Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 8 of 8

Full-Text Articles in Physical Sciences and Mathematics

Benchmarks And Standards For The Evaluation Of Parallel Job Schedulers, Steve J. Chapin, Walfredo Cirne, Dror G. Feitelson, James Patton Jones Jan 1999

Benchmarks And Standards For The Evaluation Of Parallel Job Schedulers, Steve J. Chapin, Walfredo Cirne, Dror G. Feitelson, James Patton Jones

Electrical Engineering and Computer Science - All Scholarship

The evaluation of parallel job schedulers hinges on the workloads used. It is suggested that this be standardized, in terms of both format and content, so as to ease the evaluation and comparison of different systems. The question remains whether this can encompass both traditional parallel systems and metacomputing systems. This paper is based on a panel on this subject that was held at the workshop, and the ensuing discussion; its authors are both the panel members and participants from the audience. Naturally, not all of us agree with all the opinions expressed here...


Performance Analysis Of Csma And Btma Protocols In Multihop Networks: Part Ii - Multiple Channel Case, Lin Wu, Pramod K. Varshney Jan 1999

Performance Analysis Of Csma And Btma Protocols In Multihop Networks: Part Ii - Multiple Channel Case, Lin Wu, Pramod K. Varshney

Electrical Engineering and Computer Science - All Scholarship

Busy tone multiple access protocols have been used in multihop networks to reduce the effect of the hidden terminal problem. This paper demonstrates another approach to reduce the effect of the hidden terminal problem namely the use of multiple channel schemes. A protocol that uses both the busy tone and the multiple channel techniques achieves the best performance. Using a Markov chain model and an approximation, the throughput performance of the multiple channel nonpersistent CSMA protocol and the multiple channel conservative BTMA protocol in a large network is evaluated and compared. The results show that the multichannel CSMA and BTMA …


A Matrix-Based Approach To Global Locality Optimization, Mahmut Kandemir, Alok Choudhary, J. Ramanujam, Prith Banerjee Jan 1999

A Matrix-Based Approach To Global Locality Optimization, Mahmut Kandemir, Alok Choudhary, J. Ramanujam, Prith Banerjee

Electrical Engineering and Computer Science - All Scholarship

Global locality optimization is a technique for improving the cache performance of a sequence of loop nests through a combination of loop and data layout transformations. Pure loop transformations are restricted by data dependences and may not be very successful in optimizing imperfectly nested loops and explicitly parallelized programs. Although pure data transformations are not constrained by data dependences, the impact of a data transformation on an array might be program-wide; that is, it can affect all the references to that array in all the loop nests. Therefore, in this paper we argue for an integrated approach that employs both …


Truce: Agent Coordination Through Concurrent Interpretation Of Role-Based Protocols, Wilfred C. Jamison, Douglas Lea Jan 1999

Truce: Agent Coordination Through Concurrent Interpretation Of Role-Based Protocols, Wilfred C. Jamison, Douglas Lea

Electrical Engineering and Computer Science - All Scholarship

Established protocols for coordination are essential for implementing joint-action activities among collaborating software agent. Most existing agents, however, are designed only to support static protocols, which limit their interaction domain to specific sets of agents. We develop an agent collaboration framework for open systems that enables an agent to expand its acquaintance set and to adapt to various coordination protocols dynamically. This is achieved through writing coordination scripts that are interpreted at collaboration time. We developed a role-based coordination language for writing these scripts, where the coordination mechanism used is the concurrent interpretation of a single script by the participants …


Formal Development Of Secure Email, Dan Zhou, Joncheng C. Kuo, Susan Older, Shiu-Kai Chin Jan 1999

Formal Development Of Secure Email, Dan Zhou, Joncheng C. Kuo, Susan Older, Shiu-Kai Chin

Electrical Engineering and Computer Science - All Scholarship

Developing systems that are assured to be secure requires precise and accurate descriptions of specifications, designs, implementations, and security properties. Formal specification and verification have long been recognized as giving the highest degree of assurance. In this paper, we describe a software development process that integrates formal verification and synthesis. We demonstrate this process by developing assured sender and receiver C++ code for a secure electronic mail system, Privacy Enhanced Mail. We use higher-order logic for system-requirements specification, design specifications and design verification. We use a combination of higher-order logic and category theory and tools supporting these formalisms to refine …


Continuous Models Of Computation For Logic Programs: Importing Continuous Mathematics Into Logic Programming's Algorithmic Foundations, Howard A. Blair, Fred Dushin, David W. Jakel, Angel J. Rivera, Metin Sezgin Jan 1999

Continuous Models Of Computation For Logic Programs: Importing Continuous Mathematics Into Logic Programming's Algorithmic Foundations, Howard A. Blair, Fred Dushin, David W. Jakel, Angel J. Rivera, Metin Sezgin

Electrical Engineering and Computer Science - All Scholarship

Logic programs may be construed as discrete-time and continuous-time dynamical systems with continuous states. Techniques for obtaining explicit formulations of such dynamical systems are presented and the computational performance of examples is presented. Extending 2-valued and n-valued logic to continuousvalued logic is shown to be unique, up to choosing the representations of the individual truth values as elements of a continuous field, provided that lowest degree polynomials are selected. In the case of 2-valued logic, the constraint that enables the uniqueness of the continualization is that the Jacobian matrices of the continualizations of the Boolean connectives have only affine entries. …


Formal Analysis Of A Secure Communication Channel: Secure Core-Email Protocol, Dan Zhou, Shiu-Kai Chin Jan 1999

Formal Analysis Of A Secure Communication Channel: Secure Core-Email Protocol, Dan Zhou, Shiu-Kai Chin

Electrical Engineering and Computer Science - All Scholarship

To construct a highly-assured implementation of secure communication channels we must have clear definitions of the security services, the channels, and under what assumptions these channels provide the desired services. We formally define secure channel services and develop a detailed example. The example is a core protocol common to a family of secure email systems. We identify the necessary properties of cryptographic algorithms to ensure that the email protocol is secure, and we verify that the email protocol provides secure services under these assumptions. We carry out the definitions and verifications in higher-order logic using the HOL theorem-prover. All our …


A Hierarchical Analysis Approach For High Performance Computing And Communication Applications, Salim Hariri, Pramod Varshney, Luying Zhou, Vinod V. Menon, Shihab Ghaya Jan 1999

A Hierarchical Analysis Approach For High Performance Computing And Communication Applications, Salim Hariri, Pramod Varshney, Luying Zhou, Vinod V. Menon, Shihab Ghaya

Electrical Engineering and Computer Science - All Scholarship

The proliferation of high performance computers and high-speed networks has made parallel and distributed computing feasible and cost-effective on High Performance Computing and Communication Systems (HPCC). However, the design, analysis and development of parallel and distributed applications on such computing systems are still very challenging tasks. Therefore, there is a great need for an integrated multilevel analysis methodology to assist in designing and analyzing the performance of both existing and proposed systems. Currently, there are no comprehensive analysis methods that address such diverse needs. This paper presents a three-level hierarchical modeling approach for analyzing the end-to-end performance of an application …