-RPC. In order to realize an agent migration mechanism, custom serialization mechanism is implemented to customize Java's built-in serialization mechanism. In custom serialization mechanism, objects which represent for an agent are encoded as an XML document. Encoded objects are transferred using XMLRPC. For deserialization, a dynamic class loader is implemented. If no custom serialization is used, an object cannot be deserialized on a remote host, because the class description of the object may not be in the host. As an example of an interface which is accessible from applications, we show a user interface program of a distributed e-Leaming system which we have developed.
Web services are the new generation of distributed software components. they are important for deploying automated interactions between distributed and heterogeneous applications of large-scale distributed systems. Bu...
详细信息
ISBN:
(纸本)9780769550947
Web services are the new generation of distributed software components. they are important for deploying automated interactions between distributed and heterogeneous applications of large-scale distributed systems. But withthe evolution of the number of services available on the Web, in organizations and their large-scale use, a discovery mechanism of such a Web service in a distributed and heterogeneous environment has become a real challenge. In this paper, we describe a scalable P2P approach for automatic discovery of Semantic Web services (SWs), which supports the complexity of both SWs and task. Our architecture is based on P2P technology that has proven its effectiveness and robustness as distributed system. the particularity of our approach is to place the alignment of OWL-S in the heart of this architecture.
A connected dominating set of a graph G is a set of nodes of G such that every node in G is either in the set or is adjacent to some node in the set, and the graph induced by the elements of the set is connected Conne...
详细信息
ISBN:
(纸本)0769524052
A connected dominating set of a graph G is a set of nodes of G such that every node in G is either in the set or is adjacent to some node in the set, and the graph induced by the elements of the set is connected Connected dominating sets have major applications in routing in wireless ad-hoc networks. In this paper, we present a distributed self-estabilizing algorithm for finding a connected dominating set of a graph. Starting from an arbitrary initial state, the algorithm finds a connected dominating set in 002) time, where N is the number of nodes. We also show detailed simulation results to indicate that in practice, the algorithm finas small-sized connected dominating sets in a short time.
Peer-to-peer technology has the potential to achieve scalability, fault-tolerance and robustness in a cost-efficient way. these properties are not only of interest for Internet applications, but benefits can also be r...
详细信息
ISBN:
(纸本)9780769533186
Peer-to-peer technology has the potential to achieve scalability, fault-tolerance and robustness in a cost-efficient way. these properties are not only of interest for Internet applications, but benefits can also be realized in industrial applications. In this short article we discuss the use of P2P networks for the control of microgrids, small islanded parts in electrical power systems. Although deployment of P2P seems far from now, the importance of open networks for the control and supervision of critical infrastructure will increase.
applications like Big Data, Machine Learning, Deep Learning and even other Engineering and Scientific research requires a lot of computing power;making High-Performance computing (HPC) an important field. But access t...
详细信息
ISBN:
(纸本)9781728123349
applications like Big Data, Machine Learning, Deep Learning and even other Engineering and Scientific research requires a lot of computing power;making High-Performance computing (HPC) an important field. But access to Supercomputers is out of range from the majority. Nowadays Supercomputers are actually clusters of computers usually made-up of commodity hardware. Such clusters are called Beowulf Clusters. the history of which goes back to 1994 when NASA built a Supercomputer by creating a cluster of commodity hardware. In recent times a lot of effort has been done in making HPC Clusters of even single board computers (SBCs). Although the creation of clusters of commodity hardware is possible but is a cumbersome task. Moreover, the maintenance of such systems is also difficult and requires special expertise and time. the concept of cloud is to provide on-demand resources that can be services, platform or even infrastructure and this is done by sharing a big resource pool. Cloud computing has resolved problems like maintenance of hardware and requirement of having expertise in networking etc. An effort is made of bringing concepts from cloud computing to HPC in order to get benefits of cloud. the main target is to create a system which can develop a capability of providing computing power as a service which to further be referred to as Supercomputer as a service. A prototype was made using Raspberry Pi (RPi) 3B and 3B+ Single Board Computers. the reason for using RPi boards was increasing popularity of ARM processors in the field of HPC
A major challenge in scientific computing lays in the rapid design and implementation of parallelapplications for complex simulations. In this paper, we develop an interactive graphical system to address this challen...
详细信息
How to share the data in databases of autonomous organizations quickly and flexibly is an important problem. Traditional data integration systems are supposed to be a solution to the problem. Unfortunately, they requi...
详细信息
ISBN:
(纸本)9780769534435
How to share the data in databases of autonomous organizations quickly and flexibly is an important problem. Traditional data integration systems are supposed to be a solution to the problem. Unfortunately, they require a global schema before they can be used to share data and they are centralized system. they can not support data sharing without a common schema and on-demand data sharing in applications. In addition, security is also the important requirements. this paper presents a community-based system for distributed data integration and sharing, Honeycomb. Honeycomb supports many virtual data integration and sharing systems on a single machine, and the system utilizes Web Services to access data on other nodes to avoid changing security configuration of autonomous organizations. In addition, the system adopts new cache techniques to improve performance greatly.
Group checkpointing is a fix between global checkpointing and log-based recovery. It features both reduced runtime overhead and localized recovery effect for improving the fault-tolerance performance of large-scale di...
详细信息
ISBN:
(纸本)9780769548791
Group checkpointing is a fix between global checkpointing and log-based recovery. It features both reduced runtime overhead and localized recovery effect for improving the fault-tolerance performance of large-scale distributed systems. However, parallel programs cannot efficiently benefit from this strategy, as they often involve synchronous or semi-synchronous interactions that incur extra idling delays between processes as well as between process groups. this paper presents an analytical study on such delays and the corresponding delay optimization strategies. Observing that certain parallel programs exhibit patterns of "synchronization groups", we develop a Synchronization-Induced Checkpoint protocol that manages checkpoints around such groups. the protocol keeps advantages of ordinary group checkpointing, and meanwhile minimizes the costs of synchronization-induced delays. We also broadly categorize the known synchronization patterns and establish their relations with suitable checkpoint strategies for parallel programs.
this paper describes a new prolocol for authentication in Peer-to-Peer systems. the protocol has been designed to meet specialized requirements of P2P systems, such as lack of direct communication between peers or req...
详细信息
ISBN:
(纸本)0769524052
this paper describes a new prolocol for authentication in Peer-to-Peer systems. the protocol has been designed to meet specialized requirements of P2P systems, such as lack of direct communication between peers or requirements for controlled anonymity. At the same time, a P2P authentication protocol must be resistant to spoofing, eavesdropping and playback, and man-in-the-middle attacks. the protocol is studied for a model P2P storage system that needs to implement file access rights.
暂无评论