While clusters of commodity servers and switches are the most popular form of large-scale parallel computers, many programs are not easily parallelized for execution upon them. In particular, high inter-node communica...
详细信息
JiST/SWANS is a wireless network simulator gaining increasing popularity for ad-hoc wireless, wireless sensor network, and vehicular network evaluations. Typical published results using this tool show node counts on t...
详细信息
software Transactional Memories (STMs) are emerging as a highly attractive programming model, thanks to their ability to mask concurrency management issues to the overlying applications. In this paper we are intereste...
详细信息
ISBN:
(纸本)9781424465330
software Transactional Memories (STMs) are emerging as a highly attractive programming model, thanks to their ability to mask concurrency management issues to the overlying applications. In this paper we are interested in dependability of STM systems via replication. In particular we present an extensive simulation study aimed at assessing the efficiency of some recently proposed database-oriented replication schemes, when employed in the context of STM systems. Our results point out the limited efficiency and scalability of these schemes, highlighting the need for redesigning ad-hoc solutions well fitting the requirements of STM environments. Possible directions for the re-design process are also discussed and supported by some early quantitative data.
software architecture design plays a crucial role for both the software and business success. Most of the existing methods conduct software architecture design driven by the key software requirements, facing the chall...
详细信息
ISBN:
(纸本)9781424474226;9780769540887
software architecture design plays a crucial role for both the software and business success. Most of the existing methods conduct software architecture design driven by the key software requirements, facing the challenges of creating architectures from scratch and aligning with the high-level business goals. In this paper we propose the BASAD (Business And software Architecture co-Design) method to facilitate alleviating the difficulty of software architecture design and achieving the high-level business goals. The method addresses the business and software architecture design in an integrated process from a systemsengineering perspective, leveraging the SysML and UML modeling languages and the automated model transformation from the business architectures to the software architectures, so that provide pragmatic support for the architecture co-design.
Document clustering plays an important role in data mining systems. Recently, a flocking-based document clustering algorithm has been proposed to solve the problem through simulation resembling the flocking behavior o...
详细信息
Tomography imaging of industrial subjects requires compliance with a particular environment. This results in severe limitations on the access and the deployable hardware resources, defining the situation of imaging by...
详细信息
As the quantity and breadth of Web-based softwaresystems continue to grow rapidly, it is becoming critical to assure the quality and reliability of a Web application. Web application testing is a challenging work owi...
详细信息
We describe an approach to parallel graph partitioning that scales to hundreds of processors and produces a high solution quality. For example, for many instances from Walshaw's benchmark collection we improve the...
详细信息
ISBN:
(纸本)9781424464425
We describe an approach to parallel graph partitioning that scales to hundreds of processors and produces a high solution quality. For example, for many instances from Walshaw's benchmark collection we improve the best known partitioning. We use the well known framework of multi-level graph partitioning. All components are implemented by scalable parallel algorithms. Quality improvements compared to previous systems are due to better prioritization of edges to be contracted, better approximation algorithms for identifying matchings, better local search heuristics, and perhaps most notably, a parallelization of the FM local search algorithm that works more locally than previous approaches.
Hypervisor-based fault tolerance (HBFT), a checkpoint-recovery mechanism, is an emerging approach to sustaining mission-critical applications. Based on virtualization technology, HBFT provides an economic and transpar...
详细信息
ISBN:
(纸本)9781424464425
Hypervisor-based fault tolerance (HBFT), a checkpoint-recovery mechanism, is an emerging approach to sustaining mission-critical applications. Based on virtualization technology, HBFT provides an economic and transparent solution. However, the advantages currently come at the cost of substantial overhead during failure-free, especially for memory intensive applications. This paper presents an in-depth examination of HBFT and options to improve its performance. Based on the behavior of memory accesses among checkpointing epochs, we introduce two optimizations, read fault reduction and write fault prediction, for the memory tracking mechanism. These two optimizations improve the mechanism by 31.1% and 21.4% respectively for some application. Then, we present software-superpage which efficiently maps large memory regions between virtual machines (VM). By the above optimizations, HBFT is improved by a factor of 1.4 to 2.2 and it achieves a performance which is about 60% of that of the native VM.
暂无评论