the proceedings contain 112 papers. the topics discussed include: a decentralized and cooperative workflow scheduling algorithm;bi-criteria scheduling of scientific workflows for the grid;joint communication and compu...
详细信息
ISBN:
(纸本)9780769531564
the proceedings contain 112 papers. the topics discussed include: a decentralized and cooperative workflow scheduling algorithm;bi-criteria scheduling of scientific workflows for the grid;joint communication and computation task scheduling in grids;benefits of job exchange between autonomous sites in decentralized computational grids;anonymity scheme for interactive P2P services;a hybrid P2P overlay network for non-strictly hierarchically categorized contents;Pastel: bridging the gap between structured and large-state overlays;HyperBone: a scalable overlay network based on a virtual hypercube;a FPGA optimization tool based on a multi-island genetic algorithm distributed over grid environments;WSRF-based modeling of clinical trial information for collaborative cancer research;and gridMate: a portable simulation environment for large-scale adaptive scientific applications.
Replication is a key technique for improving fault tolerance but can introduce considerable performance overhead under some circumstances. To explore the tradeoff between performance and failure resilience, we develop...
详细信息
ISBN:
(纸本)9781424442379
Replication is a key technique for improving fault tolerance but can introduce considerable performance overhead under some circumstances. To explore the tradeoff between performance and failure resilience, we develop a calculus that takes into consideration the I/O characteristics of applications and failure behavior of distributed storage nodes. Withthe developed evaluation model, we then prescribe a file system replication strategy that maximizes the utilization of computational resources for long-running and compute-intensive grid applications.
We propose a novel scheme that uses Trusted computing technology to secure grid workflows. this scheme allows the selection of trustworthy resource providers based on their platform states. the integrity and confident...
详细信息
ISBN:
(纸本)9781424442379
We propose a novel scheme that uses Trusted computing technology to secure grid workflows. this scheme allows the selection of trustworthy resource providers based on their platform states. the integrity and confidentiality of workflow jobs are provided using cryptographic keys that can only be accessed when resource provider platforms are in trustworthy states. In addition, platform attestation is used to detect potential workflow execution problems,and the information collected can be used for process provenance.
Fault tolerance is one of the key issues for large scale applications executed on high performance computing systems. In a cluster federation, clusters are gathered to provide huge computing power. To work efficiently...
详细信息
ISBN:
(纸本)9781424442379
Fault tolerance is one of the key issues for large scale applications executed on high performance computing systems. In a cluster federation, clusters are gathered to provide huge computing power. To work efficiently on such systems, networks characteristics have to be taken into account: the latency between two nodes of different clusters is much higher than the latency between two nodes of the same cluster. In this paper, we present O2P-CF a message logging protocol well-suited to provide fault tolerance for message passing applications executed on cluster federations. O2P-CF is based on the combination of O2P, an extremely optimistic message logging protocol, with a pessimistic message logging protocol.
Scalability constitutes a key property of Peer-to-Peer overlay networks. Recent advances that improve scalability include super-peer infrastructures and network coordinates. As an integral part of an upcoming middlewa...
详细信息
ISBN:
(纸本)9781424442379
Scalability constitutes a key property of Peer-to-Peer overlay networks. Recent advances that improve scalability include super-peer infrastructures and network coordinates. As an integral part of an upcoming middleware for distributed computing, we have developed a mechanism that builds and maintains a super-peer overlay network in a decentralized, self-organized way, using network coordinates to facilitate inter-peer distance estimation. We discuss the benefits of super-peer infrastructures in the context of Desktop grids and present the outcome of experiments conducted on PlanetLab to observe the constructed topology's behavior in a practical environment.
Preventing the misuse of personally identifiable information and preserving user privacy are key issues in the management of IT services, especially when organizational borders are crossed. In this paper we first pres...
详细信息
ISBN:
(纸本)9781424442379
Preventing the misuse of personally identifiable information and preserving user privacy are key issues in the management of IT services, especially when organizational borders are crossed. In this paper we first present an analysis of the differences between grid environments and previous models of inter-organizational collaboration. Based on requirements derived thereof we demonstrate how existing policy-based privacy management architectures can be extended to provide grid-specific functionality and can be integrated into existing infrastructures. Special emphasis is put on privacy policies which can be configured by users themselves, and distinguishing between the initial data access and the later data usage control phases. We also discuss the application of this approach to a XACML-based privacy management system.
Multi-agent based simulation (MABS) is a discrete event simulation technique used to study complex systems with entities having social and autonomous behavior. MABS applications are characterized by unpredictable exec...
详细信息
ISBN:
(纸本)9781424442379
Multi-agent based simulation (MABS) is a discrete event simulation technique used to study complex systems with entities having social and autonomous behavior. MABS applications are characterized by unpredictable execution behavior and high communication-to-computation ratio. In this paper, we propose an adaptation strategy to support efficient execution of large-scale MABS applications on typical grid infrastructures. To achieve this objective, the behavior of MABS applications and the execution environment is investigated, in order to constantly obtain performance prediction models. these models will then be used to realize dynamic load balancing and resource allocation schemes. We discuss our basic approach, initial experimental results, the planned future research and an application of our research in the transportation and logistics simulation domain.
Resource information systems are a key component of Computational grids. Centralized information systems hamper scalability and reliability, and thus, completely distributed resource information systems, based on Dist...
详细信息
ISBN:
(纸本)9781424442379
Resource information systems are a key component of Computational grids. Centralized information systems hamper scalability and reliability, and thus, completely distributed resource information systems, based on Distributed Hash Tables have been proposed. In some cases resource distribution might be highly uneven, load balancing of data becomes thus a crucial problem. However, current load balancing schemes cannot handle large amounts of data corresponding to a single resource type. In this paper we propose therefore RESERV a distributed information system for grid applications with a novel load balancing approach, able to handle extreme load unbalance.
the introduction of economic principles in grid resource management provides an interesting avenue for efficiently addressing the problem of conflicting user requirements. In shared computing infrastructures such as g...
详细信息
ISBN:
(纸本)9781424442379
the introduction of economic principles in grid resource management provides an interesting avenue for efficiently addressing the problem of conflicting user requirements. In shared computing infrastructures such as grids, such conflicting requirements are prevalent and stem from the selfish actions users follow when formulating their service requests. We develop and analyze both a centralized and a decentralized algorithm for economic resource management in the context of consumer requests for CPU bound applications with deadline-based QoS requirements and non-migratable workloads. A comparison with an algorithm recently proposed in the literature is presented with a focus on performance in terms of realized consumer value. We establish that our algorithms perform well and that they compare favorably to existing approaches.
暂无评论