Message Leak Detection in Debugging Large-Scale Parallel Applications
Pages 82 - 89
Abstract
Debugging in large-scale parallel applications with long runtime where frequency of errors is high became very problematic. Traditional debugging techniques with locating exactly errors no longer seems to be appropriate when applying to these applications because of high overhead in storing trace files, especially they are difficult to be able to scale efficiently. An effective solution to these problems is proposed in loop-based unusual behaviors detecting technique which is capable of defining leaked messages in loops and thus, helps to warn programmers about potential errors to prevent unexpected problems. The proposed technique consists of three order rules suggested to be implemented on high performance computing systems.
Index Terms
- Message Leak Detection in Debugging Large-Scale Parallel Applications
Index terms have been assigned to the content through auto-classification.
Recommendations
Large scale debugging of parallel tasks with AutomaDeD
SC '11: Proceedings of 2011 International Conference for High Performance Computing, Networking, Storage and AnalysisDeveloping correct HPC applications continues to be a challenge as the number of cores increases in today's largest systems. Most existing debugging techniques perform poorly at large scales and do not automatically locate the parts of the parallel ...
Comments
Please enable JavaScript to view thecomments powered by Disqus.Information & Contributors
Information
Published In
November 2015
170 pages
ISBN:9781467382342
Publisher
IEEE Computer Society
United States
Publication History
Published: 23 November 2015
Qualifiers
- Article
Contributors
Other Metrics
Bibliometrics & Citations
Bibliometrics
Article Metrics
- 0Total Citations
- 0Total Downloads
- Downloads (Last 12 months)0
- Downloads (Last 6 weeks)0
Reflects downloads up to 21 Sep 2024
Other Metrics
Citations
View Options
View options
Get Access
Login options
Check if you have access through your login credentials or your institution to get full access on this article.
Sign in