A Two-Dimensional Low-Diameter Scalable On-Chip Network for Interconnecting Thousands of Cores
This paper introduces the Spidergon-Donut (SD) on-chip interconnection network for interconnecting 1,000 cores in future MPSoCs and CMPs. Unlike the Spidergon network, the SD network which extends the Spidergon network into the second dimension, ...
Accelerating Matrix Operations with Improved Deeply Pipelined Vector Reduction
Many scientific or engineering applications involve matrix operations, in which reduction of vectors is a common operation. If the core operator of the reduction is deeply pipelined, which is usually the case, dependencies between the input data ...
An Efficient Approach for Mobile Asset Tracking Using Contexts
Due to the heterogeneity involved in smart interconnected devices, cellular applications, and surrounding (GPS-aware) environments there is a need to develop a realistic approach to track mobile assets. Current tracking systems are costly and ...
Autonomic Placement of Mixed Batch and Transactional Workloads
To reduce the cost of infrastructure and electrical energy, enterprise datacenters consolidate workloads on the same physical hardware. Often, these workloads comprise both transactional and long-running analytic computations. Such consolidation brings ...
BloomCast: Efficient and Effective Full-Text Retrieval in Unstructured P2P Networks
Efficient and effective full-text retrieval in unstructured peer-to-peer networks remains a challenge in the research community. First, it is difficult, if not impossible, for unstructured P2P systems to effectively locate items with guaranteed recall. ...
Communication-Aware Globally-Coordinated On-Chip Networks
With continued Moore's law scaling, multicore-based architectures are becoming the de facto design paradigm for achieving low-cost and performance/power-efficient processing systems through effective exploitation of available parallelism in software and ...
Compression of View on Anonymous Networks—Folded View—
View is a labeled directed graph containing all information about the network that a party can learn by exchanging messages with its neighbors. View can be used to solve distributed problems on an anonymous network (i.e., a network that does not ...
DDC: A Novel Scheme to Directly Decode the Collisions in UHF RFID Systems
RFID has been gaining popularity due to its variety of applications, such as inventory control and localization. One important issue in RFID system is tag identification. In RFID systems, the tag randomly selects a slot to send a Random Number (RN) ...
Delegation-Based I/O Mechanism for High Performance Computing Systems
Massively parallel applications often require periodic data checkpointing for program restart and post-run data analysis. Although high performance computing systems provide massive parallelism and computing power to fulfill the crucial requirements of ...
Fat versus Thin Threading Approach on GPUs: Application to Stochastic Simulation of Chemical Reactions
We explore two different threading approaches on a graphics processing unit (GPU) exploiting two different characteristics of the current GPU architecture. The fat thread approach tries to minimize data access time by relying on shared memory and ...
How Much to Share: A Repeated Game Model for Peer-to-Peer Streaming under Service Differentiation Incentives
In this paper, we propose a service differentiation incentive for P2P streaming system, according to peers' instant contributions. Also, a repeated game model is designed to analyze how much the peers should contribute in each round under this ...
In Cloud, Can Scientific Communities Benefit from the Economies of Scale?
The basic idea behind cloud computing is that resource providers offer elastic resources to end users. In this paper, we intend to answer one key question to the success of cloud computing: in cloud, can small-to-medium scale scientific communities ...
Interactivity-Constrained Server Provisioning in Large-Scale Distributed Virtual Environments
Maintaining interactivity is one of the key challenges in distributed virtual environments (DVEs). In this paper, we consider a new problem, termed the interactivity-constrained server provisioning problem, whose goal is to minimize the number of ...
Payments for Outsourced Computations
With the recent advent of cloud computing, the concept of outsourcing computations, initiated by volunteer computing efforts, is being revamped. While the two paradigms differ in several dimensions, they also share challenges, stemming from the lack of ...
Real-World Sensor Network for Long-Term Volcano Monitoring: Design and Findings
This paper presents the design, deployment, and evaluation of a real-world sensor network system in an active volcano—Mount St. Helens. In volcano monitoring, the maintenance is extremely hard and system robustness is one of the biggest concerns. ...
Self-Protection in a Clustered Distributed System
Self-protection refers to the ability for a system to detect illegal behaviors and to fight-back intrusions with counter-measures. This article presents the design, the implementation, and the evaluation of a self-protected system which targets ...
Semantic-Aware Metadata Organization Paradigm in Next-Generation File Systems
Existing data storage systems based on the hierarchical directory-tree organization do not meet the scalability and functionality requirements for exponentially growing data sets and increasingly complex metadata queries in large-scale, Exabyte-level ...
Sleep Scheduling for Critical Event Monitoring in Wireless Sensor Networks
In this paper, we focus on critical event monitoring in wireless sensor networks (WSNs), where only a small number of packets need to be transmitted most of the time. When a critical event occurs, an alarm message should be broadcast to the entire ...
Supporting Overcommitted Virtual Machines through Hardware Spin Detection
Multiprocessor operating systems (OSs) pose several unique and conflicting challenges to System Virtual Machines (System VMs). For example, most existing system VMs resort to gang scheduling a guest OS's virtual processors (VCPUs) to avoid OS ...
The Significance of CMP Cache Sharing on Contemporary Multithreaded Applications
Cache sharing on modern Chip Multiprocessors (CMPs) reduces communication latency among corunning threads, and also causes interthread cache contention. Most previous studies on the influence of cache sharing have concentrated on the design or ...
User-Level Implementations of Read-Copy Update
Read-copy update (RCU) is a synchronization technique that often replaces reader-writer locking because RCU's read-side primitives are both wait-free and an order of magnitude faster than uncontended locking. Although RCU updates are relatively heavy ...