The proceedings contain 32 papers. The topics discussed include: asymmetric distributed trust;building next-generation healthcare systems using distributed machine learning;autonomous distributed systems of myopic mob...
ISBN:
(纸本)9781450389334
The proceedings contain 32 papers. The topics discussed include: asymmetric distributed trust;building next-generation healthcare systems using distributed machine learning;autonomous distributed systems of myopic mobile robots with lights;secure conflict-free replicated data types;P4Fuzz: compiler fuzzer for dependable programmable dataplanes;gathering with a strong team in weakly byzantine environments;communication costs in a geometric communication network;certification of an exact worst-case self-stabilization time;arbitrary pattern formation on infinite regular tessellation graphs;optimal exclusive perpetual grid exploration by luminous myopic opaque robots with common chirality;and performance analysis of a distributed algorithm for admission control in wireless networks under the 2-Hop interference model.
Phylogenetic analysis has achieved extraordinary results in domains like species delimitation and evolutionary biology. An essential element behind this success has been the introduction of high performance computing ...
详细信息
ISBN:
(纸本)9781509044573
Phylogenetic analysis has achieved extraordinary results in domains like species delimitation and evolutionary biology. An essential element behind this success has been the introduction of high performance computing techniques in the step of estimating the phylogenetic likelihoods. This paper describes the design and implementation of a distributed and CPU-GPU based heterogeneous computing system on parallelizing the analysis. The parallelization has been implemented in the state-of-the-art version of MrBayes, a widespread phylogeny reconstruction program. We benchmarked the method and another two GPU-based methods by using 8 distributedcomputing nodes on Tianhe-1A. The experimental results indicate that the proposed method outstrips BEAGLE and the nMC(3) method by speedup factors of up to 1.98x and 1.68x, respectively. In comparison to the serially implemented MrBayes, a peak speedup of 188x is finally achieved by using 8 Tesla M 2050 GPUs. The proposed method is publicly available to facilitate further research on phylogenetic analysis.
In this paper, we argue that there is a need for an event-based middleware to build large-scale distributed systems. Existing publish/subscribe systems still have limitations compared to invocation-based middlewares. ...
详细信息
ISBN:
(纸本)0769515886
In this paper, we argue that there is a need for an event-based middleware to build large-scale distributed systems. Existing publish/subscribe systems still have limitations compared to invocation-based middlewares. We introduce Hermes, a novel event-based distributed middleware architecture that follows a type- and attribute-based publish/subscribe model. It centres around the notion of an event type and supports features commonly known from object-oriented languages like type hierarchies and super-type subscriptions. A scalable routing algorithm using an overlay routing network is presented that avoids global broadcasts by creating rendezvous nodes. Fault-tolerance mechanisms that can cope with different kinds of failures in the middleware are integrated with the routing algorithm resulting in a scalable and robust system.
Grid computing integrates abundant distributed resources into a single large-scale problem solving environment for parallel applications. However, the grid is a non-dedicated and dynamic computing environment. Grid ap...
详细信息
ISBN:
(纸本)9781424442331
Grid computing integrates abundant distributed resources into a single large-scale problem solving environment for parallel applications. However, the grid is a non-dedicated and dynamic computing environment. Grid applications consequently compete with each other for non-dedicated shared resources;moreover, shared resources are probably reclaimed by their owners according to administration policies, e.g. the scheduled maintenance. The job migration mechanisms which take the non-dedicated and dynamic natures of grids into consideration, therefore, become important for optimizing the application performance. The experiments of two job migration mechanisms, i.e. virtual machine migration and node reconfiguration by thread migration were presented in this study. We completed experiments on both LAN and WAN scenarios with a page-based grid-enabled DSM system, Teamster-G. The experimental results suggest the performance of virtual machine migration competes with node reconfiguration on equal terms;and further, they demonstrated the potential applications of virtual machine technique in the grid environment.
In many Internet scale replicated system, not all replicas can be dealt with in the same way, since some will be in greater demand than others. In the case of weak consistency algorithms, we have observed that updatin...
详细信息
ISBN:
(纸本)0769515886
In many Internet scale replicated system, not all replicas can be dealt with in the same way, since some will be in greater demand than others. In the case of weak consistency algorithms, we have observed that updating first replicas having most demand a greater number of clients would gain access to updated content in a shorter period of time. In this work we have investigated the benefits that can be obtained by prioritizing replicas with greater demand, and considerable improvements have been achieved. In zones of higher demand, the consistent state is reached zip to six times quicker than with a normal weak consistency algorithm, without incurring the additional costs of the strong consistency.
With the advent of DNA computing, some traditional scientific disciplines present new developing orientations. One of them is DNA-based cryptography, a new developing interdisciplinary area which combines cryptography...
详细信息
ISBN:
(纸本)9781509044573
With the advent of DNA computing, some traditional scientific disciplines present new developing orientations. One of them is DNA-based cryptography, a new developing interdisciplinary area which combines cryptography, mathematical modeling, biochemistry and molecular biology. There are some questions worth study that how to implement the arithmetic operations used in cryptosystem based on DNA computing. This paper proposes a DNA computing model to show how to calculate inversion over finite field GF(2(n)) with DNA self-assembly. 4567 types of computation tiles with 7 different functions assemble into the seed configuration with inputs to figure out the solution. The assembly time complexity is Theta(n(2)) and the space complexity is Theta(n(4)).
In the last few years the event-based paradigm has been largely studied and considered as a promising approach to develop the communication infrastructure of distributed systems. It is particularly interesting when ea...
详细信息
The proceedings contain 32 papers. The topics discussed include: secure conflict-free replicated data types;P4Fuzz: compiler fuzzer for dependable programmable dataplanes;gathering with a strong team in weakly byzanti...
ISBN:
(纸本)9781450389334
The proceedings contain 32 papers. The topics discussed include: secure conflict-free replicated data types;P4Fuzz: compiler fuzzer for dependable programmable dataplanes;gathering with a strong team in weakly byzantine environments;communication costs in a geometric communication network;certification of an exact worst-case self-stabilization time;arbitrary pattern formation on infinite regular tessellation graphs;optimal exclusive perpetual grid exploration by luminous myopic opaque robots with common chirality;bio-inspired energy distribution for programmable matter;performance analysis of a distributed algorithm for admission control in wireless networks under the 2-hop interference model;and node classification and geographical analysis of the lightning cryptocurrency network.
The publish/subscribe communication model is increasingly considered for implementing middleware infrastructures for widely distributed applications. Scalability issues and routing algorithms of such systems have rece...
详细信息
ISBN:
(纸本)0769515886
The publish/subscribe communication model is increasingly considered for implementing middleware infrastructures for widely distributed applications. Scalability issues and routing algorithms of such systems have recently been the focus of intensive research. So far little attention has been given to security and management issues. In current publish/subscribe systems, malicious publishers can very easily insert bogus notifications which may propagated to a large number of subscribers. Moreover, there is no method to control what notifications the subscribers are authorized to receive. We describe a method to specify access control policy rules using expressions similar to subscription expressions. These policies define access rules for publish and subscribe functions and screening rules for notifications.
We consider the following forms of mobile interactions: client/server interactions, whereby the request of a client triggers the execution of a unit of code in a server and returns the results to the client;remote eva...
详细信息
暂无评论