首页 > 最新文献

7th International Symposium on Parallel Architectures, Algorithms and Networks, 2004. Proceedings.最新文献

英文 中文
Long fat pipe congestion control for multi-stream data transfer 多流数据传输的长胖管道拥塞控制
Makoto Nakamura, Hiroyuki Kamezawa, J. Tamatsukuri, M. Inaba, K. Hiraki, K. Mizuguchi, K. Torii, S. Nakano, Shizuo Yoshita, Ryutaro Kurusu, Masakazu Sakamoto, Yuki Furukawa, Takeshi Yanagisawa, Yukichi Ikuta, J. Shitami, A. Zinzaki
We point out a problem of the congestion control mechanism of TCP on the long fat pipe network (LFN) by precise analysis using our hand-made tools, and propose a congestion control algorithm for parallel streams and packet spacing algorithm in slow start phase for LFN. This paper presents: (1) observation of TCP/IP multi-stream data transfer across 7500 miles, (2) analysis tools for congestion problem; i.e., packet logging tool and pseudo LFN emulator, (3) pseudo LFN experiments, and (4) modification of congestion control algorithm, balancing parallel streams with TCP fairness and TCP compatibility and packet spacing.
利用自制的工具对长胖网络(LFN)上TCP拥塞控制机制进行了精确分析,指出了该机制存在的问题,并提出了一种并行流拥塞控制算法和LFN慢启动阶段的数据包间隔算法。本文介绍了TCP/IP多流数据在7500英里范围内的传输情况,以及阻塞问题的分析工具;(3)伪LFN实验;(4)拥塞控制算法的改进,利用TCP公平性、TCP兼容性和包间隔平衡并行流。
{"title":"Long fat pipe congestion control for multi-stream data transfer","authors":"Makoto Nakamura, Hiroyuki Kamezawa, J. Tamatsukuri, M. Inaba, K. Hiraki, K. Mizuguchi, K. Torii, S. Nakano, Shizuo Yoshita, Ryutaro Kurusu, Masakazu Sakamoto, Yuki Furukawa, Takeshi Yanagisawa, Yukichi Ikuta, J. Shitami, A. Zinzaki","doi":"10.1109/ISPAN.2004.1300495","DOIUrl":"https://doi.org/10.1109/ISPAN.2004.1300495","url":null,"abstract":"We point out a problem of the congestion control mechanism of TCP on the long fat pipe network (LFN) by precise analysis using our hand-made tools, and propose a congestion control algorithm for parallel streams and packet spacing algorithm in slow start phase for LFN. This paper presents: (1) observation of TCP/IP multi-stream data transfer across 7500 miles, (2) analysis tools for congestion problem; i.e., packet logging tool and pseudo LFN emulator, (3) pseudo LFN experiments, and (4) modification of congestion control algorithm, balancing parallel streams with TCP fairness and TCP compatibility and packet spacing.","PeriodicalId":198404,"journal":{"name":"7th International Symposium on Parallel Architectures, Algorithms and Networks, 2004. Proceedings.","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2004-05-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117351597","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Matrix factorizations for parallel integer transforms 并行整数变换的矩阵分解
Yiyuan She, Pengwei Hao, Y. Paker
Integer mapping is critical for lossless source coding and the techniques have been used for image compression in the new international image compression standard, JPEG 2000. In this paper, from block factorizations for any nonsingular transform matrix, we introduce two types of parallel elementary reversible matrix (PERM) factorizations which are helpful for the parallelization of perfectly reversible integer transforms. With improved degree of parallelism (DOP) and parallel performance, the cost of multiplication and addition can be respectively reduced to O(logN) and O(log2N) for an N-by-N transform matrix. These make PERM factorizations an effective means of developing parallel integer transforms for large matrices. Besides, we also present a scheme to block the matrix and allocate the load of processors for efficient transformation.
整数映射对于无损源编码是至关重要的,并且在新的国际图像压缩标准JPEG 2000中已将该技术用于图像压缩。本文从任意非奇异变换矩阵的分块分解出发,引入了两种有助于完全可逆整数变换并行化的并行初等可逆矩阵分解。通过改进并行度(DOP)和并行性能,对于n × n变换矩阵,乘法和加法的代价可以分别降低到O(logN)和O(log2N)。这使得PERM分解成为求解大矩阵并行整数变换的有效方法。此外,我们还提出了一种阻塞矩阵和分配处理器负载以实现高效变换的方案。
{"title":"Matrix factorizations for parallel integer transforms","authors":"Yiyuan She, Pengwei Hao, Y. Paker","doi":"10.1109/ISPAN.2004.1300489","DOIUrl":"https://doi.org/10.1109/ISPAN.2004.1300489","url":null,"abstract":"Integer mapping is critical for lossless source coding and the techniques have been used for image compression in the new international image compression standard, JPEG 2000. In this paper, from block factorizations for any nonsingular transform matrix, we introduce two types of parallel elementary reversible matrix (PERM) factorizations which are helpful for the parallelization of perfectly reversible integer transforms. With improved degree of parallelism (DOP) and parallel performance, the cost of multiplication and addition can be respectively reduced to O(logN) and O(log2N) for an N-by-N transform matrix. These make PERM factorizations an effective means of developing parallel integer transforms for large matrices. Besides, we also present a scheme to block the matrix and allocate the load of processors for efficient transformation.","PeriodicalId":198404,"journal":{"name":"7th International Symposium on Parallel Architectures, Algorithms and Networks, 2004. Proceedings.","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2004-05-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133098547","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A marking scheme using Huffman codes for IP traceback 一种利用霍夫曼码进行IP溯源的标记方案
K. Choi, H. K. Dai
In (distributed) denial of service attack ((D)DoS), attackers send a huge number of packets with spoofed source addresses to disguise themselves toward a target host or network Various IP traceback techniques such as link testing, marking, and logging to find out the real source of attacking packets have been proposed. We present a marking scheme (with marking and traceback algorithms) in which a router marks a packet with a link that the packet came through. Links of a router are represented by Huffman codes according to the traffic distribution among the links. If the packet runs out of space allotted for the marking field in the packet header, then the router stores the marking field in the router's local memory along with a message digest of the packet. We analyze the memory requirement of routers to store marking fields, compare the scheme with other existing techniques, and address practical issues to deploy the scheme in the Internet. The scheme marks every packet, therefore IP traceback can be accomplished with only a packet unlike in probabilistic markings; also it requires far less amount of memory compared to logging methods and is robust in case of DDoS.
在(分布式)拒绝服务攻击(DoS)中,攻击者向目标主机或网络发送大量带有欺骗源地址的数据包,以伪装自己。为了找出攻击数据包的真实来源,人们提出了各种IP溯源技术,如链路测试、标记、日志记录等。我们提出了一种标记方案(带有标记和回溯算法),其中路由器用数据包经过的链路标记数据包。路由器的链路根据流量在链路间的分布情况用霍夫曼码表示。如果数据包用完了包头中标记字段分配的空间,那么路由器将标记字段与数据包的消息摘要一起存储在路由器的本地内存中。分析了路由器存储标记字段的内存需求,并将该方案与其他现有技术进行了比较,提出了在Internet上部署该方案的实际问题。该方案对每个数据包进行标记,因此与概率标记不同,只需一个数据包即可完成IP溯源;此外,与日志方法相比,它需要的内存量要少得多,并且在DDoS情况下非常健壮。
{"title":"A marking scheme using Huffman codes for IP traceback","authors":"K. Choi, H. K. Dai","doi":"10.1109/ISPAN.2004.1300516","DOIUrl":"https://doi.org/10.1109/ISPAN.2004.1300516","url":null,"abstract":"In (distributed) denial of service attack ((D)DoS), attackers send a huge number of packets with spoofed source addresses to disguise themselves toward a target host or network Various IP traceback techniques such as link testing, marking, and logging to find out the real source of attacking packets have been proposed. We present a marking scheme (with marking and traceback algorithms) in which a router marks a packet with a link that the packet came through. Links of a router are represented by Huffman codes according to the traffic distribution among the links. If the packet runs out of space allotted for the marking field in the packet header, then the router stores the marking field in the router's local memory along with a message digest of the packet. We analyze the memory requirement of routers to store marking fields, compare the scheme with other existing techniques, and address practical issues to deploy the scheme in the Internet. The scheme marks every packet, therefore IP traceback can be accomplished with only a packet unlike in probabilistic markings; also it requires far less amount of memory compared to logging methods and is robust in case of DDoS.","PeriodicalId":198404,"journal":{"name":"7th International Symposium on Parallel Architectures, Algorithms and Networks, 2004. Proceedings.","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2004-05-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121754252","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 61
Pancyclicity on Mobius cubes with edge faults 带边缘断层的莫比乌斯立方体的全循环性
S. Hsieh, Chun-Hua Chen
A graph G = (V, E) is said to be pancyclic if it contains cycles of all lengths from 4 to |V| in G. Let F/sub e/ be the set of faulty edges. In this paper, we show that an n-dimensional Mobius cube, n /spl ges/ 1, contains a fault-free Hamiltonian path when |F/sub e/| /spl les/ n-1. We also show that an n-dimensional Mobius cube, n /spl ges/ 2, is pancyclic when |F/sub e/| /spl les/ n-2. Since an n-dimensional Mobius cube is regular of degree n, both results are optimal in the worst case.
如果图G = (V, E)包含G中从4到|V|的所有长度的环,则称其为全环。设F/下标E /为缺陷边的集合。在本文中,我们证明了n维Mobius立方体n / splges / 1,当|F/sub / e/| / splles / n-1时存在无故障哈密顿路径。我们还证明了n维莫比乌斯立方体n /spl ges/ 2在|F/sub / e/| /spl les/ n-2时是全环的。由于n维莫比乌斯立方体是n次正则,所以在最坏情况下,这两种结果都是最优的。
{"title":"Pancyclicity on Mobius cubes with edge faults","authors":"S. Hsieh, Chun-Hua Chen","doi":"10.1109/ISPAN.2004.1300476","DOIUrl":"https://doi.org/10.1109/ISPAN.2004.1300476","url":null,"abstract":"A graph G = (V, E) is said to be pancyclic if it contains cycles of all lengths from 4 to |V| in G. Let F/sub e/ be the set of faulty edges. In this paper, we show that an n-dimensional Mobius cube, n /spl ges/ 1, contains a fault-free Hamiltonian path when |F/sub e/| /spl les/ n-1. We also show that an n-dimensional Mobius cube, n /spl ges/ 2, is pancyclic when |F/sub e/| /spl les/ n-2. Since an n-dimensional Mobius cube is regular of degree n, both results are optimal in the worst case.","PeriodicalId":198404,"journal":{"name":"7th International Symposium on Parallel Architectures, Algorithms and Networks, 2004. Proceedings.","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2004-05-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122412312","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Bounds on the client-server incremental computing 客户端-服务器增量计算的边界
Cho-Chin Lin, Da-Wei Wang, T. Hsu
We discuss the problem of finding a dominating sequence for sending the input data items from a low-end client to a server for computational intensive tasks under the realistic assumption of unpredictable communication behaviors. Under the assumption, the client sends the input data items using a specified sequence to maximum the number of computations performed at the server at any moment. The sequence-finding problem is NP-hard for the general case. In this paper, we address two fundamental and useful applications: matrix multiplication and fast Fourier transform. We have shown that the sequence-finding problems of the applications can be solved optimally in linear time. However, we have also shown counter examples to rule out any possibility of finding a dominating sequence for the sparse cases. Finally, a simulation is conducted to show the correctness and usefulness of our results.
我们讨论了在通信行为不可预测的现实假设下,为计算密集型任务从低端客户端向服务器发送输入数据项寻找支配序列的问题。在这种假设下,客户机使用指定的序列发送输入数据项,以使服务器在任一时刻执行的计算数量最大化。序列查找问题在一般情况下是np困难的。在本文中,我们讨论了两个基本和有用的应用:矩阵乘法和快速傅里叶变换。我们已经证明了应用程序的序列查找问题可以在线性时间内得到最优解决。然而,我们也展示了反例,以排除在稀疏情况下找到支配序列的任何可能性。最后通过仿真验证了所得结果的正确性和实用性。
{"title":"Bounds on the client-server incremental computing","authors":"Cho-Chin Lin, Da-Wei Wang, T. Hsu","doi":"10.1093/ietfec/e89-a.5.1198","DOIUrl":"https://doi.org/10.1093/ietfec/e89-a.5.1198","url":null,"abstract":"We discuss the problem of finding a dominating sequence for sending the input data items from a low-end client to a server for computational intensive tasks under the realistic assumption of unpredictable communication behaviors. Under the assumption, the client sends the input data items using a specified sequence to maximum the number of computations performed at the server at any moment. The sequence-finding problem is NP-hard for the general case. In this paper, we address two fundamental and useful applications: matrix multiplication and fast Fourier transform. We have shown that the sequence-finding problems of the applications can be solved optimally in linear time. However, we have also shown counter examples to rule out any possibility of finding a dominating sequence for the sparse cases. Finally, a simulation is conducted to show the correctness and usefulness of our results.","PeriodicalId":198404,"journal":{"name":"7th International Symposium on Parallel Architectures, Algorithms and Networks, 2004. Proceedings.","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2004-05-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128491407","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Computing the rupture degrees of graphs 计算图的破裂度
Fengwei Li, Xueliang Li
The rupture degree of a noncomplete connected graph G is defined by r(G) = max{/spl omega/(G - X) - |X| - m(G - X) : X /spl sub/ V(G), /spl omega/(G - X) /spl ges/ 2}, where /spl omega/(G - X) denotes the number of components in the graph G - X. For a complete graph K/sub n/, we define r(K/sub n/) = 1 - n. This parameter can be used to measure the vulnerability of a graph. To some extent, it represents a trade-off between the amount of work done to damage the network and how badly the network is damaged. In this paper, we prove that the problem of computing the rupture degree of a graph is NP-complete. We obtain the rupture degree of the Cartesian product of some special graphs and also give the exact values or bounds for the rupture degrees of Harary graphs.
非完全连通图G的破裂程度定义为r(G) = max{/spl omega/(G - X) - |X| - m(G - X): X /spl sub/ V(G), /spl omega/(G - X) /spl ges/ 2},其中/spl omega/(G - X)表示图G - X中的分量数。对于完全图K/sub n/,我们定义r(K/sub n/) = 1 - n,这个参数可以用来衡量图的易碎性。在某种程度上,它代表了破坏网络的工作量和网络破坏的严重程度之间的权衡。本文证明了图的破裂度计算问题是np完全的。我们得到了一些特殊图的笛卡尔积的破裂度,并给出了一些特殊图的破裂度的精确值或界。
{"title":"Computing the rupture degrees of graphs","authors":"Fengwei Li, Xueliang Li","doi":"10.1109/ISPAN.2004.1300507","DOIUrl":"https://doi.org/10.1109/ISPAN.2004.1300507","url":null,"abstract":"The rupture degree of a noncomplete connected graph G is defined by r(G) = max{/spl omega/(G - X) - |X| - m(G - X) : X /spl sub/ V(G), /spl omega/(G - X) /spl ges/ 2}, where /spl omega/(G - X) denotes the number of components in the graph G - X. For a complete graph K/sub n/, we define r(K/sub n/) = 1 - n. This parameter can be used to measure the vulnerability of a graph. To some extent, it represents a trade-off between the amount of work done to damage the network and how badly the network is damaged. In this paper, we prove that the problem of computing the rupture degree of a graph is NP-complete. We obtain the rupture degree of the Cartesian product of some special graphs and also give the exact values or bounds for the rupture degrees of Harary graphs.","PeriodicalId":198404,"journal":{"name":"7th International Symposium on Parallel Architectures, Algorithms and Networks, 2004. Proceedings.","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2004-05-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129598965","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 22
Processor mapping technique for communication free data redistribution on symmetrical matrix 对称矩阵上无通信数据重分配的处理器映射技术
Ching-Hsien Hsu, Kun-Ming Yu
In this paper, we present the processor mapping technique to eliminate amount of data exchange in runtime data redistribution on symmetric matrices. The main idea of the proposed technique is to develop mathematical functions for mapping destination processors to a new sequence of processor id. The realigned order of destination processors is then used to perform data redistribution in the receiving phase. Together with a local matrix transposition scheme, interprocessor communication can be totally eliminated in runtime redistribution. The other improvement of this approach is that one does not need to compute the complicated communication sets. The indexing cost is reduced largely. The theoretical analysis shows that (p-1)/p data transmission cost can be saved for a redistribution over p/spl times/p processors grid. Experimental result also shows that the processor mapping technique provides superior improvement for runtime data redistribution.
在本文中,我们提出了处理器映射技术,以消除运行时数据在对称矩阵上重新分配时的数据交换量。该技术的主要思想是开发将目标处理器映射到新的处理器id序列的数学函数。然后,目标处理器的重新排列顺序用于在接收阶段执行数据重新分配。结合局部矩阵变换方案,可以完全消除运行时重分发时的处理器间通信。这种方法的另一个改进是不需要计算复杂的通信集。索引成本大大降低。理论分析表明,在p/spl次/p个处理器网格上进行重新分配可以节省(p-1)/p个数据传输成本。实验结果还表明,处理器映射技术对运行时数据重分配有较好的改善。
{"title":"Processor mapping technique for communication free data redistribution on symmetrical matrix","authors":"Ching-Hsien Hsu, Kun-Ming Yu","doi":"10.1109/ISPAN.2004.1300483","DOIUrl":"https://doi.org/10.1109/ISPAN.2004.1300483","url":null,"abstract":"In this paper, we present the processor mapping technique to eliminate amount of data exchange in runtime data redistribution on symmetric matrices. The main idea of the proposed technique is to develop mathematical functions for mapping destination processors to a new sequence of processor id. The realigned order of destination processors is then used to perform data redistribution in the receiving phase. Together with a local matrix transposition scheme, interprocessor communication can be totally eliminated in runtime redistribution. The other improvement of this approach is that one does not need to compute the complicated communication sets. The indexing cost is reduced largely. The theoretical analysis shows that (p-1)/p data transmission cost can be saved for a redistribution over p/spl times/p processors grid. Experimental result also shows that the processor mapping technique provides superior improvement for runtime data redistribution.","PeriodicalId":198404,"journal":{"name":"7th International Symposium on Parallel Architectures, Algorithms and Networks, 2004. Proceedings.","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2004-05-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125024375","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A study of concurrency control in Web-based distributed real-time database system using extended time Petri nets 基于web的分布式实时数据库系统中扩展时间Petri网的并发控制研究
Yaojun Han, Changjun Jiang, Xuemei Luo
The Web-based database system has both distributed and real-time features. In addition to satisfying data consistency requirements as in conventional distributed database systems, concurrency control in Web-based distributed real-time database systems (DRTDBS) must also satisfy timing constraints, such as deadlines associated with transactions. So, the concurrency control problems become more complex and extremely difficult in a Web-based DRTDBS. Petri nets are promising tools for modeling and analysis information processing systems that are characterized as being concurrent, asynchronous, parallel and distributed. An extended time Petri net model for describing and analyzing the concurrent control of the Web-based DRTDBS is presented in this paper. The model has features of deadlock-free and serializability and can prevent useless restarts and useless waits. We compose the reduced Petri net models of all sites into a Petri net model for globe concurrent transactions using synchronizing composition. Moreover, the paper largely reduces the scale of the Petri net model for every site with reduction technique before composing. It solves the state explosion problem in reachability analysis of Petri nets. Last, a sufficient and necessary condition for judging whether the whole system is deadlock is given in the paper.
基于web的数据库系统具有分布式和实时性的特点。除了满足传统分布式数据库系统中的数据一致性需求外,基于web的分布式实时数据库系统(DRTDBS)中的并发控制还必须满足时间约束,例如与事务相关的截止日期。因此,在基于web的DRTDBS中,并发控制问题变得更加复杂和极其困难。Petri网是一种很有前途的工具,用于建模和分析具有并发、异步、并行和分布式特征的信息处理系统。本文提出了一种用于描述和分析基于web的DRTDBS并发控制的扩展时间Petri网模型。该模型具有无死锁和可串行化的特点,可以防止无用的重启和无用的等待。我们使用同步组合将所有站点的简化Petri网模型组合成全球并发事务的Petri网模型。此外,本文还利用约简技术对每个站点的Petri网模型进行了大幅度的尺度缩减。解决了Petri网可达性分析中的状态爆炸问题。最后给出了判断整个系统是否为死锁的一个充要条件。
{"title":"A study of concurrency control in Web-based distributed real-time database system using extended time Petri nets","authors":"Yaojun Han, Changjun Jiang, Xuemei Luo","doi":"10.1109/ISPAN.2004.1300459","DOIUrl":"https://doi.org/10.1109/ISPAN.2004.1300459","url":null,"abstract":"The Web-based database system has both distributed and real-time features. In addition to satisfying data consistency requirements as in conventional distributed database systems, concurrency control in Web-based distributed real-time database systems (DRTDBS) must also satisfy timing constraints, such as deadlines associated with transactions. So, the concurrency control problems become more complex and extremely difficult in a Web-based DRTDBS. Petri nets are promising tools for modeling and analysis information processing systems that are characterized as being concurrent, asynchronous, parallel and distributed. An extended time Petri net model for describing and analyzing the concurrent control of the Web-based DRTDBS is presented in this paper. The model has features of deadlock-free and serializability and can prevent useless restarts and useless waits. We compose the reduced Petri net models of all sites into a Petri net model for globe concurrent transactions using synchronizing composition. Moreover, the paper largely reduces the scale of the Petri net model for every site with reduction technique before composing. It solves the state explosion problem in reachability analysis of Petri nets. Last, a sufficient and necessary condition for judging whether the whole system is deadlock is given in the paper.","PeriodicalId":198404,"journal":{"name":"7th International Symposium on Parallel Architectures, Algorithms and Networks, 2004. Proceedings.","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2004-05-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132179267","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Optimal loop scheduling with register constraints using flow graphs 使用流程图的寄存器约束的最优循环调度
Jan Müller, D. Fimmel, R. Merker
We present a novel loop scheduling approach using a generalized flow graph model of the resource constraints. From this model we derive a new flow graph to incorporate register constraints. Our linear programming implementation produces an optimum loop schedule, respecting the constraints on functional units and registers in a single optimization problem. Moreover, the iteration interval is treated as a rational number, and the approach supports heterogeneous processor architectures and pipelined functional units. Compared to earlier approaches, the solution can reduce the problem complexity and solution time, and provide faster loop schedules.
利用资源约束的广义流图模型,提出了一种新的循环调度方法。从这个模型中,我们得到了一个新的流图来包含寄存器约束。我们的线性规划实现产生一个最优的循环调度,在单个优化问题中尊重功能单元和寄存器的约束。此外,迭代间隔被视为一个有理数,并且该方法支持异构处理器架构和流水线功能单元。与早期的方法相比,该解决方案可以减少问题的复杂性和解决时间,并提供更快的循环调度。
{"title":"Optimal loop scheduling with register constraints using flow graphs","authors":"Jan Müller, D. Fimmel, R. Merker","doi":"10.1109/ISPAN.2004.1300478","DOIUrl":"https://doi.org/10.1109/ISPAN.2004.1300478","url":null,"abstract":"We present a novel loop scheduling approach using a generalized flow graph model of the resource constraints. From this model we derive a new flow graph to incorporate register constraints. Our linear programming implementation produces an optimum loop schedule, respecting the constraints on functional units and registers in a single optimization problem. Moreover, the iteration interval is treated as a rational number, and the approach supports heterogeneous processor architectures and pipelined functional units. Compared to earlier approaches, the solution can reduce the problem complexity and solution time, and provide faster loop schedules.","PeriodicalId":198404,"journal":{"name":"7th International Symposium on Parallel Architectures, Algorithms and Networks, 2004. Proceedings.","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2004-05-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133853850","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Exploring core based tree (CBT) in WDM networks WDM网络中基于核心树(CBT)的研究
Jianping Wang, X. Qi, Mei Yang, Biao Chen
In this paper, we explore the routing and wavelength assignment problem for the CBT service in a WDM network where k sources need to send data to a common core node. We formally model the problem as a problem of finding k shortest lightpaths from sources to the core subject to the constraint of wavelength collision free. We define and study several subproblems, each addressing a different objective. For the feasibility and the minimum total cost problems of k shortest lightpaths, we show how the classical network flow algorithms can be modified and applied efficiently on the network flow model constructed on the transformed wavelength graph. For the minimum max-cost problem, we prove its NP-completeness and propose two efficient heuristic algorithms. Simulation results show that the proposed heuristic algorithms perform very close to the calculated lower bounds.
在本文中,我们探讨了在WDM网络中需要k个源向公共核心节点发送数据的CBT服务的路由和波长分配问题。我们将该问题正式建模为在波长无碰撞约束下求出从光源到核心的k条最短光路的问题。我们定义并研究了几个子问题,每个子问题都有不同的目标。对于k最短光路的可行性和最小总代价问题,我们展示了如何对经典网络流算法进行改进,并有效地应用于变换波长图上构建的网络流模型。对于最小最大代价问题,我们证明了它的np完备性,并提出了两种有效的启发式算法。仿真结果表明,所提出的启发式算法非常接近计算出的下界。
{"title":"Exploring core based tree (CBT) in WDM networks","authors":"Jianping Wang, X. Qi, Mei Yang, Biao Chen","doi":"10.1109/ISPAN.2004.1300526","DOIUrl":"https://doi.org/10.1109/ISPAN.2004.1300526","url":null,"abstract":"In this paper, we explore the routing and wavelength assignment problem for the CBT service in a WDM network where k sources need to send data to a common core node. We formally model the problem as a problem of finding k shortest lightpaths from sources to the core subject to the constraint of wavelength collision free. We define and study several subproblems, each addressing a different objective. For the feasibility and the minimum total cost problems of k shortest lightpaths, we show how the classical network flow algorithms can be modified and applied efficiently on the network flow model constructed on the transformed wavelength graph. For the minimum max-cost problem, we prove its NP-completeness and propose two efficient heuristic algorithms. Simulation results show that the proposed heuristic algorithms perform very close to the calculated lower bounds.","PeriodicalId":198404,"journal":{"name":"7th International Symposium on Parallel Architectures, Algorithms and Networks, 2004. Proceedings.","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2004-05-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120891292","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
7th International Symposium on Parallel Architectures, Algorithms and Networks, 2004. Proceedings.
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1