This paper provides an overview of the WarpIV simulation Kernel that was designed to be an initial implementation of the Standard simulation Architecture (SSA). WarpIV is the next generation replacement for the Synchr...
详细信息
This paper describes a method for evolutionary component-based development of families of parallel programs to attain performance goals on multiple execution environments for multiple family instances and an implement...
详细信息
ISBN:
(纸本)1595930876
This paper describes a method for evolutionary component-based development of families of parallel programs to attain performance goals on multiple execution environments for multiple family instances and an implementation of the method. It is based upon combining component-oriented development with integration of parallel/distributed execution and parallel/distributedsimulation. Each component may have multiple representations at multiple levels of realization from analytical timing models to production code. Each component is encapsulated with an associative interface specifying its properties and behaviors which enables distinguishing among different implementations (or abstractions) of the same functional behavior which may have different performance behavior. Evolutionary development evolves a program from an abstract performance model to a complete program and may continue evolution during runtime. Performance can be estimated at any stage of realization. The implementation is a compiler which composes parallel/distributed programs from components encapsulated with associative interfaces and a runtime system which supports integrated execution/simulation of parallel programs composed from components at different levels of abstraction and program evolution at runtime by component replacement. Case studies in the application of the evolutionary development method including performance results are given. Copyright 2005 ACM.
Scalable and efficient network simulation methods are the method of choice for evaluating and verifying wireless network protocols on a moderate to large scale. This need becomes obvious when simulating very large-sca...
详细信息
In this paper, an efficient distributed heuristic-based algorithm is presented, which is based on joint distance-counter threshold scheme. It features a distributed manner by each node in the network needing no global...
详细信息
ISBN:
(纸本)3540296395
In this paper, an efficient distributed heuristic-based algorithm is presented, which is based on joint distance-counter threshold scheme. It features a distributed manner by each node in the network needing no global information. Each node in an ad hoc network receives the message from its neighbors and decides whether to operate retransmitting or not according to the signal strength and times of the receiving messages. The algorithm has superiority such as reliability, rebroadcast saving, less communication overhead for broadcasting task, localized and parameter-less behaviors, so it is easy to operate and possesses a good performance in mobile ad hoc communication environments. A comparison with several other existing algorithms is conducted. It shows by simulation results that the new algorithm is more efficient than others.
The proceedings contain 14 papers. The topics discussed include: performance issues in video streaming environments;design and testing of scalable web-based systems with performance constraints;models of dynamic web c...
详细信息
ISBN:
(纸本)0769524478
The proceedings contain 14 papers. The topics discussed include: performance issues in video streaming environments;design and testing of scalable web-based systems with performance constraints;models of dynamic web content;performance modeling of P2P file sharing applications;performance model building of pervasive computing;design and performance evaluation of mechanisms for mobile-devices handoff forecast;efficient analysis algorithms for parametric fault trees;a tool set for modeling and simulation of robotic workcells;software performance analysis in UML models;scalable and efficient parallel and distributedsimulation of complex, dynamic and mobile systems;and towards transparent optimistic synchronization in HLA.
Scalable and efficient network simulation methods are the method of choice for evaluating and verifying wireless network protocols on a moderate to large scale. This need becomes obvious when simulating very large-sca...
详细信息
ISBN:
(纸本)0769523838
Scalable and efficient network simulation methods are the method of choice for evaluating and verifying wireless network protocols on a moderate to large scale. This need becomes obvious when simulating very large-scale wireless networks such as emerging ad hoc sensor networks in which the number of nodes can be the order of thousands or more, and with very high node density. Unfortunately, simulation of such large-scale wireless networks often requires excessively large amounts of computing resources and can be slow to complete. One approach to achieving higher performance in a large-scale network simulation is the use of parallel or distributedsimulation techniques. However the efficient distributedsimulation of wireless ad hoc networks is still a daunting task. Therefore, we turn our attention to more traditional sequential simulation methods, and seek to reduce the overhead incurred in the Medium Access Control (MAC) state update propagation between wireless nodes. We introduce a novel method called LAMP (LAzy MAC state uPdate), that substantially reduces this overhead, with no loss of accuracy. Using our wireless network simulation tool, we compare the efficiency of the LAMP approach to the more traditional approach, and show a performance improvement of up to a factor of eight, with no loss of accuracy.
Semantic caching is very attractive for use in distributed computing environments based on historical queries and their descriptions, one of whose important issues is how to best maintain semantic caching using a cohe...
详细信息
ISBN:
(纸本)3540296395
Semantic caching is very attractive for use in distributed computing environments based on historical queries and their descriptions, one of whose important issues is how to best maintain semantic caching using a coherency control scheme. With the object of applying semantic caching into practice, the cache coherency problems including the data between the server and its caching as well as the cached data and their semantic descriptions are analyzed. This paper presents conflicts existing in semantic caching and their formal definitions, proposes the semantic caching model, and coherency control scheme, meanwhile derives update list optimization algorithm adopted in server and coherency control algorithm used in clients. Finally, the performance of the semantic caching coherency control scheme is examined and analyzed through a simulation study in detail.
Some multimedia content may be divisible into independently routable components, e.g. audio and video flows. As a result media content adaptation services may be linked in serial, parallel and hybrid configurations to...
详细信息
If-conversion and predicated execution are widely adopted to eliminate branch misprediction penalty. Previous predication execution depends on compiler to generate explicit predicated instructions, In this paper, a tr...
详细信息
ISBN:
(纸本)3540296395
If-conversion and predicated execution are widely adopted to eliminate branch misprediction penalty. Previous predication execution depends on compiler to generate explicit predicated instructions, In this paper, a trace-based predicate mechanism named RIMP (Runtime IMplicit Predication) is discussed. The candidates of if-conversion will be identified during dynamic execution. Conventional trace cache has been modified to store RIMP traces, which include instructions both from fall-through and target block following the conditional branch. Hardware extension will add predication to RIMP trace automatically. With the help of RIMP, legacy applications can benefit from predication mechanism without recompiling source code. simulation of RIMP implementation under diverse microarchitecture configurations is presented in the paper. Results have shown promising performance improvement. In general, RIMP with 64kB trace storage delivers an average 10.3% IPC improvement while actually speeding up the execution time by over 7%.
Compute-intensive simulations are currently good candidates for being executed on distributed computers and Grids, in particular for applications with a large number of input data whose values change throughout the si...
详细信息
ISBN:
(数字)9783540321323
ISBN:
(纸本)3540297391
Compute-intensive simulations are currently good candidates for being executed on distributed computers and Grids, in particular for applications with a large number of input data whose values change throughout the simulation time and where the communications are not a critical factor. Although the number of computations usually depends on the bulk of input data, there are applications in which the computational load depends on the particular values of some input data. We propose a general methodology to deal with the problem of improving load balance in these cases. It is divided into two main stages. The first one is an exhaustive study of the parallel code structure, using performance tools, with the aim of establishing a relationship between the values of the input data and the computational effort. The next stage uses this information and provides a mechanism to distribute the load of any particular simulating situation among the computational nodes. A load balancing strategy for the particular case of STEM-II, a compute-intensive application that simulates the behavior of pollutant factors in the air, has been developed, obtaining an important improvement in execution time.
暂无评论