Cloud providers are highly incentivized to reduce latency. One way they do this is by locating data centers as close to users as possible. These “cloud edge” data centers are placed in metropolitan areas and enable ...
详细信息
Cloud providers are highly incentivized to reduce latency. One way they do this is by locating data centers as close to users as possible. These “cloud edge” data centers are placed in metropolitan areas and enable edge computing for residents of these cities. Therefore, which cities are selected to host edge data centers determines who has the fastest access to applications requiring edge compute — creating a digital divide between those closest and furthest from the edge. In this study we measure latency to the current and predicted cloud edge of three major cloud providers around the world. Our measurements use the RIPE Atlas platform targeting cloud regions, AWS Local Zones, and network optimization services that minimize the path to the cloud edge. An analysis of the digital divide shows rising inequality as the relative difference between users closest and farthest from cloud compute increases. We also find this inequality unfairly affects lower income census tracts in the US. This result is extended globally using remotely sensed night time lights as a proxy for wealth. Finally, we demonstrate that low earth orbit satellite internet can help to close this digital divide and provide more fair access to the cloud edge.
In this panel, a team of four experts in performance analysis, parallel computing, and distributed systems discuss the future of performance analysis. A particular emphasis will be placed on how the growth of GPUs and...
详细信息
In this paper, we present a comparative analysis of model-free reinforcement learning (RL) and model predictive control (MPC) approaches for intelligent control of heating, ventilation, and air-conditioning (HVAC). De...
详细信息
With growing data set sizes, many scientific and data center HPC workloads observe an increasing scaling imbalance, e.g., between compute and memory capacities. As a solution, disaggregated system architectures employ...
详细信息
ISBN:
(纸本)9781665446648
With growing data set sizes, many scientific and data center HPC workloads observe an increasing scaling imbalance, e.g., between compute and memory capacities. As a solution, disaggregated system architectures employ spatial distribution of the different resources. They aim for independent scaling of the different resource kinds (e.g., compute, non-volatile storage, memory), and use fast communication fabrics for their interconnection. However, for some bulk operations, such as reductions and collections, it is still beneficial to perform them close to the memories, avoiding the need to move large volumes of data over the fabric. This work realizes a disaggregated system capable of performing such near-data processing (NDP) operations by extending the distributed memory controllers with hardware-accelerated compute capabilities. The actual computations execute on FPGAs and can be abstractly described using C/C++ as compilable by high-level hardware synthesis (HLS) tools. We have aimed for high usability of our technology also by HPC experts unfamiliar with hardware design. An automated toolflow encapsulates the creation and deployment of the actual accelerators in the disaggregated system. The NDP operations execute distributed across all memory nodes, and are easily accessed using a simple MPI-based programming interface that requires only minimal effort to use in existing applications. Our solution is demonstrated using a prototype disaggregated system based on the low-latency EXTOLL fabric for communication. We evaluate both conventional reductions/collectives as well as complete machine-learning inference tasks.
Self-adaptive systems (SASs) can change their structures autonomously and dynamically adapt their behaviors aiming at (i) at-taining longer-term system goals and (ii) coping with inevitable dynamics and changes in the...
详细信息
ISBN:
(数字)9798400705854
ISBN:
(纸本)9798350363838
Self-adaptive systems (SASs) can change their structures autonomously and dynamically adapt their behaviors aiming at (i) at-taining longer-term system goals and (ii) coping with inevitable dynamics and changes in their operational environments that are difficult to anticipate. As SASs directly or indirectly interact with, and affect humans, such degrees of autonomy create the necessity for these systems to be trusted or considered trustworthy. While the notions of ‘trust’ and ‘trustworthiness’ have been investigated for over a decade, particularly by the SEAMS community, trust is a broad concept that covers diverse notions and techniques and there is currently no clear view on the state of the art. To that end, we present the outcomes of an exploratory literature study that clarifies how trust as a foundational concept has been concretized and used in SASs. Based on an analysis of a set of 16 articles from the published SEAMS proceedings, we provide (i) a summary of the diverse quality attributes of SASs influenced by trust, (ii) a clarification on the different participant roles to trust establishment in SASs, and (iii) a summary of trust qualification or quantification approaches used in literature. This review provides a more holistic view on the current state of the art for attaining trust in the engineering of self-adaptive systems, and identifies research gaps worthy of further investigation.
Clouds and massive-scale computing infrastructures are starting to dominate computing and will likely continue to do so for the foreseeable future. Major cloud operators are now comprising millions of cores hosting su...
详细信息
ISBN:
(纸本)9798400700507
Clouds and massive-scale computing infrastructures are starting to dominate computing and will likely continue to do so for the foreseeable future. Major cloud operators are now comprising millions of cores hosting substantial fractions of corporate and government IT infrastructure. CCSW is the world's premier forum bringing together researchers and practitioners in all security aspects of cloud-centric and outsourced computing, including: Side channel attacksCryptographic protocols for cloud securitySecure cloud resource virtualization mechanismsSecure data management outsourcing (e.g., database as a service)Privacy and integrity mechanisms for outsourcingFoundations of cloud-centric threat modelsSecure computation outsourcingRemote attestation mechanisms in cloudsSandboxing and VM-based enforcementsTrust and policy management in cloudsSecure identity management mechanismsCloud-aware web service security paradigms and mechanismsCloud-centric regulatory compliance issues and mechanismsBusiness and security risk models and cloudsCost and usability models and their interaction with security in cloudsScalability of security in global-size cloudsBinary analysis of software for remote attestation and cloud protectionNetwork security (DOS, IDS etc.) mechanisms for cloud contextsSecurity for emerging cloud programming modelsEnergy/cost/efficiency of security in cloudsmOpen hardware for cloud
The proceedings contain 32 papers. The topics discussed include: asymmetric distributed trust;building next-generation healthcare systems using distributed machine learning;autonomous distributed systems of myopic mob...
ISBN:
(纸本)9781450389334
The proceedings contain 32 papers. The topics discussed include: asymmetric distributed trust;building next-generation healthcare systems using distributed machine learning;autonomous distributed systems of myopic mobile robots with lights;secure conflict-free replicated data types;P4Fuzz: compiler fuzzer for dependable programmable dataplanes;gathering with a strong team in weakly byzantine environments;communication costs in a geometric communication network;certification of an exact worst-case self-stabilization time;arbitrary pattern formation on infinite regular tessellation graphs;optimal exclusive perpetual grid exploration by luminous myopic opaque robots with common chirality;and performance analysis of a distributed algorithm for admission control in wireless networks under the 2-Hop interference model.
A good graphical user interface (GUI) is crucial for an application's usability, so vendors and regulatory agencies increasingly place restrictions on how GUI elements should appear to and interact with users. Mot...
详细信息
ISBN:
(纸本)9781450385626
A good graphical user interface (GUI) is crucial for an application's usability, so vendors and regulatory agencies increasingly place restrictions on how GUI elements should appear to and interact with users. Motivated by this concern, this paper presents a new technique (based on static analysis) for checking conformance between (Android) applications and GUI policies expressed in a formal specification language. In particular, this paper (1) describes a specification language for formalizing GUI policies, (2) proposes a new program abstraction called an event-driven layout forest, and (3) describes a static analysis for constructing this abstraction and checking it against a GUI policy. We have implemented the proposed approach in a tool called Venus, and we evaluate it on 2361 Android applications and 17 policies. Our evaluation shows that Venus can uncover malicious applications that perform ad fraud and identify violations of GUI design guidelines and GDPR laws.
10+K qubit quantum computer is essential to achieve a true sense of quantum supremacy. With the recent effort towards the large-scale quantum computer, architects have revealed various scalability issues including the...
详细信息
ISBN:
(纸本)9781450386104
10+K qubit quantum computer is essential to achieve a true sense of quantum supremacy. With the recent effort towards the large-scale quantum computer, architects have revealed various scalability issues including the constraints in a quantum control processor, which should be holistically analyzed to design a future scalable control processor. However, it has been impossible to identify and resolve the processor's scalability bottleneck due to the absence of a reliable tool to explore an extensive design space including microarchitecture, device technology, and operating temperature. In this paper, we present XQsim, an open-source cross-technology quantum control processor simulator. XQsim can accurately analyze the target control processors' scalability bottlenecks for various device technology and operating temperature candidates. To achieve the goal, we first fully implement a convincing control processor microarchitecture for the Fault-tolerant Quantum Computer (FTQC) systems. Next, on top of the microarchitecture, we develop an architecture-level control processor simulator (XQsim) and thoroughly validate it with post-layout analysis, timing-accurate RTL simulation, and noisy quantum simulation. Lastly, driven by XQsim, we provide the future directions to design a 10+K qubit quantum control processor with several design guidelines and architecture optimizations. Our case study shows that the final control processor architecture can successfully support similar to 59K qubits with our operating temperature and technology choices.
The proceedings contain 8 papers. The topics discussed include: towards physical design management in storage systems;applying machine learning to understand write performance of large-scale parallel filesystems;in se...
ISBN:
(纸本)9781728160054
The proceedings contain 8 papers. The topics discussed include: towards physical design management in storage systems;applying machine learning to understand write performance of large-scale parallel filesystems;in search of a fast and efï¬ücient serverless DAG engine;enabling transparent asynchronous I/O using background threads;understanding data motion in the modern HPC data center;active learning-based automatic tuning and prediction of parallel I/O performance;proï¬üling platform storage using IO500 and mistral;and a foundation for automated placement of data.
暂无评论