53 research outputs found

    SRPT for Multi Server Systems Under Cellular Batching

    Get PDF
    In recent years, there has been a rapid growth of large-scale distributed deep learning (DDL) (this is a form of machine learning that lets computer programs learn patterns and adapt their performance) frameworks (Google's TensorFlow, MXNet, etc.), which exploit the massive parallelism of computing clusters to expedite the training and inference phases of deep learning systems. In a networked computing cluster that supports a large number of deep learning jobs, a key question is how to design efficient scheduling algorithms to allocate resources across different machines to minimize the overall job processing time (Essentially, we want to let computers process as many tasks as efficiently as possible). Toward this end, in this project, we propose to develop a suite of online scheduling algorithms that jointly optimize resource allocation and locality decisions for distributed deep learning training and inference phases. Our goal is to develop theoretically provable (near) delay-optimal scheduling and resource allocation optimization algorithms for RNN-based (recursive neural network) distributed deep learning based on cell-based batching in the inference phase

    Multi-party Quantum Byzantine Agreement Without Entanglement

    Full text link
    In this paper we propose a protocol of quantum communication to achieve Byzantine agreement among multiple parties. The striking feature of our proposal in comparison to the existing protocols is that we do not use entanglement to achieve the agreement. There are two stages in our protocol. In the first stage, a list of numbers that satisfies some special properties is distributed to every participant by a group of semi-honest list distributors via quantum secure communication. Then, in the second stage those participants exchange some information to reach agreement.Comment: 6 pages, 1 figur

    ์ž์—ฐ์–ด ์ƒ์„ฑ ๋ชจ๋ธ ์ถ”๋ก  ์„œ๋น„์Šค์˜ ํšจ์œจ์ ์ธ ์ž์› ์Šค์ผ€์ผ๋ง ์ •์ฑ…

    Get PDF
    ํ•™์œ„๋…ผ๋ฌธ(์„์‚ฌ) -- ์„œ์šธ๋Œ€ํ•™๊ต๋Œ€ํ•™์› : ๊ณต๊ณผ๋Œ€ํ•™ ์ปดํ“จํ„ฐ๊ณตํ•™๋ถ€, 2022. 8. ์ „๋ณ‘๊ณค.Though number of different types of Deep Neural Network (DNN) models are increasing, language generation model is still the most in demand. There is also an increasing demand for serving the pre-trained model. However, managing computing resources in serving Natural Language Generation (NLG) model is not a trivial problem, because requests and responses of each query is different due to a variety of environment. Moreover, it is even more challenging to decide scaling policy, which minimizes both violation of service level objective (SLO) and GPU resource usage. In this paper, we discuss the problem of using efficient GPU resources in serving language generation model, and propose a design a serving framework which supports fast and accurate scaling policy. We implemented an deep learning inference serving framework with policy and validated our system on the serving request query workloads.๋‹ค์–‘ํ•œ ์œ ํ˜•์˜ ์‹ฌ์ธต ์‹ ๊ฒฝ๋ง ๋ชจ๋ธ (DNN)์ด ์ฆ๊ฐ€ํ•จ์— ๋”ฐ๋ผ ์ž์—ฐ์–ด ์ƒ์„ฑ ๋ชจ๋ธ์— ๋Œ€ํ•œ ๊ด€์‹ฌ์ด ๋งŽ์•„์ง€๊ณ  ์žˆ๋‹ค. ๋˜ํ•œ ํ•™์Šต๋œ ๋ชจ๋ธ ์ด์šฉํ•œ ์ถ”๋ก  ์„œ๋น„์Šค์— ๋Œ€ํ•œ ์ˆ˜์š” ๋˜ํ•œ ํ•จ๊ป˜ ์ฆ๊ฐ€ํ•˜๊ณ  ์žˆ๋‹ค. ๊ทธ๋Ÿฌ๋‚˜ ์ž์—ฐ์–ด ์ƒ์„ฑ ๋ชจ๋ธ ์ถ”๋ก  ์„œ๋น„์Šค๋ฅผ ์šด์šฉํ•˜๋Š” ๋ฐ ์žˆ์–ด์„œ ์ปดํ“จํŒ… ์ž์›์„ ํšจ์œจ์ ์œผ๋กœ ์‚ฌ์šฉํ•˜๋Š” ๊ฒƒ์€ ๋‹จ์ˆœํ•œ ๋ฌธ์ œ๊ฐ€ ์•„๋‹ˆ๋‹ค. ์ด๋Š” ์ถ”๋ก  ์„œ๋น„์Šค์— ๋“ค์–ด์˜ค๋Š” ๊ฐ ์ฟผ๋ฆฌ๋งˆ๋‹ค ์ถ”๋ก  ์—”์ง„์—์„œ ์‚ฌ์šฉํ•˜๋Š” ์ปดํ“จํŒ… ์ž์›์ด ๋‹ค๋ฅด๊ธฐ ๋•Œ๋ฌธ์ด๋‹ค. ๊ทธ๋ ‡๊ธฐ์— ์ถ”๋ก  ์„œ๋น„์Šค์— ๋Œ€ํ•ด ์ž์› ์Šค์ผ€์ผ๋ง ์ •์ฑ…์„ ์‚ฌ์šฉํ•˜๋Š” ๊ฒƒ์€ ํ›จ์”ฌ ๋” ์–ด๋ ค์šด ์ผ์ด๋‹ค. ๋ณธ ๋…ผ๋ฌธ์—์„œ๋Š” ์–ธ์–ด ์ƒ์„ฑ ๋ชจ๋ธ ์ถ”๋ก  ์„œ๋น„์Šค์—์„œ GPU ์ž์›์„ ํšจ์œจ์ ์œผ๋กœ ์‚ฌ์šฉํ•˜๋Š” ๋ฌธ์ œ์— ๋Œ€ํ•ด ๋…ผ์˜ํ•œ๋‹ค. ๋ฌธ์ œ๋ฅผ ํ•ด๊ฒฐํ•˜๊ธฐ ์œ„ํ•œ ๋น ๋ฅด๊ณ  ์ •ํ™•ํ•œ ์ž์› ์Šค์ผ€์ผ๋ง ์ •์ฑ…์„ ์ œ์•ˆํ•˜๊ณ , ์š”์ฒญ ์ฟผ๋ฆฌ ์›Œํฌ๋กœ๋“œ์— ๋Œ€ํ•ด์„œ ํ•ด๋‹น ์ •์ฑ…์„ ๊ฒ€์ฆํ•œ๋‹ค.1. Introduction 5 2. Background 8 2.1 Natural Language Generation Model 8 2.2 Scaling Inference Engine in Kubernetes Cluster 10 3. Related Work 12 3.1 Scaling in Machine Learning Inference Serving 12 3.2 Model-less Inference Serving 12 4. Observation 14 4.1 Various Input Queries Violates SLOs 14 5. Scaling Mechanism and Policy 19 5.1 Horizontal Pod Scaling Mechanism 19 5.2 Per-Token Latency Based Policy 20 6 System Design 21 6.1 System Architecture 21 6.2 Management Server API Design 23 6.3 Implementation 23 7. Evaluation 25 7.1 Evaluation Setup 25 7.1.1 Environment 25 7.1.2 Workloads 25 7.2 First Scaling Time 26 7.3 SLO Violations and Total Resource Usage 27 7.4 Appropriate Resource Usage 27 8. Conclusion 31์„

    Security Information Sharing in Smart Grids: Persisting Security Audits to the Blockchain

    Get PDF
    This article belongs to the Special Issue Advanced Cybersecurity Services DesignWith the transformation in smart grids, power grid companies are becoming increasingly dependent on data networks. Data networks are used to transport information and commands for optimizing power grid operations: Planning, generation, transportation, and distribution. Performing periodic security audits is one of the required tasks for securing networks, and we proposed in a previous work autoauditor, a system to achieve automatic auditing. It was designed according to the specific requirements of power grid companies, such as scaling with the huge number of heterogeneous equipment in power grid companies. Though pentesting and security audits are required for continuous monitoring, collaboration is of utmost importance to fight cyber threats. In this paper we work on the accountability of audit results and explore how the list of audit result records can be included in a blockchain, since blockchains are by design resistant to data modification. Moreover, blockchains endowed with smart contracts functionality boost the automation of both digital evidence gathering, audit, and controlled information exchange. To our knowledge, no such system exists. We perform throughput evaluation to assess the feasibility of the system and show that the system is viable for adaptation to the inventory systems of electrical companies.This work has been supported by National R&D Projects TEC2017-84197-C4-1-R, TIN2017-84844-C2-1-R, by the Comunidad de Madrid project CYNAMON P2018/TCS-4566 and co-financed by European Structural Funds (ESF and FEDER), and by the Consejo Superior de Investigaciones Cientรญficas (CSIC) under the project LINKA20216 ("Advancing in cybersecurity technologies", i-LINK+ program)

    Blockchain logging for process mining: a systematic review

    Get PDF
    Considerable progress was forcasted for collaborative business processes with the rise of blockchain programmable platforms. One of the saliant promises was auditable traces of business process execution, but practically that has posed challenges specially with regard to blockchain logsโ€™ structure who turned out to be inadequate for process mining techniques. Approaches to answer this issue have started to emerge in the literature, some focusing on the creation process of event logs and others dealing with their retrieval from the blockchain. This work outlines the generic steps required to solve these challenges and analyzes findings in these approaches with a consideration for efficiency and future research directions
    • โ€ฆ
    corecore