35,078 research outputs found
A Multilevel Approach to Topology-Aware Collective Operations in Computational Grids
The efficient implementation of collective communiction operations has
received much attention. Initial efforts produced "optimal" trees based on
network communication models that assumed equal point-to-point latencies
between any two processes. This assumption is violated in most practical
settings, however, particularly in heterogeneous systems such as clusters of
SMPs and wide-area "computational Grids," with the result that collective
operations perform suboptimally. In response, more recent work has focused on
creating topology-aware trees for collective operations that minimize
communication across slower channels (e.g., a wide-area network). While these
efforts have significant communication benefits, they all limit their view of
the network to only two layers. We present a strategy based upon a multilayer
view of the network. By creating multilevel topology-aware trees we take
advantage of communication cost differences at every level in the network. We
used this strategy to implement topology-aware versions of several MPI
collective operations in MPICH-G2, the Globus Toolkit[tm]-enabled version of
the popular MPICH implementation of the MPI standard. Using information about
topology provided by MPICH-G2, we construct these multilevel topology-aware
trees automatically during execution. We present results demonstrating the
advantages of our multilevel approach by comparing it to the default
(topology-unaware) implementation provided by MPICH and a topology-aware
two-layer implementation.Comment: 16 pages, 8 figure
Do cyber-birds flock together? Comparing deviance among social network members of cyber-dependent offenders and traditional offenders
The distinct setting in which cyber-dependent crime takes place may reduce the similarity in the deviance of social network members. We test this assumption by analysing the deviance of the most important social contacts of cyber-dependent offenders and traditional offenders in the Netherlands (N = 344 offenders; N = 1131 social contacts). As expected, similarity in deviance is weaker for cyber-dependent crime. Because this is a strong predictor of traditional offending, this has important implications for criminological research and practice. Additionally, for both crime types the offending behaviour of a person is more strongly linked to the deviance of social ties if those ties are of the same gender and age, and if the offender has daily contact with them. Implications and future criminological research suggestions are discussed
A Taxonomy for Attack Patterns on Information Flows in Component-Based Operating Systems
We present a taxonomy and an algebra for attack patterns on component-based
operating systems. In a multilevel security scenario, where isolation of
partitions containing data at different security classifications is the primary
security goal and security breaches are mainly defined as undesired disclosure
or modification of classified data, strict control of information flows is the
ultimate goal. In order to prevent undesired information flows, we provide a
classification of information flow types in a component-based operating system
and, by this, possible patterns to attack the system. The systematic
consideration of informations flows reveals a specific type of operating system
covert channel, the covert physical channel, which connects two former isolated
partitions by emitting physical signals into the computer's environment and
receiving them at another interface.Comment: 9 page
Recommended from our members
Complex systems science: expert consultation report
Executive SummaryA new programme of research in Complex Systems Science must be initiated by FETThe science of complex systems (CS) is essential to establish rigorous scientific principles on which to develop the future ICT systems that are critical to the well-being, safety and prosperity of Europe and its citizens. As the âICT incubator and pathfinder for new ideas and themes for long-term research in the area of information and communication technologiesâ FET must initiate a significant new programme of research in complex systems science to underpin research and development in ICT. Complex Systems Science is a âblue skyâ research laboratory for R&D in ICT and their applications. In July 2009, ASSYST was given a set of probing questions concerning FET funding for ICT-related complex systems research. This document is based on the CS communityâs response.Complex systems research has made considerable progress and is delivering new scienceSince FET began supporting CS research, considerable progress has been made. Building on previous understanding of concepts such as emergence from interactions, far-from-equilibrium systems, border of chaos and self-organised criticality, recent CS research is now delivering rigorous theory through methods of statistical physics, network theory, and computer simulation. CS research increasingly demands high-throughput data streams and new ICT-based methods of observing and reconstructing, i.e. modelling, the dynamics from those data in areas as diverse as embryogenesis, neuroscience, transport, epidemics, linguistics, meteorology, and robotics. CS research is also beginning to address the problem of engineering robust systems of systems of systems that can adapt to changing environments, including the perplexing problem that ICT systems are too often fragile and non-adaptive.Recommendation: A Programme of Research in Complex Systems Science to Support ICTFundamental theory in Complex Systems Science is needed, but this can only be achieved through real-world applications involving large, heterogeneous, and messy data sets, including people and organisations. A long-term vision is needed. Realistic targets can be set. Fundamental research can be ensured by requiring that teams include mathematicians, computer scientists, physicists and computational social scientists.One research priority is to develop a formalism for multilevel systems of systems of systems, applicable to all areas including biology, economics, security, transportation, robotics, health, agriculture, ecology, and climate change. Another related research priority is a scientific perspective on the integration of the new science with policy and its implementation, including ethical problems related to privacy and equality.A further priority is the need for education in complex systems science. Conventional education continues to be domain-dominated, producing scientists who are for the most part still lacking fundamental knowledge in core areas of mathematics, computation, statistical physics, and social systems. Therefore:1. We recommend that FET fund a new programme of work in complex systems science as essential research for progress in the development of new kinds of ICT systems.2. We have identified the dynamics of multilevel systems as the area in complex systems science requiring a major paradigm shift, beyond which significant scientific progress cannot be made.3. We propose a call requiring: fundamental research in complex systems science; new mathematical and computational formalisms to be developed; involving a large âguinea pigâ organisation; research into policy and its meta-level information dynamics; and that all research staff have interdisciplinary knowledge through an education programme.Tangible outcomes, potential users of the new science, its impact and measures of successUsers include (i) the private and public sectors using ICT to manage complex systems and (ii) researchers in ICT, CSS, and all complex domains. The tangible output of a call will be new knowledge on the nature of complex systems in general, new knowledge of the particular complex system(s) studied, and new knowledge of the fundamental role played by ICT in the research and implementation to create real systems addressing real-world problems. The impact of the call will be seen through new high added-value opportunities in the public and private sectors, new high added-value ICT technologies, and new high added-value science to support innovation in ICT research and development. The measure of success will be through the delivery of these high added-value outcomes, and new science to better understand failures
A strategy for reducing turnaround time in design optimization using a distributed computer system
There is a need to explore methods for reducing lengthly computer turnaround or clock time associated with engineering design problems. Different strategies can be employed to reduce this turnaround time. One strategy is to run validated analysis software on a network of existing smaller computers so that portions of the computation can be done in parallel. This paper focuses on the implementation of this method using two types of problems. The first type is a traditional structural design optimization problem, which is characterized by a simple data flow and a complicated analysis. The second type of problem uses an existing computer program designed to study multilevel optimization techniques. This problem is characterized by complicated data flow and a simple analysis. The paper shows that distributed computing can be a viable means for reducing computational turnaround time for engineering design problems that lend themselves to decomposition. Parallel computing can be accomplished with a minimal cost in terms of hardware and software
- âŠ