Pub Date : 2023-06-06DOI: 10.1142/s0129626423500068
D. Zaitsev, T. Shmeleva, Qing Zhang, Hongfei Zhao
Modern computing is a path of violations and transformations coming from an intrinsically concurrent application domain into a sequence of instructions and then back to concurrency with OpenMP, MPI and CUDA/OpenCL. Why we create so many difficulties? Sleptsov Net Computing (SNC) maps a task into an appropriate computing structure implemented as a re-configurable multidimensional sparse matrix of computing memory. It has entirely graphical mass parallel language for concurrent programming and a framework of techniques for concurrent program verification to develop reliable software. Estimated efficiency of SNC is higher than 50% compared to actual less that 1% efficiency of the most powerful supercomputers. It yields hyper-performance capable of efficient control of hyper-sonic objects, colliders, thermonuclear reaction. This paper presents an open source prototype VM and IDE for SNC with a view on upcoming hardware implementation of the corresponding computer.
{"title":"Virtual Machine and Integrated Developer Environment for Sleptsov Net Computing","authors":"D. Zaitsev, T. Shmeleva, Qing Zhang, Hongfei Zhao","doi":"10.1142/s0129626423500068","DOIUrl":"https://doi.org/10.1142/s0129626423500068","url":null,"abstract":"Modern computing is a path of violations and transformations coming from an intrinsically concurrent application domain into a sequence of instructions and then back to concurrency with OpenMP, MPI and CUDA/OpenCL. Why we create so many difficulties? Sleptsov Net Computing (SNC) maps a task into an appropriate computing structure implemented as a re-configurable multidimensional sparse matrix of computing memory. It has entirely graphical mass parallel language for concurrent programming and a framework of techniques for concurrent program verification to develop reliable software. Estimated efficiency of SNC is higher than 50% compared to actual less that 1% efficiency of the most powerful supercomputers. It yields hyper-performance capable of efficient control of hyper-sonic objects, colliders, thermonuclear reaction. This paper presents an open source prototype VM and IDE for SNC with a view on upcoming hardware implementation of the corresponding computer.","PeriodicalId":44742,"journal":{"name":"Parallel Processing Letters","volume":" ","pages":""},"PeriodicalIF":0.4,"publicationDate":"2023-06-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48025321","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-05-17DOI: 10.1142/s0129626423500056
A. Schumann, F. Schang
In this paper, we propose an explication of the notion of emotional (pragmatic) truth due to defining performative propositions on non-Archimedean models [Formula: see text]. In these models, it is possible to fix an appropriate behavioral scenario for each atomic performative proposition. Meanwhile, each performative proposition [Formula: see text] has an appropriate form of cognitive bias [Formula: see text] changing the meaning of [Formula: see text], but this bias is the result or foundation for interaction with the outside world. Therefore, instead of the usual domain [Formula: see text] of realization of atomic informative propositions [Formula: see text], which can be finite, we always have an infinite domain [Formula: see text] of realization of performative propositions [Formula: see text], where [Formula: see text] is an informative proposition, distorted by some kind of cognitive biases [Formula: see text]. This semantics allows us to shift the focus from artificial intelligence (AI) to emotional artificial intelligence (EAI).
{"title":"On the Notion of Emotional Truth","authors":"A. Schumann, F. Schang","doi":"10.1142/s0129626423500056","DOIUrl":"https://doi.org/10.1142/s0129626423500056","url":null,"abstract":"In this paper, we propose an explication of the notion of emotional (pragmatic) truth due to defining performative propositions on non-Archimedean models [Formula: see text]. In these models, it is possible to fix an appropriate behavioral scenario for each atomic performative proposition. Meanwhile, each performative proposition [Formula: see text] has an appropriate form of cognitive bias [Formula: see text] changing the meaning of [Formula: see text], but this bias is the result or foundation for interaction with the outside world. Therefore, instead of the usual domain [Formula: see text] of realization of atomic informative propositions [Formula: see text], which can be finite, we always have an infinite domain [Formula: see text] of realization of performative propositions [Formula: see text], where [Formula: see text] is an informative proposition, distorted by some kind of cognitive biases [Formula: see text]. This semantics allows us to shift the focus from artificial intelligence (AI) to emotional artificial intelligence (EAI).","PeriodicalId":44742,"journal":{"name":"Parallel Processing Letters","volume":"1 1","pages":""},"PeriodicalIF":0.4,"publicationDate":"2023-05-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41791718","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-04-17DOI: 10.1142/s0129626423400054
Linjiang Xie, Feilu Hang, W. Guo, Zhenhong Zhang, Hanruo Li
Modern information and communication technologies are being incorporated into traditional power grid systems to create the smart grid of the real world. The newly provided information flow and intrinsic creation, transport, storage, and the use of electricity are all facilitated by the energy transfer, especially as the complete deployment of the Internet of Things in the power grid, also known as the power Internet of Things (PIoT). These new 5G technologies and the value generated by novel services and market processes can all be used to maximize the value of scarce resources like energy. This paper develops a framework for a cyber-physical power system based on IoT (CPPS-IoT). Automobiles, aircraft, defense, factory equipment, wellness equipment, industrial control, connected cars, and other sectors and industries are all benefiting from the fast growth of CPS technology. A smart electric grid is created when dispersed sources of energy and electrical infrastructure are linked together to provide global exchange of information, sensible decision, including true flexible control using the CPPS. Cyber-physical systems have great benefits because they combine IoT with physical processes and mediate how humans interact with the natural environment. Cyber-physical systems use sensor networks and embedded computers to keep tabs on and manipulate the physical world around them. They include built-in feedback loops that enable the environment to trigger their communication, control, or processing. The proposed method makes systems safer and more efficient, decreasing the cost of developing and running these systems. The accuracy is 89%, and the proposed method’s error rate is 48%.
{"title":"Data-centric Networking with Parallel and Distributed Architecture Performs Performance Analysis to Protect Critical Infrastructure in the Future Power System Network Based on IoT","authors":"Linjiang Xie, Feilu Hang, W. Guo, Zhenhong Zhang, Hanruo Li","doi":"10.1142/s0129626423400054","DOIUrl":"https://doi.org/10.1142/s0129626423400054","url":null,"abstract":"Modern information and communication technologies are being incorporated into traditional power grid systems to create the smart grid of the real world. The newly provided information flow and intrinsic creation, transport, storage, and the use of electricity are all facilitated by the energy transfer, especially as the complete deployment of the Internet of Things in the power grid, also known as the power Internet of Things (PIoT). These new 5G technologies and the value generated by novel services and market processes can all be used to maximize the value of scarce resources like energy. This paper develops a framework for a cyber-physical power system based on IoT (CPPS-IoT). Automobiles, aircraft, defense, factory equipment, wellness equipment, industrial control, connected cars, and other sectors and industries are all benefiting from the fast growth of CPS technology. A smart electric grid is created when dispersed sources of energy and electrical infrastructure are linked together to provide global exchange of information, sensible decision, including true flexible control using the CPPS. Cyber-physical systems have great benefits because they combine IoT with physical processes and mediate how humans interact with the natural environment. Cyber-physical systems use sensor networks and embedded computers to keep tabs on and manipulate the physical world around them. They include built-in feedback loops that enable the environment to trigger their communication, control, or processing. The proposed method makes systems safer and more efficient, decreasing the cost of developing and running these systems. The accuracy is 89%, and the proposed method’s error rate is 48%.","PeriodicalId":44742,"journal":{"name":"Parallel Processing Letters","volume":" ","pages":""},"PeriodicalIF":0.4,"publicationDate":"2023-04-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42132291","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-03-14DOI: 10.1142/s0129626423400042
Fujun Yang, Xiaohang Li
In the Energy Conversion for Next-Generation Smart Cities, intelligent substation plays an important role in the power conversion. As an important guarantee for the stable operation of intelligent substation, the research on fault diagnosis technology is particularly important. In this paper, the acoustic characteristic diagnosis of substation equipment (take transformers for example) is researched and the application of “Voice Recognition + artificial neural network (ANN)” technology in substation fault diagnosis is analyzed. At the same time, the continuous online monitoring of the intelligent substation equipment will produce a large amount of monitoring data, which needs to be analyzed timely and effectively to understand the operating status of the equipment accurately. Because of this, this paper adopts distributed computing by establishing a real-time distributed computing platform, using open source technology to store the online monitoring of sound data into the computing platform for data processing to achieve the purpose of automatic fault detection and analysis. The results show that distributed computing can realize the intelligent analysis, storage, and visualization of equipment data in the substation, which provides data support for fault diagnosis. Besides, the fitting accuracy rates of ANN model are 95.123% for training process and the fitting accuracy rates of ANN model are 99.353% for training process and the overall fitting accuracy rates of ANN model are 95.478% and the error between the predicted value and the actual value of the 5 sound signals is within 5% in the fault diagnosis process. Consequently, the ANN model can accurately identify each fault sound of substation and achieve the purpose of fault diagnosis.
{"title":"Research on Substation Monitoring and Fault Diagnosis Based on Distributed Computing and Artificial Neural Network","authors":"Fujun Yang, Xiaohang Li","doi":"10.1142/s0129626423400042","DOIUrl":"https://doi.org/10.1142/s0129626423400042","url":null,"abstract":"In the Energy Conversion for Next-Generation Smart Cities, intelligent substation plays an important role in the power conversion. As an important guarantee for the stable operation of intelligent substation, the research on fault diagnosis technology is particularly important. In this paper, the acoustic characteristic diagnosis of substation equipment (take transformers for example) is researched and the application of “Voice Recognition + artificial neural network (ANN)” technology in substation fault diagnosis is analyzed. At the same time, the continuous online monitoring of the intelligent substation equipment will produce a large amount of monitoring data, which needs to be analyzed timely and effectively to understand the operating status of the equipment accurately. Because of this, this paper adopts distributed computing by establishing a real-time distributed computing platform, using open source technology to store the online monitoring of sound data into the computing platform for data processing to achieve the purpose of automatic fault detection and analysis. The results show that distributed computing can realize the intelligent analysis, storage, and visualization of equipment data in the substation, which provides data support for fault diagnosis. Besides, the fitting accuracy rates of ANN model are 95.123% for training process and the fitting accuracy rates of ANN model are 99.353% for training process and the overall fitting accuracy rates of ANN model are 95.478% and the error between the predicted value and the actual value of the 5 sound signals is within 5% in the fault diagnosis process. Consequently, the ANN model can accurately identify each fault sound of substation and achieve the purpose of fault diagnosis.","PeriodicalId":44742,"journal":{"name":"Parallel Processing Letters","volume":" ","pages":""},"PeriodicalIF":0.4,"publicationDate":"2023-03-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45545415","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-03-08DOI: 10.1142/s0129626423400066
Linjiang Xie, Feilu Hang, W. Guo, Zhenhong Zhang, Hanruo Li
Maintaining computer network security has long been an essential component of computer administration. Network security has become essential to companies’ safety and steady development in real-time implementation for diverse physical domains employing computers. Establishing a specific physical domain has consistently included a priority job of improving the safety of computer systems management. Study results on the practical implementation of machine intelligence in network security maintenance. Specifically, this paper examines and offers security management techniques for computer network data protection to establish an all-encompassing security shield for networked computers, with the ultimate goal of improving the safety and reliability of the net-worked computers used in commercial settings. Furthermore, the comprehensive research analysis determines an architectural model for machine intelligence-based network security maintenance (MI-NSM), implying an intrusion detection scheme with a novel neural network system. Labelling important properties of objects or data points and searching for commonalities allows the auto-mobile’s AI to distinguish between a human, the street, another car, and the sky. The simulation evaluation is performed using the NS2 simulator and observes the security maintenance efficiency over the current security solutions.
{"title":"Performance Evaluation of Data-Centric Networks Based on Parallel and Distributed Architectures for Machine Intelligence Research","authors":"Linjiang Xie, Feilu Hang, W. Guo, Zhenhong Zhang, Hanruo Li","doi":"10.1142/s0129626423400066","DOIUrl":"https://doi.org/10.1142/s0129626423400066","url":null,"abstract":"Maintaining computer network security has long been an essential component of computer administration. Network security has become essential to companies’ safety and steady development in real-time implementation for diverse physical domains employing computers. Establishing a specific physical domain has consistently included a priority job of improving the safety of computer systems management. Study results on the practical implementation of machine intelligence in network security maintenance. Specifically, this paper examines and offers security management techniques for computer network data protection to establish an all-encompassing security shield for networked computers, with the ultimate goal of improving the safety and reliability of the net-worked computers used in commercial settings. Furthermore, the comprehensive research analysis determines an architectural model for machine intelligence-based network security maintenance (MI-NSM), implying an intrusion detection scheme with a novel neural network system. Labelling important properties of objects or data points and searching for commonalities allows the auto-mobile’s AI to distinguish between a human, the street, another car, and the sky. The simulation evaluation is performed using the NS2 simulator and observes the security maintenance efficiency over the current security solutions.","PeriodicalId":44742,"journal":{"name":"Parallel Processing Letters","volume":" ","pages":""},"PeriodicalIF":0.4,"publicationDate":"2023-03-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43347411","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-01-30DOI: 10.1142/s0129626423500081
Minglu Bai, Yingzhi Tian, Jiaqiong Yin
Let [Formula: see text] be a graph with vertex set [Formula: see text] and edge set [Formula: see text]. An edge subset [Formula: see text] is called a restricted edge-cut if [Formula: see text] is disconnected and has no isolated vertices. The restricted edge-connectivity [Formula: see text] of [Formula: see text] is the cardinality of a minimum restricted edge-cut of [Formula: see text] if it has any; otherwise [Formula: see text]. If [Formula: see text] is not a star and its order is at least four, then [Formula: see text], where [Formula: see text]. The graph [Formula: see text] is said to be maximally restricted edge-connected if [Formula: see text]; the graph [Formula: see text] is said to be super restricted edge-connected if every minimum restricted edge-cut isolates an edge from [Formula: see text]. The direct product of graphs [Formula: see text] and [Formula: see text], denoted by [Formula: see text], is the graph with vertex set [Formula: see text], where two vertices [Formula: see text] and [Formula: see text] are adjacent in [Formula: see text] if and only if [Formula: see text] and [Formula: see text]. In this paper, we give a sufficient condition for [Formula: see text] to be super restricted edge-connected, where [Formula: see text] is the complete graph on [Formula: see text] vertices.
{"title":"The Super Restricted Edge-connectedness of Direct Product Graphs","authors":"Minglu Bai, Yingzhi Tian, Jiaqiong Yin","doi":"10.1142/s0129626423500081","DOIUrl":"https://doi.org/10.1142/s0129626423500081","url":null,"abstract":"Let [Formula: see text] be a graph with vertex set [Formula: see text] and edge set [Formula: see text]. An edge subset [Formula: see text] is called a restricted edge-cut if [Formula: see text] is disconnected and has no isolated vertices. The restricted edge-connectivity [Formula: see text] of [Formula: see text] is the cardinality of a minimum restricted edge-cut of [Formula: see text] if it has any; otherwise [Formula: see text]. If [Formula: see text] is not a star and its order is at least four, then [Formula: see text], where [Formula: see text]. The graph [Formula: see text] is said to be maximally restricted edge-connected if [Formula: see text]; the graph [Formula: see text] is said to be super restricted edge-connected if every minimum restricted edge-cut isolates an edge from [Formula: see text]. The direct product of graphs [Formula: see text] and [Formula: see text], denoted by [Formula: see text], is the graph with vertex set [Formula: see text], where two vertices [Formula: see text] and [Formula: see text] are adjacent in [Formula: see text] if and only if [Formula: see text] and [Formula: see text]. In this paper, we give a sufficient condition for [Formula: see text] to be super restricted edge-connected, where [Formula: see text] is the complete graph on [Formula: see text] vertices.","PeriodicalId":44742,"journal":{"name":"Parallel Processing Letters","volume":" ","pages":""},"PeriodicalIF":0.4,"publicationDate":"2023-01-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41839893","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-06-01DOI: 10.1142/S0129626414400040
A V Spirov, E A Zagriychuk, D M Holloway
The co-evolution of species with their genomic parasites (transposons) is thought to be one of the primary ways of rewiring gene regulatory networks (GRNs). We develop a framework for conducting evolutionary computations (EC) using the transposon mechanism. We find that the selective pressure of transposons can speed evolutionary searches for solutions and lead to outgrowth of GRNs (through co-option of new genes to acquire insensitivity to the attacking transposons). We test the approach by finding GRNs which can solve a fundamental problem in developmental biology: how GRNs in early embryo development can robustly read maternal signaling gradients, despite continued attacks on the genome by transposons. We observed co-evolutionary oscillations in the abundance of particular GRNs and their transposons, reminiscent of predator-prey or host-parasite dynamics.
{"title":"Evolutionary Design of Gene Networks: Forced Evolution by Genomic Parasites.","authors":"A V Spirov, E A Zagriychuk, D M Holloway","doi":"10.1142/S0129626414400040","DOIUrl":"https://doi.org/10.1142/S0129626414400040","url":null,"abstract":"<p><p>The co-evolution of species with their genomic parasites (transposons) is thought to be one of the primary ways of rewiring gene regulatory networks (GRNs). We develop a framework for conducting evolutionary computations (EC) using the transposon mechanism. We find that the selective pressure of transposons can speed evolutionary searches for solutions and lead to outgrowth of GRNs (through co-option of new genes to acquire insensitivity to the attacking transposons). We test the approach by finding GRNs which can solve a fundamental problem in developmental biology: how GRNs in early embryo development can robustly read maternal signaling gradients, despite continued attacks on the genome by transposons. We observed co-evolutionary oscillations in the abundance of particular GRNs and their transposons, reminiscent of predator-prey or host-parasite dynamics.</p>","PeriodicalId":44742,"journal":{"name":"Parallel Processing Letters","volume":"24 2","pages":""},"PeriodicalIF":0.4,"publicationDate":"2014-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1142/S0129626414400040","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"32950139","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-01-01DOI: 10.1007/978-3-642-33062-9
M. Hance
{"title":"Photon Physics at the LHC","authors":"M. Hance","doi":"10.1007/978-3-642-33062-9","DOIUrl":"https://doi.org/10.1007/978-3-642-33062-9","url":null,"abstract":"","PeriodicalId":44742,"journal":{"name":"Parallel Processing Letters","volume":"1 1","pages":""},"PeriodicalIF":0.4,"publicationDate":"2013-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1007/978-3-642-33062-9","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"51087233","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-09-01DOI: 10.1142/S012962641000017X
Marius Nagy, S. Akl
Rank-varying computational complexity describes those computations in which the complexity of executing each step is not a constant, but evolves throughout the computation as a function of the order of execution of each step [2]. This paper identifies practical instances of this computational paradigm in the procedures for computing the quantum Fourier transform and its inverse. It is shown herein that under the constraints imposed by quantum decoherence, only a parallel approach can guarantee a reliable solution or, alternatively, improve scalability.
{"title":"Coping with Decoherence: Parallelizing the Quantum Fourier Transform","authors":"Marius Nagy, S. Akl","doi":"10.1142/S012962641000017X","DOIUrl":"https://doi.org/10.1142/S012962641000017X","url":null,"abstract":"Rank-varying computational complexity describes those computations in which the complexity of executing each step is not a constant, but evolves throughout the computation as a function of the order of execution of each step [2]. This paper identifies practical instances of this computational paradigm in the procedures for computing the quantum Fourier transform and its inverse. It is shown herein that under the constraints imposed by quantum decoherence, only a parallel approach can guarantee a reliable solution or, alternatively, improve scalability.","PeriodicalId":44742,"journal":{"name":"Parallel Processing Letters","volume":"39 1","pages":"108-113"},"PeriodicalIF":0.4,"publicationDate":"2010-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73781196","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2008-09-01DOI: 10.1142/S012962640800348X
Z. Balaton, Z. Farkas, G. Gombás, P. Kacsuk, R. Lovas, Csaba Attila Marosi, G. Terstyánszky, T. Kiss, O. Lodygensky, G. Fedak, A. Emmen, I. Kelley, I. Taylor, M. Cárdenas-Montes, Filipe Araújo
Service grids and desktop grids are both promoted by their supportive communities as great solutions for solving the available compute power problem and helping to balance loads across network systems. Little work, however, has been undertaken to blend these two technologies together. In this paper we introduce a new EU project, that is building technological bridges to facilitate service and desktop grid interoperability. We provide a taxonomy and background into service grids, such as EGEE and desktop grids or volunteer computing platforms, such as BOINC and XtremWeb. We then describe our approach for identifying translation technologies between service and desktop grids. The individual themes discuss the actual bridging technologies employed and the distributed data issues surrounding deployment.
{"title":"EdgES: the Common Boundary between Service and Desktop Grids","authors":"Z. Balaton, Z. Farkas, G. Gombás, P. Kacsuk, R. Lovas, Csaba Attila Marosi, G. Terstyánszky, T. Kiss, O. Lodygensky, G. Fedak, A. Emmen, I. Kelley, I. Taylor, M. Cárdenas-Montes, Filipe Araújo","doi":"10.1142/S012962640800348X","DOIUrl":"https://doi.org/10.1142/S012962640800348X","url":null,"abstract":"Service grids and desktop grids are both promoted by their supportive communities as great solutions for solving the available compute power problem and helping to balance loads across network systems. Little work, however, has been undertaken to blend these two technologies together. In this paper we introduce a new EU project, that is building technological bridges to facilitate service and desktop grid interoperability. We provide a taxonomy and background into service grids, such as EGEE and desktop grids or volunteer computing platforms, such as BOINC and XtremWeb. We then describe our approach for identifying translation technologies between service and desktop grids. The individual themes discuss the actual bridging technologies employed and the distributed data issues surrounding deployment.","PeriodicalId":44742,"journal":{"name":"Parallel Processing Letters","volume":"9 1","pages":"37-48"},"PeriodicalIF":0.4,"publicationDate":"2008-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85417036","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}