首页 > 最新文献

Proceedings of the Computing Frontiers Conference最新文献

英文 中文
AXIOM project: from applied research towards embedded systems AXIOM项目:从应用研究到嵌入式系统
Pub Date : 2017-05-15 DOI: 10.1145/3075564.3095085
Davide Catani
SECO is going to present how UE funded AXIOM project makes it possible to approach edge computing platforms and technologies in order to bring them to the industrial embedded market.
SECO将介绍UE资助的AXIOM项目如何使边缘计算平台和技术成为可能,并将其带入工业嵌入式市场。
{"title":"AXIOM project: from applied research towards embedded systems","authors":"Davide Catani","doi":"10.1145/3075564.3095085","DOIUrl":"https://doi.org/10.1145/3075564.3095085","url":null,"abstract":"SECO is going to present how UE funded AXIOM project makes it possible to approach edge computing platforms and technologies in order to bring them to the industrial embedded market.","PeriodicalId":398898,"journal":{"name":"Proceedings of the Computing Frontiers Conference","volume":"CE-32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126546575","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Proceedings of the Computing Frontiers Conference 计算机前沿会议论文集
Pub Date : 2017-05-15 DOI: 10.1145/3075564
R. Giorgi, M. Becchi, F. Palumbo
{"title":"Proceedings of the Computing Frontiers Conference","authors":"R. Giorgi, M. Becchi, F. Palumbo","doi":"10.1145/3075564","DOIUrl":"https://doi.org/10.1145/3075564","url":null,"abstract":"","PeriodicalId":398898,"journal":{"name":"Proceedings of the Computing Frontiers Conference","volume":"180 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133513482","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
ARM HPC Ecosystem and the Reemergence of Vectors: Invited Paper ARM高性能计算生态系统和载体的重新出现:特邀论文
Pub Date : 2017-05-15 DOI: 10.1145/3075564.3095086
Alejandro Rico, José A. Joao, Chris Adeniyi-Jones, E. V. Hensbergen
ARM's involvement in funded international projects has helped pave the road towards ARM-based supercomputers. ARM and its partners have collaborately grown an HPC ecosystem with software and hardware solutions that provide choice in a unified software ecosystem. Partners have announced important HPC deployments resulting from collaborations around the globe. One of the key enabling technologies for ARM in HPC is the Scalable Vector Extension, an instruction set extension for vector processing. This paper discusses ARM's journey into HPC, the current state of the ARM HPC ecosystem, the approach to HPC node architecture co-design, and details on the Scalable Vector Extension as a future technology representing the reemergence of vectors.
ARM参与资助的国际项目为基于ARM的超级计算机铺平了道路。ARM及其合作伙伴共同开发了一个高性能计算生态系统,其中包括软件和硬件解决方案,在统一的软件生态系统中提供选择。合作伙伴宣布了全球范围内重要的高性能计算部署。ARM在高性能计算领域的关键支持技术之一是可扩展向量扩展,这是一种用于向量处理的指令集扩展。本文讨论了ARM进军HPC的历程、ARM HPC生态系统的现状、HPC节点架构协同设计的方法,以及可扩展向量扩展(Scalable Vector Extension)作为未来技术的细节,它代表了向量的重新出现。
{"title":"ARM HPC Ecosystem and the Reemergence of Vectors: Invited Paper","authors":"Alejandro Rico, José A. Joao, Chris Adeniyi-Jones, E. V. Hensbergen","doi":"10.1145/3075564.3095086","DOIUrl":"https://doi.org/10.1145/3075564.3095086","url":null,"abstract":"ARM's involvement in funded international projects has helped pave the road towards ARM-based supercomputers. ARM and its partners have collaborately grown an HPC ecosystem with software and hardware solutions that provide choice in a unified software ecosystem. Partners have announced important HPC deployments resulting from collaborations around the globe. One of the key enabling technologies for ARM in HPC is the Scalable Vector Extension, an instruction set extension for vector processing. This paper discusses ARM's journey into HPC, the current state of the ARM HPC ecosystem, the approach to HPC node architecture co-design, and details on the Scalable Vector Extension as a future technology representing the reemergence of vectors.","PeriodicalId":398898,"journal":{"name":"Proceedings of the Computing Frontiers Conference","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124881172","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 22
Using Tweaks To Design Fault Resistant Ciphers (Full Version) 使用微调设计抗故障密码(完整版)
Pub Date : 2017-05-15 DOI: 10.1145/3075564.3091965
Sikhar Patranabis, Debapriya Basu Roy, Debdeep Mukhopadhyay
Side channel analysis and active fault analysis are now major threats to even mathematically robust cryptographic algorithms that are otherwise resistant to classical cryptanalysis. It is necessary to design suitable countermeasures to protect cryptographic primitives against such attacks. This paper focuses on designing encryption schemes that are innately secure against fault analysis. The paper formally proves that one such design strategy namely the use of key-dependent S-Boxes, is only partially secure against DFA. The paper then examines the fault tolerance of encryption schemes that use a key-independent secret tweak value for randomization. In particular, the paper focuses on a linear tweak based and a non-linear tweak based version of a recently proposed block cipher DRECON. The paper demonstrates that while both versions are secure against classical DFA, the non-linear tweak based version provides greater fault coverage against stronger fault models. This fact, together with the DPA resistance provided by the use of variable S-Boxes, makes DRECON a strong candidate for the design of secure cryptographic primitives. All claims have been validated by experimental results on a SASEBO GII platform.
侧信道分析和主动故障分析现在甚至是对数学上健壮的密码算法的主要威胁,否则这些算法会抵抗经典密码分析。有必要设计合适的对策来保护密码原语免受此类攻击。本文的重点是设计对故障分析具有天生安全性的加密方案。本文正式证明了一种这样的设计策略,即使用依赖于密钥的s - box,对DFA只有部分安全。然后研究了使用与密钥无关的秘密调整值进行随机化的加密方案的容错性。本文特别关注了最近提出的分组密码DRECON的基于线性调整和基于非线性调整的版本。本文证明,虽然这两种版本对经典DFA都是安全的,但基于非线性调整的版本在更强的故障模型下提供了更大的故障覆盖率。这一事实,加上使用可变s - box提供的DPA阻力,使DRECON成为安全加密原语设计的有力候选者。所有声明均已通过SASEBO GII平台的实验结果得到验证。
{"title":"Using Tweaks To Design Fault Resistant Ciphers (Full Version)","authors":"Sikhar Patranabis, Debapriya Basu Roy, Debdeep Mukhopadhyay","doi":"10.1145/3075564.3091965","DOIUrl":"https://doi.org/10.1145/3075564.3091965","url":null,"abstract":"Side channel analysis and active fault analysis are now major threats to even mathematically robust cryptographic algorithms that are otherwise resistant to classical cryptanalysis. It is necessary to design suitable countermeasures to protect cryptographic primitives against such attacks. This paper focuses on designing encryption schemes that are innately secure against fault analysis. The paper formally proves that one such design strategy namely the use of key-dependent S-Boxes, is only partially secure against DFA. The paper then examines the fault tolerance of encryption schemes that use a key-independent secret tweak value for randomization. In particular, the paper focuses on a linear tweak based and a non-linear tweak based version of a recently proposed block cipher DRECON. The paper demonstrates that while both versions are secure against classical DFA, the non-linear tweak based version provides greater fault coverage against stronger fault models. This fact, together with the DPA resistance provided by the use of variable S-Boxes, makes DRECON a strong candidate for the design of secure cryptographic primitives. All claims have been validated by experimental results on a SASEBO GII platform.","PeriodicalId":398898,"journal":{"name":"Proceedings of the Computing Frontiers Conference","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127671335","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Finding Maximum Cliques on a Quantum Annealer 在量子退火炉上寻找最大团
Pub Date : 2017-05-15 DOI: 10.1145/3075564.3075575
Guillaume Chapuis, H. Djidjev, Georg Hahn, Guillaume Rizk
This paper assesses the performance of the D-Wave 2X (DW) quantum annealer for finding a maximum clique in a graph, one of the most fundamental and important NP-hard problems. Because the size of the largest graphs DW can directly solve is quite small (usually around 45 vertices), we also consider decomposition algorithms intended for larger graphs and analyze their performance. For smaller graphs that fit DW, we provide formulations of the maximum clique problem as a quadratic unconstrained binary optimization (QUBO) problem, which is one of the two input types (together with the Ising model) acceptable by the machine, and compare several quantum implementations to current classical algorithms such as simulated annealing, Gurobi, and third-party clique finding heuristics. We further estimate the contributions of the quantum phase of the quantum annealer and the classical post-processing phase typically used to enhance each solution returned by DW. We demonstrate that on random graphs that fit DW, no quantum speedup can be observed compared with the classical algorithms. On the other hand, for instances specifically designed to fit well the DW qubit interconnection network, we observe substantial speed-ups in computing time over classical approaches.
本文评估了D-Wave 2X (DW)量子退火机在图中寻找最大团的性能,这是最基本和最重要的NP-hard问题之一。由于DW可以直接解决的最大图的大小非常小(通常在45个顶点左右),我们还考虑用于较大图的分解算法并分析其性能。对于适合DW的较小图,我们将最大团问题的公式提供为二次无约束二进制优化(QUBO)问题,这是机器可接受的两种输入类型之一(以及Ising模型),并将几种量子实现与当前的经典算法(如模拟退火,Gurobi和第三方团查找启发式算法)进行比较。我们进一步估计了量子退火器的量子相位和典型的用于增强DW返回的每个溶液的经典后处理相位的贡献。我们证明了在适合DW的随机图上,与经典算法相比,没有量子加速。另一方面,对于专门设计用于很好地适应DW量子比特互连网络的实例,我们观察到与经典方法相比,计算时间有很大的加快。
{"title":"Finding Maximum Cliques on a Quantum Annealer","authors":"Guillaume Chapuis, H. Djidjev, Georg Hahn, Guillaume Rizk","doi":"10.1145/3075564.3075575","DOIUrl":"https://doi.org/10.1145/3075564.3075575","url":null,"abstract":"This paper assesses the performance of the D-Wave 2X (DW) quantum annealer for finding a maximum clique in a graph, one of the most fundamental and important NP-hard problems. Because the size of the largest graphs DW can directly solve is quite small (usually around 45 vertices), we also consider decomposition algorithms intended for larger graphs and analyze their performance. For smaller graphs that fit DW, we provide formulations of the maximum clique problem as a quadratic unconstrained binary optimization (QUBO) problem, which is one of the two input types (together with the Ising model) acceptable by the machine, and compare several quantum implementations to current classical algorithms such as simulated annealing, Gurobi, and third-party clique finding heuristics. We further estimate the contributions of the quantum phase of the quantum annealer and the classical post-processing phase typically used to enhance each solution returned by DW. We demonstrate that on random graphs that fit DW, no quantum speedup can be observed compared with the classical algorithms. On the other hand, for instances specifically designed to fit well the DW qubit interconnection network, we observe substantial speed-ups in computing time over classical approaches.","PeriodicalId":398898,"journal":{"name":"Proceedings of the Computing Frontiers Conference","volume":"93 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125914552","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 23
Addressing Hadoop's Small File Problem With an Appendable Archive File Format 用可附加的存档文件格式解决Hadoop的小文件问题
Pub Date : 2017-05-15 DOI: 10.1145/3075564.3078888
T. Renner, Johannes Müller, L. Thamsen, O. Kao
Hadoop has been used widely for data analytic tasks in various domains. At the same time, data volume is expected to grow even further in the next years. Hadoop recently introduced the concept Archival Storage, an automated tiered storage technique for increasing storage capacity for long-term storage. However, Hadoop Distributed File System's scalability is limited by the total number of files that can be stored, and it is likely that the number of files increases fast when using it for archival purposes. This paper presents an approach for improving HDFS' scalability when using it as an archival storage. We present a tool that extends Hadoop Archive to an appendable file format. New files are appended to one of the existing archive data files efficiently without rewriting the whole archive. Therefore, a first fit algorithm is used to fill up the often not fully utilized fixed-sized data blocks of the archive data files. Index files are updated using a red-black tree providing guaranteed fast lookup and insert performance. We show that the tool performs well for different sizes of archives and number of files to add. By distributing new files efficiently, we also reduce the number of data blocks needed for archiving and, thus, reduce the memory footprint on the NameNode.
Hadoop已被广泛用于各个领域的数据分析任务。与此同时,预计未来几年数据量将进一步增长。Hadoop最近引入了归档存储的概念,这是一种自动分层存储技术,用于增加长期存储的存储容量。然而,Hadoop分布式文件系统的可伸缩性受到可以存储的文件总数的限制,并且当将其用于存档目的时,文件数量可能会快速增加。本文提出了一种提高HDFS作为归档存储时的可扩展性的方法。我们提供了一个将Hadoop Archive扩展为可附加文件格式的工具。新文件被有效地附加到现有的存档数据文件之一,而无需重写整个存档。因此,采用首次拟合算法来填充归档数据文件中通常未被充分利用的固定大小的数据块。索引文件使用红黑树进行更新,从而保证快速查找和插入性能。我们展示了该工具对于不同大小的归档和要添加的文件数量表现良好。通过有效地分发新文件,我们还减少了归档所需的数据块数量,从而减少了NameNode上的内存占用。
{"title":"Addressing Hadoop's Small File Problem With an Appendable Archive File Format","authors":"T. Renner, Johannes Müller, L. Thamsen, O. Kao","doi":"10.1145/3075564.3078888","DOIUrl":"https://doi.org/10.1145/3075564.3078888","url":null,"abstract":"Hadoop has been used widely for data analytic tasks in various domains. At the same time, data volume is expected to grow even further in the next years. Hadoop recently introduced the concept Archival Storage, an automated tiered storage technique for increasing storage capacity for long-term storage. However, Hadoop Distributed File System's scalability is limited by the total number of files that can be stored, and it is likely that the number of files increases fast when using it for archival purposes. This paper presents an approach for improving HDFS' scalability when using it as an archival storage. We present a tool that extends Hadoop Archive to an appendable file format. New files are appended to one of the existing archive data files efficiently without rewriting the whole archive. Therefore, a first fit algorithm is used to fill up the often not fully utilized fixed-sized data blocks of the archive data files. Index files are updated using a red-black tree providing guaranteed fast lookup and insert performance. We show that the tool performs well for different sizes of archives and number of files to add. By distributing new files efficiently, we also reduce the number of data blocks needed for archiving and, thus, reduce the memory footprint on the NameNode.","PeriodicalId":398898,"journal":{"name":"Proceedings of the Computing Frontiers Conference","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125916244","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Data mining the memory access stream to detect anomalous application behavior 数据挖掘内存访问流,以检测异常的应用程序行为
Pub Date : 2017-05-15 DOI: 10.1145/3075564.3075578
Francis B. Moreira, M. Diener, P. Navaux, I. Koren
Detecting anomalous application executions is a challenging problem, due to the diversity of anomalies that can occur, such as programming bugs, silent data corruption, or even malicious code corruption. Moreover, the similarity to a regular execution that can occur in these cases, especially in silent data corruption, makes distinction from normal executions difficult. In this paper, we develop a mechanism that can detect such anomalous executions based on changes in the memory access pattern of an application. We analyze memory patterns using a two-level machine learning approach. First, we classify the behavior of different memory access periods within applications using Gaussian mixtures. Then, based on these classifications, we construct matrix representations of Markov chains to obtain information regarding the temporal behavior of these memory accesses. Based on metrics of matrix similarity, we can classify whether the application behaves as expected or anomalously. Using gradient boosting on the metrics of matrix similarity, our technique correctly classifies more than 85% of all executions, identifying instances of the same application and different applications. We can also detect a range of faulty executions caused by benign or malicious permanent bit flips in the code section.
检测异常的应用程序执行是一个具有挑战性的问题,因为可能发生各种各样的异常,例如编程错误、静默数据损坏,甚至恶意代码损坏。此外,在这些情况下,特别是在静默数据损坏情况下,与常规执行的相似性使得很难区分正常执行。在本文中,我们开发了一种机制,可以根据应用程序内存访问模式的变化来检测这种异常执行。我们使用两级机器学习方法分析记忆模式。首先,我们使用高斯混合对应用程序中不同内存访问周期的行为进行分类。然后,基于这些分类,我们构建了马尔可夫链的矩阵表示,以获得有关这些内存访问的时间行为的信息。基于矩阵相似度的度量,我们可以对应用程序的行为是否符合预期或异常进行分类。在矩阵相似性度量上使用梯度增强,我们的技术正确地分类了85%以上的执行,识别了相同应用程序和不同应用程序的实例。我们还可以检测由代码段中良性或恶意的永久位翻转引起的一系列错误执行。
{"title":"Data mining the memory access stream to detect anomalous application behavior","authors":"Francis B. Moreira, M. Diener, P. Navaux, I. Koren","doi":"10.1145/3075564.3075578","DOIUrl":"https://doi.org/10.1145/3075564.3075578","url":null,"abstract":"Detecting anomalous application executions is a challenging problem, due to the diversity of anomalies that can occur, such as programming bugs, silent data corruption, or even malicious code corruption. Moreover, the similarity to a regular execution that can occur in these cases, especially in silent data corruption, makes distinction from normal executions difficult. In this paper, we develop a mechanism that can detect such anomalous executions based on changes in the memory access pattern of an application. We analyze memory patterns using a two-level machine learning approach. First, we classify the behavior of different memory access periods within applications using Gaussian mixtures. Then, based on these classifications, we construct matrix representations of Markov chains to obtain information regarding the temporal behavior of these memory accesses. Based on metrics of matrix similarity, we can classify whether the application behaves as expected or anomalously. Using gradient boosting on the metrics of matrix similarity, our technique correctly classifies more than 85% of all executions, identifying instances of the same application and different applications. We can also detect a range of faulty executions caused by benign or malicious permanent bit flips in the code section.","PeriodicalId":398898,"journal":{"name":"Proceedings of the Computing Frontiers Conference","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128368770","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Vectorization of Hybrid Breadth First Search on the Intel Xeon Phi 英特尔 Xeon Phi 上混合广度优先搜索的矢量化
Pub Date : 2017-04-07 DOI: 10.1145/3075564.3075573
Mireya Paredes, G. Riley, M. Luján
The Breadth-First Search (BFS) algorithm is an important building block for graph analysis of large datasets. The BFS parallelisation has been shown to be challenging because of its inherent characteristics, including irregular memory access patterns, data dependencies and workload imbalance, that limit its scalability. We investigate the optimisation and vectorisation of the hybrid BFS (a combination of top-down and bottom-up approaches for BFS) on the Xeon Phi, which has advanced vector processing capabilities. The results show that our new implementation improves by 33%, for a one million vertices graph, compared to the state-of-the-art.
广度优先搜索(BFS)算法是大型数据集图形分析的重要组成部分。由于其固有特性(包括不规则内存访问模式、数据依赖性和工作负载不平衡)限制了其可扩展性,BFS 并行化已被证明具有挑战性。我们在具有先进矢量处理能力的 Xeon Phi 上研究了混合 BFS(BFS 自上而下和自下而上方法的组合)的优化和矢量化。结果表明,与最先进的技术相比,我们的新实现在百万顶点图上提高了 33%。
{"title":"Vectorization of Hybrid Breadth First Search on the Intel Xeon Phi","authors":"Mireya Paredes, G. Riley, M. Luján","doi":"10.1145/3075564.3075573","DOIUrl":"https://doi.org/10.1145/3075564.3075573","url":null,"abstract":"The Breadth-First Search (BFS) algorithm is an important building block for graph analysis of large datasets. The BFS parallelisation has been shown to be challenging because of its inherent characteristics, including irregular memory access patterns, data dependencies and workload imbalance, that limit its scalability. We investigate the optimisation and vectorisation of the hybrid BFS (a combination of top-down and bottom-up approaches for BFS) on the Xeon Phi, which has advanced vector processing capabilities. The results show that our new implementation improves by 33%, for a one million vertices graph, compared to the state-of-the-art.","PeriodicalId":398898,"journal":{"name":"Proceedings of the Computing Frontiers Conference","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126783760","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Runtime Aware Architectures 运行时感知架构
Pub Date : 2015-08-24 DOI: 10.1109/IPDPS.2017.130
M. Valero
In the last years the traditional ways to keep the increase of hardware performance to the rate predicted by the Moore's Law vanished. When uni-cores were the norm, hardware design was decoupled from the software stack thanks to a well defined Instruction Set Architecture (ISA). This simple interface allowed developing applications without worrying too much about the underlying hardware, while computer architects proposed techniques to aggressively exploit Instruction-Level Parallelism (ILP) in superscalar processors. Current multi-cores are designed as simple symmetric multiprocessors on a chip. While these designs are able to compensate the clock frequency stagnation, they face multiple problems in terms of power consumption, programmability, resilience or memory. The solution is to give more responsibility to the runtime system and to let it tightly collaborate with the hardware. The runtime has to drive the design of future multi-cores architectures. In this talk, we introduce an approach towards a Runtime-Aware Architecture (RAA), a massively parallel architecture designed from the runtime's perspective.
在过去的几年里,将硬件性能的增长保持在摩尔定律所预测的速度的传统方法消失了。当单核成为标准时,由于定义良好的指令集体系结构(ISA),硬件设计与软件堆栈解耦。这个简单的接口允许开发应用程序而不必过多地担心底层硬件,而计算机架构师提出了在超标量处理器中积极利用指令级并行(ILP)的技术。当前的多核被设计成一个芯片上的简单对称多处理器。虽然这些设计能够补偿时钟频率停滞,但它们在功耗、可编程性、弹性或内存方面面临多重问题。解决方案是赋予运行时系统更多的责任,并让它与硬件紧密协作。运行时必须驱动未来多核架构的设计。在这次演讲中,我们将介绍一种实现运行时感知架构(RAA)的方法,这是一种从运行时角度设计的大规模并行架构。
{"title":"Runtime Aware Architectures","authors":"M. Valero","doi":"10.1109/IPDPS.2017.130","DOIUrl":"https://doi.org/10.1109/IPDPS.2017.130","url":null,"abstract":"In the last years the traditional ways to keep the increase of hardware performance to the rate predicted by the Moore's Law vanished. When uni-cores were the norm, hardware design was decoupled from the software stack thanks to a well defined Instruction Set Architecture (ISA). This simple interface allowed developing applications without worrying too much about the underlying hardware, while computer architects proposed techniques to aggressively exploit Instruction-Level Parallelism (ILP) in superscalar processors. Current multi-cores are designed as simple symmetric multiprocessors on a chip. While these designs are able to compensate the clock frequency stagnation, they face multiple problems in terms of power consumption, programmability, resilience or memory. The solution is to give more responsibility to the runtime system and to let it tightly collaborate with the hardware. The runtime has to drive the design of future multi-cores architectures. In this talk, we introduce an approach towards a Runtime-Aware Architecture (RAA), a massively parallel architecture designed from the runtime's perspective.","PeriodicalId":398898,"journal":{"name":"Proceedings of the Computing Frontiers Conference","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122828762","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
期刊
Proceedings of the Computing Frontiers Conference
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1