2015 IEEE 21st International Conference on Parallel and Distributed Systems (ICPADS)最新文献

筛选
英文 中文
Hardware-Centric Analysis of Network Performance for MPI Applications 以硬件为中心的MPI应用网络性能分析
K. Brown, Jens Domke, S. Matsuoka
{"title":"Hardware-Centric Analysis of Network Performance for MPI Applications","authors":"K. Brown, Jens Domke, S. Matsuoka","doi":"10.1109/ICPADS.2015.92","DOIUrl":"https://doi.org/10.1109/ICPADS.2015.92","url":null,"abstract":"As the scale of high-performance computing systems increases, optimizing inter-process communication becomes more challenging while being critical for ensuring good performance. However, the hardware layer abstraction provided by MPI makes it difficult to study application communication performance over the network hardware, especially for collective operations. We present a new approach to network performance analysis based on exposing low-level communication metrics in a flexible manner and conducting hardware-centric analysis of these metrics. We show how low-level network metrics can be revealed using Open MPI's Peruse utility, without interfacing with the hardware layer. A lightweight profiler, ibprof, was developed to aggregate these metrics from message passing events at a cost of <;1% runtime overhead for communication in NPB kernel and application benchmarks. We also developed a flexible visualization module for the Boxfish analysis tool to analyze our communication profile over the physical topology of the network. Using case studies, we demonstrate how our approach can identify communication anomalies in network applications and guide performance optimization strategies.","PeriodicalId":231517,"journal":{"name":"2015 IEEE 21st International Conference on Parallel and Distributed Systems (ICPADS)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128431528","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Thread Count Prediction Model: Dynamically Adjusting Threads for Heterogeneous Many-Core Systems 线程数预测模型:动态调整异构多核系统的线程
Tao Ju, Weiguo Wu, Heng Chen, Zhengdong Zhu, Xiaoshe Dong
{"title":"Thread Count Prediction Model: Dynamically Adjusting Threads for Heterogeneous Many-Core Systems","authors":"Tao Ju, Weiguo Wu, Heng Chen, Zhengdong Zhu, Xiaoshe Dong","doi":"10.1109/ICPADS.2015.64","DOIUrl":"https://doi.org/10.1109/ICPADS.2015.64","url":null,"abstract":"Determining an appropriate thread count for a multithread application running on a heterogeneous many-core system is crucial for improving computing performance and reducing energy consumption. This paper investigates the interrelation between thread count and computing performance of applications, and designs a prediction model of the optimum thread count on the basis of Amdahl's law combined with regression analysis theory to improve computing performance and reduce energy consumption. The prediction model can estimate the optimum tread count relying on the program running behaviors and the architecture characteristics of heterogeneous many-core system. Using the estimated optimum thread count, the number of the active hardware threads and processing cores on the many-core processor is dynamically adjusted in the process of thread mapping to improve the energy efficiency of entire heterogeneous many-core system. The experimental results show that, using this paper proposed thread count prediction model, on an average, the computing performance is improved by 48.6%, energy consumption is reduced by 59%, and additional overhead introduced is 2.03% compared with that of the traditional thread mapping for the PARSEC benchmark programs run on an Intel MIC heterogeneous many-core system.","PeriodicalId":231517,"journal":{"name":"2015 IEEE 21st International Conference on Parallel and Distributed Systems (ICPADS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129784184","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Fair Decentralized Congestion and Awareness Control for Vehicular Networks 车辆网络的公平分散拥塞和感知控制
Matthias Sander Frigau
{"title":"Fair Decentralized Congestion and Awareness Control for Vehicular Networks","authors":"Matthias Sander Frigau","doi":"10.1109/ICPADS.2015.30","DOIUrl":"https://doi.org/10.1109/ICPADS.2015.30","url":null,"abstract":"Challenges surrounding 802.11p vehicular networks have become more apparent in recent years within the research community. The exchange of periodical beacons on the control channel is mandatory to support higher layer applications such as active safety applications. However, the nature of such wireless vehicular networks imposes a lot of serious problems, especially the risk that the radio channel becomes quickly saturated. Thus, congestion control and awareness control are crucial mechanisms to control the load and ensure that each vehicle is able to communicate with its most relevant neighbours respectively. In this paper, we tackle jointly congestion and awareness control by taking into consideration 2-hops influence, hidden-terminals, SINR, received power, and a fair bandwidth indicator measuring the performance distribution among a coalition of vehicles in a highly volatile vehicular network. A two-steps proactive distributed algorithm called TPA&plus;IAB is proposed to improve the fair bandwidth utilization. Each step of the algorithm achieves a distinct goal: Intelligent Adaptive Beaconing (IAB) is in charge of controlling the congestion while the Transmit Power Adaptation (TPA) is in charge of controlling which neighbour should be part of a coalition with respect to down-link channel qualities. Different from awareness control algorithms which assume an optimal channel model, here a more realistic model is used to estimate dynamically the best communication range based on a non-deterministic propagation model. Realistic simulations with NS-3 show that the solution presented outperforms the well-known D-FPAV algorithm in non-homogeneous graphs.","PeriodicalId":231517,"journal":{"name":"2015 IEEE 21st International Conference on Parallel and Distributed Systems (ICPADS)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129796170","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Towards a Human-Centred Approach in Modelling and Testing of Cyber-Physical Systems 迈向以人为中心的方法在建模和测试的网络物理系统
M. Spichkova, A. Zamansky, E. Farchi
{"title":"Towards a Human-Centred Approach in Modelling and Testing of Cyber-Physical Systems","authors":"M. Spichkova, A. Zamansky, E. Farchi","doi":"10.1109/ICPADS.2015.115","DOIUrl":"https://doi.org/10.1109/ICPADS.2015.115","url":null,"abstract":"The ability to capture different levels of abstraction in a system model is especially important for remote integration, testing/verification, and manufacturing of cyber-physical systems (CPSs). However, the complexity of modelling and testing of CPSs makes these processes extremely prone to human error. In this paper we present our ongoing work on introducing human-centred considerations into modelling and testing of CPSs, which allow for agile iterative refinement processes of different levels of abstraction when errors are discovered or missing information is completed.","PeriodicalId":231517,"journal":{"name":"2015 IEEE 21st International Conference on Parallel and Distributed Systems (ICPADS)","volume":"380 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123343658","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
SHAFT: Supporting Transactions with Serializability and Fault-Tolerance in Highly-Available Datastores 在高可用数据存储中支持具有序列化性和容错性的事务
Yuqing Zhu, Yilei Wang
{"title":"SHAFT: Supporting Transactions with Serializability and Fault-Tolerance in Highly-Available Datastores","authors":"Yuqing Zhu, Yilei Wang","doi":"10.1109/ICPADS.2015.95","DOIUrl":"https://doi.org/10.1109/ICPADS.2015.95","url":null,"abstract":"Guaranteeing transaction semantics in a highly available and fault tolerant manner is desirable to application developers. Besides, it is a very valuable feature for database-backed applications. In this paper, we propose SHAFT to support transactions with serializability in highly-available datastores, which partition, distribute and replicate data across datacenters. SHAFT is a transactional replication protocol guaranteeing Serializability, High Availability and Fault Tolerance simultaneously for transactions. Laying its basis on the Paxos algorithm, SHAFT guarantees serializability by a two-phase locking procedure in a fault-tolerant manner. Different from other transactional replication protocols like MDCC, SHAFT allows a client to actively abort a transaction. SHAFT also allows flexible data partition, replication and distribution, a proper combination of which can reduce costs and improve performance. SHAFT performs well even under failures. Our experiments show that SHAFT outperforms MDCC, which outperforms other synchronous transactional replication protocols, e.g. Megastore.","PeriodicalId":231517,"journal":{"name":"2015 IEEE 21st International Conference on Parallel and Distributed Systems (ICPADS)","volume":"164 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126934218","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Software Defined Networking for Communication and Control of Cyber-Physical Systems 用于信息物理系统通信和控制的软件定义网络
K. Ahmed, J. Blech, M. Gregory, H. Schmidt
{"title":"Software Defined Networking for Communication and Control of Cyber-Physical Systems","authors":"K. Ahmed, J. Blech, M. Gregory, H. Schmidt","doi":"10.1109/ICPADS.2015.107","DOIUrl":"https://doi.org/10.1109/ICPADS.2015.107","url":null,"abstract":"Cyber-physical Systems (CPS) combine human-machine interaction, the physical world around us, and software aspects by integrating physical systems with communication networks. Opportunities and research challenges are largely interconnected with the three core sub-domains of CPS &mdash; computation, communication and control. The current state of the art of the legacy communication technology is one of the major hindrances limiting the evolution of CPS. Most specifically, innovation in communication is restricted with existing routing and switching technologies leaving no practical methods for researchers to test their new ideas. Software Defined Networking (SDN), through the realization of OpenFlow, separates network control logic from the underlying physical routers and switches. This phenomenon allows researchers to write high-level control programs specifying the behavior of the core networks used to implement CPS and thus, enable innovation in next generation communication architectures for CPS. In this paper, we propose a SDN architecture for industrial automation. Network design requirements are extracted from formal component specifications which support the generation of automatic network configurations. The proposed SDN architecture aims to leverage Industry 4.0 and Smart Factories, to bring together industrial automation installations with networking and Internet technologies.","PeriodicalId":231517,"journal":{"name":"2015 IEEE 21st International Conference on Parallel and Distributed Systems (ICPADS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125808797","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 35
Versioning Architectures for Local and Global Memory 本地和全局内存的版本控制体系结构
H. Fujita, K. Iskra, P. Balaji, A. Chien
{"title":"Versioning Architectures for Local and Global Memory","authors":"H. Fujita, K. Iskra, P. Balaji, A. Chien","doi":"10.1109/ICPADS.2015.71","DOIUrl":"https://doi.org/10.1109/ICPADS.2015.71","url":null,"abstract":"Future supercomputer systems will face serious reliability challenges. Among failure scenarios, latent errors are some of the most serious and concerning. Preserving multiple versions of critical data is a promising approach to deal with such errors. We are developing the Global View Resilience (GVR) library, with multi-version global arrays as one of the key features. This paper presents three array versioning architectures: flat array, flat array with change tracking, and log-structured array. We use a synthetic workload that mimics the memory access patterns of radix sort, N-body simulation, and matrix multiplication, comparing the three array architectures in terms of runtime performance, memory requirements, and version restoration costs. The experiments show that the flat array with change tracking is the best architecture in terms of runtime performance, for versioning frequencies of 10-5 ops-1 or higher matching the second best architecture or beating it by up to 23 times, whereas the log-structured array is preferable for low memory usage, since it saves up to 98% of memory compared with a flat array.","PeriodicalId":231517,"journal":{"name":"2015 IEEE 21st International Conference on Parallel and Distributed Systems (ICPADS)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115573950","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cloud Based Monitoring of Timed Events for Industrial Automation 基于云的工业自动化定时事件监控
M. Wenger, Alois Zoitl, J. Blech, I. Peake, L. Fernando
{"title":"Cloud Based Monitoring of Timed Events for Industrial Automation","authors":"M. Wenger, Alois Zoitl, J. Blech, I. Peake, L. Fernando","doi":"10.1109/ICPADS.2015.111","DOIUrl":"https://doi.org/10.1109/ICPADS.2015.111","url":null,"abstract":"This paper presents ideas towards automatic monitoring of industrial automation devices by using a cloud based monitoring infrastructure. We are in particular aiming at fine grained timed properties that can be described using formal specification techniques such as behavioral types. Possible applications are in the areas of remote maintenance and servicing as well as commissioning and testing. Our work is based in the IEC 61499 standard.","PeriodicalId":231517,"journal":{"name":"2015 IEEE 21st International Conference on Parallel and Distributed Systems (ICPADS)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121767565","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Fusion: Privacy-Preserving Distributed Protocol for High-Dimensional Data Mashup 融合:高维数据混搭的隐私保护分布式协议
Gaby G. Dagher, Farkhund Iqbal, M. Arafati, B. Fung
{"title":"Fusion: Privacy-Preserving Distributed Protocol for High-Dimensional Data Mashup","authors":"Gaby G. Dagher, Farkhund Iqbal, M. Arafati, B. Fung","doi":"10.1109/ICPADS.2015.100","DOIUrl":"https://doi.org/10.1109/ICPADS.2015.100","url":null,"abstract":"In the last decade, several approaches concerning private data release for data mining have been proposed. Data mashup, on the other hand, has recently emerged as a mechanism for integrating data from several data providers. Fusing both techniques to generate mashup data in a distributed environment while providing privacy and utility guarantees on the output involves several challenges. That is, how to ensure that no unnecessary information is leaked to the other parties during the mashup process, how to ensure the mashup data is protected against certain privacy threats, and how to handle the high-dimensional nature of the mashup data while guaranteeing high data utility. In this paper, we present Fusion, a privacy-preserving multi-party protocol for data mashup with guaranteed LKC-privacy for the purpose of data mining. Experiments on real-life data demonstrate that the anonymous mashup data provide better data utility, the approach can handle high dimensional data, and it is scalable with respect to the data size.","PeriodicalId":231517,"journal":{"name":"2015 IEEE 21st International Conference on Parallel and Distributed Systems (ICPADS)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114946877","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Secrecy Outage Probability of Two-Path Successive Relaying in Physical Layer Security 物理层安全中双路径连续中继的保密中断概率
Qian Yu Liau, C. Leow
{"title":"Secrecy Outage Probability of Two-Path Successive Relaying in Physical Layer Security","authors":"Qian Yu Liau, C. Leow","doi":"10.1109/ICPADS.2015.103","DOIUrl":"https://doi.org/10.1109/ICPADS.2015.103","url":null,"abstract":"Relaying is a promising technique to improve wireless physical-layer security. Existing literature shows that a full-duplex relay can further improve the secrecy capacity and secrecy outage probability compared to conventional half-duplex relay, but this comes at a price of sophisticated implementation. For sake of easy implementation, two-path successive relaying has been proposed to emulate the full-duplex relay by scheduling a pair of half-duplex relays to assist the source transmission alternately. However, the performance of two-path successive relaying in secrecy communication remains unexplored. This paper proposes a secrecy two-path successive relaying protocol for a scenario with one source, one destination and two half-duplex relays. The relays operate alternately in a time division mode to forward messages continuously from source to destination in the presence of an eavesdropper. To further confuse the eavesdropper, the source and relay are scheduled to transmit jamming signals at appropriate intervals. Analytical results on the secrecy outage probability reveals that the proposed protocol is able to deliver the target secrecy rate when the SNR of the eavesdropping channels are high. In addition, the secrecy outage probability of the proposed protocol is the joint secrecy outage probability of the relay pair. Numerical simulations show that the proposed protocol achieves the highest ergodic secrecy capacity and lowest secrecy outage probability compared to the existing half duplex relaying, full duplex relaying and full duplex jamming schemes.","PeriodicalId":231517,"journal":{"name":"2015 IEEE 21st International Conference on Parallel and Distributed Systems (ICPADS)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133106076","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信