首页 > 最新文献

2013 15th International Symposium on Symbolic and Numeric Algorithms for Scientific Computing最新文献

英文 中文
Local Rank Distance 本地等级距离
Radu Tudor Ionescu
Researchers have developed a wide variety of methods for string data, that can be applied with success in different fields such as computational biology, natural language processing and so on. Such methods range from clustering techniques used to analyze the phylogenetic trees of different organisms, to kernel methods used to identify authorship or native language from text. Results of such methods are not perfect and can always be improved. Some of these methods are based on a distance or similarity measure for strings, such as Hamming, Levenshtein, Kendall-tau, rank distance, or string kernel. This paper aims to introduce a new distance measure, termed Local Rank Distance (LRD), inspired from the recently introduced Local Patch Dissimilarity for images. Designed to conform to more general principles and adapted to DNA strings, LRD comes to improve over state of the art methods for phylogenetic analysis. This paper shows two applications of LRD. The first application is the phylogenetic analysis of mammals. Experiments show that phylogenetic trees produced by LRD are better or at least similar to those reported in the literature. The second application is to identify native language of English learners. By working at character level, the proposed method is completely language independent and theory neutral. In conclusion, LRD can be used as a general approach to measure string similarity, despite being designed for DNA.
研究人员已经开发了各种各样的字符串数据方法,这些方法可以成功地应用于计算生物学、自然语言处理等不同领域。这些方法包括用于分析不同生物系统发育树的聚类技术,以及用于从文本中识别作者身份或母语的核方法。这些方法的结果并不完美,而且总是可以改进的。其中一些方法基于字符串的距离或相似性度量,如Hamming、Levenshtein、Kendall-tau、秩距离或字符串核。本文旨在引入一种新的距离度量,称为局部秩距离(LRD),其灵感来自于最近引入的图像局部斑块不相似度。LRD的设计符合更普遍的原则,并适应于DNA序列,它改进了目前最先进的系统发育分析方法。本文介绍了LRD的两种应用。第一个应用是哺乳动物的系统发育分析。实验表明,LRD生成的系统发育树与文献报道的系统发育树更好或至少相似。第二个应用是识别英语学习者的母语。通过在字符层面上进行工作,该方法完全独立于语言,理论中立。总之,尽管LRD是为DNA设计的,但它可以作为测量字符串相似性的一般方法。
{"title":"Local Rank Distance","authors":"Radu Tudor Ionescu","doi":"10.1109/SYNASC.2013.36","DOIUrl":"https://doi.org/10.1109/SYNASC.2013.36","url":null,"abstract":"Researchers have developed a wide variety of methods for string data, that can be applied with success in different fields such as computational biology, natural language processing and so on. Such methods range from clustering techniques used to analyze the phylogenetic trees of different organisms, to kernel methods used to identify authorship or native language from text. Results of such methods are not perfect and can always be improved. Some of these methods are based on a distance or similarity measure for strings, such as Hamming, Levenshtein, Kendall-tau, rank distance, or string kernel. This paper aims to introduce a new distance measure, termed Local Rank Distance (LRD), inspired from the recently introduced Local Patch Dissimilarity for images. Designed to conform to more general principles and adapted to DNA strings, LRD comes to improve over state of the art methods for phylogenetic analysis. This paper shows two applications of LRD. The first application is the phylogenetic analysis of mammals. Experiments show that phylogenetic trees produced by LRD are better or at least similar to those reported in the literature. The second application is to identify native language of English learners. By working at character level, the proposed method is completely language independent and theory neutral. In conclusion, LRD can be used as a general approach to measure string similarity, despite being designed for DNA.","PeriodicalId":293085,"journal":{"name":"2013 15th International Symposium on Symbolic and Numeric Algorithms for Scientific Computing","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122121067","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
Common Due-Date Problem: Exact Polynomial Algorithms for a Given Job Sequence 通用截止日期问题:给定作业序列的精确多项式算法
A. Awasthi, Jörg Lässig, Oliver Kramer
This paper considers the problem of scheduling jobs on single and parallel machines where all the jobs possess different processing times but a common due date. There is a penalty involved with each job if it is processed earlier or later than the due date. The objective of the problem is to find the assignment of jobs to machines, the processing sequence of jobs and the time at which they are processed, which minimizes the total penalty incurred due to tardiness or earliness of the jobs. This work presents exact polynomial algorithms for optimizing a given job sequence for single and parallel machines with the run-time complexities of O(n log n) and O(mn2 log n) respectively, where n is the number of jobs and m the number of machines. The algorithms take a sequence consisting of all the jobs (Ji, i = 1,2,...,n) as input and distribute the jobs to machines (for m>1) along with their best completion times so as to get the least possible total penalty for this sequence. We prove the optimality for the single machine case and the runtime complexities of both. Henceforth, we present the results for the benchmark problems and compare with previous work for both single and parallel machine cases, up to 200 jobs.
研究了单并行机器上作业的调度问题,其中所有作业具有不同的加工时间,但有一个共同的到期日。如果每项工作的处理时间早于或晚于截止日期,则会受到处罚。该问题的目标是找到分配给机器的作业,作业的加工顺序和加工时间,以最小化由于延迟或提前作业而产生的总损失。这项工作提出了精确的多项式算法,用于优化单个和并行机器的给定作业序列,其运行时复杂度分别为O(n log n)和O(mn2 log n),其中n是作业数量,m是机器数量。该算法采用由所有作业(Ji, i = 1,2,…,n)组成的序列作为输入,并将作业分配给机器(对于m>1)以及它们的最佳完成时间,以便对该序列获得尽可能小的总惩罚。我们证明了单机情况下的最优性和两者的运行时复杂性。此后,我们给出了基准问题的结果,并将其与以前的单机和并机案例进行了比较,最多可达200个作业。
{"title":"Common Due-Date Problem: Exact Polynomial Algorithms for a Given Job Sequence","authors":"A. Awasthi, Jörg Lässig, Oliver Kramer","doi":"10.1109/SYNASC.2013.41","DOIUrl":"https://doi.org/10.1109/SYNASC.2013.41","url":null,"abstract":"This paper considers the problem of scheduling jobs on single and parallel machines where all the jobs possess different processing times but a common due date. There is a penalty involved with each job if it is processed earlier or later than the due date. The objective of the problem is to find the assignment of jobs to machines, the processing sequence of jobs and the time at which they are processed, which minimizes the total penalty incurred due to tardiness or earliness of the jobs. This work presents exact polynomial algorithms for optimizing a given job sequence for single and parallel machines with the run-time complexities of O(n log n) and O(mn2 log n) respectively, where n is the number of jobs and m the number of machines. The algorithms take a sequence consisting of all the jobs (Ji, i = 1,2,...,n) as input and distribute the jobs to machines (for m>1) along with their best completion times so as to get the least possible total penalty for this sequence. We prove the optimality for the single machine case and the runtime complexities of both. Henceforth, we present the results for the benchmark problems and compare with previous work for both single and parallel machine cases, up to 200 jobs.","PeriodicalId":293085,"journal":{"name":"2013 15th International Symposium on Symbolic and Numeric Algorithms for Scientific Computing","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127047725","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Reducing the Number of Useless Revisions Performed by Constraint Solvers Based on AC-3 减少基于AC-3约束求解器执行的无用修正次数
Cristian Frasinaru, E. F. Olariu
Maintaining arc-consistency during the search is one of the most widely used techniques in solving constraint satisfaction problems. Many algorithms have been developed in order to implement effectively arc-consistency, such as AC-3, AC-4, AC-6 or AC-7. While not as elaborate as others, AC-3 is simple to implement and proves to be efficient for many types of problems. In order to improve the overall performance of an AC-3 based solver it is essential to exploit any specific feature of the problem being solved. In this paper we describe a generic method to reduce the number of useless revisions performed by AC-3 based on the semantics of the constraints, as long as they provide custom information needed by our algorithm. Arithmetic constraints of the form ax + by ? c where x, y are variables of the constraint network, a,b,c are integer values and the operator ? ? {} fit naturally into this framework and AC3-OP becomes a particular case of our algorithm.
在搜索过程中保持弧一致性是解决约束满足问题中应用最广泛的技术之一。为了有效地实现电弧一致性,已经开发了许多算法,如AC-3, AC-4, AC-6或AC-7。虽然不像其他方法那样复杂,但AC-3易于实现,并被证明对许多类型的问题都是有效的。为了提高基于AC-3的求解器的整体性能,必须利用所解决问题的任何特定特征。在本文中,我们描述了一种基于约束语义的通用方法来减少AC-3执行的无用修订的数量,只要它们提供我们的算法所需的自定义信息。ax + by形式的算术约束?C,其中x, y是约束网络的变量,a,b, C是整数值,算子?? {}自然适合这个框架,AC3-OP成为我们算法的一个特殊案例。
{"title":"Reducing the Number of Useless Revisions Performed by Constraint Solvers Based on AC-3","authors":"Cristian Frasinaru, E. F. Olariu","doi":"10.1109/SYNASC.2013.39","DOIUrl":"https://doi.org/10.1109/SYNASC.2013.39","url":null,"abstract":"Maintaining arc-consistency during the search is one of the most widely used techniques in solving constraint satisfaction problems. Many algorithms have been developed in order to implement effectively arc-consistency, such as AC-3, AC-4, AC-6 or AC-7. While not as elaborate as others, AC-3 is simple to implement and proves to be efficient for many types of problems. In order to improve the overall performance of an AC-3 based solver it is essential to exploit any specific feature of the problem being solved. In this paper we describe a generic method to reduce the number of useless revisions performed by AC-3 based on the semantics of the constraints, as long as they provide custom information needed by our algorithm. Arithmetic constraints of the form ax + by ? c where x, y are variables of the constraint network, a,b,c are integer values and the operator ? ? {} fit naturally into this framework and AC3-OP becomes a particular case of our algorithm.","PeriodicalId":293085,"journal":{"name":"2013 15th International Symposium on Symbolic and Numeric Algorithms for Scientific Computing","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117232283","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Securing Communication in a Peer-to-Peer Messaging Middleware 在对等消息传递中间件中保护通信
Péter Szilágyi
Traditionally, message oriented middlewares (MOM) are looked upon as either centralized systems (e.g. AMQP) or a rigidly distributed collection of machines, requiring significant configuration overhead for achieving the desired throughput under the needed security constraints. On the other end of the spectrum, peer-to-peer systems (P2P) in general achieve amazing scalability and fault tolerance, but due to their very nature, are susceptible to various attacks. Since all measures of security have considerable consequences on the system's capabilities, the securing of a peer-to-peer system requires a thorough analysis on the exact designated use-case and environment in which the network is required to operate in, as well as all the possible threats the system must be able to withstand. The paper proposes a security model that bridges the distribution concept of peer-to-peer systems with the necessities of MOMs by rigorously defining the operational environment, assumptions and requirements, on top of which a security protocol was implemented. Taking advantage of the specific use case of P2P MOMs, further optimizations are provided which provide the same security against the defined threat model, but result in significant gains with regard to the overall switching throughput of the network.
传统上,面向消息的中间件(MOM)被视为集中式系统(例如AMQP)或严格分布的机器集合,需要大量的配置开销才能在所需的安全约束下实现所需的吞吐量。另一方面,点对点系统(P2P)通常实现了惊人的可伸缩性和容错性,但由于其本身的性质,容易受到各种攻击。由于所有的安全措施都对系统的功能有相当大的影响,因此确保点对点系统的安全需要对网络需要运行的确切指定用例和环境以及系统必须能够承受的所有可能的威胁进行彻底的分析。本文提出了一个安全模型,通过严格定义操作环境、假设和需求,将点对点系统的分布概念与mom的需求联系起来,并在此基础上实现了安全协议。利用P2P mom的特定用例,提供了进一步的优化,提供了针对定义的威胁模型的相同安全性,但在网络的总体交换吞吐量方面产生了显着的收益。
{"title":"Securing Communication in a Peer-to-Peer Messaging Middleware","authors":"Péter Szilágyi","doi":"10.1109/SYNASC.2013.50","DOIUrl":"https://doi.org/10.1109/SYNASC.2013.50","url":null,"abstract":"Traditionally, message oriented middlewares (MOM) are looked upon as either centralized systems (e.g. AMQP) or a rigidly distributed collection of machines, requiring significant configuration overhead for achieving the desired throughput under the needed security constraints. On the other end of the spectrum, peer-to-peer systems (P2P) in general achieve amazing scalability and fault tolerance, but due to their very nature, are susceptible to various attacks. Since all measures of security have considerable consequences on the system's capabilities, the securing of a peer-to-peer system requires a thorough analysis on the exact designated use-case and environment in which the network is required to operate in, as well as all the possible threats the system must be able to withstand. The paper proposes a security model that bridges the distribution concept of peer-to-peer systems with the necessities of MOMs by rigorously defining the operational environment, assumptions and requirements, on top of which a security protocol was implemented. Taking advantage of the specific use case of P2P MOMs, further optimizations are provided which provide the same security against the defined threat model, but result in significant gains with regard to the overall switching throughput of the network.","PeriodicalId":293085,"journal":{"name":"2013 15th International Symposium on Symbolic and Numeric Algorithms for Scientific Computing","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123004602","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Common Factors in Fraction-Free Matrix Reduction 无分式矩阵约简中的常见因子
J. Middeke, Ahmed Almohaimeed, D. J. Jeffrey
We consider LU factoring of matrices in the context of exact and symbolic computation, as opposed to floating-point computation. Although initially developed for Gaussian elimination, fraction-free methods have been extended to LU factoring and related forms. We present surprising evidence that the rows and columns of the three matrices in the fraction-free form contain more common factors than one would expect. We describe and analyze experimental evidence for the existence of common factors, both in the case of integer matrices and matrices containing polynomials. The factors discovered grow linearly in the size of the matrix being factored. The common factors allow the entries in the factored form to be decreased in size.
我们在精确和符号计算的背景下考虑矩阵的LU分解,而不是浮点计算。虽然最初是为高斯消去而开发的,但无分数方法已扩展到LU分解和相关形式。我们提出了令人惊讶的证据,证明在无分数形式的三个矩阵的行和列包含比人们期望的更多的共同因素。我们描述和分析了在整数矩阵和包含多项式的矩阵中存在公因子的实验证据。所发现的因子随被分解矩阵的大小呈线性增长。公共因子允许因子形式中的条目减小大小。
{"title":"Common Factors in Fraction-Free Matrix Reduction","authors":"J. Middeke, Ahmed Almohaimeed, D. J. Jeffrey","doi":"10.1109/SYNASC.2013.17","DOIUrl":"https://doi.org/10.1109/SYNASC.2013.17","url":null,"abstract":"We consider LU factoring of matrices in the context of exact and symbolic computation, as opposed to floating-point computation. Although initially developed for Gaussian elimination, fraction-free methods have been extended to LU factoring and related forms. We present surprising evidence that the rows and columns of the three matrices in the fraction-free form contain more common factors than one would expect. We describe and analyze experimental evidence for the existence of common factors, both in the case of integer matrices and matrices containing polynomials. The factors discovered grow linearly in the size of the matrix being factored. The common factors allow the entries in the factored form to be decreased in size.","PeriodicalId":293085,"journal":{"name":"2013 15th International Symposium on Symbolic and Numeric Algorithms for Scientific Computing","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123892155","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Quality Assurance for Open Source Software Configuration Management 开源软件配置管理的质量保证
Stefan Meyer, Philip D. Healy, Theo Lynn, J. Morrison
Commonly used open source configuration management systems, such as Puppet, Chef and CFEngine, allow for system configurations to be expressed as scripts. A number of quality issues that may arise when executing these scripts are identified. An automated quality assurance service is proposed that identifies the presence of these issues by automatically executing scripts across a range of environments. Test results are automatically published to a format capable of being consumed by script catalogues and social coding sites. This would serve as an independent signal of script trustworthiness and quality to script consumers and would allow developers to be made quickly aware of quality issues. As a result, potential consumers of scripts can be assured that a script is likely to work when applied to their particular environment. Script developers can be notified of compatibility issues and take steps to address them.
常用的开源配置管理系统,如Puppet、Chef和CFEngine,允许将系统配置表示为脚本。在执行这些脚本时可能会出现许多质量问题。提出了一个自动化的质量保证服务,通过在一系列环境中自动执行脚本来识别这些问题的存在。测试结果被自动发布为能够被脚本目录和社会编码站点使用的格式。这将作为脚本可信度和脚本质量的独立信号,并允许开发人员快速意识到质量问题。因此,脚本的潜在使用者可以确信,当脚本应用于他们的特定环境时,脚本可能会正常工作。脚本开发人员可以收到兼容性问题的通知,并采取措施解决这些问题。
{"title":"Quality Assurance for Open Source Software Configuration Management","authors":"Stefan Meyer, Philip D. Healy, Theo Lynn, J. Morrison","doi":"10.1109/SYNASC.2013.66","DOIUrl":"https://doi.org/10.1109/SYNASC.2013.66","url":null,"abstract":"Commonly used open source configuration management systems, such as Puppet, Chef and CFEngine, allow for system configurations to be expressed as scripts. A number of quality issues that may arise when executing these scripts are identified. An automated quality assurance service is proposed that identifies the presence of these issues by automatically executing scripts across a range of environments. Test results are automatically published to a format capable of being consumed by script catalogues and social coding sites. This would serve as an independent signal of script trustworthiness and quality to script consumers and would allow developers to be made quickly aware of quality issues. As a result, potential consumers of scripts can be assured that a script is likely to work when applied to their particular environment. Script developers can be notified of compatibility issues and take steps to address them.","PeriodicalId":293085,"journal":{"name":"2013 15th International Symposium on Symbolic and Numeric Algorithms for Scientific Computing","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117329178","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
Supporting the Development and Operation of Multi-cloud Applications: The MODAClouds Approach 支持多云应用的开发和运营:modclouds方法
E. D. Nitto, M. A. D. Silva, D. Ardagna, G. Casale, Ciprian Craciun, Nicolas Ferry, Victor Muntés, Arnor Solberg
Vendor lock-in and cloud outages are two important challenges that make IT managers reluctant in widely adopting the cloud within the enterprise. Vendor lock-in happens when the adoption of cloud provider-specific technologies and APIs forces consumers to stay with the same provider even if they would like to change. Cloud outages can happen to any provider, as the events of the last years have largely demonstrated, and have a critical impact on the actual reliability of cloud applications. A solution to both problems could be to support application developers and operators in the adoption of a multi-cloud approach: applications are built to run and replicate on different clouds, and mechanisms for fast switching from a cloud installation to the other are offered. In the MODAClouds project we pursue this approach and rely on model-driven development combined with risk analysis and quality prediction. In this paper we provide an overview of our approach and present the architecture of the corresponding platform.
供应商锁定和云中断是使IT经理不愿在企业内广泛采用云的两个重要挑战。当采用特定于云提供商的技术和api时,即使消费者想要改变,也会迫使他们继续使用同一个提供商。云中断可能发生在任何提供商身上,正如过去几年的事件所证明的那样,并且对云应用程序的实际可靠性产生重大影响。这两个问题的解决方案可能是支持应用程序开发人员和运营商采用多云方法:构建应用程序以在不同的云上运行和复制,并提供从一个云安装快速切换到另一个云安装的机制。在modclouds项目中,我们采用这种方法,并依赖于模型驱动的开发与风险分析和质量预测相结合。在本文中,我们概述了我们的方法,并给出了相应平台的体系结构。
{"title":"Supporting the Development and Operation of Multi-cloud Applications: The MODAClouds Approach","authors":"E. D. Nitto, M. A. D. Silva, D. Ardagna, G. Casale, Ciprian Craciun, Nicolas Ferry, Victor Muntés, Arnor Solberg","doi":"10.1109/SYNASC.2013.61","DOIUrl":"https://doi.org/10.1109/SYNASC.2013.61","url":null,"abstract":"Vendor lock-in and cloud outages are two important challenges that make IT managers reluctant in widely adopting the cloud within the enterprise. Vendor lock-in happens when the adoption of cloud provider-specific technologies and APIs forces consumers to stay with the same provider even if they would like to change. Cloud outages can happen to any provider, as the events of the last years have largely demonstrated, and have a critical impact on the actual reliability of cloud applications. A solution to both problems could be to support application developers and operators in the adoption of a multi-cloud approach: applications are built to run and replicate on different clouds, and mechanisms for fast switching from a cloud installation to the other are offered. In the MODAClouds project we pursue this approach and rely on model-driven development combined with risk analysis and quality prediction. In this paper we provide an overview of our approach and present the architecture of the corresponding platform.","PeriodicalId":293085,"journal":{"name":"2013 15th International Symposium on Symbolic and Numeric Algorithms for Scientific Computing","volume":"212 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115790618","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 40
Adaptive Distributed Data Structure Management for Parallel CFD Applications 并行CFD应用的自适应分布式数据结构管理
J. Frisch, R. Mundani, E. Rank
Computational fluid dynamics (CFD) simulations require a lot of computing resources in terms of CPU time and memory in order to compute with a reasonable physical accuracy. If only uniformly refined domains are applied, the amount of computing cells is growing rather fast if a certain small resolution is physically required. This can be remedied by applying adaptively refined grids. Unfortunately, due to the adaptive refinement procedures, errors are introduced which have to be taken into account. This paper is focussing on implementation details of the applied adaptive data structure management and a qualitative analysis of the introduced errors by analysing a Poisson problem on the given data structure, which has to be solved in every time step of a CFD analysis. Furthermore an adaptive CFD benchmark example is computed, showing the benefits of an adaptive refinement as well as measurements of parallel data distribution and performance.
计算流体动力学(CFD)仿真需要大量的CPU时间和内存资源,才能以合理的物理精度进行计算。如果只应用统一细化的域,如果物理上需要一定的小分辨率,计算单元的数量将增长得相当快。这可以通过应用自适应细化网格来弥补。不幸的是,由于自适应改进过程,引入了必须考虑的误差。本文通过分析给定数据结构上的泊松问题,重点讨论了应用自适应数据结构管理的实现细节,并对引入的误差进行了定性分析,该问题在CFD分析的每个时间步都必须解决。此外,计算了一个自适应CFD基准示例,显示了自适应改进的好处以及并行数据分布和性能的测量。
{"title":"Adaptive Distributed Data Structure Management for Parallel CFD Applications","authors":"J. Frisch, R. Mundani, E. Rank","doi":"10.1109/SYNASC.2013.73","DOIUrl":"https://doi.org/10.1109/SYNASC.2013.73","url":null,"abstract":"Computational fluid dynamics (CFD) simulations require a lot of computing resources in terms of CPU time and memory in order to compute with a reasonable physical accuracy. If only uniformly refined domains are applied, the amount of computing cells is growing rather fast if a certain small resolution is physically required. This can be remedied by applying adaptively refined grids. Unfortunately, due to the adaptive refinement procedures, errors are introduced which have to be taken into account. This paper is focussing on implementation details of the applied adaptive data structure management and a qualitative analysis of the introduced errors by analysing a Poisson problem on the given data structure, which has to be solved in every time step of a CFD analysis. Furthermore an adaptive CFD benchmark example is computed, showing the benefits of an adaptive refinement as well as measurements of parallel data distribution and performance.","PeriodicalId":293085,"journal":{"name":"2013 15th International Symposium on Symbolic and Numeric Algorithms for Scientific Computing","volume":"467 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116184819","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
A Systematic Approach to Computations on Decomposable Graphs 可分解图的系统计算方法
E. Ravve, Z. Volkovich
In this paper, we try to build a bridge between pure theoretical approach to computations on decomposable graphs and heuristics, used in practice for treatment of particular cases of them. In theory, Feferman and Vaught in 1959 proposed a method to reduce solution of First Order definable problems on Disjoint Union of structures to solutions of derived problems on the components with some post-processing of the obtained results. In practice, the literature is very reach in examples of particular methods to deal with different variations of graphs, built from components. From the theoretical point of view we adapt and generalize the Feferman-Vaught method. We define a new kind of decomposable graphs: sum-like graphs and propose a new systematic approach, which allows us to reduce the solution of Monadic Second Order definable problems on such graphs to the solution of effectively derivable Monadic Second Order definable problems on the components. From the practical point of view, we consider in great details one application of our approach in the field of parallel computations on distributed data.
在本文中,我们试图在可分解图的纯理论计算方法和启发式方法之间建立一座桥梁,启发式方法在实践中用于处理可分解图的特定情况。理论上,Feferman和Vaught(1959)提出了一种方法,将结构不相交并上的一阶可定义问题的解简化为构件上的衍生问题的解,并对所得结果进行一些后处理。在实践中,文献中有很多处理由组件构建的图形的不同变化的特定方法的例子。从理论的角度对费曼-沃特方法进行了改进和推广。我们定义了一类新的可分解图:类和图,并提出了一种新的系统方法,使我们能够将该类图上一元二阶可定义问题的解简化为分量上有效可导一元二阶可定义问题的解。从实际的角度来看,我们非常详细地考虑了我们的方法在分布式数据并行计算领域的一个应用。
{"title":"A Systematic Approach to Computations on Decomposable Graphs","authors":"E. Ravve, Z. Volkovich","doi":"10.1109/SYNASC.2013.59","DOIUrl":"https://doi.org/10.1109/SYNASC.2013.59","url":null,"abstract":"In this paper, we try to build a bridge between pure theoretical approach to computations on decomposable graphs and heuristics, used in practice for treatment of particular cases of them. In theory, Feferman and Vaught in 1959 proposed a method to reduce solution of First Order definable problems on Disjoint Union of structures to solutions of derived problems on the components with some post-processing of the obtained results. In practice, the literature is very reach in examples of particular methods to deal with different variations of graphs, built from components. From the theoretical point of view we adapt and generalize the Feferman-Vaught method. We define a new kind of decomposable graphs: sum-like graphs and propose a new systematic approach, which allows us to reduce the solution of Monadic Second Order definable problems on such graphs to the solution of effectively derivable Monadic Second Order definable problems on the components. From the practical point of view, we consider in great details one application of our approach in the field of parallel computations on distributed data.","PeriodicalId":293085,"journal":{"name":"2013 15th International Symposium on Symbolic and Numeric Algorithms for Scientific Computing","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130333768","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Parallel data acquisition for visualization of very large sparse matrices 用于可视化非常大的稀疏矩阵的并行数据采集
D. Langr, I. Šimeček, P. Tvrdík, T. Dytrych
The problem of visualization of very large sparse matrices emerging on massively parallel computer systems is identified and a new method along with an accompanying algorithm for parallel acquisition of visualization data for such matrices are presented. The proposed method is based on downsampling a matrix into blocks for which the desired visualization data are saved into a file. This file is then supposed to be downloaded and processed into a final image on a personal computer. Experimental results for the evaluation of the performance and scalability of the proposed algorithm are further provided and discussed.
针对大规模并行计算机系统中出现的超大型稀疏矩阵的可视化问题,提出了一种新的矩阵可视化数据的并行获取方法及相应的算法。所提出的方法是基于将矩阵降采样成块,并将所需的可视化数据保存到文件中。然后,这个文件应该被下载,并在个人电脑上处理成最终的图像。实验结果进一步验证了该算法的性能和可扩展性。
{"title":"Parallel data acquisition for visualization of very large sparse matrices","authors":"D. Langr, I. Šimeček, P. Tvrdík, T. Dytrych","doi":"10.1109/SYNASC.2013.51","DOIUrl":"https://doi.org/10.1109/SYNASC.2013.51","url":null,"abstract":"The problem of visualization of very large sparse matrices emerging on massively parallel computer systems is identified and a new method along with an accompanying algorithm for parallel acquisition of visualization data for such matrices are presented. The proposed method is based on downsampling a matrix into blocks for which the desired visualization data are saved into a file. This file is then supposed to be downloaded and processed into a final image on a personal computer. Experimental results for the evaluation of the performance and scalability of the proposed algorithm are further provided and discussed.","PeriodicalId":293085,"journal":{"name":"2013 15th International Symposium on Symbolic and Numeric Algorithms for Scientific Computing","volume":"88 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131131266","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
期刊
2013 15th International Symposium on Symbolic and Numeric Algorithms for Scientific Computing
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1