首页 > 最新文献

ACM distinguished dissertations最新文献

英文 中文
Performance analysis of data sharing environments 数据共享环境性能分析
Pub Date : 1992-11-03 DOI: 10.7551/mitpress/5299.001.0001
A. Dan
A data sharing environment consists of multiple loosely coupled transaction processing nodes sharing a common database at the disk level. Apart from the private buffers in each node, the environment may contain an additional global shared buffer in the form of disk cache, file server cache or intermediate shared memory. In this dissertation, we develop a comprehensive analytical model for such a complex environment using a hierarchical approach, where the concurrency control, the CPU queueing discipline and the buffer hit probabilities of the private and shared buffers are first modeled separately, and then integrated through an iterative procedure. To this end, we develop two new submodels: (1) the private buffer model that captures the effects of multi-system buffer invalidation, skewed database access, LRU buffer replacement policy and the rerun transactions, and (2) the shared buffer modeling framework that captures the effects of dependence between the contents of private and the shared buffers, and is used to analyze various shared buffer management policies (SBMPs) proposed in this dissertation. The various policies propagate a granule into the shared buffer after one or more of the following events: database update, shared buffer miss and private buffer replacement. The analytical model is then used to investigate various issues in the design of data sharing environment. Scalability. The model predicts degradation in transaction response time as new nodes are added to the system. Buffer utilization. The model predicts the effectiveness of additional buffer allocation for both the private and shared buffers. Skewed access. The skewed access increases both data contention and buffer hit probability in the system. The resultant effect on the transaction response time is investigated. The response time is found to be more sensitive to skewed data access under two-phase locking (2PL) than under optimistic concurrency control (OCC) protocol. The skewed access also magnifies the effect of invalidation and reduces the utilization of private buffers. Policy selection. The modeling framework is used to select the best SBMP for a given parameter range (private and shared buffer sizes, shared buffer access overhead and delay, number of nodes, database access pattern, update probabilities, etc.). The updates should always be propagated to the shared buffer to alleviate the invalidation problem. For a smaller number of nodes, the effect of dependence between the contents of the private and the shared buffers influences policy selection. Optimal configuration. The model can be used to optimally allocate the buffer between the private and the shared buffers in various system architectures depending on the overhead and delay in accessing the shared buffer. For a larger number of nodes and under skewed database access, the shared buffer can improve the transaction response time significantly.
数据共享环境由多个松散耦合的事务处理节点组成,这些节点在磁盘级别共享一个公共数据库。除了每个节点中的私有缓冲区之外,环境还可能包含一个额外的全局共享缓冲区,其形式为磁盘缓存、文件服务器缓存或中间共享内存。在本文中,我们使用分层方法建立了一个综合的分析模型,其中并发控制,CPU排队规则以及私有和共享缓冲区的缓冲区命中概率首先分别建模,然后通过迭代过程集成。为此,我们开发了两个新的子模型:(1)私有缓冲区模型,该模型捕获了多系统缓冲区失效、倾斜数据库访问、LRU缓冲区替换策略和重新运行事务的影响;(2)共享缓冲区建模框架,该框架捕获了私有缓冲区和共享缓冲区内容之间的依赖关系,并用于分析本文提出的各种共享缓冲区管理策略(SBMPs)。在发生以下一个或多个事件后,各种策略将一个颗粒传播到共享缓冲区:数据库更新、共享缓冲区丢失和私有缓冲区替换。然后利用分析模型对数据共享环境设计中的各种问题进行了探讨。可伸缩性。该模型预测随着新节点添加到系统中,事务响应时间会下降。缓冲区的利用率。该模型预测了私有缓冲区和共享缓冲区额外分配的有效性。倾斜的访问。倾斜访问增加了系统中的数据争用和缓冲区命中概率。研究了对事务响应时间的最终影响。研究发现,与乐观并发控制(OCC)协议相比,在两阶段锁定(2PL)协议下,响应时间对倾斜数据访问更为敏感。倾斜访问还会放大无效的影响,并降低私有缓冲区的利用率。政策选择。建模框架用于为给定的参数范围(私有和共享缓冲区大小、共享缓冲区访问开销和延迟、节点数量、数据库访问模式、更新概率等)选择最佳SBMP。应该始终将更新传播到共享缓冲区,以减轻无效问题。对于较小数量的节点,私有缓冲区和共享缓冲区内容之间的依赖关系会影响策略选择。最优配置。该模型可用于根据访问共享缓冲区的开销和延迟,在各种系统体系结构中优化分配私有缓冲区和共享缓冲区之间的缓冲区。对于节点数量较多且数据库访问倾斜的情况,共享缓冲区可以显著改善事务响应时间。
{"title":"Performance analysis of data sharing environments","authors":"A. Dan","doi":"10.7551/mitpress/5299.001.0001","DOIUrl":"https://doi.org/10.7551/mitpress/5299.001.0001","url":null,"abstract":"A data sharing environment consists of multiple loosely coupled transaction processing nodes sharing a common database at the disk level. Apart from the private buffers in each node, the environment may contain an additional global shared buffer in the form of disk cache, file server cache or intermediate shared memory. In this dissertation, we develop a comprehensive analytical model for such a complex environment using a hierarchical approach, where the concurrency control, the CPU queueing discipline and the buffer hit probabilities of the private and shared buffers are first modeled separately, and then integrated through an iterative procedure. To this end, we develop two new submodels: (1) the private buffer model that captures the effects of multi-system buffer invalidation, skewed database access, LRU buffer replacement policy and the rerun transactions, and (2) the shared buffer modeling framework that captures the effects of dependence between the contents of private and the shared buffers, and is used to analyze various shared buffer management policies (SBMPs) proposed in this dissertation. The various policies propagate a granule into the shared buffer after one or more of the following events: database update, shared buffer miss and private buffer replacement. \u0000The analytical model is then used to investigate various issues in the design of data sharing environment. \u0000Scalability. The model predicts degradation in transaction response time as new nodes are added to the system. \u0000Buffer utilization. The model predicts the effectiveness of additional buffer allocation for both the private and shared buffers. \u0000Skewed access. The skewed access increases both data contention and buffer hit probability in the system. The resultant effect on the transaction response time is investigated. The response time is found to be more sensitive to skewed data access under two-phase locking (2PL) than under optimistic concurrency control (OCC) protocol. The skewed access also magnifies the effect of invalidation and reduces the utilization of private buffers. \u0000Policy selection. The modeling framework is used to select the best SBMP for a given parameter range (private and shared buffer sizes, shared buffer access overhead and delay, number of nodes, database access pattern, update probabilities, etc.). The updates should always be propagated to the shared buffer to alleviate the invalidation problem. For a smaller number of nodes, the effect of dependence between the contents of the private and the shared buffers influences policy selection. \u0000Optimal configuration. The model can be used to optimally allocate the buffer between the private and the shared buffers in various system architectures depending on the overhead and delay in accessing the shared buffer. For a larger number of nodes and under skewed database access, the shared buffer can improve the transaction response time significantly.","PeriodicalId":151524,"journal":{"name":"ACM distinguished dissertations","volume":"255 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1992-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116012102","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 20
Using hard problems to create pseudorandom generators 使用难题创建伪随机生成器
Pub Date : 1992-01-21 DOI: 10.7551/mitpress/7052.001.0001
N. Nisan
It's not surprisingly when entering this site to get the book. One of the popular books now is the using hard problems to create pseudorandom generators. You may be confused because you can't find the book in the book store around your city. Commonly, the popular book will be sold quickly. And when you have found the store to buy the book, it will be so hurt when you run out of it. This is why, searching for this popular book in this website will give you benefit. You will not run out of this book.
这并不奇怪,当进入这个网站得到这本书。现在最流行的书之一是用难题来创建伪随机生成器。你可能会感到困惑,因为你在你所在城市的书店里找不到这本书。通常,受欢迎的书会卖得很快。当你找到商店买书的时候,当你没有书的时候,它会很伤心。这就是为什么在这个网站上搜索这本受欢迎的书会给你带来好处。你不会用完这本书的。
{"title":"Using hard problems to create pseudorandom generators","authors":"N. Nisan","doi":"10.7551/mitpress/7052.001.0001","DOIUrl":"https://doi.org/10.7551/mitpress/7052.001.0001","url":null,"abstract":"It's not surprisingly when entering this site to get the book. One of the popular books now is the using hard problems to create pseudorandom generators. You may be confused because you can't find the book in the book store around your city. Commonly, the popular book will be sold quickly. And when you have found the store to buy the book, it will be so hurt when you run out of it. This is why, searching for this popular book in this website will give you benefit. You will not run out of this book.","PeriodicalId":151524,"journal":{"name":"ACM distinguished dissertations","volume":"81 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1992-01-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127179730","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 23
Trace theory for automatic hierarchical verification of speed-independent circuits 速度无关电路自动分层验证的跟踪理论
Pub Date : 1989-09-07 DOI: 10.7551/mitpress/6874.001.0001
D. Dill
A theory of automatic hierarchical verification of speed-independent circuits is developed and implemented. The theory models circuits as trace structures. Trace structures represent the behaviors of circuits as sets of traces, which sequences of transitions on the circuit's input and output wires. Trace structures form a compositional semantics for circuits: two trace structures can be composed to model connecting the corresponding circuits and transitions can be hidden to model unobservable internal wires. Trace structures express requirements on the behavior of the environment in addition to describing the behavior of a circuit. It is noted that, for composition to work properly, a trace structure must model all possible actions of the environment. This property, called receptiveness, is precisely characterized. Trace structures can also be used as specifications. If one trace structure can be safely substituted for another in all contexts, the first is an implementation of the second. This relationship can be tested by using a decision procedure based on finding the most demanding environment with which a trace structure can be composed. The use of a single formalism for descriptions and specifications greatly simplifies the theory. More importantly, the resulting verification methodology is naturally hierarchical, because specifications at one level of abstraction can be used as descriptions at higher levels of abstraction. Two distinct theories are proposed: prefix-closed trace structures, which can model and specify safety properties, and complete trace structures, which can also deal with liveness and fairness properties. The theory of prefix-closed trace structures has been implemented in an interactive program which has verified and detected bugs in published circuit designs. Complete trace structures are based on regular languages of infinite sequences. The definitions and results pertaining to complete trace structures are very similar to those for prefix-closed trace structures. It is relatively difficult to define and test receptiveness for complete trace structures. The definition of this property is presented in terms of infinite two-player games. The problem of receptiveness is proved to be decidable, by reduction to Church's solvability problem.
提出并实现了一种速度无关电路的自动分层验证理论。该理论将电路建模为轨迹结构。迹线结构将电路的行为表示为一组迹线,这些迹线是电路输入和输出导线上的转换序列。轨迹结构构成了电路的组合语义:可以组合两个轨迹结构来建模连接相应的电路,可以隐藏过渡来建模不可观察的内部线路。轨迹结构除了描述电路的行为外,还表达了对环境行为的要求。值得注意的是,为了使合成正常工作,跟踪结构必须模拟环境的所有可能动作。这种被称为接受性的特性被精确地描述了出来。跟踪结构也可以用作规范。如果一个跟踪结构可以在所有上下文中安全地替换另一个跟踪结构,那么第一个跟踪结构就是第二个跟踪结构的实现。可以通过使用一个决策过程来测试这种关系,该决策过程基于查找可以组合跟踪结构的最苛刻的环境。使用单一的形式描述和说明大大简化了理论。更重要的是,产生的验证方法是自然分层的,因为一个抽象级别上的规范可以用作更高抽象级别上的描述。提出了两种不同的理论:一种是前缀封闭轨迹结构,它可以建模和指定安全性质;另一种是完整轨迹结构,它也可以处理活动性和公平性性质。前缀闭合轨迹结构理论已在交互式程序中实现,该程序验证并检测了已发表电路设计中的错误。完全轨迹结构基于无穷序列的正则语言。完整跟踪结构的定义和结果与前缀封闭跟踪结构的定义和结果非常相似。对于完整的痕量结构,定义和测试接受度是相对困难的。这个性质的定义是在无限双玩家博弈中给出的。通过还原为丘奇的可解性问题,证明了可接受性问题是可决定的。
{"title":"Trace theory for automatic hierarchical verification of speed-independent circuits","authors":"D. Dill","doi":"10.7551/mitpress/6874.001.0001","DOIUrl":"https://doi.org/10.7551/mitpress/6874.001.0001","url":null,"abstract":"A theory of automatic hierarchical verification of speed-independent circuits is developed and implemented. The theory models circuits as trace structures. Trace structures represent the behaviors of circuits as sets of traces, which sequences of transitions on the circuit's input and output wires. Trace structures form a compositional semantics for circuits: two trace structures can be composed to model connecting the corresponding circuits and transitions can be hidden to model unobservable internal wires. Trace structures express requirements on the behavior of the environment in addition to describing the behavior of a circuit. It is noted that, for composition to work properly, a trace structure must model all possible actions of the environment. This property, called receptiveness, is precisely characterized. \u0000Trace structures can also be used as specifications. If one trace structure can be safely substituted for another in all contexts, the first is an implementation of the second. This relationship can be tested by using a decision procedure based on finding the most demanding environment with which a trace structure can be composed. The use of a single formalism for descriptions and specifications greatly simplifies the theory. More importantly, the resulting verification methodology is naturally hierarchical, because specifications at one level of abstraction can be used as descriptions at higher levels of abstraction. \u0000Two distinct theories are proposed: prefix-closed trace structures, which can model and specify safety properties, and complete trace structures, which can also deal with liveness and fairness properties. The theory of prefix-closed trace structures has been implemented in an interactive program which has verified and detected bugs in published circuit designs. \u0000Complete trace structures are based on regular languages of infinite sequences. The definitions and results pertaining to complete trace structures are very similar to those for prefix-closed trace structures. It is relatively difficult to define and test receptiveness for complete trace structures. The definition of this property is presented in terms of infinite two-player games. The problem of receptiveness is proved to be decidable, by reduction to Church's solvability problem.","PeriodicalId":151524,"journal":{"name":"ACM distinguished dissertations","volume":"66 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1989-09-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130948110","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 582
期刊
ACM distinguished dissertations
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1