High-performance computing communities are increasingly adopting Neural Networks (NN) as surrogate models in their applications to generate scientific insights. Replacing an execution phase in the application with NN ...
详细信息
ISBN:
(纸本)9798400701559
High-performance computing communities are increasingly adopting Neural Networks (NN) as surrogate models in their applications to generate scientific insights. Replacing an execution phase in the application with NN models can bring significant performance improvement. However, there is a lack of tools that can help domain scientists automatically apply NN-based surrogate models to HPC applications. We introduce a framework, named Auto-HPCnet, to democratize the usage of NN-based surrogates. Auto-HPCnet is the first end-to-end framework that makes past proposals for the NN-based surrogate model practical and disciplined. Auto-HPCnet introduces a workflow to address unique challenges when applying the approximation, such as feature acquisition and meeting the application-specific constraint on the quality of final computation outcome. We show that Auto-HPCnet can leverage NN for a set of HPC applications and achieve 5.50x speedup on average (up to 16.8x speedup and with data preparation cost included) while meeting the application-specific constraint on the final computation quality.
In order to deal with the threats of faults and cyber attacks on automated electrical systems in complex industrial environments, this paper aims to design and implement a comprehensive early warning system. Through f...
详细信息
The Transformer model, which has significantly advanced natural language processing and computer vision, overcomes the limitations of recurrent neural networks and convolutional neural networks. However, it faces chal...
详细信息
At present, the "source-load interaction" distribution network operation mode has gradually replaced the "source-load operation" mode. The uncertainty and volatility of the distribution system have...
详细信息
Serverless computing has been favored by users and infrastructure providers from various industries, including online services and scientific computing. Users enjoy its auto-scaling and ease-of-management, and provide...
详细信息
ISBN:
(纸本)9798400701559
Serverless computing has been favored by users and infrastructure providers from various industries, including online services and scientific computing. Users enjoy its auto-scaling and ease-of-management, and providers own more control to optimize their service. However, existing serverless platforms still require users to pre-define resource allocations for their functions, leading to frequent misconfiguration by inexperienced users in practice. Besides, functions' varying input data further escalate the gap between their dynamic resource demands and static allocations, leaving functions either over-provisioned or under-provisioned. This paper presents Libra, a safe and timely resource harvesting framework for multi-node serverless clusters. Libra makes precise harvesting decisions to accelerate function invocations with harvested resources and jointly improve resource utilization by profiling dynamic resource demands and availability proactively. Experiments on OpenWhisk clusters with real-world workloads show that Libra reduces response latency by 39% and achieves 3x resource utilization compared to state-of-the-art solutions.
In the era of big data, efficiently processing and retrieving insights from unstructured data presents a critical challenge. This paper introduces a scalable leader-worker distributed data pipeline designed to handle ...
详细信息
Image processing algorithm has important application value in 3D real-time rendering of power grid. By reasonable selection and application of image processing algorithm, the effect and performance of 3D visualization...
详细信息
Edge computing emerges as a stable and efficient solution for IoT data processing and analytics. With big data distributed engines to be deployed on edge infrastructures, users seek solutions to evaluate the performan...
详细信息
ISBN:
(纸本)9783031396977;9783031396984
Edge computing emerges as a stable and efficient solution for IoT data processing and analytics. With big data distributed engines to be deployed on edge infrastructures, users seek solutions to evaluate the performance of their analytics queries. In this paper, we introduce SparkEdgeEmu, an interactive framework designed for researchers and practitioners who need to inspect the performance of Spark analytic jobs without the edge topology setup burden. SparkEdgeEmu provides: (i) parameterizable template-based use cases for edge infrastructures, (ii) real-time emulated environments serving ready-to-use Spark clusters, (iii) a unified and interactive programming interface for the framework's execution and query submission, and (vi) utilization metrics from the underlying emulated topology as well as performance and quantitative metrics from the deployed queries. We evaluate the usability of our framework in a smart city use case and extract useful performance hints for the Apache Spark code execution.
Docker uses software isolation mechanism while sharing the operating system kernel with the host, which results in insufficient isolation between containers and hosts. Attackers can affect the stable operation of host...
详细信息
ISBN:
(纸本)9798350331547
Docker uses software isolation mechanism while sharing the operating system kernel with the host, which results in insufficient isolation between containers and hosts. Attackers can affect the stable operation of hosts and other containers by attacking containers, causing container escape issues. In this paper, we design a security hardening scheme for docker containers. By detecting the vulnerabilities in container images, it avoids malicious vulnerabilities and performs image measurement to ensure that the images before the container is started has not been tampered. Through the container integrity measurement module, the process of measuring the code segment, data segment, and the shared library of the container ensures that the contents of these areas will not be tampered during the containers operation. Further, it reduces the attacking surface by setting the system whitelist for the container process and restricting the interaction between the container and the external network. This improves the container safety and reliability.
As nonrenewable fuels deplete;most of the businesses are transitioning to renewable energy. Solar energy is a abundant in nature and is a reliable source of renewable energy. In today's photovoltaic systems, multi...
详细信息
暂无评论