We study the problem of parallel stream computations on a multiprocessor architecture. Modelling the problem, we exhibit that any parallelisation introduces an arithmetic overhead related to intermediate copy operatio...
详细信息
ISBN:
(纸本)9780769530895
We study the problem of parallel stream computations on a multiprocessor architecture. Modelling the problem, we exhibit that any parallelisation introduces an arithmetic overhead related to intermediate copy operations. We provide lower bounds for the parallel stream computation on p processors of different speeds with two models, a strict model and a buffered model;to our knowledge, these are new results. We introduce a new parallel algorithm called processor-oblivious: it is based on the coupling of a fast sequential algorithm with a fine-grain parallel one that is scheduled by work-stealing. This algorithm is proved asymptotically optimal. We show that our algorithm has a good experimental behaviour.
This paper presents a framework to easily build and execute parallel applications in container-baseddistributed computing platforms in a user transparent way. The proposed framework is a combination of the COMP Super...
详细信息
ISBN:
(纸本)9781509060580
This paper presents a framework to easily build and execute parallel applications in container-baseddistributed computing platforms in a user transparent way. The proposed framework is a combination of the COMP Superscalar and Docker. We have built a prototype in order to evaluate how it performs by evaluating the overhead in the building, deployment and execution phases. We have observed an important gain compared with cloud environments during the building and deployment phases. In contrast, we have detected an extra overhead during the execution, which is mainly due to the multi-host Docker networking.
This paper proposes an e-document workflow system called "WorkTrue" that supports secure, fine-grained access control and multiple digital signings for e-document workflow management implemented on cloud. We...
详细信息
ISBN:
(纸本)9781665414555
This paper proposes an e-document workflow system called "WorkTrue" that supports secure, fine-grained access control and multiple digital signings for e-document workflow management implemented on cloud. We apply a ciphertext policy attribute-based encryption (CP-ABE) to enable the access control with data privacy-preserving for all signed documents stored in the cloud server. In addition, we present a dynamic workflow scheduling algorithm to dynamically schedule the workflow tasks to be run by VM instances (VMIs) from a single VM in a cloud. In our experiment, we developed a WorkTrue prototype as a proof of concept for validating its functionality. We also conducted performance evaluation to substantiate that our WorkTrue is efficient in practice.
In this paper, we propose a novel mapping algorithm for providing Quality of Service (QoS) under bandwidth constraints in 3D network-on-Chip (NoC). The QoS is warranted in such a way that all minimum feasible paths co...
详细信息
ISBN:
(纸本)9780769549392;9781467353212
In this paper, we propose a novel mapping algorithm for providing Quality of Service (QoS) under bandwidth constraints in 3D network-on-Chip (NoC). The QoS is warranted in such a way that all minimum feasible paths considering the required and available bandwidth are explored by the mapping algorithm. The maximum required bandwidth on the network links for this mapping algorithm is compared with other methods such as NMAP, Onyx and Citrine while applied on two video processing applications i.e. VOPD (Video Object Plane Decoder) and MPEG-4. The available bandwidth of vertical and horizontal links are considered the same and different in the experimental results.
NoC technology is composed of switched-based interconnections, where the communication resources are shared. Therefore, the optimal resource utilization is a crucial consideration for the efficient architecture design...
详细信息
ISBN:
(纸本)9780769549392;9781467353212
NoC technology is composed of switched-based interconnections, where the communication resources are shared. Therefore, the optimal resource utilization is a crucial consideration for the efficient architecture designs. Application mapping and scheduling are important optimization problems. This paper studies the practicality of the Constraint Programming (CP) models on NoC architecture designs that effectively use a regular mesh with wormhole switching and the XY routing. The complexity of the CP models is compared to the earlier Mixed Integer Programming (MIP) models. Practical CP-based mapping and scheduling models are developed and the results are reported on the benchmark datasets. The results indicate that mapping and scheduling problems can be solved at near optimality even under relatively shorter run-time limits compared to those required by the MIP models.
Aggressive scaling of transistors allows integration of hundreds of processors on a chip. However, on-chip interconnects carrying signals between different blocks will be the bottleneck for system performance and reli...
详细信息
ISBN:
(纸本)9780769543284
Aggressive scaling of transistors allows integration of hundreds of processors on a chip. However, on-chip interconnects carrying signals between different blocks will be the bottleneck for system performance and reliability. To tackle this problem, we developed an on-chip communication infrastructure based on a network-on-chip architecture and developed a hybrid mechanism to transfer data among IP cores by taking advantages of both wired and wireless communications. By using on-chip antennas, one can provide on-chip wireless communication to transfer data across long distances and minimize transfer latency and energy dissipation accordingly. A wireless network-on-chip architecture was designed and evaluated, and the experimental results showed significant improvement in transfer latency, network throughput and energy dissipation.
Future many-cores will accommodate a high number of cores, but the tera-scale transistors increases the failure rates in cores and interconnection networks of such chips. Message-based fault detection techniques have ...
详细信息
ISBN:
(纸本)9780769549392;9781467353212
Future many-cores will accommodate a high number of cores, but the tera-scale transistors increases the failure rates in cores and interconnection networks of such chips. Message-based fault detection techniques have been developed to mitigate the influence of faults to the system. In this paper, we investigate the message overhead for fault detection monitoring with decentralized Fault Detection Units in a unified 2D-mesh and assess the resulting delays of application messages. We investigate routing algorithms for different message types and demonstrate 19% reduction of the impact of fault detection messages on application messages. We also show the limitations of prioritized fault detection messages for different application message packet injection rates.
Overlay networks represent a flexible approach for distributed services deployed across different administrative domains to group according to a given criteria without modification of the underlying network. Two key f...
详细信息
ISBN:
(纸本)9780769530895
Overlay networks represent a flexible approach for distributed services deployed across different administrative domains to group according to a given criteria without modification of the underlying network. Two key features for such overlays to be effective and useful are security and dynamicity. This paper introduces a proposal for the elements (i.e., architecture, protocols, and formal information models) needed to dynamically deploy secure overlay networks in certain multi-domain scenarios.
High-volume data streams are straining the limits of stream processing frameworks which need advanced parallelprocessing capabilities to withstand the actual incoming bandwidth. parallelprocessing must be synergical...
详细信息
ISBN:
(纸本)9781509060580
High-volume data streams are straining the limits of stream processing frameworks which need advanced parallelprocessing capabilities to withstand the actual incoming bandwidth. parallelprocessing must be synergically integrated with elastic features in order dynamically scale the amount of utilized resources by accomplishing the Quality of Service goals in a cost-effective manner. This paper proposes a control-theoretic strategy to drive the elastic behavior of latency-sensitive streaming operators in distributed environments. The strategy takes scaling decisions in advance by relying on a predictive model-based approach. Our ideas have been experimentally evaluated on a cluster using a real-world streaming application fed by synthetic and real datasets. The results show that our approach takes the strictly necessary reconfigurations while providing reduced resource consumption. Furthermore, it allows the operator to meet desired average latency requirements with a significant reduction in the experienced latency jitter.
The Personal network (PN) concept extends the Personal Area network (PAN) by including remote personal nodes, such as nodes at home or in the office. This extension is achieved through dynamic tunnels established betw...
详细信息
ISBN:
(纸本)9780769530895
The Personal network (PN) concept extends the Personal Area network (PAN) by including remote personal nodes, such as nodes at home or in the office. This extension is achieved through dynamic tunnels established between the remote PN entities. Scalability presents a major challenge for tunnel management in PNs due to their dynamic nature and the increasing number of simultaneously supported PNs. To reduce the PN management complexity, this paper proposes to use a peer-to-peer-based publish/subscribe naming (PPNS) system. The PPNS system enables an automated provisioning of the location information in the tunnel endpoints. A centralised management approach is proposed for the on-demand PN establishment and a distributed management approach is proposed for the always-on PN establishment.
暂无评论