We consider a heterogeneous computing environment that consists of a collection of machines and task types. The machines vary in capabilities and different task types are better suited to specific machine architecture...
详细信息
Modern high performance computing systems are being increasingly deployed in a hierarchical fashion with multi-core computing platforms forming the base of the hierarchy. These systems are usually comprised of multipl...
详细信息
software is created by people, with people and for people. These people work in varying environments. They have their particular backgrounds and act under different conditions. Thus understanding the human and social ...
详细信息
The dynamics of peer participation, or churn, is critical for design, implementation and evaluation of Peer-to-peer (P2P) systems. The metrics used to characterize the churn is distributions of the node session length...
详细信息
ISBN:
(纸本)9780769541105
The dynamics of peer participation, or churn, is critical for design, implementation and evaluation of Peer-to-peer (P2P) systems. The metrics used to characterize the churn is distributions of the node session lengths and arrival intervals. The prior studies setup the model by measuring the historical logs or records, and treat the churn as one whole black-box without understanding the inside of peer's population. We investigate churn in another point of view, and find that modeling it based on the global geographical distribution of peer nodes will result in a system which behave in the way compliant to the measurement taken by previous works. By this model, we do see some more future things than other models. We might expect or predict when and what nodes would return back, as well as when and what nodes would disappear at high possibility. So it is useful when designing a system optimized both to the pass and the future, which could reduce the overhead of the maintenance of underlying overlay network of DHTs and lower the redundant level of replications for P2P storage system.
The proceedings contain 11 papers. The topics discussed include: an architectural framework for analyzing tradeoffs between software security and performance;architectural design decisions for achieving reliable softw...
ISBN:
(纸本)3642135552
The proceedings contain 11 papers. The topics discussed include: an architectural framework for analyzing tradeoffs between software security and performance;architectural design decisions for achieving reliable softwaresystems;integrating fault-tolerant techniques into the design of critical systems;component behavior synthesis for critical systems;a road to a formally verified general-purpose operating system;engineering a distributed e-voting system architecture: meeting critical requirements;testing fault robustness of model predictive control algorithms;towards net-centric cyber survivability for ballistic missile defense;a safety case approach to assuring configurable architectures of safety-critical product lines;increasing the resilience of critical SCADA systems using peer-to-peer overlays;and ISO/DIS 26262 in the context of electric and electronic architecture modeling.
Rejuvenation is a technique expected to mitigate failures in HPC systems by replacing, repairing, or resetting system components. Because of the small overhead required by software rejuvenation, we primarily focus on ...
详细信息
Rejuvenation is a technique expected to mitigate failures in HPC systems by replacing, repairing, or resetting system components. Because of the small overhead required by software rejuvenation, we primarily focus on OS/kernel rejuvenation. In this paper, we propose three rejuvenation scheduling techniques. Moreover, we investigate the claim that software rejuvenation prolongs failure times in HPC systems. Also, we compare the lost computing times of the checkpoint/restart mechanism with and without rejuvenation after each checkpoint.
Performance problems, which can stem from different system components, such as network, memory, and storage devices, are difficult to diagnose and isolate in a cluster file system. In this paper, we present an online ...
详细信息
The pervasive use of Peer-to-Peer (P2P) systems and the growing demand on personalization for consumers has made future business focus on the niche market instead of the mass market. The recommender system, which is a...
详细信息
Driven by the increasing demand for large-scale and high-performance data protection, disk-based de-duplication storage has become a new research focus of the storage industry and research community where several new ...
详细信息
This paper presents an in-depth analysis of the behavior of a SCA component-based waveform application in terms of "inter-component" communication latency. The main limitation with SCA, in the context of emb...
详细信息
暂无评论