distributed atmospheric data are often stored and managed in diverse regional and global repositories. The scientific process requires composition of these resources to solve a specific atmospheric science problem. A ...
详细信息
ISBN:
(纸本)9780769537474
distributed atmospheric data are often stored and managed in diverse regional and global repositories. The scientific process requires composition of these resources to solve a specific atmospheric science problem. A challenge is how to harvest data and models for designing and executing experiments in a seamless manner. Moreover, data-intensive scientific experiments with large-scale scientific data processing are iterative, dynamic and human centered. In particular, the atmospheric scientific experiments usually include some fixed steps, such as data discovery, access, preprocessing, transformation, visualization. A web service-enabled workflow system is a flexible tool for accessing distributed scientific data, and executing complex analysis on it. In this paper, we describe a four-layered architecture of the workflow system, which consists of web interaction layer, workflow engine layer, workflow components layer and resource layer. We also develop an intuitive and easy-to-use web based toolkit and apply it to atmospheric data processing.
Motif is overrepresented pattern in biological sequence and Motif finding is an important problem in bioinformatics. Due to high computational complexity of motif finding, more and more computational capabilities are ...
详细信息
ISBN:
(纸本)9780769537474
Motif is overrepresented pattern in biological sequence and Motif finding is an important problem in bioinformatics. Due to high computational complexity of motif finding, more and more computational capabilities are required as the rapid growth of available biological data, such as gene transcription data. Among many motif finding algorithms, Gibbs sampling is an effective method for long motif finding. In this paper we present an improved Gibbs sampling method on graphics processing units (GPU) to accelerate motif finding. Experimental data support that, compared to traditional programs on CPU, our program running on GPU provides an effective and low-cost solution for motif finding problem, especially for long motif finding.
In order to solve the problem that there exists unbalanced detection performance on different types of attacks in current large-scale network intrusion detection algorithms, distributed Transfer Network Learning algor...
详细信息
ISBN:
(纸本)9780769537474
In order to solve the problem that there exists unbalanced detection performance on different types of attacks in current large-scale network intrusion detection algorithms, distributed Transfer Network Learning algorithm is proposed in this paper. The algorithm introduces transfer learning into distributed Network Boosting algorithm for instructing the attacks learning with poor performance, in which the instances transfer learning is adopted for different domain adaptation. The experimental results on the Kdd Cup'99 Data Set show that the proposed algorithm has higher efficacy and better performance. Further, the detection accuracy of R2L attacks has been improved greatly while maintaining higher detection accuracy of other attack types.
This paper presents an in-depth analysis of characterization for an irregular application - computing betweenness centrality (BC) - on multi-core architectures. BC algorithm is widely used in large scale graph analysi...
详细信息
ISBN:
(纸本)9780769537474
This paper presents an in-depth analysis of characterization for an irregular application - computing betweenness centrality (BC) - on multi-core architectures. BC algorithm is widely used in large scale graph analysis applications, which play an increasingly important role in high performance computing community. Through a joint study or architecture and application, we find that dynamically non-contiguous memory access, unstructured parallelism and low arithmetic intensity in BC program pose an obstacle to an efficient execution on parallel architectures. The experimental results report a comparison between Intel Clovertown and Sun Niagara1 for running such irregular program. Finally, several implications on mulit-core architecture and programming are proposed.
This paper proposes a new Evolutionary Algorithm for the Dynamic Resource Constrained Project Scheduling Problem. This algorithm has new features that get around some problems like premature convergence and other ones...
详细信息
Workflow engines [1]12][3] often being based on WS-BPEL, currently rely on a mix or recovery / modification strategies [4) that are either part of the workflow description, part of the workflow engine, or realized as ...
详细信息
ISBN:
(纸本)9780769537474
Workflow engines [1]12][3] often being based on WS-BPEL, currently rely on a mix or recovery / modification strategies [4) that are either part of the workflow description, part of the workflow engine, or realized as plugins to the workflow engine. To foster the development of distributed cloud-based workflow engines and novel repair algorithms, workflow engines have to be modularized in order to overcome the static and inflexible APIs provided by these workflow engines. Dynamic features gained by a modularization include the creation of external modules to monitor as well as modify a workflow to provide error handling in conjunction with Service Level Agreement (SLA) constraints. The aim of this paper is to present a flexible Workflow Execution Engine to facilitate the development of a new dynamic infrastructure to realize dynamic workflow engines with a focus on cloud-based environments.
In this paper, a Model Driven Architecture (MDA) approach is applied to Semi-automatically translate sequential programs into corresponding distributed code. The novelty of our work is the use of MDA in the process of...
详细信息
ISBN:
(纸本)9780769537474
In this paper, a Model Driven Architecture (MDA) approach is applied to Semi-automatically translate sequential programs into corresponding distributed code. The novelty of our work is the use of MDA in the process of translating serial into distributed code. The transformation comprises automatic generation of platform independent and then platform specific models from the sequential code. In order to generate the PIM, a meta-model defining the overall architecture of the resultant distributed code is developed. The meta-model is used as a basis for the development of platform independent models (PIM) for the resultant distributed code. A set of transformation rules are defined to transform the resulted PIM into a corresponding platform-specific model. These transformation rules can be modified by the user, depending on the details of the underlying middle-ware applied for the distribution. The platform independent model provides a better understanding of the distributed code and helps the programmer to modify the code more easily.
Developing a high performance parallel application is difficult. An application must often be analyzed and optimized by the programmer before reaching an acceptable level of performance. Performance tools that collect...
详细信息
Interest management is essential for real-time large-scale distributed virtual environments (DVEs) which seeks to filter irrelevant messages on the network. Many existing interest management schemes such as HLA DDM fo...
详细信息
ISBN:
(纸本)9780769538686
Interest management is essential for real-time large-scale distributed virtual environments (DVEs) which seeks to filter irrelevant messages on the network. Many existing interest management schemes such as HLA DDM focus on providing precise message filtering mechanisms. However, this leads to a second problem: the computational overhead of the interest matching process. If the CPU cost of interest matching is too high, it would be unsuitable for real-time applications such as multiplayer online games for which runtime performance is important. This paper evaluates the performance of existing interest matching algorithms and proposes a new algorithm based on parallelprocessing. The new algorithm is expected to have better computational efficiency than existing algorithms and maintain the same accuracy of message filtering as them. Experimental evidence shows that our approach works well in practice.
暂无评论