Int. J. Netw. Comput.最新文献

筛选
英文 中文
Self-Stabilizing Algorithms for Maximal 2-packing and General k-packing (k ≥ 2) with Safe Convergence in an Arbitrary Graph 任意图上安全收敛的最大2-填充和一般k-填充的自稳定算法
Int. J. Netw. Comput. Pub Date : 2015-01-10 DOI: 10.15803/IJNC.5.1_105
Yihua Ding, J. Wang, P. Srimani
{"title":"Self-Stabilizing Algorithms for Maximal 2-packing and General k-packing (k ≥ 2) with Safe Convergence in an Arbitrary Graph","authors":"Yihua Ding, J. Wang, P. Srimani","doi":"10.15803/IJNC.5.1_105","DOIUrl":"https://doi.org/10.15803/IJNC.5.1_105","url":null,"abstract":"In a graph or a network  G =( V,E ), a set  SâS† V is a 2-packing if  ∀ i ∈ V : | N [ i ] ∩S|≤ 1, where N [ i ] denotes the closed neighborhood of node i . A 2-packing is maximal if no proper superset of S is a 2-packing. This paper presents a safely converging self-stabilizing algorithm for maximal 2-packing problem. Under a synchronous daemon, it quickly converges to a 2- packing (a safe state, not necessarily the legitimate state) in three synchronous steps, and then terminates in a maximal one (the legitimate state) in O ( n ) steps without breaking safety during the convergence interval, where n is the number of nodes. Space requirement at each node is O (log n ) bits. This is a significant improvement over the most recent self-stabilizing algorithm for maximal 2-packing that uses O ( n 2 ) synchronous steps with same space complexity and that does not have safe convergence property. We then generalize the technique to design a self- stabilizing algorithm for maximal k -packing, k ≥ 2, with safe convergence that stabilizes in O ( kn 2 ) steps under synchronous daemon; the algorithm has space complexity of O ( kn log n ) bits at each node; existing algorithms for k -packing stabilize in exponential time under a central daemon with O (log n ) space complexity.Â","PeriodicalId":270166,"journal":{"name":"Int. J. Netw. Comput.","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-01-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125401193","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
An Adaptive Routing Algorithm of 2-D Torus Network Based on Turn Model: The Communication Performance 基于转弯模型的二维环面网络自适应路由算法:通信性能
Int. J. Netw. Comput. Pub Date : 2015-01-10 DOI: 10.15803/IJNC.5.1_223
Y. Miura, Kentaro Shimozono, Naohisa Fukase, S. Watanabe, Kazuya Matoyama
{"title":"An Adaptive Routing Algorithm of 2-D Torus Network Based on Turn Model: The Communication Performance","authors":"Y. Miura, Kentaro Shimozono, Naohisa Fukase, S. Watanabe, Kazuya Matoyama","doi":"10.15803/IJNC.5.1_223","DOIUrl":"https://doi.org/10.15803/IJNC.5.1_223","url":null,"abstract":"A 2-D torus network is one of the most popular networks for parallel processing. Many algorithms have been proposed based on the turn model, but most of them cannot be applied to a torus network without modification. In this paper, we propose North-South First (NSF) routing that is applicable to a 2-D torus and combines the north-first method (NF) and the south-first method (SF). NF and SF are algorithms yielded by the turn model. A software simulation comparing NSF routing with other forms of deterministic and adaptive routing showed that NSF routing improves throughput in three types of communication patterns, but yields no improvement for one other communication pattern.Â","PeriodicalId":270166,"journal":{"name":"Int. J. Netw. Comput.","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-01-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128204551","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Composing resilience techniques: ABFT, periodic and incremental checkpointing 组合弹性技术:ABFT、周期性和增量检查点
Int. J. Netw. Comput. Pub Date : 2015-01-10 DOI: 10.15803/IJNC.5.1_2
G. Bosilca, Aurélien Bouteiller, T. Hérault, Y. Robert, J. Dongarra
{"title":"Composing resilience techniques: ABFT, periodic and incremental checkpointing","authors":"G. Bosilca, Aurélien Bouteiller, T. Hérault, Y. Robert, J. Dongarra","doi":"10.15803/IJNC.5.1_2","DOIUrl":"https://doi.org/10.15803/IJNC.5.1_2","url":null,"abstract":"Algorithm Based Fault Tolerant (ABFT) approaches promise unparalleled scalability and performance in failure-prone environments. Thanks to recent advances in the understanding of the involved mechanisms, a growing number of important algorithms (including all widely used factorizations) have been proven ABFT-capable. In the context of larger applications, these algorithms provide a temporal section of the execution, where the data is protected by its own intrinsic properties, and can therefore be algorithmically recomputed without the need of checkpoints. However, while typical scientific applications spend a significant fraction of their execution time in library calls that can be ABFT-protected, they interleave sections that are difficult or even impossible to protect with ABFT. As a consequence, the only practical fault-tolerance approach for these applications is checkpoint/restart. In this paper we propose a model to investigate the efficiency of a composite protocol, that alternates between ABFT and checkpoint/restart for the effective protection of an iterative application composed of ABFT- aware and ABFT-unaware sections. We also consider an incremental checkpointing composite approach in which the algorithmic knowledge is leveraged by a novel optimal dynamic program- ming to compute checkpoint dates. We validate these models using a simulator. The model and simulator show that the composite approach drastically increases the performance delivered by an execution platform, especially at scale, by providing the means to increase the interval between checkpoints while simultaneously decreasing the volume of each checkpoint.","PeriodicalId":270166,"journal":{"name":"Int. J. Netw. Comput.","volume":"131 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-01-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122409355","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 24
A Novel Computational Model for GPUs with Applications to Efficient Algorithms 一种新的gpu计算模型及其在高效算法中的应用
Int. J. Netw. Comput. Pub Date : 2015-01-10 DOI: 10.15803/IJNC.5.1_26
A. Koike, K. Sadakane
{"title":"A Novel Computational Model for GPUs with Applications to Efficient Algorithms","authors":"A. Koike, K. Sadakane","doi":"10.15803/IJNC.5.1_26","DOIUrl":"https://doi.org/10.15803/IJNC.5.1_26","url":null,"abstract":"We propose a novel computational model for GPUs. Known parallel computational models such as the PRAM model are not appropriate for evaluating GPU-based algorithms. Our model, called AGPU , abstracts the essence of current GPU architectures such as global and shared memory, memory coalescing and bank conflicts. Using our model, we can evaluate asymptotic behavior of GPU algorithms more efficiently than the known models and we can develop algorithms that run fast on real GPU devices. As a showcase, we analyze the asymptotic behavior of basic existing algorithms including reduction, prefix scan, and comparison sorting. We further develop new algorithms by detecting and resolving performance bottlenecks of the existing algorithms. Our reduction algorithm has the optimal time and I/O complexities and works with non-commutative operators. Our com- parison sorting algorithm has the optimal I/O complexity. Additionally, we show our algorithms run faster than the existing algorithms not only in theory but also in practice.Â","PeriodicalId":270166,"journal":{"name":"Int. J. Netw. Comput.","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-01-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127743206","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Development of an Algorithm for Extracting Parallelism and Pipeline Structure from Stream-based Processing flow with Spanning Tree 基于生成树的流处理流并行性和管道结构提取算法研究
Int. J. Netw. Comput. Pub Date : 2015-01-10 DOI: 10.15803/IJNC.5.1_159
S. Yamagiwa, G. Wang, K. Wada
{"title":"Development of an Algorithm for Extracting Parallelism and Pipeline Structure from Stream-based Processing flow with Spanning Tree","authors":"S. Yamagiwa, G. Wang, K. Wada","doi":"10.15803/IJNC.5.1_159","DOIUrl":"https://doi.org/10.15803/IJNC.5.1_159","url":null,"abstract":"It is a fashion to use the manycore accelerators to promote the computing power in a computing platform. Especially GPU is one of the main series of the high performance computing, which is also employed by top supercomputers in the world. Programming methods on such accelerators includes development of control programs which accelerators executes to schedule the invocation of the accelerator’s kernel program. The kernel program needs to be written based on the stream computing paradigm. Connecting I/Os of the kernel programs, we can develop a large application. When we consider the processing flow as a directed graph, we can implement a GUI-based programming tool for the accelerators. It visualizes a pipeline-based processing flow. However, it is very hard to find a starting point of a complex processing flow. Moreover, although the processing pipeline include the potential parallelism, it is hard for the programmer to exploit it intuitively. This paper proposes an algorithm applying the spanning tree that mechanically exploits the parallelism and determines an execution order. To verify the algorithm, this paper performs evaluation with realistic applications. The algorithm exploits effectively the parallelism and construct the optimal pipeline processing flow.Â","PeriodicalId":270166,"journal":{"name":"Int. J. Netw. Comput.","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-01-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133980091","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Handling Non-determinism with Description Logics using a Fork/Join Approach 使用Fork/Join方法处理描述逻辑的非确定性
Int. J. Netw. Comput. Pub Date : 2015-01-10 DOI: 10.15803/IJNC.5.1_61
J. Faddoul, W. MacCaull
{"title":"Handling Non-determinism with Description Logics using a Fork/Join Approach","authors":"J. Faddoul, W. MacCaull","doi":"10.15803/IJNC.5.1_61","DOIUrl":"https://doi.org/10.15803/IJNC.5.1_61","url":null,"abstract":"The increasing use of Ontologies, formulated using expressive Description Logics, for time sensitive applications necessitates the development of fast (near realtime) reasoning tools. Mul- ticore processors are nowadays widespread across desktop, laptop, server, and even smartphone and tablets devices. The rise of such powerful execution environments calls for new parallel and distributed Description Logics (DLs) reasoning algorithms. Many sophisticated optimizations have been explored and have considerably enhanced DL reasoning with light ontologies. Non- determinism remains a main source of complexity for implemented systems handling ontologies relying on more expressive logics. In this work, we explore handling non-determinism with DL languages enabling qualified cardinality restrictions. We implement a fork/join parallel framework into our tableau-based al- gebraic reasoner, which handles qualified cardinality restrictions and nominals using in-equation solving. The preliminary results are encouraging and show that using a parallel framework with algebraic reasoning is worth investigating and more promising than parallelizing standard tableau-based reasoning.Â","PeriodicalId":270166,"journal":{"name":"Int. J. Netw. Comput.","volume":"97 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-01-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127088587","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Employing Cooperative Communication to Recover Network Connectivity in Ad Hoc Networks 利用协作通信恢复Ad Hoc网络中的网络连通性
Int. J. Netw. Comput. Pub Date : 2014-07-14 DOI: 10.15803/IJNC.4.2_336
U. R. Afonseca, Thiago F. Neves, J. Bordim
{"title":"Employing Cooperative Communication to Recover Network Connectivity in Ad Hoc Networks","authors":"U. R. Afonseca, Thiago F. Neves, J. Bordim","doi":"10.15803/IJNC.4.2_336","DOIUrl":"https://doi.org/10.15803/IJNC.4.2_336","url":null,"abstract":"In wireless ad hoc networks, bridges and articulation nodes are critical elements that, in case of failure, render the network disconnected. Owing to their relevance, a number of works try to extend the life span of these elements. Nevertheless, in critical situations, such as the unavailability of a critical link, ways to reestablish the communication, even if for short periods of time, can be of importance in a number of urgent tasks. In this context, this work explores the concept of Cooperative Communication (CC) to monitor critical nodes and links and recover network connectivity in case of disruption. Unlike other works that perform exhaustive search to locate suitable CC-links that require global topology information, the proposed scheme identifies critical nodes and links based solely on local information. Compared to other prominent works, the proposed solution was able to reduce the computing cost to create CC-links in ≈ 67 times in the evaluated scenarios while persisting a lower message overhead.Â","PeriodicalId":270166,"journal":{"name":"Int. J. Netw. Comput.","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114834940","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Using Optical-Approaches to Raise Energy Efficiency of Future Central and/or Linked Distributed Data Center Network Services 使用光学方法提高未来中央和/或分布式数据中心网络服务的能源效率
Int. J. Netw. Comput. Pub Date : 2014-07-14 DOI: 10.15803/IJNC.4.2_209
N. Yamanaka, H. Takeshita, S. Okamoto, Takehiro Sato
{"title":"Using Optical-Approaches to Raise Energy Efficiency of Future Central and/or Linked Distributed Data Center Network Services","authors":"N. Yamanaka, H. Takeshita, S. Okamoto, Takehiro Sato","doi":"10.15803/IJNC.4.2_209","DOIUrl":"https://doi.org/10.15803/IJNC.4.2_209","url":null,"abstract":"Novel optical network architectures are proposed for creating future network services. The �rst architecture is a centralized approach for higher energy efficiency; it yields a data centercentric metro/access optical aggregation network based on wavelength/time- multiplexing. Not only higher application layer functions but also all layer-3 or upper traffic are transferred through the simple metro/access optical aggregation network and switched in a huge centralized giant router at the data center. Its simple optical switching is 200 times more energy efficient and only one electrical router is needed, so power consumption of the network can be reduced ten or twenty fold compared to the existing Internet. The second is service mash-up by linked data through a network that uses broadband optical wire for the IoT era. All service contents,","PeriodicalId":270166,"journal":{"name":"Int. J. Netw. Comput.","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124275140","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Novel List Scheduling Strategies for Data Parallelism Task Graphs 数据并行任务图的新型列表调度策略
Int. J. Netw. Comput. Pub Date : 2014-07-14 DOI: 10.15803/IJNC.4.2_279
Yang Liu, Lin Meng, Ittetsu Taniguchi, H. Tomiyama
{"title":"Novel List Scheduling Strategies for Data Parallelism Task Graphs","authors":"Yang Liu, Lin Meng, Ittetsu Taniguchi, H. Tomiyama","doi":"10.15803/IJNC.4.2_279","DOIUrl":"https://doi.org/10.15803/IJNC.4.2_279","url":null,"abstract":"This paper studies task scheduling algorithms which schedule a set of tasks on multiple cores so that the total scheduling length is minimized. Most of the algorithms developed in the past assume that a task is executed on a single core. Unlike the previous algorithms, the algorithms studied in this paper allow a task to be executed on multiple cores. This paper proposes six algorithms. All of the six algorithms are based on list scheduling, but the strategy for priority assignment is different. In our experiments, the six algorithms as well as an integer linear programming method are evaluated.Â","PeriodicalId":270166,"journal":{"name":"Int. J. Netw. Comput.","volume":"108 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127971138","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
Pronto: A Low Overhead Message Passing System for High Performance Many-Core Processors 一种用于高性能多核处理器的低开销消息传递系统
Int. J. Netw. Comput. Pub Date : 2014-07-14 DOI: 10.15803/IJNC.4.2_307
Sumeet S. Kumar, M. T. A. Djie, R. V. Leuken
{"title":"Pronto: A Low Overhead Message Passing System for High Performance Many-Core Processors","authors":"Sumeet S. Kumar, M. T. A. Djie, R. V. Leuken","doi":"10.15803/IJNC.4.2_307","DOIUrl":"https://doi.org/10.15803/IJNC.4.2_307","url":null,"abstract":"Many-core processors provide the raw computation power required by modern high-performance multimedia and signal processing workloads. The conversion of this computation power into ex- ecution performance is often constrained by the overheads of communication between concurrent tasks. This paper presents Pronto, a low overhead message passing system which simplies the semantics of data movement between communicating tasks by performing buffer management, message synchronization and address translation directly in hardware. The integration of these functions into hardware results in transfer latencies upto 30% shorter than state of the art MPI derivatives. The overheads for communication with Pronto in an 18-core processor array are under 5% for 64-word burst transfers, and less than 0.5% of total execution time using workloads such as the JPEG decoder and FIRlter. Furthermore, this paper also studies the effect of task mapping and interconnect traffic on the predictability of data block arrival times, and provides insight on where interconnect contention can be tolerated.","PeriodicalId":270166,"journal":{"name":"Int. J. Netw. Comput.","volume":"77 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121429715","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信