The paper presents the experience of the authors in model based testing of safety critical real-Time control logic software. It describes specifics of the corresponding industrial settings and discusses technical deta...
详细信息
This paper describes the design and implementation of full-system logging and deterministic replay mechanisms in QEMU simulator for several target platforms.
This paper describes the design and implementation of full-system logging and deterministic replay mechanisms in QEMU simulator for several target platforms.
In this paper we explore the potential of virtualization being applied to High Performance Computing (HPC). We demonstrate the importance of proper NUMA architecture emulation when running HPC task inside virtual mach...
In this paper we explore the potential of virtualization being applied to High Performance Computing (HPC). We demonstrate the importance of proper NUMA architecture emulation when running HPC task inside virtual machines on multiple NUMA hosts. We assess KVM/QEMU and Palacios hypervisors and, with proper tuning of hypervisor (including NUMA emulation), we reduce the performance degradation from 10-60% to 1-5% on many tests from HPC Challenge and NAS Parallel Benchmark suites. All tests are performed on modern HPC cluster with high-speed Infiniband interconnect. The cluster nodes are 2-socket 12-core systems, up to 8 nodes were used for computation. Comparing KVM/QEMU and Palacios hypervisors, we conclude that in general the results with NUMA emulation enabled are similar, with KVM providing more stable and predictable results while Palacios being much better on fine-grained tests at a large scale, but showing abnormal performance degradation on a few tests. We believe that the main advantage of Palacios with respect to performance is the reduced amount of noise generated by the virtualization system. This advantage is getting more important when the scale of the system grows.
The paper describes a method for keyterm extraction from messages of microblogs. The described approach utilizes the information obtained by the analysis of structure and content of Wikipedia. The algorithm is based o...
详细信息
The paper describes a method for keyterm extraction from messages of microblogs. The described approach utilizes the information obtained by the analysis of structure and content of Wikipedia. The algorithm is based on computation of “keyphraseness” measure for each term, i.e. an estimation of probability that it can be selected as a key in the text. The experimental study of the proposed technique demonstrated satisfactory results which significantly outpaces analogues. As a demonstration of possible application of the algorithm, the prototype of context-sensitive advertising system has been implemented. This system is able to obtain the descriptions of the goods relevant to the found keyterms from Amazon online store. Several suggestions are also made on how to utilize the information obtained by the analysis of Twitter messages in different auxiliary services.
The S.A. Lebedev institute developed operating system for the AS-6 distributed computing system (OS AS-6) in the 1970s. The OS AS-6 consisted of peer operating systems of separate machines making up the AS-6 computer ...
详细信息
Extracting information from tables is an important and rather complex part of information retrieval. For the task of objects extraction from HTML tables we introduce the following methods: determining table orientatio...
Extracting information from tables is an important and rather complex part of information retrieval. For the task of objects extraction from HTML tables we introduce the following methods: determining table orientation, processing of aggregating objects (like Total) and scattered headers (super row labels, subheaders).
Automatic generation and simulation of test programs is known to be the main means for verifying microprocessors. The problem is that test program generators for new designs are often developed from scratch with littl...
详细信息
Verification of Linux kernel modules and especially device drivers is a critically important task. However, due to the special nature of the kernel operation, it is very challenging to perform runtime analysis of part...
详细信息
Verification has long been recognized as an integral part of the hardware design process. When designing a system, engineers usually use various design representations and concretize them step by step up to a physical...
详细信息
Polymorphic and metamorphic viruses are the most sophisticated malicious programs that give a lot of trouble to virus scanners. Each time when these viruses infect new executables or replicate themselves, they complet...
暂无评论