首页 > 最新文献

2010 IEEE 16th International Conference on Parallel and Distributed Systems最新文献

英文 中文
TRIP: Temporal Redundancy Integrated Performance Booster for Parity-Based RAID Storage Systems 基于奇偶校验的RAID存储系统的时间冗余集成性能增强器
Pub Date : 2010-12-08 DOI: 10.1109/ICPADS.2010.49
Chao Jin, D. Feng, Hong Jiang, Lei Tian, Jingning Liu, Xiongzi Ge
Parity redundancy is widely employed in RAID-structured storage systems to protect against disk failures. However, the small-write problem has been a persistent root cause of the performance bottleneck of such parity-based RAID systems, due to the additional parity update overhead upon each write operation. In this paper, we propose a novel RAID architecture, TRIP, based on the conventional parity-based RAID systems. TRIP alleviates the small-write problem by integrating and exploiting the temporal redundancy (i.e., snapshots and logs) that commonly exists in storage systems to protect data from soft errors while boosting write performance. During the write-intensive periods, TRIP can reduce the penalty of each small-write request to as few as one device IO operation, at a minimal cost of maintaining the temporal redundant information. Reliability analysis, in terms of Mean Time to Data Loss (MTTDL), shows that the reliability of TRIP is only marginally affected. On the other hand, our prototype implementation and performance evaluation demonstrate that TRIP significantly outperforms the conventional parity-based RAID systems in data transfer rate and user response time, especially in write-intensive environments.
奇偶校验冗余被广泛应用于raid结构的存储系统中,以防止磁盘故障。然而,小写入问题一直是这种基于奇偶校验的RAID系统性能瓶颈的持久根源,因为每次写入操作都会产生额外的奇偶校验更新开销。本文在传统的基于奇偶校验的RAID系统的基础上,提出了一种新的RAID体系结构——TRIP。TRIP通过集成和利用存储系统中通常存在的时间冗余(即快照和日志)来保护数据免受软错误的影响,同时提高写性能,从而减轻了小写问题。在写密集型期间,TRIP可以将每个小写请求的代价减少到一个设备IO操作,而维护临时冗余信息的代价最小。从平均数据丢失时间(Mean Time to Data Loss, MTTDL)角度进行的可靠性分析表明,TRIP的可靠性仅受到轻微影响。另一方面,我们的原型实现和性能评估表明,TRIP在数据传输速率和用户响应时间方面明显优于传统的基于奇偶校验的RAID系统,特别是在写密集型环境中。
{"title":"TRIP: Temporal Redundancy Integrated Performance Booster for Parity-Based RAID Storage Systems","authors":"Chao Jin, D. Feng, Hong Jiang, Lei Tian, Jingning Liu, Xiongzi Ge","doi":"10.1109/ICPADS.2010.49","DOIUrl":"https://doi.org/10.1109/ICPADS.2010.49","url":null,"abstract":"Parity redundancy is widely employed in RAID-structured storage systems to protect against disk failures. However, the small-write problem has been a persistent root cause of the performance bottleneck of such parity-based RAID systems, due to the additional parity update overhead upon each write operation. In this paper, we propose a novel RAID architecture, TRIP, based on the conventional parity-based RAID systems. TRIP alleviates the small-write problem by integrating and exploiting the temporal redundancy (i.e., snapshots and logs) that commonly exists in storage systems to protect data from soft errors while boosting write performance. During the write-intensive periods, TRIP can reduce the penalty of each small-write request to as few as one device IO operation, at a minimal cost of maintaining the temporal redundant information. Reliability analysis, in terms of Mean Time to Data Loss (MTTDL), shows that the reliability of TRIP is only marginally affected. On the other hand, our prototype implementation and performance evaluation demonstrate that TRIP significantly outperforms the conventional parity-based RAID systems in data transfer rate and user response time, especially in write-intensive environments.","PeriodicalId":365914,"journal":{"name":"2010 IEEE 16th International Conference on Parallel and Distributed Systems","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130600803","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Personalized Reputation Model in Cooperative Distributed Systems 协同分布式系统中的个性化信誉模型
Pub Date : 2010-12-08 DOI: 10.1109/ICPADS.2010.122
W. Liu, Yang-Bin Tang, Huaimin Wang
Reputation systems provide a promising way to build trust relationships between users in distributed cooperation systems, such as file sharing, streaming, distributed computing and social network, through which a user can distinguish good services or users from malicious ones and cooperate with them. However, most reputation models mainly focus on evaluating the quality of services in one dimension, but care less about the preferences of different users. This paper proposes a personalized reputation model which provides each user a personalized trust view on others according to his preferences. In our approach, we aggregate the users’ preferences with collaborative filtering method and qualify it with user similarity which is integrated into the computing of reputation value. The experimental results suggest that our model can resist possible kinds of malicious behaviors efficiently.
信誉系统为文件共享、流媒体、分布式计算、社交网络等分布式合作系统中用户之间建立信任关系提供了一种很有前景的方式,用户可以通过信誉系统区分好的服务或用户与恶意的服务或用户,并与之合作。然而,大多数声誉模型主要集中在一个维度上评价服务质量,而对不同用户的偏好关注较少。本文提出了一种个性化信誉模型,该模型根据用户的偏好为用户提供个性化的对他人的信任视图。在我们的方法中,我们使用协同过滤方法聚合用户的€™偏好,并用用户相似度对其进行限定,并将其集成到声誉值的计算中。实验结果表明,该模型能够有效地抵抗各种可能的恶意行为。
{"title":"Personalized Reputation Model in Cooperative Distributed Systems","authors":"W. Liu, Yang-Bin Tang, Huaimin Wang","doi":"10.1109/ICPADS.2010.122","DOIUrl":"https://doi.org/10.1109/ICPADS.2010.122","url":null,"abstract":"Reputation systems provide a promising way to build trust relationships between users in distributed cooperation systems, such as file sharing, streaming, distributed computing and social network, through which a user can distinguish good services or users from malicious ones and cooperate with them. However, most reputation models mainly focus on evaluating the quality of services in one dimension, but care less about the preferences of different users. This paper proposes a personalized reputation model which provides each user a personalized trust view on others according to his preferences. In our approach, we aggregate the users’ preferences with collaborative filtering method and qualify it with user similarity which is integrated into the computing of reputation value. The experimental results suggest that our model can resist possible kinds of malicious behaviors efficiently.","PeriodicalId":365914,"journal":{"name":"2010 IEEE 16th International Conference on Parallel and Distributed Systems","volume":"250 5","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133203630","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Design and Practice on iVCE for Memory System 存储系统iVCE的设计与实践
Pub Date : 2010-12-08 DOI: 10.1109/ICPADS.2010.62
Rui Chu, Tian Tian, Zhenli Lin
As one of the components in iVCE software platform, iVCE/M devotes to the performance improvement of the I/O-intensive and memory-intensive applications with efficient aggregation of distributed memory resources. To facilitate the deployment of iVCE/M, the data locating algorithm with balanced time and space cost, as well as the transparent interface for the legacy applications without code modification, are both significant in the implementation of iVCE/M. We propose the logarithmic search tree based client-side metadata structure to accelerate the data locating using moderate memory consumption, the implicit I/O redirection mechanism, and the implementation of iVCE/M based disk cache system. The experiments with cross domain emulation prove that the scheme is applicable to exploit the distributed memory resources for applications with small granularity I/O accesses.
iVCE/M作为iVCE软件平台的组成部分之一,通过对分布式内存资源的高效聚合,致力于I/ o密集型和内存密集型应用的性能提升。为了方便iVCE/M的部署,平衡时间和空间成本的数据定位算法以及无需修改代码即可为遗留应用程序提供透明的接口都是实现iVCE/M的重要因素。我们提出了基于对数搜索树的客户端元数据结构,利用适度的内存消耗、隐式I/O重定向机制和基于iVCE/M的磁盘缓存系统来加速数据定位。跨域仿真实验证明,该方案适用于小粒度I/O访问应用的分布式内存资源开发。
{"title":"Design and Practice on iVCE for Memory System","authors":"Rui Chu, Tian Tian, Zhenli Lin","doi":"10.1109/ICPADS.2010.62","DOIUrl":"https://doi.org/10.1109/ICPADS.2010.62","url":null,"abstract":"As one of the components in iVCE software platform, iVCE/M devotes to the performance improvement of the I/O-intensive and memory-intensive applications with efficient aggregation of distributed memory resources. To facilitate the deployment of iVCE/M, the data locating algorithm with balanced time and space cost, as well as the transparent interface for the legacy applications without code modification, are both significant in the implementation of iVCE/M. We propose the logarithmic search tree based client-side metadata structure to accelerate the data locating using moderate memory consumption, the implicit I/O redirection mechanism, and the implementation of iVCE/M based disk cache system. The experiments with cross domain emulation prove that the scheme is applicable to exploit the distributed memory resources for applications with small granularity I/O accesses.","PeriodicalId":365914,"journal":{"name":"2010 IEEE 16th International Conference on Parallel and Distributed Systems","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122003844","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
VMGuard: An Integrity Monitoring System for Management Virtual Machines VMGuard:用于管理虚拟机的完整性监控系统
Pub Date : 2010-12-08 DOI: 10.1109/ICPADS.2010.44
Haifeng Fang, Yiqiang Zhao, Hongyong Zang, H. H. Huang, Ying Song, Yuzhong Sun, Zhiyong Liu
A cloud computing provider can dynamically allocate virtual machines (VM) based on the needs of the customers, while maintaining the privileged access to the Management Virtual Machine that directly manages the hardware and supports the guest VMs. The customers must trust the cloud providers to protect the confidentiality and integrity of their applications and data. However, as the VMs from different customers are running on the same host, an attack to the management virtual machine will easily lead to the compromise of the guest VMs. Therefore, it is critical for a cloud computing system to ensure the trustworthiness of management VMs. To this end, we propose VMGuard, an integrity monitoring and detecting system for management virtual machines in a distributed environment. VMGuard utilizes a special VM, Guard Domain, which runs on each physical node to monitor the co-resident management VMs. The integrity measurements collected by the Guard Domains are sent to the VMGuard server for safe store and independent analysis. The experimental evaluation of a Xen-based prototype shows that VMGuard can quickly detect the root kit attacks while the performance overhead is low.
云计算提供商可以根据客户的需求动态分配虚拟机(VM),同时保持对直接管理硬件并支持来宾虚拟机的管理虚拟机的特权访问。客户必须信任云提供商能够保护其应用程序和数据的机密性和完整性。但是,由于来自不同客户的虚拟机运行在同一台主机上,因此对管理虚拟机的攻击很容易导致客户虚拟机的入侵。因此,保证管理虚拟机的可信性对云计算系统至关重要。为此,我们提出了一种用于分布式环境下管理虚拟机的完整性监控和检测系统VMGuard。VMGuard使用一个特殊的虚拟机Guard Domain,它运行在每个物理节点上,监控共同驻留的管理虚拟机。Guard domain收集的完整性测量数据被发送到VMGuard服务器进行安全存储和独立分析。基于xen的原型机的实验评估表明,VMGuard可以快速检测到根工具包攻击,且性能开销低。
{"title":"VMGuard: An Integrity Monitoring System for Management Virtual Machines","authors":"Haifeng Fang, Yiqiang Zhao, Hongyong Zang, H. H. Huang, Ying Song, Yuzhong Sun, Zhiyong Liu","doi":"10.1109/ICPADS.2010.44","DOIUrl":"https://doi.org/10.1109/ICPADS.2010.44","url":null,"abstract":"A cloud computing provider can dynamically allocate virtual machines (VM) based on the needs of the customers, while maintaining the privileged access to the Management Virtual Machine that directly manages the hardware and supports the guest VMs. The customers must trust the cloud providers to protect the confidentiality and integrity of their applications and data. However, as the VMs from different customers are running on the same host, an attack to the management virtual machine will easily lead to the compromise of the guest VMs. Therefore, it is critical for a cloud computing system to ensure the trustworthiness of management VMs. To this end, we propose VMGuard, an integrity monitoring and detecting system for management virtual machines in a distributed environment. VMGuard utilizes a special VM, Guard Domain, which runs on each physical node to monitor the co-resident management VMs. The integrity measurements collected by the Guard Domains are sent to the VMGuard server for safe store and independent analysis. The experimental evaluation of a Xen-based prototype shows that VMGuard can quickly detect the root kit attacks while the performance overhead is low.","PeriodicalId":365914,"journal":{"name":"2010 IEEE 16th International Conference on Parallel and Distributed Systems","volume":"99 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116162506","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
4Sensing -- Decentralized Processing for Participatory Sensing Data
Pub Date : 2010-12-08 DOI: 10.1109/ICPADS.2010.20
Heitor Ferreira, S. Duarte, Nuno M. Preguiça
Participatory Sensing is an emerging application paradigm that leverages the growing ubiquity of sensor-capable smart phones to allow communities carry out wide-area sensing tasks, as a side-effect of people's everyday lives and movements. This paper proposes a decentralized infrastructure for supporting Participatory Sensing applications. It describes an architecture and a domain specific programming language for modeling, prototyping and developing the distributed processing of participatory sensing data with the goal of allowing faster and easier development of these applications. Moreover, a case-study application is also presented as the basis for an experimental evaluation.
参与式传感是一种新兴的应用范例,它利用日益普及的具有传感器功能的智能手机,使社区能够执行广域传感任务,作为人们日常生活和活动的副作用。本文提出了一种支持参与式传感应用的分散式基础设施。它描述了一种架构和一种领域特定的编程语言,用于建模、原型设计和开发参与式传感数据的分布式处理,目标是允许更快、更容易地开发这些应用程序。此外,还提出了一个案例研究应用程序作为实验评估的基础。
{"title":"4Sensing -- Decentralized Processing for Participatory Sensing Data","authors":"Heitor Ferreira, S. Duarte, Nuno M. Preguiça","doi":"10.1109/ICPADS.2010.20","DOIUrl":"https://doi.org/10.1109/ICPADS.2010.20","url":null,"abstract":"Participatory Sensing is an emerging application paradigm that leverages the growing ubiquity of sensor-capable smart phones to allow communities carry out wide-area sensing tasks, as a side-effect of people's everyday lives and movements. This paper proposes a decentralized infrastructure for supporting Participatory Sensing applications. It describes an architecture and a domain specific programming language for modeling, prototyping and developing the distributed processing of participatory sensing data with the goal of allowing faster and easier development of these applications. Moreover, a case-study application is also presented as the basis for an experimental evaluation.","PeriodicalId":365914,"journal":{"name":"2010 IEEE 16th International Conference on Parallel and Distributed Systems","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128602658","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
VirtCFT: A Transparent VM-Level Fault-Tolerant System for Virtual Clusters VirtCFT:用于虚拟集群的透明vm级容错系统
Pub Date : 2010-12-08 DOI: 10.1109/ICPADS.2010.125
Minjia Zhang, Hai Jin, Xuanhua Shi, Song Wu
A virtual cluster consists of a multitude of virtual machines and software components that are doomed to fail eventually. In many environments, such failures can result in unanticipated, potentially devastating failure behavior and in service unavailability. The ability of failover is essential to the virtual cluster’s availability, reliability, and manageability. Most of the existing methods have several common disadvantages: requiring modifications to the target processes or their OSes, which is usually error prone and sometimes impractical; only targeting at taking checkpoints of processes, not whole entire OS images, which limits the areas to be applied. In this paper we present VirtCFT, an innovative and practical system of fault tolerance for virtual cluster. VirtCFT is a system-level, coordinated distributed checkpointing fault tolerant system. It coordinates the distributed VMs to periodically reach the globally consistent state and take the checkpoint of the whole virtual cluster including states of CPU, memory, disk of each VM as well as the network communications. When faults occur, VirtCFT will automatically recover the entire virtual cluster to the correct state within a few seconds and keep it running. Superior to all the existing fault tolerance mechanisms, VirtCFT provides a simpler and totally transparent fault tolerant platform that allows existing, unmodified software and operating system (version unawareness) to be protected from the failure of the physical machine on which it runs. We have implemented this system based on the Xen virtualization platform. Our experiments with real-world benchmarks demonstrate the effectiveness and correctness of VirtCFT.
虚拟集群由许多虚拟机和软件组件组成,这些虚拟机和软件组件最终注定会失败。在许多环境中,此类故障可能导致意外的、潜在的破坏性故障行为和服务不可用。故障转移功能对于虚拟集群的可用性、可靠性和可管理性至关重要。大多数现有方法都有几个共同的缺点:需要修改目标进程或其操作系统,这通常容易出错,有时不切实际;仅针对进程的检查点,而不是整个操作系统映像,这限制了应用的区域。本文提出了一种新颖实用的虚拟集群容错系统VirtCFT。VirtCFT是一个系统级、协调的分布式检查点容错系统。它协调分布式虚拟机定期达到全局一致状态,并采取整个虚拟集群的检查点,包括每个虚拟机的CPU、内存、磁盘状态以及网络通信。当发生故障时,VirtCFT会在几秒钟内自动将整个虚拟集群恢复到正确的状态,并使其继续运行。优于所有现有的容错机制,VirtCFT提供了一个更简单和完全透明的容错平台,允许现有的,未修改的软件和操作系统(版本无意识)免受其运行的物理机器故障的影响。本系统是在Xen虚拟化平台上实现的。我们的实际基准测试实验证明了VirtCFT的有效性和正确性。
{"title":"VirtCFT: A Transparent VM-Level Fault-Tolerant System for Virtual Clusters","authors":"Minjia Zhang, Hai Jin, Xuanhua Shi, Song Wu","doi":"10.1109/ICPADS.2010.125","DOIUrl":"https://doi.org/10.1109/ICPADS.2010.125","url":null,"abstract":"A virtual cluster consists of a multitude of virtual machines and software components that are doomed to fail eventually. In many environments, such failures can result in unanticipated, potentially devastating failure behavior and in service unavailability. The ability of failover is essential to the virtual cluster’s availability, reliability, and manageability. Most of the existing methods have several common disadvantages: requiring modifications to the target processes or their OSes, which is usually error prone and sometimes impractical; only targeting at taking checkpoints of processes, not whole entire OS images, which limits the areas to be applied. In this paper we present VirtCFT, an innovative and practical system of fault tolerance for virtual cluster. VirtCFT is a system-level, coordinated distributed checkpointing fault tolerant system. It coordinates the distributed VMs to periodically reach the globally consistent state and take the checkpoint of the whole virtual cluster including states of CPU, memory, disk of each VM as well as the network communications. When faults occur, VirtCFT will automatically recover the entire virtual cluster to the correct state within a few seconds and keep it running. Superior to all the existing fault tolerance mechanisms, VirtCFT provides a simpler and totally transparent fault tolerant platform that allows existing, unmodified software and operating system (version unawareness) to be protected from the failure of the physical machine on which it runs. We have implemented this system based on the Xen virtualization platform. Our experiments with real-world benchmarks demonstrate the effectiveness and correctness of VirtCFT.","PeriodicalId":365914,"journal":{"name":"2010 IEEE 16th International Conference on Parallel and Distributed Systems","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129623909","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 28
A Scheduling Method for Avoiding Kernel Lock Thrashing on Multi-cores 一种避免多核内核锁抖动的调度方法
Pub Date : 2010-12-08 DOI: 10.1109/ICPADS.2010.31
Yan Cui, Weida Zhang, Yu Chen, Yuanchun Shi
Multi-core architectures have been adopted in various computing environments. Predictions based on Moore's Law state that thousands of cores can be integrated on a single chip within 10 years. To achieve better performance and scalability on multi-cores, applications should be multi-threaded, and therefore threads assigned on different cores can execute concurrently. However, lock contention in kernels can affect the scalability so significantly that the speedup decreases with the increasing number of cores (thrashing). Existing efforts to address this problem mainly focus on deferring lock thrashing, and therefore these techniques cannot prevent thrashing fundamentally. In this paper, we propose to use lock-aware scheduling to avoid thrashing. Our method detects thrashing on a per-thread basis and migrates contended threads to a smaller set of cores. The optimal number of cores is determined by maximizing the proposed normalized throughput model of migrated threads. The proposed method is implemented in Linux 2.6.29.4 and evaluated on a 32-core system. Experimental results on a series of lock-intensive micro- and macro-benchmarks show the effectiveness: for 3 of 5 workloads exhibiting thrashing behaviour, lock-aware scheduling can detect the speedup decrease accurately and sustain the maximal speedup, for the remaining 2 workloads, the performance can be improved greatly although the maximal speedup is not sustained, for 1 workload which does not suffer thrashing, the method introduces negligible runtime overhead.
在各种计算环境中都采用了多核体系结构。基于摩尔定律的预测表明,在10年内,数千个核心可以集成到一个芯片上。为了在多核上实现更好的性能和可伸缩性,应用程序应该是多线程的,因此分配在不同核上的线程可以并发执行。然而,内核中的锁争用会严重影响可伸缩性,以至于加速会随着内核数量的增加而降低(抖动)。解决这个问题的现有努力主要集中在延迟锁抖动上,因此这些技术不能从根本上防止抖动。在本文中,我们建议使用锁感知调度来避免抖动。我们的方法以每个线程为基础检测抖动,并将争用线程迁移到更小的核心集。通过最大化所提出的迁移线程规范化吞吐量模型来确定最优的内核数。该方法在Linux 2.6.29.4上实现,并在32核系统上进行了测试。在一系列锁密集的微观和宏观基准测试上的实验结果表明了该方法的有效性:对于表现出抖动行为的5个工作负载中的3个,锁感知调度可以准确地检测到加速下降并维持最大的加速,对于剩余的2个工作负载,虽然不能维持最大的加速,但性能可以得到很大的提高,对于不遭受抖动的1个工作负载,该方法引入的运行时开销可以忽略不计。
{"title":"A Scheduling Method for Avoiding Kernel Lock Thrashing on Multi-cores","authors":"Yan Cui, Weida Zhang, Yu Chen, Yuanchun Shi","doi":"10.1109/ICPADS.2010.31","DOIUrl":"https://doi.org/10.1109/ICPADS.2010.31","url":null,"abstract":"Multi-core architectures have been adopted in various computing environments. Predictions based on Moore's Law state that thousands of cores can be integrated on a single chip within 10 years. To achieve better performance and scalability on multi-cores, applications should be multi-threaded, and therefore threads assigned on different cores can execute concurrently. However, lock contention in kernels can affect the scalability so significantly that the speedup decreases with the increasing number of cores (thrashing). Existing efforts to address this problem mainly focus on deferring lock thrashing, and therefore these techniques cannot prevent thrashing fundamentally. In this paper, we propose to use lock-aware scheduling to avoid thrashing. Our method detects thrashing on a per-thread basis and migrates contended threads to a smaller set of cores. The optimal number of cores is determined by maximizing the proposed normalized throughput model of migrated threads. The proposed method is implemented in Linux 2.6.29.4 and evaluated on a 32-core system. Experimental results on a series of lock-intensive micro- and macro-benchmarks show the effectiveness: for 3 of 5 workloads exhibiting thrashing behaviour, lock-aware scheduling can detect the speedup decrease accurately and sustain the maximal speedup, for the remaining 2 workloads, the performance can be improved greatly although the maximal speedup is not sustained, for 1 workload which does not suffer thrashing, the method introduces negligible runtime overhead.","PeriodicalId":365914,"journal":{"name":"2010 IEEE 16th International Conference on Parallel and Distributed Systems","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130098507","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Cooperative User Centric Information Dissemination in Human Content-Based Networks 基于内容的人类网络中以用户为中心的协同信息传播
Pub Date : 2010-12-08 DOI: 10.1109/ICPADS.2010.77
M. Chuah, P. Yang, Pan Hui
Powerful wireless devices carried by humans can form human contact-based networks. Such networks often suffer from intermittent connectivity. Thus, providing an effective information dissemination feature in such networks is very important. In this paper, we explore a cooperative user centric information dissemination scheme which allows published data items to be delivered to interested nodes efficiently. Our scheme uses fewer relays and allows each node to operate distributedly using locally gathered information. Our scheme is more effective than the epidemic scheme since it achieves comparable success ratio with a 45-60% reduction in storage requirement and 47-53% reduction in transmissions. We also compare our scheme with an ideal scheme which assumes one can analyze contact traces apriori to determine their dominating sets, and show that our scheme can be more efficient than this ideal scheme.
人类携带的功能强大的无线设备可以形成基于人类接触的网络。这样的网络经常受到间歇性连接的困扰。因此,在此类网络中提供有效的信息传播功能是非常重要的。在本文中,我们探索了一种以用户为中心的协作式信息传播方案,该方案允许发布的数据项有效地传递到感兴趣的节点。我们的方案使用较少的中继,并允许每个节点使用本地收集的信息进行分布式操作。我们的方案比流行病方案更有效,存储需求减少45-60%,传输减少47-53%,成功率相当。我们还将该方案与一种理想方案进行了比较,该方案假定可以通过先验分析接触轨迹来确定其支配集,并表明我们的方案比该理想方案更有效。
{"title":"Cooperative User Centric Information Dissemination in Human Content-Based Networks","authors":"M. Chuah, P. Yang, Pan Hui","doi":"10.1109/ICPADS.2010.77","DOIUrl":"https://doi.org/10.1109/ICPADS.2010.77","url":null,"abstract":"Powerful wireless devices carried by humans can form human contact-based networks. Such networks often suffer from intermittent connectivity. Thus, providing an effective information dissemination feature in such networks is very important. In this paper, we explore a cooperative user centric information dissemination scheme which allows published data items to be delivered to interested nodes efficiently. Our scheme uses fewer relays and allows each node to operate distributedly using locally gathered information. Our scheme is more effective than the epidemic scheme since it achieves comparable success ratio with a 45-60% reduction in storage requirement and 47-53% reduction in transmissions. We also compare our scheme with an ideal scheme which assumes one can analyze contact traces apriori to determine their dominating sets, and show that our scheme can be more efficient than this ideal scheme.","PeriodicalId":365914,"journal":{"name":"2010 IEEE 16th International Conference on Parallel and Distributed Systems","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122185268","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
Distributed Spatial Analysis in Wireless Sensor Networks 无线传感器网络中的分布式空间分析
Pub Date : 2010-12-08 DOI: 10.1109/ICPADS.2010.58
Farhana Jabeen, A. Fernandes
Environmental monitoring is an important application area for wireless sensor networks (WSNs). An important problem for environmental WSNs is the characterization of the dynamic behaviour of transient physical phenomena over space. In the case of mote-level WSNs, a solution that is computed inside the WSN is essential for energy efficiency. In this context, the main contributions of this paper to the literature on in network processing in WSNs are threefold. The paper further develops an algebraic framework with which one can express and evaluate complex topological relationships over geometrical representations of permanent features (e.g., buildings, or geographical features such as lakes and rivers) and of transient phenomena (e.g., areas of mist over a cultivated field). The paper then describes distributed implementations of spatial-algebraic operations over the regions represented by that framework, thereby enabling identification of topological relationships between regions. Finally, the paper presents experimental evidence that the techniques described lead to efficient runtime behaviour. Taken together, these contributions constitute a further step towards enabling the high-level specification of expressive spatial analyses for efficient execution inside a WSN.
环境监测是无线传感器网络的一个重要应用领域。环境无线传感器网络的一个重要问题是表征瞬态物理现象在空间上的动态行为。在移动级WSN的情况下,在WSN内部计算的解决方案对于能源效率至关重要。在此背景下,本文对无线传感器网络中网络处理的文献的主要贡献有三个方面。这篇论文进一步发展了一个代数框架,人们可以用它来表达和评估复杂的拓扑关系,而不是永久特征(例如,建筑物,或地理特征,如湖泊和河流)和瞬态现象(例如,耕地上的薄雾区域)的几何表示。然后,本文描述了由该框架表示的区域上的空间代数操作的分布式实现,从而能够识别区域之间的拓扑关系。最后,本文给出了实验证据,表明所描述的技术导致了高效的运行时行为。综上所述,这些贡献构成了进一步实现表达空间分析的高级规范,以便在WSN内有效执行。
{"title":"Distributed Spatial Analysis in Wireless Sensor Networks","authors":"Farhana Jabeen, A. Fernandes","doi":"10.1109/ICPADS.2010.58","DOIUrl":"https://doi.org/10.1109/ICPADS.2010.58","url":null,"abstract":"Environmental monitoring is an important application area for wireless sensor networks (WSNs). An important problem for environmental WSNs is the characterization of the dynamic behaviour of transient physical phenomena over space. In the case of mote-level WSNs, a solution that is computed inside the WSN is essential for energy efficiency. In this context, the main contributions of this paper to the literature on in network processing in WSNs are threefold. The paper further develops an algebraic framework with which one can express and evaluate complex topological relationships over geometrical representations of permanent features (e.g., buildings, or geographical features such as lakes and rivers) and of transient phenomena (e.g., areas of mist over a cultivated field). The paper then describes distributed implementations of spatial-algebraic operations over the regions represented by that framework, thereby enabling identification of topological relationships between regions. Finally, the paper presents experimental evidence that the techniques described lead to efficient runtime behaviour. Taken together, these contributions constitute a further step towards enabling the high-level specification of expressive spatial analyses for efficient execution inside a WSN.","PeriodicalId":365914,"journal":{"name":"2010 IEEE 16th International Conference on Parallel and Distributed Systems","volume":"70 4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122691480","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Employing Multiple CUDA Devices to Accelerate LTL Model Checking 采用多CUDA设备加速LTL模型检查
Pub Date : 2010-12-08 DOI: 10.1109/ICPADS.2010.82
J. Barnat, Petr Bauch, L. Brim, Milan Ceska
Recently, the CUDA technology has been used to accelerate many computation demanding tasks. For example, in our previous work we have shown how CUDA technology can be employed to accelerate the process of Linear Temporal Logic (LTL) Model Checking. While the raw computing power of a CUDA enabled device is tremendous, the applicability of the technology is quite often limited to small or middle-sized instances of the problems being solved. This is because the memory that a single device is equipped with, is simply not large enough to cope with large or realistic instances of the problem, which is also the case of our CUDA-aware LTL Model Checking solution. In this paper we suggest how to overcome this limitations by employing multiple (two in our case) CUDA devices for acceleration of our fine-grained communication-intensive parallel algorithm for LTL Model Checking.
近年来,CUDA技术已被用于加速许多计算要求高的任务。例如,在我们之前的工作中,我们已经展示了如何使用CUDA技术来加速线性时序逻辑(LTL)模型检查的过程。虽然支持CUDA的设备的原始计算能力是巨大的,但该技术的适用性通常仅限于正在解决的小型或中型问题实例。这是因为单个设备配备的内存根本不足以应对大的或现实的问题实例,这也是我们cuda感知LTL模型检查解决方案的情况。在本文中,我们建议如何通过使用多个(在我们的情况下是两个)CUDA设备来加速我们用于LTL模型检查的细粒度通信密集型并行算法来克服这一限制。
{"title":"Employing Multiple CUDA Devices to Accelerate LTL Model Checking","authors":"J. Barnat, Petr Bauch, L. Brim, Milan Ceska","doi":"10.1109/ICPADS.2010.82","DOIUrl":"https://doi.org/10.1109/ICPADS.2010.82","url":null,"abstract":"Recently, the CUDA technology has been used to accelerate many computation demanding tasks. For example, in our previous work we have shown how CUDA technology can be employed to accelerate the process of Linear Temporal Logic (LTL) Model Checking. While the raw computing power of a CUDA enabled device is tremendous, the applicability of the technology is quite often limited to small or middle-sized instances of the problems being solved. This is because the memory that a single device is equipped with, is simply not large enough to cope with large or realistic instances of the problem, which is also the case of our CUDA-aware LTL Model Checking solution. In this paper we suggest how to overcome this limitations by employing multiple (two in our case) CUDA devices for acceleration of our fine-grained communication-intensive parallel algorithm for LTL Model Checking.","PeriodicalId":365914,"journal":{"name":"2010 IEEE 16th International Conference on Parallel and Distributed Systems","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123586226","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 23
期刊
2010 IEEE 16th International Conference on Parallel and Distributed Systems
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1