From multiprocessor scale-up to cache sizes to the number of reorder-buffer entries, microarchitects wish to reap the benefits of more computing resources while staying within power and latency bounds. this tension is...
详细信息
ISBN:
(纸本)1595937064
From multiprocessor scale-up to cache sizes to the number of reorder-buffer entries, microarchitects wish to reap the benefits of more computing resources while staying within power and latency bounds. this tension is quite evident in schedulers, which need to be large and single-cycle for maximum performance on out-of-order cores. In this work we present two straightforward modifications to a matrix scheduler implementation which greatly strengthen its scalability. Both are based on the simple observation that the wakeup and picker matrices are sparse, even at small sizes;thus small indirection tables can be used to greatly reduce their width and latency. this technique can be used to create quicker iso-performance schedulers (17-58% reduced critical path) or larger iso-timing schedulers (7-26% IPC increase). Importantly, the power and area requirements of the additional hardware are likely offset by the greatly reduced matrix sizes and subsuming the functionality of the power-hungry allocation CAMs. Copyright 2007 acm.
We present the architecture of a scalable and dynamic intermediary infrastructure for developing and deploying advanced Edge computing services, by using a cluster of heterogeneous machines. Our main goal is to addres...
详细信息
ISBN:
(纸本)9781581139648
We present the architecture of a scalable and dynamic intermediary infrastructure for developing and deploying advanced Edge computing services, by using a cluster of heterogeneous machines. Our main goal is to address the challenges of the next-generation Internet services: scalability, high availability, fault-tolerance and robustness. Moreover, SEcS offers an easy, "on-the-fly" and per-user configuration of services. the architecture is based on IBM's Web Based Intermediaries (WBI) [8, 9]. Copyright 2005 acm.
the proceedings contain 317 papers. the topics discussed include: experimenting with a real-size Man-Hill to optimize Pedagogical paths;an agent model for fault-tolerant systems;reliability analysis of mobile agent-ba...
详细信息
the proceedings contain 317 papers. the topics discussed include: experimenting with a real-size Man-Hill to optimize Pedagogical paths;an agent model for fault-tolerant systems;reliability analysis of mobile agent-based systems;an approximation algorithm for haplotype inference by maximum parsimony;tree-based clustering for gene expression data;multilure active contours;sequence modeling for sentence classification in a legal summarisation system;estimating manifold dimension by inversion error;a comparison on information fusion methods for air target identification;cleaning microarray expression data using Markov random fields based on profile similarity;and the intensity level reduction in radiation therapy.
the proceedings contain 317 papers. the topics discussed include: experimenting with a real-size Man-Hill to optimize Pedagogical paths;an agent model for fault-tolerant systems;reliability analysis of mobile agent-ba...
详细信息
the proceedings contain 317 papers. the topics discussed include: experimenting with a real-size Man-Hill to optimize Pedagogical paths;an agent model for fault-tolerant systems;reliability analysis of mobile agent-based systems;an approximation algorithm for haplotype inference by maximum parsimony;tree-based clustering for gene expression data;multilure active contours;sequence modeling for sentence classification in a legal summarisation system;estimating manifold dimension by inversion error;a comparison on information fusion methods for air target identification;cleaning microarray expression data using Markov random fields based on profile similarity;and the intensity level reduction in radiation therapy.
In this paper we describe a serializer component completely realized in .NET managed code, able to run on a stripped versions of the .NET platform (e.g., COMPACT FRAMEWORK) and still generic enough to be used on .NET ...
详细信息
ISBN:
(纸本)9781581139648
In this paper we describe a serializer component completely realized in .NET managed code, able to run on a stripped versions of the .NET platform (e.g., COMPACT FRAMEWORK) and still generic enough to be used on .NET or other CLI compatible frameworks. Such a component is not normally provided with stock libraries in their compact version, since its implementation is quite tricky when relying on reduced reflection services. However, this component makes easier the development of distributed applications involving mobile devices and desktop computers or mainframes. Our implementation faced several problems ranging from lack of features in the base classes to the interframework portability problem, since the same object could have different implementation. the resulting product shows satisfactory performance figures and has a modular and flexible architecture. Copyright 2005 acm.
It is well understood that a conflict between functionality and confidentiality exists within the context of medical research databases: while patients' rights must be preserved, restricting access to data can red...
详细信息
ISBN:
(纸本)9781581139648
It is well understood that a conflict between functionality and confidentiality exists within the context of medical research databases: while patients' rights must be preserved, restricting access to data can reduce the value of the data that is available to the researcher. As such, limiting access so that confidentiality is preserved without reducing functionality more than is necessary should be a key aim of every designer of medical research databases. In this paper we investigate the application of query modification for the protection of sensitive patient data with a view to preserving functionality as much as possible. the work has been conducted within the context of the e-DiaMoND research project. Copyright 2005 acm.
Finding the appropriate location of adaptation points for computation migration/checkpointing is critical since the distance between two consecutive adaptation points determines the migration/checkpointing scheme'...
详细信息
ISBN:
(纸本)9781581139648
Finding the appropriate location of adaptation points for computation migration/checkpointing is critical since the distance between two consecutive adaptation points determines the migration/checkpointing scheme's sensitivity and overheads. this paper proposes a heuristic adaptation point placement algorithm to improve the computation migration/checkpointing schemes' performance in terms of sensitivity and flexibility. this heuristic algorithm enables automatic and transparent insertion of checkpoints in user's source code. Copyright 2005 acm.
In this paper we propose an algorithm for estimating the reliability of mobile agent systems, based on the conditions of the underlying computer network. We use the concept of restricted random walks in graph theory f...
详细信息
ISBN:
(纸本)9781581139648
In this paper we propose an algorithm for estimating the reliability of mobile agent systems, based on the conditions of the underlying computer network. We use the concept of restricted random walks in graph theory for generating a random static route strategy for mobile agents. the complexity of the mobile agent networks makes it hard to obtain the reliability of the system theoretically;instead we estimate it using the Monte Carlo approach. We assume that the system consists of a number of independent agents operating simultaneously. the results we have achieved demonstrate the robustness of the proposed algorithm, j Copyright 2005 acm.
In this paper, we propose a multi-agent approach for solving a class of optimization problems involving expensive resources, where monolithic local search schemes perform miserably. More specifically, we study the cla...
详细信息
ISBN:
(纸本)9781581139648
In this paper, we propose a multi-agent approach for solving a class of optimization problems involving expensive resources, where monolithic local search schemes perform miserably. More specifically, we study the class of bin-packing problems. Under our proposed Fine-Grained Agent System scheme, rational agents work both collaboratively and selfishly based on local search and mimic physics-motivated systems. We apply our approach to a generalization of bin-packing - the Inventory Routing Problem with Time Windows - which is an important logistics problem, and demonstrate the efficiency and effectiveness of our approach. Copyright 2005 acm.
We compared the performance of Bayes theory, Fuzzy Set theory, Heuristic method and Dempster-Shafer theory in the identification of aircrafts by using the information from different sensors. From the results of the si...
详细信息
ISBN:
(纸本)9781581139648
We compared the performance of Bayes theory, Fuzzy Set theory, Heuristic method and Dempster-Shafer theory in the identification of aircrafts by using the information from different sensors. From the results of the simulation, the Fuzzy method produces the best result. the final identification could be improved if specific features of each type of aircraft are available. To get more accurate object identification, the results from each method can be combined withthe best assignment of values for each method. Copyright 2005 acm.
暂无评论