Enhancing Functionality and Performance in the PVM Network Computing System

نویسنده

  • Vaidy Sunderam
چکیده

The research funded by this grant is part of an ongoing research project in heterogeneous distributed computing with the PVM system, at Emory as well as at Oak Ridge Labs and the University of Tennessee. This grant primarily supports research at Emory that continues to evolve new concepts and systems in distributed computing, but it also includes the PI’S ongoing interaction with the other groups in terms of collaborative research as well as software systems development and maintenance. We have continued our second year efforts (July 1995 June 1996), on the same topics as during the first year, namely a)visualization of PVM programs to complement XPVM displays; (b) 1/0 and generalized distributed computing in PVM; and (c ) evolution of a multithreaded concurrent computing model.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Access and Mobility Policy Control at the Network Edge

The fifth generation (5G) system architecture is defined as service-based and the core network functions are described as sets of services accessible through application programming interfaces (API). One of the components of 5G is Multi-access Edge Computing (MEC) which provides the open access to radio network functions through API. Using the mobile edge API third party analytics applications ...

متن کامل

The PVM Concurrent Computing System: Evolution, Experiences, and Trends

The PVM system a software framework for heterogeneous concurrent computing in networked environments has evolved in the past several years into a viable technol ogy for distributed and parallel processing in a variety of disciplines PVM supports a straightforward but functionally complete message passing model and is capable of harnessing the combined resources of typically heterogeneous networ...

متن کامل

Assessment Methodology for Anomaly-Based Intrusion Detection in Cloud Computing

Cloud computing has become an attractive target for attackers as the mainstream technologies in the cloud, such as the virtualization and multitenancy, permit multiple users to utilize the same physical resource, thereby posing the so-called problem of internal facing security. Moreover, the traditional network-based intrusion detection systems (IDSs) are ineffective to be deployed in the cloud...

متن کامل

An Autonomic Service Oriented Architecture in Computational Engineering Framework

Service Oriented Architecture (SOA) technology enables composition of large and complex computational units out of the available atomic services. Implementation of SOA brings about challenges which include service discovery, service interaction, service composition, robustness, quality of service, security, etc. These challenges are mainly due to the dynamic nature of SOA. SOAmay often need to ...

متن کامل

Heterogeneous Network Computing: The Next Generation

Heterogeneous concurrent computing has emerged in recent times as an eeective platform for high performance applications as well as for traditional distributed computing. Performance and functionality that such methodologies can provide, as well as their limitations and potential, have become reasonably well understood. In this paper, we discuss some selected aspects of heterogeneous computing ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2000