146 research outputs found

    Speedup and efficiency of computational parallelization: A unifying approach and asymptotic analysis

    Full text link
    In high performance computing environments, we observe an ongoing increase in the available numbers of cores. This development calls for re-emphasizing performance (scalability) analysis and speedup laws as suggested in the literature (e.g., Amdahl's law and Gustafson's law), with a focus on asymptotic performance. Understanding speedup and efficiency issues of algorithmic parallelism is useful for several purposes, including the optimization of system operations, temporal predictions on the execution of a program, and the analysis of asymptotic properties and the determination of speedup bounds. However, the literature is fragmented and shows a large diversity and heterogeneity of speedup models and laws. These phenomena make it challenging to obtain an overview of the models and their relationships, to identify the determinants of performance in a given algorithmic and computational context, and, finally, to determine the applicability of performance models and laws to a particular parallel computing setting. In this work, we provide a generic speedup (and thus also efficiency) model for homogeneous computing environments. Our approach generalizes many prominent models suggested in the literature and allows showing that they can be considered special cases of a unifying approach. The genericity of the unifying speedup model is achieved through parameterization. Considering combinations of parameter ranges, we identify six different asymptotic speedup cases and eight different asymptotic efficiency cases. Jointly applying these speedup and efficiency cases, we derive eleven scalability cases, from which we build a scalability typology. Researchers can draw upon our typology to classify their speedup model and to determine the asymptotic behavior when the number of parallel processing units increases. In addition, our results may be used to address various extensions of our setting

    Elektronische Zeitung – das Erbe Gutenbergs?

    Get PDF

    Writing Qualitative IS Literature Reviews—Guidelines for Synthesis, Interpretation, and Guidance of Research

    Get PDF
    The literature review is an established research genre in many academic disciplines, including the IS discipline. Although many scholars agree that systematic literature reviews should be rigorous, few instructional texts for compiling a solid literature review, at least with regard to the IS discipline, exist. In response to this shortage, in this tutorial, I provide practical guidance for both students and researchers in the IS community who want to methodologically conduct qualitative literature reviews. The tutorial differs from other instructional texts in two regards. First, in contrast to most textbooks, I cover not only searching and synthesizing the literature but also the challenging tasks of framing the literature review, interpreting research findings, and proposing research paths. Second, I draw on other texts that provide guidelines for writing literature reviews in the IS discipline but use many examples of published literature reviews. I use an integrated example of a literature review, which guides the reader through the overall process of compiling a literature review

    Requirements for IT Security Metrics - an Argumentation Theory Based Approach

    Get PDF
    The demand for measuring IT security performance is driven by regulatory, financial, and organizational factors. While several best practice metrics have been suggested, we observe a lack of consistent requirements against which IT security metrics can be evaluated. We address this research gap by adopting a methodological approach that is based on argumentation theory and an accompanying literature review. As a result, we derive five key requirements: IT security metrics should be (a) bounded, (b) metrically scaled, (c) reliable, valid and objective, (d) context-specific and (e) computed automatically. We illustrate and discuss the context-specific instantiation of requirements by using the practically used vulnerability scanning coverage and mean-time-to-incident discovery metrics as examples. Finally we summarize further implications of each requirement

    High-Performance Computing for Scheduling Decision Support: A Parallel Depth-First Search Heuristic

    Get PDF
    Many academic disciplines - including information systems, computer science, and operations management - face scheduling problems as important decision making tasks. Since many scheduling problems are NP-hard in the strong sense, there is a need for developing solution heuristics. For scheduling problems with setup times on unrelated parallel machines, there is limited research on solution methods and to the best of our knowledge, parallel computer architectures have not yet been taken advantage of. We address this gap by proposing and implementing a new solution heuristic and by testing different parallelization strategies. In our computational experiments, we show that our heuristic calculates near-optimal solutions even for large instances and that computing time can be reduced substantially by our parallelization approach

    A Fuzzy Model for IT Security Investments

    Get PDF
    This paper presents a fuzzy set based decision support model for taking uncertainty into account when making security investment decisions for distributed systems. The proposed model is complementary to robabilistic approaches and useful in situations where probabilistic information is either unavailable or not appropriate to reliably predict future conditions. We ïŹrst present the speciïŹcation of a formal security language that allows to specify under which conditions a distributed system is protected against security violations. We show that each term of the security language can be transformed into an equivalent propositional logic term. Then we use propositional logic terms to deïŹne a fuzzy set based decision model. This optimization model incorporates uncertainty with regard to the impact of investments on the achieved security levels of components of the distributed system. The model also accounts for budget and security constraints, in order to be applicable in practice

    Resource Planning in Disaster Response - Decision Support Models and Methodologies

    Get PDF
    Managing the response to natural, man-made, and technical disasters is becoming increasingly important in the light of climate change, globalization, urbanization, and growing conflicts. Sudden onset disasters are typically characterized by high stakes, time pressure, and uncertain, conflicting or lacking information. Since the planning and management of response is a complex task, decision makers of aid organizations can thus benefit from decision support methods and tools. A key task is the joint allocation of rescue units and the scheduling of incidents under different conditions of collaboration. The authors present an approach to support decision makers who coordinate response units by (a) suggesting mathematical formulations of decision models, (b) providing heuristic solution procedures, and (c) evaluating the heuristics against both current best practice behavior and optimal solutions. The computational experiments show that, for the generated problem instances, (1) current best practice behavior can be improved substantially by our heuristics, (2) the gap between heuristic and optimal solutions is very narrow for instances without collaboration, and (3) the described heuristics are capable of providing solutions for all generated instances in less than a second on a state-of-the-art PC

    Automated Negotiations Under Uncertain Preferences

    Get PDF
    Automated Negotiation is an emerging field of electronic markets and multi-agent system research. Market engineers are faced in this connection with computational as well as economic issues, such as individual rationality and incentive compatibility. Most literature is focused on autonomous agents and negotiation protocols regarding these issues. However, common protocols show two deficiencies: (1) neglected consideration of agents’ incentives to strive for social welfare, (2) underemphasised acknowledgement that agents build their decision upon preference information delivered by human principals. Since human beings make use of heuristics for preference elicitation, their preferences are subject to informational uncertainty. The contribution of this paper is the proposition of a research agenda that aims at overcoming these research deficiencies. Our research agenda draws theoretically and methodologically on auctions, iterative bargaining, and fuzzy set theory. We complement our agenda with simulation-based preliminary results regarding differences in the application of auctions and iterative bargaining
    • 

    corecore