Filters








13,799 Hits in 5.2 sec

Distributed ONE: Scalable Parallel Network Simulation

Vedavyas Duggirala, Calvin Ribbens, Srinidhi Varadarajan
2013 Proceedings of the Sixth International Conference on Simulation Tools and Techniques  
We present strong and weak scaling performance results for the Distributed ONE system on up to sixteen nodes of a distributed-memory parallel cluster, on simulations involving up to 16,000 virtual hosts  ...  ONE uses a scaled real-time model called Relativistic Time (RT). We describe a RT-based reactive global warp detection algorithm to exploit lookahead.  ...  As applications running in a given LP generate events (e.g., send_msg, receive_msg) the system determines whether these events are local to that LP or whether they correspond to a virtual node that is  ... 
doi:10.4108/icst.simutools.2013.251733 dblp:conf/simutools/DuggiralaRV13 fatcat:3hc7k32wkff4feok36qy5oh6ae

Virtual distributed environments in a shared infrastructure

P. Ruth, X. Jiang, D. Xu, S. Goasguen
2005 Computer  
The widely used job and service models define an appropriate paradigm for resource sharing and program execution.  ...  Examples of these applications include the fine-grained emulation of real-world systems such as airport operations and antiterrorism exercises, each of which involves numerous dynamic and diverse objects  ...  Acknowledgment The US National Science Foundation partly funded this research under grants SCI-0438246 and SCI-0504261.  ... 
doi:10.1109/mc.2005.175 fatcat:zpc7rbeo3repxpifn6f4wyerb4

Cloud and Grid Part I: Difference and Convergence

Anna Melekhova, Vladimir Vinnikov
2015 Indian Journal of Science and Technology  
The types and properties of virtual resources as well as approaches to their appropriate and efficient management in virtual machines are considered in the next following second part of the paper.  ...  The first part of this paper is concerned with the generalized models of grid and cloud architectures as well as their mutual convergence.  ...  The cluster operates mostly in shared memory mode and provides an interface to mimic a single physical machine.  ... 
doi:10.17485/ijst/2015/v8i29/86860 fatcat:jogl4vs5cfadzadtb43vpqmnke

Scalable Work Stealing of Native Threads on an x86-64 Infiniband Cluster

Shigeki Akiyama, Kenjiro Taura
2016 Journal of Information Processing  
General task models provide functionalities for suspending and resuming tasks at any program point, and such a model enables us flexible task scheduling to achieve higher processor utilization, locality-aware  ...  In this paper, we port the library to an x86-64 Infiniband cluster with GASNet communication library.  ...  distributed shared memory systems.  ... 
doi:10.2197/ipsjjip.24.583 fatcat:lrsku2xz4feadb74xmlwzjqvrq

Efficient System-Enforced Deterministic Parallelism [article]

Amittai Aviram, Shu-Chun Weng, Sen Hu, Bryan Ford
2010 arXiv   pre-print
An untrusted user-level runtime uses distributed computing techniques to emulate familiar abstractions such as Unix processes, file systems, and shared memory multithreading.  ...  The system runs parallel applications deterministically both on multicore PCs and across nodes in a cluster.  ...  The scheduler runs the threads under an artificial execution schedule, emulating a schedule by which a true shared-memory multiprocessor might in principle run them, but using a deterministic, virtual  ... 
arXiv:1005.3450v1 fatcat:2zzzgu5q3vcltklzvmlc6b4ccq

Shared Virtual Memory Clusters with Next-Generation Interconnection Networks and Wide Compute Nodes [chapter]

Courtney R. Gibson, Angelos Bilas
2001 Lecture Notes in Computer Science  
We use an existing, large-scale hardware cache-coherent system with 64 processors to emulate a future cluster. We present results for both 32-and 64-processor system configurations.  ...  In this work we investigate this approach to building future software shared memory clusters.  ...  Acknowledgments We would like to thank Dongming Jiang for providing the modified versions of the SPLASH-2 applications and Bill Wichser for his help with using the SGI Origin 2000.  ... 
doi:10.1007/3-540-45307-5_15 fatcat:hvpb53fssfci7e4ll5sgtkcbeq

Efficient system-enforced deterministic parallelism

Amittai Aviram, Shu-Chun Weng, Sen Hu, Bryan Ford
2012 Communications of the ACM  
Coarse-grained parallel benchmarks perform and scale comparably to nondeterministic systems, on both multicore PCs and across nodes in a distributed cluster.  ...  We introduce a new parallel programming model addressing these issues, and use Determinator, a proof-of-concept OS, to demonstrate the model's practicality.  ...  Third, we use this model to emulate shared memory and file system ab-stractions in Determinator's user-space runtime.  ... 
doi:10.1145/2160718.2160742 fatcat:7ptdywth7jffvawn7vsatlmts4

Implementing Immersive Clustering with VR Juggler [chapter]

Aron Bierbaum, Patrick Hartling, Pedro Morillo, Carolina Cruz-Neira
2005 Lecture Notes in Computer Science  
shared memory computers traditionally used for virtual reality purposes.  ...  In this paper we present ClusterJuggler, a system based on the VR Juggler architecture that enables the use of distributed and clustered computers for the display of immersive virtual environments.  ...  Introduction Traditionally, multi-screen immersive visualization systems have relied upon dedicated, high-end, shared memory graphics computers to generate interactive virtual environments.  ... 
doi:10.1007/11424857_120 fatcat:ulmxrp2gdjffngpo722v5xzq2i

Network Emulation on Globus-Based Grids: Mechanisms and Challenges [chapter]

R. Canonico, P. Di Gennaro, V. Manetti, G. Ventre
2009 Signals and Communication Technology  
In this paper, we illustrate the peculiar virtualization requirements of a cluster-based emulation system and discuss how a Globus Virtual Workspace based on Xen virtual machines can be used as the basis  ...  Setting up an emulation experiment in a cluster-based system requires, firstly, the ability to map virtual resources requested by an experimenter onto available physical resources and, secondly, the ability  ...  Use of virtualization in emulation systems In a typical cluster-based network emulation system, users submit to the system an experiment request.  ... 
doi:10.1007/978-0-387-09663-6_30 fatcat:qupecydf3zfjvjrd3fhqnmv2zi

Denali

Andrew Whitaker, Marianne Shaw, Steven D. Gribble
2002 Proceedings of the 10th workshop on ACM SIGOPS European workshop: beyond the PC - EW10  
By selectively modifying the hardware architecture, we enable our system to scale up to 1000's of virtual machines on commodity hardware.  ...  Unlike VMMs, however, isolation kernels do not attempt to precisely emulate the underlying physical architecture.  ...  These emerging applications include pushing new Internet services into third party hosting infrastructure, deploying dynamic content generation code in content delivery networks, or pushing context-specific  ... 
doi:10.1145/1133373.1133375 dblp:conf/sigopsE/WhitakerSG02 fatcat:2rxusgbkqzamraxku7r6urk4bm

Scalable Network Emulation - The NET Approach

Andreas Grau, Klaus Herrmann, Kurt Rothermel
2012 Journal of Communications  
Our Network Emulation Testbed (NET) achieves high scalability by combining efficient node virtualization and adaptive virtual time. In this paper, we provide an overview of our system.  ...  The idea of NETplace is to minimize the load of the testbed by calculating an initial placement of virtual nodes onto the testbed nodes.  ...  All virtual nodes use a common Copy-on-Write file system to share these files. To minimize the overhead, we are using hard links to make shared files available on all virtual nodes.  ... 
doi:10.4304/jcm.7.1.3-16 fatcat:vl7yplnrxjhe7k5jzh32qttuba

Implementation and evaluation of a microthread architecture

K. Bousias, L. Guang, C.R. Jesshope, M. Lankamp
2009 Journal of systems architecture  
AETHER attempts to exploit concurrency self-adaptively in a ubiquitous environment and so the model is quite general.  ...  It is based on a model of computation called SVP, developed in the AETHER project to provide a SANE Virtual Processor model for concurrent programming.  ...  Acknowledgements The authors acknowledge and give thanks for the support to this project provided from both the EU, for its funding for the "AETHER" project, and from the NWO (the Netherlands Research  ... 
doi:10.1016/j.sysarc.2008.07.001 fatcat:44uq6mcpuzgnvn56svsa73jbnu

An MPI Implementation on the Top of the Virtual Interface Architecture [chapter]

Massimo Bertozzi, Franco Boselli, Gianni Conte, Monica Reggiani
1999 Lecture Notes in Computer Science  
These solutions share the underlying idea of giving to user processes direct access to network resources.  ...  The Virtual Interface Architecture (VIA) is an emerging standard designed by Intel, Microsoft, and Compaq aimed at the reduction of communication latency for cluster of workstations or system area networks  ...  Thanks to a software emulation of VIA, the porting has been possible even in absence of a hardware interface.  ... 
doi:10.1007/3-540-48158-3_25 fatcat:dozfpz3zrzdwffd4or4yrjfsoq

Practical taint-based protection using demand emulation

Alex Ho, Michael Fetterman, Christopher Clark, Andrew Warfield, Steven Hand
2006 ACM SIGOPS Operating Systems Review  
ability to dynamically switch a running system between virtualized and emulated execution.  ...  This paper demonstrates the use of a wellknown technique, data tainting, to track data received from the network as it propagates through a system and to prevent its execution.  ...  The authors would also like to thank our shepherd Gilles Muller, and Fabrice Bellard for his excellent work in creating a versatile open-source emulator that proved both enjoyable and educational to extend  ... 
doi:10.1145/1218063.1217939 fatcat:hiwss3754bcorm7xdowv6hfoqu

Practical taint-based protection using demand emulation

Alex Ho, Michael Fetterman, Christopher Clark, Andrew Warfield, Steven Hand
2006 Proceedings of the 2006 EuroSys conference on - EuroSys '06  
ability to dynamically switch a running system between virtualized and emulated execution.  ...  This paper demonstrates the use of a wellknown technique, data tainting, to track data received from the network as it propagates through a system and to prevent its execution.  ...  The authors would also like to thank our shepherd Gilles Muller, and Fabrice Bellard for his excellent work in creating a versatile open-source emulator that proved both enjoyable and educational to extend  ... 
doi:10.1145/1217935.1217939 dblp:conf/eurosys/HoFCWH06 fatcat:5qzr6jzyirh3vd6h44skc6ju74
« Previous Showing results 1 — 15 out of 13,799 results