The P-RECS workshop focuses heavily on practical, actionable aspects of reproducibility in broad areas of computational science and data exploration, with special emphasis on issues in which community collaboration ca...
详细信息
The proceedings contain 32 papers. The topics discussed include: DAOS: data access-aware operating system;FPVM: towards a floating point virtual machine;lifting and dropping VMs to dynamically transition between time-...
ISBN:
(纸本)9781450391993
The proceedings contain 32 papers. The topics discussed include: DAOS: data access-aware operating system;FPVM: towards a floating point virtual machine;lifting and dropping VMs to dynamically transition between time- and space-sharing for large-scale HPC systems;access patterns and performance behaviors of multi-layer supercomputer I/O subsystems under production load;capri: compiler and architecture support for whole-system persistence;understanding memory failures on a petascale arm system;SchedInspector: a batch job scheduling inspector using reinforcement learning;Holmes: SMT interference diagnosis and CPU scheduling for job co-location;TLPGNN: a lightweight two-level parallelism paradigm for graph neural network computation on GPU;and TAC: optimizing error-bounded lossy compression for three-dimensional adaptive mesh refinement simulations.
With the ever-shrinking size of transistors and increasing scale of applications, silent data corruptions (SDCs) have become a common yet serious issue in HPC applications. Selective instruction duplication (SID) is a...
详细信息
ISBN:
(纸本)9781450392044
With the ever-shrinking size of transistors and increasing scale of applications, silent data corruptions (SDCs) have become a common yet serious issue in HPC applications. Selective instruction duplication (SID) is a popular fault-tolerance technique that can obtain a high SDC coverage with low-performance overhead, as it selects the most vulnerable parts of a program for protection with priority. However, existing studies of SID are confined to single program input in the evaluation, assuming that the error resilience of the program remains similar across inputs, leading to a drastic loss of SDC coverage from SID when the protected program runs different inputs. Hence, we proposed Sentinel, an automated compiler-based framework to mitigate the loss of SDC coverage. Evaluation results show that Sentinel can effectively mitigate the loss of SDC coverage (up to 97.00%) across multiple inputs, which significantly hardens existing SID techniques.
Maximal Independent Set (MIS) is one of the most fundamental problems in distributedcomputing, and it has been studied intensively for over four decades. This paper focuses on the MIS problem in the radio networks mo...
详细信息
ISBN:
(纸本)9798400718854
Maximal Independent Set (MIS) is one of the most fundamental problems in distributedcomputing, and it has been studied intensively for over four decades. This paper focuses on the MIS problem in the radio networks model, a standard model widely used to model wireless networks, particularly ad hoc wireless and sensor networks. Energy is a premium resource in these networks, which are typically battery-powered. Hence, designing distributed algorithms that use as little energy as possible is crucial. We use the well-established energy model where a node can be sleeping or awake in a round, and only the awake rounds (when it can send or listen) determine the energy complexity of the *** present the first energy-efficient MIS algorithms in radio networks with arbitrary and unknown graph topology. We present algorithms for two popular variants of the radio model - with collision detection (CD) and without collision detection (no-CD). Specifically, we obtain the following results:(1) CD model: We present a distributed MIS algorithm with O (log n) energy complexity (n is the network size). We also show a matching Ω (log n) lower bound for the energy complexity.(2) no-CD model: In the more challenging no-CD model, we present a distributed MIS algorithm with energy complexity O (log2 n log log n). The energy complexity of our algorithm is significantly lower than the round (and energy) complexity of O (log3 n) of the best-known distributed MIS algorithm of Davies [PODC 2023] for arbitrary graph topology.
Playground have simplified programming and wiring, enabling students to quickly engineer physical computing projects. But enabling students to rapidly design and build is a double-edged sword: Students can create func...
详细信息
Adversarial Thinking (AT) is essential in cybersecurity, fostering strategic problem-solving by anticipating worst-case scenarios. However, its integration into early computing education, especially in the first two y...
详细信息
Edge computing (EC) has been promising in providing support for Deep Neural Network (DNN) applications in IoT environments. However, resources in each edge are limited as response time increases. To reduce the latency...
详细信息
ISBN:
(纸本)9781450391658
Edge computing (EC) has been promising in providing support for Deep Neural Network (DNN) applications in IoT environments. However, resources in each edge are limited as response time increases. To reduce the latency, we propose to distribute the computation of multiple DNN models to nearby IoT devices. In particular, we propose a piece-wise multilevel partitioning and scheduling algorithm to improve the completion time of DNN inference.
Recently, Balliu, Brandt, and Olivetti [FOCS '20] showed the first omega(log* n) lower bound for the maximal independent set (MIS) problem in trees. In this work we prove lower bounds for a much more relaxed famil...
详细信息
ISBN:
(纸本)9781450385480
Recently, Balliu, Brandt, and Olivetti [FOCS '20] showed the first omega(log* n) lower bound for the maximal independent set (MIS) problem in trees. In this work we prove lower bounds for a much more relaxed family of distributed symmetry breaking problems. As a by-product, we obtain improved lower bounds for the distributed MIS problem in trees. For a parameter k and an orientation of the edges of a graph G, we say that a subset S of the nodes of G is a k-outdegree dominating set if S is a dominating set of G and if in the induced sub- graph G [S], every node in S has outdegree at most k. Note that for k = 0, this definition coincides with the definition of an MIS. For a given k, we consider the problem of computing a k-outdegree dominating set. We show that, even in regular trees of degree at most A, in the standard LOCAL model, there exists a constant omega > 0 such that for k <= Delta(epsilon), for the problem of computing a k-outdegree dominating set, any randomized algorithm requires at least Omega ( min {log Delta, root log log n}) rounds and any deterministic algorithm requires at least Omega ( min {log Delta, root log log n} ) rounds. The proof of our lower bounds is based on the recently highly successful round elimination technique. We provide a novel way to do simplifications for round elimination, which we expect to be of independent interest. Our new proof is considerably simpler than the lower bound proof in [FOCS '20]. In particular, our round elimination proof uses a family of problems that can be described by only a constant number of labels. The existence of such a proof for the MIS problem was believed impossible by the authors of [FOCS '20].
Near-additive (aka (1 + epsilon, beta)-) emulators and spanners are a fundamental graph-algorithmic construct, with numerous applications for computing approximate shortest paths and related problems in distributed, s...
详细信息
ISBN:
(纸本)9781450385480
Near-additive (aka (1 + epsilon, beta)-) emulators and spanners are a fundamental graph-algorithmic construct, with numerous applications for computing approximate shortest paths and related problems in distributed, streaming and dynamic settings. Known constructions of near-additive emulators enable one to trade between their sparsity (i.e., number of edges) and the additive stretch beta. Specifically, for any pair of parameters epsilon > 0, kappa = 1, 2, ..., one can have a (1 + epsilon, beta)-emulator with O(n(1+1/kappa)) edges, with beta = (log kappa/epsilon)(log kappa). At their sparsest, these emulators employ c . n edges, for some constant c >= 2. We tighten this bound, and show that in fact precisely n(1+1/kappa )edges suffice. In particular, our emulators can be ultra-sparse, i.e., we can have an emulator with n + o(n) edges and beta (log log n/epsilon)(log log n (1+o(1))).( ) We also devise a distributed deterministic algorithm in the CONG EST model that builds these emulators in low polynomial time (i.e., in O(n(rho)) time, for an arbitrarily small constant parameter time, for an arbitrarily small constant parameter rho > 0). Finally, we also improve the state-of-the-art distributed deterministic CONGEST-model construction of (1 + epsilon, beta)-spanners devised in the PODC'19 paper [13]. Specifically, the spanners of [13] have O(beta . n(1+1/kappa)) edges, i.e., at their sparsest they employ O(log log n/epsilon) (log log n). n edges. In this paper, we devise an efficient distributed deterministic CONGEST-model algorithm that builds such spanners with O(n(1+1/kappa)) edges for kappa = O (log n/log((3) )n). K = 0 At their sparsest, these spanners employ only O(n. log log n) edges.
Population protocols are a model for distributedcomputing that is focused on simplicity and robustness. A system ofnidentical agents (finite state machines) performs a global task like electing a unique leader or det...
详细信息
Population protocols are a model for distributedcomputing that is focused on simplicity and robustness. A system ofnidentical agents (finite state machines) performs a global task like electing a unique leader or determining the majority opinion when each agent has one of two opinions. Agents communicate in pairwise interactions with randomly assigned communication partners. Quality is measured in two ways: the number of interactions to complete the task and the number of states per agent. We present protocols for the majority problem that allow for a trade-off between these two measures. Compared to the only other trade-off result (Alistarh et al. in proceedings of the 2015 acmsymposium on principles of distributedcomputing, Donostia-San Sebastian, 2015), we improve the number of interactions by almost a linear factor. Furthermore, our protocols can be made uniform (working correctly without any information on the population sizen), yielding the first uniform majority protocols that stabilize in a subquadratic number of interactions.
暂无评论