2022 IEEE 29th International Conference on High Performance Computing, Data and Analytics Workshop (HiPCW)最新文献

筛选
英文 中文
Hands-On, Instructor-Light, Checked and Tracked Training of Trainers in Java Fork-Join Abstractions 在Java Fork-Join抽象的培训师的实践,讲师轻,检查和跟踪培训
P. Dewan, A. Worley, Samuel George, Felipe Yanaga, Andrew Wortas, James Juschuk, Mike Rogers, Sheikh Ghafoor
{"title":"Hands-On, Instructor-Light, Checked and Tracked Training of Trainers in Java Fork-Join Abstractions","authors":"P. Dewan, A. Worley, Samuel George, Felipe Yanaga, Andrew Wortas, James Juschuk, Mike Rogers, Sheikh Ghafoor","doi":"10.1109/HiPCW57629.2022.00009","DOIUrl":"https://doi.org/10.1109/HiPCW57629.2022.00009","url":null,"abstract":"As part of a 3-day workshop on training faculty members in concurrency, we developed a module for hands-on training in Java Fork-Join abstractions that had several related novel pedagogical and technical components: (1) Source and runtime checks that (a) tested whether test-aware code created by the trainees met the expected requirements and (b) logged their results in the local file system and the IBM cloud. (2) Editable worked example code along with a guide on how to understand the underlying concepts behind the code and experiment with the code. (3) The ability to follow the guide (a) synchronously, with graduate student help, in a session devoted to this module, and (b) asynchronously, on one's own, before or after the synchronous session. (4) Assignments trainees could do after experimenting with the worked example. (5) Zoom recording of the entire synchronous session. Fourteen faculty members across the country attended the session and had varying amounts of knowledge of Java and automatic assessment. Data gathered from check logs and a Zoom recording, together with novel visualizations of them, provide information to evaluate our pedagogical model and differentiate the participants.","PeriodicalId":432185,"journal":{"name":"2022 IEEE 29th International Conference on High Performance Computing, Data and Analytics Workshop (HiPCW)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126738390","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Towards Data Gravity and Compliance Aware Distributed Deep Learning on Hybrid Clouds 面向混合云的数据重力和遵从意识分布式深度学习
Avinash Maurya, Jaiaid Mobin, M. M. Rafique
{"title":"Towards Data Gravity and Compliance Aware Distributed Deep Learning on Hybrid Clouds","authors":"Avinash Maurya, Jaiaid Mobin, M. M. Rafique","doi":"10.1109/HiPCW57629.2022.00012","DOIUrl":"https://doi.org/10.1109/HiPCW57629.2022.00012","url":null,"abstract":"To store large volumes of data concurrently from a diverse set of sources, data stores such as data silos, lakes, and warehouses, have been widely embraced by various organizations. Thanks to data fabric architectures, such scattered data (both structurally and geographically), can be accessed transparently at scale while adhering to various administrative regulations (e.g. governance, privacy, compliance, etc.). However, modern workload schedulers and distributed deep learning (DDL) runtimes are oblivious to the uneven data distribution across different storage services and compliance regulations, leading to sub-optimal resource utilization and training completion times. Al-though state-of-art workflow schedulers such as Apache Hadoop Yarn, Horovod, etc. exploit data locality, they require application developers to explicitly map data and resources available across various cloud services during job submission. These approaches are redundant and counterproductive for next-generation data fabric architectures that feature automated transparency and compliance abstractions for accessing disparate data sources with uneven data distribution. To this end, we propose an algorithm based on greedy programming that leverages the meta-data catalog of data fabric to efficiently determine training schedules based on data gravity, compliance, and resource availability. Our simulations based on synthetic data and resource distribution profiles demonstrate significant improvements in execution times and resource utilization compared to traditional DDL scheduling approaches in hybrid multi-cloud environments.","PeriodicalId":432185,"journal":{"name":"2022 IEEE 29th International Conference on High Performance Computing, Data and Analytics Workshop (HiPCW)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117254636","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Hands-on Approach for Scalable Parallel Applications Development: From Testbed to Petascale 可伸缩并行应用程序开发的实践方法:从测试平台到千兆级
D. Aggarwal, A. Bokshi, Deep Lad
{"title":"A Hands-on Approach for Scalable Parallel Applications Development: From Testbed to Petascale","authors":"D. Aggarwal, A. Bokshi, Deep Lad","doi":"10.1109/HiPCW57629.2022.00010","DOIUrl":"https://doi.org/10.1109/HiPCW57629.2022.00010","url":null,"abstract":"HPC systems are ubiquitous yet inaccessible to college/university students as most universities in India still lack the infrastructure, experience, and budget for setting up an HPC facility. Therefore, it is highly desirable for academia to use effective pedagogy to train students about HPC concepts and develop skills to write parallel applications. In this paper, we present the hands-on approach of learning cluster architecture and the development of applications that can interact with HPC systems in a Parallel and Distributed Computing (PDC) environment. The applications have been developed on a testbed cluster and successfully scaled on the Institute for Plasma Research (IPR) Petascale cluster named ANTYA. These applications have been used as a tool for HPC outreach activities at IPR for training young college students about PDC along with a hands-on understanding of cluster architecture by building testbeds from scratch.","PeriodicalId":432185,"journal":{"name":"2022 IEEE 29th International Conference on High Performance Computing, Data and Analytics Workshop (HiPCW)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124555993","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Visual Guide to MPI All-to-all MPI全方位视觉指南
Nick Netterville, Ke Fan, Sidharth Kumar, Thomas Gilray
{"title":"A Visual Guide to MPI All-to-all","authors":"Nick Netterville, Ke Fan, Sidharth Kumar, Thomas Gilray","doi":"10.1109/HiPCW57629.2022.00008","DOIUrl":"https://doi.org/10.1109/HiPCW57629.2022.00008","url":null,"abstract":"The standard implementation of MPI_Alltoall in MPI libraries (e.g., MPICH, Open-MPI) uses a combination of techniques, such as the spread-out and Bruck algorithms. The spread-out algorithm uses a linear number iterations, in process count $P$, while the Bruck algorithm is logarithmic. The Bruck algorithm transfers more data overall, but with fewer communication steps, and is thus better suited for smaller sized (latency-dominated) messages. MPI implementations dynamically choose the underlying algorithm to use depending upon process count and message size. We have created an easy-to-use, parameterized, interactive web-based visualization that shows the implementation details of both the linear-step spread-out algorithm and the log-step Bruck algorithm, along with the decision tree used to choose between these two algorithms. Our tool visually illustrates and animates the two algorithms, pointing out key differences such as number of iterations, communication pattern and whether they are in-place.","PeriodicalId":432185,"journal":{"name":"2022 IEEE 29th International Conference on High Performance Computing, Data and Analytics Workshop (HiPCW)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129943472","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Verifiable and Practical Compliance for Data Privacy Laws 数据隐私法的可验证和实际遵守
M. Awasthi
{"title":"Verifiable and Practical Compliance for Data Privacy Laws","authors":"M. Awasthi","doi":"10.1109/HiPCW57629.2022.00013","DOIUrl":"https://doi.org/10.1109/HiPCW57629.2022.00013","url":null,"abstract":"A number of governments have legislated privacy laws in recent years. The most prominent international one covering multiple nations is the General Data Protection Regulation (GDPR) of the European Union. Many national and local governments are in the process of tabling similar legislation. To be compliant with privacy laws, software companies providing Software as a Service (SaaS) have changed internal practices to develop applications with a “privacy first” ethos. In addition, these companies (data controllers) have put mechanisms in place for ensuring the privacy and security preparedness of their service providers (data processors), which is currently being done manually using questionnaires. Questionnaires designed to collect compliance information from processors aren't the best instruments. This is due to many reasons including lack of clarity on information to be collected, humans in the information collection loop, and badly designed questionnaires, among others. In this paper, we analyse a few reasons making compliance determination a herculean tasks for both parties and propose a simple mechanism to automate compliance information gathering.","PeriodicalId":432185,"journal":{"name":"2022 IEEE 29th International Conference on High Performance Computing, Data and Analytics Workshop (HiPCW)","volume":"124 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129627507","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Security Analysis of Labeling-Based Control-Flow Integrity Schemes 基于标签的控制流完整性方案的安全性分析
David Demicco, Matthew Cole, Shengdun Wang, Aravind Prakash
{"title":"A Security Analysis of Labeling-Based Control-Flow Integrity Schemes","authors":"David Demicco, Matthew Cole, Shengdun Wang, Aravind Prakash","doi":"10.1109/HiPCW57629.2022.00011","DOIUrl":"https://doi.org/10.1109/HiPCW57629.2022.00011","url":null,"abstract":"Secure and transparent policy enforcement by a cloud provider is crucial in cloud infrastructures. Particularly, enforcement of control-flow integrity (CFI) policy has been widely accepted for stopping software-induced attacks. Using low-level hardware metadata to encode CFI policy is a fairly recent development. Besides moving enforcement out of the software and into the hardware for performance benefit, tagging metadata also offers other benefits in the precision of defenses. We evaluate several different metadata layouts for CFI policy enforcement, and examine the layouts' effects on the number of valid forward edges remaining in a RISC-V binary after policy enforcement. Additionally we look at related work in tag-based tools that provide CFI policy enforcement in order to get a sense of their performance and the design trade-offs they make. We evaluate our policy and the related works in terms of space and precision trade-offs for forward- and backward-edge CFI, finding that some trade-offs have a higher impact on the number of remaining forward edges, notably return address protection. Additionally, we report that existing backward edge protections can be highly effective, reducing the number of remaining backward edges in a protected binary to an average of 0.034% over an equivalent coarse-grained CFI.","PeriodicalId":432185,"journal":{"name":"2022 IEEE 29th International Conference on High Performance Computing, Data and Analytics Workshop (HiPCW)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123454455","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Compendium of Abstracts 摘要汇编
M. Suresh, D. Banerjee
{"title":"Compendium of Abstracts","authors":"M. Suresh, D. Banerjee","doi":"10.1109/HiPCW57629.2022.00015","DOIUrl":"https://doi.org/10.1109/HiPCW57629.2022.00015","url":null,"abstract":"The 14th Student Research Symposium on High-Performance Computing, Data, and Analytics (HiPC) was held from December 18-21, 2022 at Bengaluru 2022. The symposium is aimed at stimulating and fostering student research, and providing an international forum to highlight student research accomplishments. One of the main goals of the symposium is to introduce aspiring researchers to the world of systems research and specifically in the context of data analytics and engineering. The symposium, held in conjunction with the main conference, provides an excellent opportunity for students to present, discuss, exchange ideas, and network with some of the leaders of the domain. The symposium will also provide them an exposure to the best practices in HPC in academia and industry. The 2022 SRS features 16 student posters and provides students with other enriching experiences, such as workshops, industry exhibits, and demos. The symposium in general enables students and upcoming researchers to interact with HPC researchers and practitioners (and recruiters) from academia and industry.","PeriodicalId":432185,"journal":{"name":"2022 IEEE 29th International Conference on High Performance Computing, Data and Analytics Workshop (HiPCW)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128303041","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信