Reliable Scalable Symbolic Computation: The Design of SymGridPar2 pdfsubject=Proceedings of the 28th Symposium On Applied Computing, SAC 2013

نویسندگان

  • Patrick Maier
  • Rob Stewart
  • Phil Trinder
چکیده

Symbolic computation is an important area of both Mathematics and Computer Science, with many large computations that would benefit from parallel execution. Symbolic computations are, however, challenging to parallelise as they have complex data and control structures, and both dynamic and highly irregular parallelism. The SymGridPar framework has been developed to address these challenges on small-scale parallel architectures. However the multicore revolution means that the number of cores and the number of failures are growing exponentially, and that the communication topology is becoming increasingly complex. Hence an improved parallel symbolic computation framework is required. This paper presents the design and initial evaluation of SymGridPar2 (SGP2), a successor to SymGridPar that is designed to provide scalability onto 10 cores, and hence also provide fault tolerance. We present the SGP2 design goals, principles and architecture. We describe how scalability is achieved using layering and by allowing the programmer to control task placement. We outline how fault tolerance is provided by supervising remote computations, and outline higher-level fault tolerance abstractions. We describe the SGP2 implementation status and development plans. We report the scalability and efficiency on approximately 2000 cores, and investigate the overheads of tolerating faults for simple symbolic computations.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Special section on Software Verification and Testing

We are delighted to present this special section containing extended versions of selected papers from the Software Verification and Testing (SVT 2013) track at the 28th ACM Symposium on Applied Computing (ACM SAC 2013), which took place in March 2013 in Coimbra, Portugal. The SVT track aims to bring together academic researchers and industry R&D expertise to discuss new results in formal verifi...

متن کامل

Fault Tolerant DNA Computing Based on ‎Digital Microfluidic Biochips

   Historically, DNA molecules have been known as the building blocks of life, later on in 1994, Leonard Adelman introduced a technique to utilize DNA molecules for a new kind of computation. According to the massive parallelism, huge storage capacity and the ability of using the DNA molecules inside the living tissue, this type of computation is applied in many application areas such as me...

متن کامل

Privacy-preserving targeted mobile advertising: requirements, design and a prototype implementation

=1884356 [last accessed 6 April 2016].19. Tufekci Z. Can you see me now? Audience and disclosure regulation in online social network sites. Bulletin ofScience, Technology & Society 2008; 28(1):20–36.20. Madden M, Lenhart A, Cortesi S, Gasser U, Duggan M, Smith A, Beaton M. Teens, social media, and privacy. Available at: http://www.pewinternet.org/2013/05/21/teens-social-media-and-pr...

متن کامل

A Novel Trust Computation Method Based on User Ratings to Improve the Recommendation

Today, the trust has turned into one of the most beneficial solutions to improve recommender systems, especially in the collaborative filtering method. However, trust statements suffer from a number of shortcomings, including the trust statements sparsity, users' inability to express explicit trust for other users in most of the existing applications, etc. Thus to overcome these problems, this ...

متن کامل

Development of a Lattice-based Cryptosystem

Plantard T. , Rose M. and Willy S. (2009). Improvement of Lattice-based Cryptography using CRT. School of Computer and Software Engineering, University of Wollongong NSW, Australia. Ajtai, M. (1996). Generating Hard Instances of Lattice Problems. In Proceedings of the 28th annual ACM Symposium on Theory of Computing, New York, USA. Alese, B. K. (2000). Vulnerability Analysis of Encryption/Decry...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2012