Model Based systemsengineering (MBSE) in a distributed environment using virtual teams presents many challenges. This paper will discuss the development projects for creating specifications for a Unified Profile for ...
详细信息
The Red Storm architecture, which was conceived by Sandia National Laboratories and implemented by Cray, Inc., has become the basis for most successful line of commercial supercomputers in history. The success of the ...
详细信息
The Red Storm architecture, which was conceived by Sandia National Laboratories and implemented by Cray, Inc., has become the basis for most successful line of commercial supercomputers in history. The success of the Red Storm architecture is due largely to the ability to effectively and efficiently solve a wide range of science and engineering problems. The Cray XT series of machines that embody the Red Storm architecture have allowed for unprecedented scaling and performance of parallel applications spanning many areas of scientific computing. This paper describes the fundamental characteristics of the architecture and its implementation that have enabled this success, even through successive generations of hardware and software.
The Coarse-Grained Monte Carlo (CGMC) method is a multi-scale stochastic mathematical and simulation framework for spatially distributedsystems. CGMC simulations are important tools for studying phenomena such as cat...
详细信息
The proceedings contain 64 papers. The topics discussed include: dynamic policy-driven quality of service in service-oriented systems;a scheme for reliable real-time messaging with bounded delays;energy-saving mechani...
ISBN:
(纸本)9780769540382
The proceedings contain 64 papers. The topics discussed include: dynamic policy-driven quality of service in service-oriented systems;a scheme for reliable real-time messaging with bounded delays;energy-saving mechanisms in the time-triggered architecture;model-based programming of modular robots;design and performance evaluation of binary code packing for protecting embedded software against reverse engineering;architectural and behavioral modeling with AADL for fault tolerant embedded systems;model-driven development of a web service-oriented architecture and security policies;real-time-component based software architecture for QoS-adaptive networked multimedia applications;flexible resource management for self-x systems: an evaluation;real-time distribution of time-dependant tasks in heterogeneous environments;towards a framework for self-adaptive reliable network services in highly-uncertain environments;and policy-based reprogramming for wireless sensor networks.
Hardware/software (HW/SW) co-design has become an important issue for system design, and simulation environments have been utilized widely to shorten the development cycle. However, traditional hardware description la...
详细信息
The automatic allocation of enterprise workload to resources can be enhanced by being able to make 'whatif' response time predictions, whilst different allocations are being considered. It is important to quan...
详细信息
作者:
Kang, YanYunnan Univ
Sch Software Dept Software Engn Kunming 650091 Yunnan Peoples R China
Optimal scheduling of parallel tasks with some precedence is critical for achieving high performance in heterogeneous computing system. The application scheduling is known to be NP-complete in general cases. The compl...
详细信息
ISBN:
(纸本)9781424464968
Optimal scheduling of parallel tasks with some precedence is critical for achieving high performance in heterogeneous computing system. The application scheduling is known to be NP-complete in general cases. The complexity of the problem increase when task scheduling is to be done in a heterogeneous environment, where the processors in the network may not be identical and take different amounts of time to execute the same task. This paper presents a task scheduling algorithm for the tasks run on the network of Heterogeneous systems and represented by Directed Acyclic Graphs (DAGs). The algorithm first assigns the tasks on processors and orders their execution so that task precedence requirements are satisfied. Then it shortens overall completion time by inserting the task into the slack that is created by delaying some tasks without exceeding the current completion time. The performance of the algorithm is illustrated by comparing the scheduling length ratio, frequency of best results with the existing effectively scheduling algorithms, Heterogeneous Earliest Finish Time and Iterative List Scheduling algorithm.
One among the most influential and popular data mining methods is the k-Means algorithm for cluster analysis. Techniques for improving the efficiency of k-Means have been largely explored in two main directions. The a...
详细信息
Network Virtualization has recently emerged to provide scalable, customized and on-demand virtual network services over a shared substrate network. How to provide VN services with resiliency guarantees against network...
详细信息
The number of failures occurring in large-scale high performance computing (HPC) systems is significantly increasing due to the large number of physical components found on the system. Fault tolerance (FT) mechanisms ...
详细信息
暂无评论