In this paper we present the thread migration mechanism of DSM-PEPE, a multithreaded distributed shared memory system. DSM systems like DSM-PEPE provide a parallel environment to harness the available computing power ...
详细信息
ISBN:
(纸本)9783540729044
In this paper we present the thread migration mechanism of DSM-PEPE, a multithreaded distributed shared memory system. DSM systems like DSM-PEPE provide a parallel environment to harness the available computing power of computer networks. DSM systems offer a virtual shared memory space on top of a distributed-memory multicomputer, featuring the scalability and low cost of a multicomputer, and the ease of programming of a shared-memory multiprocessor. DSM systems rely on data migration to make data available to running threads. The thread migration mechanism of DSM-PEPE was designed as an alternative to this data migration paradigm. Threads are allowed to migrate from one node to another, as needed by the computation. We show by experimentation the feasibility of the thread migration mechanism of DSM-PEPE as an alternative to improve application perfomance by enhancing spatial locality.
Peer selection is an important aspect in many P2P applications requiring efficient assignment and execution of jobs to peer nodes and search and file transfer, among others. Due to increasing interest of using P2P sys...
详细信息
The sectioned genetic algorithm (hereafter denoted as sectioned GA), which is presented in this paper, represents a modification of the standard GA and deals with large scale problems (i.e. problems involving pattern ...
详细信息
ISBN:
(纸本)9781424436491
The sectioned genetic algorithm (hereafter denoted as sectioned GA), which is presented in this paper, represents a modification of the standard GA and deals with large scale problems (i.e. problems involving pattern spaces with high dimensionalities). Instead of increasing the size of the population searching the pattern space when the problem dimensionality increases, the sectioned GA approach divides each individual into smaller parts (sections) and subsequently applies the genetic operators on each of these parts. Results from the application of sectioned GA on the problem of automatic morphological analysis are also presented in this article. Morphological analysis is by nature a large scale problem since a great number of words need to be segmented into stems and suffixes. The proposed system improves the segmentation accuracy substantially in comparison to standard GA algorithms.
A distributed map data parallel dissemination system, which can be used to distribute spatial map data to remote users through different networks, is presented. The paper first defines spatial map data, associated met...
详细信息
ISBN:
(纸本)9783540747833
A distributed map data parallel dissemination system, which can be used to distribute spatial map data to remote users through different networks, is presented. The paper first defines spatial map data, associated metadata and network resource nodes with graphic formalization definition. Then, the relations between map data and network resources are established. Based on formalized definition to the whole system, a map data dissemination framework and a series of essential distributed CORBA services, conditions input methods based on three querying conditions are presented. We also explore network map copyright validating in dissemination course, and present an improved adaptive watermarking algorithm for vector digital maps whose data is the most difficult and necessary to watermark. Different from other methods, we compare the watermarked map with the original watermarked map, not with the primitive map, before extraction. The results show that compared with Direct Copy, our dissemination system can delivery spatial map data effectively. The transfer performance of CORBA services mode is almost equal to Direct Copy. The system can approach the biggest transfer rate more quickly but dependents on data amount weakly. And, the improved watermarking algorithm has better robustness.
The proceedings contain 77 papers. The topics discussed include: parallelization and performance analysis of video feature extractions on multi-core based systems;towards optimized packet classification algorithms for...
详细信息
ISBN:
(纸本)076952933X
The proceedings contain 77 papers. The topics discussed include: parallelization and performance analysis of video feature extractions on multi-core based systems;towards optimized packet classification algorithms for multi-core network processors;loop-level speculative parallelism in embedded applications;integrating memory compression and decompression with coherence protocols in distributed shared memory multiprocessors;improving search using a fault-tolerant overlay in unstructured P2P systems;difficulty-aware hybrid search in peer-to-peer networks;ASAP: an advertisement-based search algorithm for unstructured peer-to-peer systems;Mercury: combining performance with dependability using self-virtualization;Flexfetch: a history-aware scheme for I/O energy saving in mobile computing;multi-layer event trace analysis for parallel I/O performance tuning;and efficient parallel algorithm for optimal three-sequences alignment.
We present a new set of distributed algorithms for scheduling sensors to enhance the total lifetime of a wireless sensor network. These algorithms are based on constructing minimal cover sets each consisting of one or...
详细信息
ISBN:
(纸本)9783540772194
We present a new set of distributed algorithms for scheduling sensors to enhance the total lifetime of a wireless sensor network. These algorithms are based on constructing minimal cover sets each consisting of one or more sensors which can collectively cover the local targets. Some of the covers are heuristically better than others for a sensor trying to decide its own sense-sleep status. This leads to various ways to assign priorities to the covers. The algorithms work by having each sensor transition through these possible prioritized cover sets, settling for the best cover it can negotiate with its neighbors. A local lifetime dependency graph consisting of the cover sets as nodes with any two nodes connected if the corresponding covers intersect captures the interdependencies among the covers. We present several variations of the basic algorithmic framework. The priority function of a cover is derived from its degree or connectedness in the dependency graph - usually lower the better. Lifetime improvement is 10% to 20% over the existing algorithms, while maintaining comparable communication overheads. We also show how previous algorithms can be formulated within our framework.
A scheme that defending against distributed denial of service (DDoS) attacks adopts the mechanism of Distribution-based Secure Overlay Nodes (DSON) to a large-scale ISP (Internet Service Provider) network is presented...
详细信息
ISBN:
(纸本)9783540747833
A scheme that defending against distributed denial of service (DDoS) attacks adopts the mechanism of Distribution-based Secure Overlay Nodes (DSON) to a large-scale ISP (Internet Service Provider) network is presented. The scheme uses local BPG announcement to divert traffic to the overlay network when experiencing high load, then filtering algorithm based on the technology of signal processing is applied to the diverted traffic. This algorithm detects and filters out DDoS attacks in frequency domain to allow targets to provide good service to legitimate traffic, with fast reaction and high energy ratio of legitimate to attacks traffic. DSON is implemented and installed on the monitor points of large-scale ISP network associated with the corresponding routers, edge router, border router, and core router, with no requirement for the modifying to network architecture, infrastructure, and protocol.
The successors of distributed-memory, massively-parallel processing (MPP) systems that are based on multi-core processor technologies and high-bandwidth communication networks are expected to deliver Petascale computi...
详细信息
The following topics are dealt with: multiprocessor architecture; grid and cluster computing; information retrieval and mining; overlay and network architecture; power-aware architecture; mobile computing; parallel an...
The following topics are dealt with: multiprocessor architecture; grid and cluster computing; information retrieval and mining; overlay and network architecture; power-aware architecture; mobile computing; parallel and distributed systems; security and trustworthy computing; wireless networks; resource scheduling; fault tolerance; peer-to-peer computing; wireless communication; parallel algorithms.
The following topics were dealt with: information assurance; cryptography and network security; component-based software engineering; software specification and architecture; software testing; requirements engineering...
The following topics were dealt with: information assurance; cryptography and network security; component-based software engineering; software specification and architecture; software testing; requirements engineering; user-centered design methods; embedded systems; operating systems; image, speech, and signal processing; data mining and knowledge discovery; Internet technology and applications; artificial intelligence; natural language processing; neural networks and genetic algorithms; parallel and distributedcomputing; voice-over-IP; communication systems and networks; mobile/wireless/ad-hoc networks; collaborative computing; algorithms; visual and multimedia computing; web-based applications; E-commerce and its applications.
暂无评论