Several effective algorithms are presented for the optimal allocation of computer resources in a proposed stream-oriented parallel-processing scheme for database operations. these algorithms can be utilized to obtain ...
详细信息
ISBN:
(纸本)0818619538
Several effective algorithms are presented for the optimal allocation of computer resources in a proposed stream-oriented parallel-processing scheme for database operations. these algorithms can be utilized to obtain the optimal allocation of memory resources for every type of query in sequential-processing environments, parallel-processing environments with shared-memory multiprocessors, and distributed-processing environments. the computation complexities of the proposed algorithms are analyzed and used to clarify the effectiveness of those algorithms.
A performance model is constructed for parallel iterative numerical methods under the assumption of a message-passing computing system. Arguments are given for the fact that the speedup of parallel iterative methods i...
详细信息
A performance model is constructed for parallel iterative numerical methods under the assumption of a message-passing computing system. Arguments are given for the fact that the speedup of parallel iterative methods is mainly influenced by the speedup at one iterative step. Using the theoretical model, it is proved why explicit iterative methods for ordinary differential equations are inefficient in implementation on distributed memory multiprocessor systems. Numerical tests on parallel and distributedcomputing environments confirm the correctness of the theoretical model at least in the case of iterative methods for ordinary differential equations and time-dependent partial differential equations. (c) 2005 Elsevier Ltd. All rights reserved.
It is the purpose of this paper to present some practical security issues related to National High Performance computing Environment (NHPCE), the computational grid. Based on the security requirements of NHPCE we disc...
详细信息
ISBN:
(纸本)0780378407
It is the purpose of this paper to present some practical security issues related to National High Performance computing Environment (NHPCE), the computational grid. Based on the security requirements of NHPCE we discuss some existing distributed security technologies we used and point out why they are not enough. then the key issues of NHPCE and its corresponding solutions to these problems are analyzed. Lastly we put forward our final solution.(8).
In this paper, we propose and evaluate new storage formats for sparse matrices that minimize the space complexity of information about matrix structure. the motivation of our work are applications with very large spar...
详细信息
ISBN:
(纸本)9780769547497
In this paper, we propose and evaluate new storage formats for sparse matrices that minimize the space complexity of information about matrix structure. the motivation of our work are applications with very large sparse matrices that due to their size must be processed on massively parallel computer systems consisting of tens or hundreds of thousands of processor cores and that must be stored in a distributed file system using parallel I/O. the parallel I/O is typically the main performance bottleneck and reading or writing such matrices from/to distributed file system can take significant amount of time. We try to reduce this time by reducing the amount of data to be processed.
Massive amounts of data are generated by sensor networks, edge computers, IoT devices, and enterprise networks. To process this volume of data requires (1) a scalable programming model that is not only concurrent and ...
详细信息
ISBN:
(纸本)9781665460873
Massive amounts of data are generated by sensor networks, edge computers, IoT devices, and enterprise networks. To process this volume of data requires (1) a scalable programming model that is not only concurrent and distributed, but supports the mobility of data and processes (actors), and (2) algorithms to distribute computations between nodes in a manner that improves overall performance while considering energy use in the system. With appropriate programming tools, we can distribute a given computation in a way that makes effective use of edge devices to improve performance while lowering energy consumption. the paper describes our work building on ideas based on the Actor model of computation. these include characterizing the relation of performance and energy consumption in parallel computation, and methods to support scalable placement mechanisms under dynamically changing network conditions and computational loads on edge devices. the paper will conclude with a presentation with a summary of open research problems.
Formal specification are indispensable for computer-aided verification and testing of communication protocols. However, a large number of the practical protocols have only informal specifications, mostly in English. T...
详细信息
ISBN:
(纸本)9780769530499
Formal specification are indispensable for computer-aided verification and testing of communication protocols. However, a large number of the practical protocols have only informal specifications, mostly in English. there are no general procedures to derive formal specifications from such informal specification. In this paper we model Session Initiation Protocol (SIP) by parameterized extended finite state machines. We also provide insights gained in the derivation of the formal specification.
the molecular docking is the focus of practical applications such as protein engineering and drug design. A docking algorithm is a procedure that predicts the assembly of two molecules like a key and a lock. To screen...
详细信息
ISBN:
(纸本)9781467316583
the molecular docking is the focus of practical applications such as protein engineering and drug design. A docking algorithm is a procedure that predicts the assembly of two molecules like a key and a lock. To screen a large library of molecules, a docking algorithm requires high performance computing. parallel and distributedapplications have long been recognized as powerful computational tools and effective in the field of bioinformatics. Jini technology is one of the powerful infrastructures network for building and deploying distributed systems that are organized as a federation of services. JavaSpaces is one of the services that come bundled with Jini, it is a shared associative memory accessible by the network and allows an easily developing of a massively parallel and distributedapplications. this paper discusses the use of the JavaSpaces service to build a distributed application in order to minimize the running time of a molecular docking algorithm.
Agents and multi-agent systems are related to a modern software paradigm which has long beenrecognized as a promising technology for constructingautonomous, complex andintelligent *** covered in this volume include ag...
ISBN:
(数字)9783319197289
ISBN:
(纸本)9783319197272;9783319197289
Agents and multi-agent systems are related to a modern software paradigm which has long beenrecognized as a promising technology for constructingautonomous, complex andintelligent *** covered in this volume include agent-oriented software engineering,agent co-operation, co-ordination,negotiation, organization and communication,distributed problem solving,specification of agentcommunication languages, agentprivacy, safety and security,formalization of ontologies and conversational *** volume highlights new trends andchallenges in agent and multi-agent research and includes 38 papers classifiedin the following specific topics:learningparadigms, agent-based modeling and simulation, business model innovation anddisruptive technologies,anthropic-oriented computing, serious games andbusiness intelligence,design and implementation of intelligent agentsand multi-agent systems,digital economy, and advances in networkedvirtual *** papershave been presented at the 9th KESconference on Agent and Multi-Agent Systems technologies and applications(KES-AMSTA 2015)held in Sorrento, *** results should be of value tothe research community working in the fields of artificial intelligence,collective computational intelligence, robotics,dialogue systems and, inparticular, agent and multi-agent systems, technologies, tools and applications.
Improved FCM algorithm based on genetic algorithm is used to extract user needs in mobile cloud computing. By using its characteristics of fast clustering, users can be divided into the same category with similar attr...
详细信息
ISBN:
(纸本)9781509050819
Improved FCM algorithm based on genetic algorithm is used to extract user needs in mobile cloud computing. By using its characteristics of fast clustering, users can be divided into the same category with similar attributes and behavior patterns, and then use the similarity recommendation algorithm, which makes the similar user requests can be quickly responded. this algorithm (GAFCM-CF) is proposed in this paper to solve the problem of mobile cloud user attribute collection and user request processing in small and medium network. At the same time, this paper compares the simulation experiment withthe traditional MIN-MIN scheduling algorithm, and verifies the effectiveness and efficiency of the algorithm.
Cluster grid computing is nowadays considered an actual alternative to both grid computing and traditional parallelcomputing based on supercomputing systems and on clusters of workstations exploited as a unique, cohe...
详细信息
ISBN:
(纸本)9789806560550
Cluster grid computing is nowadays considered an actual alternative to both grid computing and traditional parallelcomputing based on supercomputing systems and on clusters of workstations exploited as a unique, coherent, high performance computing resource. To this end, ePVM is an extension of the well known PVM programming system, whose main goal is to enable PVM applications to run on "cluster grids". However, for large-scale PVM applications to be able to efficiently run on such computational grids, ePVM needs to be provided with a parallel file system that enables the enormous volumes of data usually generated by such applications to be managed and distributed among multiple disks. this paper presents the optimized porting of the PIOUS parallel file system, called ePIOUS, under ePVM. the porting has been carried out taking into account the two-levels physical network topology characterizing the cluster grids normally built by ePVM. Furthermore, in order not to penalize the application performance, ePIOUS has been also provided with a file caching service that is able to speed up file accesses across clusters.
暂无评论