Scalability of Partial Differential Equations Preconditioner Resilient to Soft and Hard Faults

Size: px
Start display at page:

Download "Scalability of Partial Differential Equations Preconditioner Resilient to Soft and Hard Faults"

Transcription

1 Scalability of Partial Differential Equations Preconditioner Resilient to Soft and Hard Faults K.Morris, F.Rizzi, K.Sargsyan, K.Dahlgren, P.Mycek, C.Safta, O.LeMaitre, O.Knio, B.Debusschere Sandia National Laboratories, Livermore, CA, USA Duke University, Durham, NC, USA UC Santa Cruz, USA ISC High Performance, Frankfurt June 2016 Supported by the US Department of Energy (DOE) Advanced Scientific Computing Research (ASCR) Sandia National Laboratories is a multi-program laboratory managed and operated by Sandia Corporation, a wholly owned subsidiary of Lockheed Martin Corporation, for the U.S. Department of Energy s National Nuclear Security Administration under contract DE-AC04-94AL85000.

2 Outline 1 Motivation 2 Algorithm 3 Implementation 4 Results 5 Conclusions

3 Do We Need Resilience? Resilience Collection of techniques to keep applications running to a correct solution in a timely and efficient manner despite underlying system faults. Addressing Failures in Exascale Computing, Snir et al., Toward Exascale Resilience, Cappello et al., IEEE, Feb.2016, Al Geist (ORNL) As a child, were you ever afraid that a monster lurking in your bedroom would leap out of the dark and get you? Lack of resilience is a similar monster, hiding in the steel cabinets of the supercomputers and threatening to crash the largest computing machines.

4 Faults: Broadly Speaking Hard: activation is systematically reproducible. Soft: activation is not systematically reproducible. Active: fault causes an error. Dormant: fault does not cause an error. The dormant fault is activated when it causes an error. Permanent: presence is continuous in time. Transient: presence is temporary. Intermittent: fault is transient and reappears. Addressing Failures in Exascale Computing, Snir et al., 2012.

5 Challenges & Needs Hypothetically hardware can take care of most of it......at the expense of energy consumption, money, and asynchrony. Power is a big obstacle towards exascale. High tradeoffs between power, resiliency and performance. For instance: if an application can tolerate memory bit flips for certain parts of its memory, it can ask the OS to turn off ECC checks for those memory regions and potentially improve power and performance. Cross-cutting research needed to explore these areas.

6 The Lorenz attractor Ed N. Lorenz, meterologist (1963): simplified model of convection in the earths atmosphere (also found in models of lasers and dynamos). System of coupled non-linear differential equations: dx = dt (y x), dy = x( dt z) y, dz = xy dt z. Lorenz used = 10, = 8/3, and = 28. Systems exhibits chaotic behavior for these (and nearby) values. Chaotic means highly sensitive to initial conditions. Small differences in initial conditions (such as those due to rounding errors in numerical computation) yield widely diverging outcomes for such dynamical systems, rendering long-term prediction impossible in general.

7 Motivation Algorithm Implementation Results Conclusions The Lorenz attractor: effect of Silent Data Corruption (SDCs) SDC: data corruption not raising errors/warnings. Start from x0 = 8, y0 = 5, z0 = 1. Solve over 0 t 40. Simulate SDC by randomly selecting a bit to flip in x at t = th bit, before = , after = Small change, but completely different solution for this simple test! nominal, corrupted nominal, corrupted K. Morris Resilient Approach for PDE Min:

8 Algorithm

9 Resilient EXtreme Scale Scientific Simulations (REXSSS) What? Domain-decomposition-based preconditioner for PDEs. Currently for elliptic equations (1D, 2D). Other PDEs (in progress). How? Recasting the original PDE problem as a sampling problem, followed by a resilient data manipulation to achieve the final solution update. Why? We do not characterize all types of system faults that can occur, but focus solely on the information that a simulation provides. Target: silent data corruptions (SDCs) and nodes/cores failing.

10 Algorithm Overview 1D problem: 8 >< Ly(x) =g(x), in =(x, x + ) y(x )=y, >: y(x + )=y +, L is a linear, elliptic operator. The solution at point x 0 linearly depends on the boundary conditions: y(x 0 )=a + by + cy +.

11 Algorithm Overview: Domain Decomposition & Boundary Maps Grid with current state. Partition space with overlapping subdomains. Treat subdomains independently. Define sampling range for each boundary. Sample and solve PDE locally. From samples build maps: y 1 = f (y 2, y L )=a + by 2 + cy L y 2 = g(y 1, y R )=d + ey 1 + fy R Maps link the subdomains. y L, y R are known BC. Solve, new state: (y 1, y 2 ). If needed: update range, repeat loop. y x L x x R

12 Algorithm Overview: Domain Decomposition & Boundary Maps Grid with current state. Partition space with overlapping subdomains. Treat subdomains independently. Define sampling range for each boundary. Sample and solve PDE locally. From samples build maps: y 1 = f (y 2, y L )=a + by 2 + cy L y 2 = g(y 1, y R )=d + ey 1 + fy R Maps link the subdomains. y L, y R are known BC. Solve, new state: (y 1, y 2 ). If needed: update range, repeat loop. y A B x L x x x 1 x 2 R

13 Algorithm Overview: Domain Decomposition & Boundary Maps Grid with current state. Partition space with overlapping subdomains. Treat subdomains independently. Define sampling range for each boundary. Sample and solve PDE locally. From samples build maps: y 1 = f (y 2, y L )=a + by 2 + cy L y 2 = g(y 1, y R )=d + ey 1 + fy R Maps link the subdomains. y L, y R are known BC. Solve, new state: (y 1, y 2 ). If needed: update range, repeat loop. y A y L y 2 x L y x 1 y 1 x 2 B x y R R

14 Algorithm Overview: Domain Decomposition & Boundary Maps Grid with current state. Partition space with overlapping subdomains. Treat subdomains independently. Define sampling range for each boundary. Sample and solve PDE locally. From samples build maps: y 1 = f (y 2, y L )=a + by 2 + cy L y 2 = g(y 1, y R )=d + ey 1 + fy R Maps link the subdomains. y L, y R are known BC. Solve, new state: (y 1, y 2 ). If needed: update range, repeat loop. y y L x L A y x 1 Sampling range x 2 B x y R R

15 Algorithm Overview: Domain Decomposition & Boundary Maps Grid with current state. Partition space with overlapping subdomains. Treat subdomains independently. Define sampling range for each boundary. Sample and solve PDE locally. From samples build maps: y 1 = f (y 2, y L )=a + by 2 + cy L y 2 = g(y 1, y R )=d + ey 1 + fy R Maps link the subdomains. y L, y R are known BC. Solve, new state: (y 1, y 2 ). If needed: update range, repeat loop. y y L x L A y Build: y 2 =g(y 1,y R ) {y 1 } x 1 x 2 {y 2 } Build: y 1 =f(y L,y 2 ) B x y R R

16 Algorithm Overview: Domain Decomposition & Boundary Maps Grid with current state. Partition space with overlapping subdomains. Treat subdomains independently. Define sampling range for each boundary. Sample and solve PDE locally. From samples build maps: y 1 = f (y 2, y L )=a + by 2 + cy L y 2 = g(y 1, y R )=d + ey 1 + fy R Maps link the subdomains. y L, y R are known BC. Solve, new state: (y 1, y 2 ). If needed: update range, repeat loop. y y L x L A y Build: y 2 =g(y 1,y R ) {y 1 } x 1 x 2 {y 2 } Build: y 1 =f(y L,y 2 ) B x y R R

17 Algorithm Overview: Domain Decomposition & Boundary Maps Grid with current state. Partition space with overlapping subdomains. Treat subdomains independently. Define sampling range for each boundary. Sample and solve PDE locally. From samples build maps: y 1 = f (y 2, y L )=a + by 2 + cy L y 2 = g(y 1, y R )=d + ey 1 + fy R Maps link the subdomains. y L, y R are known BC. Solve, new state: (y 1, y 2 ). If needed: update range, repeat loop. y y L x L A y x 1 y 1 * x 2 * y 2 Update state & range B x y R R

18 Extension y y L y 1 y 2 y 3 y 4 y 5 y 6 y R A B C D x L x 1 x 2 x 3 x 4 x 5 x 6 x R x y 1 = f 1 (y L, y 2 ) y 2 = f 2 (y 1, y 4 ) y 3 = f 3 (y 1, y 4 ) y 4 = f 4 (y 3, y 6 ) y 5 = f 5 (y 3, y 6 ) y 6 = f 6 (y 5, y R )

19 Extension

20 Robust Regression: Resilience to SDCs High-dim boundary maps: u(x )=a + bu 1 + cu Generate samples, suppose some are corrupted, run regression. `1 noise model is robust against presence of corrupted data.

21 Implementation

22 Server/Client-based Implementation server client cluster Cluster: 1 server + n clients. Servers: Communicate between each other. Safe data/state storage (sandboxed). Clients: Independent from one another. Only serve as computing units. Separates state from computation: reduces the overall vulnerability. Resilient to clients crashing because even if tasks are lost, state is safe. It aligns with the vision of future exascale architectures involving heterogeneous and hierarchical hardware required to meet energy and cost constraints. C++ code, two external dependencies: Trilinos and Boost.

23 Server/Client-based Implementation Node failures are modeled as clients crashing. Server simply continues the execution using only the clients that are alive. Servers probe the corresponding cluster communicator using MPI_ANY_SOURCE to assess whether a new message is arriving from one of the clients.

24 Resilience Results

25 Injecting Faults Selective reliability Inject/perturb applications at target points and evaluate how it behaves. Some parts of the algorithm are assumed to be handled in a more reliable manner than others. M.Hoemmen,M.Heroux,2012 Silent Data Corruptions (SDC) Selective reliability: only affect sampling stage. Poisson process with rates: r 1 =4 10 5, r 2 = (n faults /sec). Corrupt the solution of a task. Bit-flip model: random bit-flip in binary representation. Node/Cores failing Selective reliability: only affect sampling stage. Poisson process with rates: r 1 =5 10 5, r 2 = (n faults /sec). Simulate by setting idle the MPI ranks of a client (as if client was dead).

26 Details Oversampling Oversampling: >1, such that N = N s nom. N s nom: number of samples for the fault-free scenario. Silent Data Corruptions (SDC) Resilience condition: out of the samples used in the regression, the number of uncorrupted samples has to be greater than the minimum set needed to have a well-posed regression problem. Node/Cores failing Server continues the execution using only the clients that are alive. No need to rebuild broken communicators, or clients.

27 Test Problem for Resilience 2D elliptic PDE. Consider 48 2 subdomains, distributed among 48 servers. Each server-client cluster includes 48 clients each made of 1 rank. The local grid within each subdomain is We consider three runs: one with no faults that is used as a reference two runs with faults based on the rates defined before. The number of cores is in all cases 2352, and all runs are performed on Edison. To have a more statistically meaningful analysis an ensemble of runs would be needed, but this objective was prohibitive due to time limitations.

28 Results (left) The figure shows that in all cases, the solution converges, regardless of the number of faults occurring. (right) the results show that the runtime stays approximately constant. The negligible effect of the faults on the runtime is due to the overhead caused by the Boost serialization/mpi library, which tends to make the effective communication costs much higher than with pure MPI. root-mean-square (RMS) residual. t =time for the no faults case.

29 Nominal Scalability

30 SST/macro Coarse-grained simulator of distributed-memory applications. Uses machine models to estimate performance of processing and network components. Estimates the performance without incurring the cost of doing actual message passing or computation operations. Uses a skeleton of the target application: all operations are stripped out, only left communication patterns. Estimate performance of a given application on new or existing architectures without using the actual machine. Useful for assessing communication behavior. How does it work?

31 SST/macro: Overview Replace/model computation with equivalent timings. Various ways to estimate timings: operations counts, memory, etc. No need for data to exist for real, but need size. 1 if (rank==0){ const int N = 10000; 4 std :: vector<double> data(n, 0.0); for ( int i=0; i<n; ++i){ 7 if (rank==0) 8 data [ i ] =... ; 9 else 10 data [ i ] =... ; 11 } 12 double mean = compute_mean ( data ) ; MPI_Send(&mean,1,DBL,1,0,COMM) ; 15 } 16 else 17 { 18 double mean = 0. 0 ; 19 MPI_Status st ; 20 MPI_Recv(&mean,1,DBL,0,0,COMM,& st ) ; 21 } 1 if (rank==0) 2 { double time1 = 3; //seconds 8 SSTMAC_compute ( time1 ) ; MPI_Send (NULL,1,DBL,1,0,COMM); 15 } 16 else 17 { 18 MPI_Status st ; 19 MPI_Recv (NULL,1,DBL,0,0,COMM, &st ); 20 }

32 Scalability based on SST/macro skeleton Weak Strong Subdomains 12 2, 18 2, 24 2, 30 2, Total Cores 3088, 6948, 12352, 19300, , 12352, Subdomain grid size Overlap (# cells) Servers 16, 36, 64, 100, , 64, 256 Number of clients/server Size of each client 4 4

33 Scalability Weak Strong

34 Conclusions Domain-decomposition PDE preconditioner that is resilient to SDC and node failures. Novel reformulation of the PDE into a sampling problem over a set of subdomains such that data is generated, and then suitably manipulated to yield the final updating of the solution state. SST/macro skeleton of our application showing excellent scalability up to 50k cores. Resilience with simulated SDCs and node failures. The results show convergence in all cases. Overhead due to the presence of faults is negligible. This effect, however, is due to the use of the Boost serialization/mpi library.

35 Acknowledgments This material is based upon work supported by the U.S. Department of Energy, Office of Science, Office of Advanced Scientific Computing Research, under Award Number Sandia National Laboratories is a multi-program laboratory managed and operated by Sandia Corporation, a wholly owned subsidiary of Lockheed Martin Corporation, for the U.S. Department of Energy s National Nuclear Security Administration under contract DE-AC04-94AL This research used resources of the National Energy Research Scientific Computing Center, a DOE Office of Science User Facility supported by the Office of Science of the U.S. Department of Energy under Contract No. DE-AC02-05CH THANK YOU!

Agreement Protocols. CS60002: Distributed Systems. Pallab Dasgupta Dept. of Computer Sc. & Engg., Indian Institute of Technology Kharagpur

Agreement Protocols. CS60002: Distributed Systems. Pallab Dasgupta Dept. of Computer Sc. & Engg., Indian Institute of Technology Kharagpur Agreement Protocols CS60002: Distributed Systems Pallab Dasgupta Dept. of Computer Sc. & Engg., Indian Institute of Technology Kharagpur Classification of Faults Based on components that failed Program

More information

How to deal with uncertainties and dynamicity?

How to deal with uncertainties and dynamicity? How to deal with uncertainties and dynamicity? http://graal.ens-lyon.fr/ lmarchal/scheduling/ 19 novembre 2012 1/ 37 Outline 1 Sensitivity and Robustness 2 Analyzing the sensitivity : the case of Backfilling

More information

Parallel Simulation of Subsurface Fluid Flow

Parallel Simulation of Subsurface Fluid Flow Parallel Simulation of Subsurface Fluid Flow Scientific Achievement A new mortar domain decomposition method was devised to compute accurate velocities of underground fluids efficiently using massively

More information

EECS150 - Digital Design Lecture 26 - Faults and Error Correction. Types of Faults in Digital Designs

EECS150 - Digital Design Lecture 26 - Faults and Error Correction. Types of Faults in Digital Designs EECS150 - Digital Design Lecture 26 - Faults and Error Correction April 25, 2013 John Wawrzynek 1 Types of Faults in Digital Designs Design Bugs (function, timing, power draw) detected and corrected at

More information

Comparing the Effects of Intermittent and Transient Hardware Faults on Programs

Comparing the Effects of Intermittent and Transient Hardware Faults on Programs Comparing the Effects of Intermittent and Transient Hardware Faults on Programs Jiesheng Wei, Layali Rashid, Karthik Pattabiraman and Sathish Gopalakrishnan Department of Electrical and Computer Engineering,

More information

Using R for Iterative and Incremental Processing

Using R for Iterative and Incremental Processing Using R for Iterative and Incremental Processing Shivaram Venkataraman, Indrajit Roy, Alvin AuYoung, Robert Schreiber UC Berkeley and HP Labs UC BERKELEY Big Data, Complex Algorithms PageRank (Dominant

More information

An Empirical Comparison of Graph Laplacian Solvers

An Empirical Comparison of Graph Laplacian Solvers An Empirical Comparison of Graph Laplacian Solvers Kevin Deweese 1 Erik Boman 2 John Gilbert 1 1 Department of Computer Science University of California, Santa Barbara 2 Scalable Algorithms Department

More information

Do we have a quorum?

Do we have a quorum? Do we have a quorum? Quorum Systems Given a set U of servers, U = n: A quorum system is a set Q 2 U such that Q 1, Q 2 Q : Q 1 Q 2 Each Q in Q is a quorum How quorum systems work: A read/write shared register

More information

Scalable, Robust, Fault-Tolerant Parallel QR Factorization. Camille Coti

Scalable, Robust, Fault-Tolerant Parallel QR Factorization. Camille Coti Communication-avoiding Fault-tolerant Scalable, Robust, Fault-Tolerant Parallel Factorization Camille Coti LIPN, CNRS UMR 7030, SPC, Université Paris 13, France DCABES August 24th, 2016 1 / 21 C. Coti

More information

Simulation of the Evolution of Information Content in Transcription Factor Binding Sites Using a Parallelized Genetic Algorithm

Simulation of the Evolution of Information Content in Transcription Factor Binding Sites Using a Parallelized Genetic Algorithm Simulation of the Evolution of Information Content in Transcription Factor Binding Sites Using a Parallelized Genetic Algorithm Joseph Cornish*, Robert Forder**, Ivan Erill*, Matthias K. Gobbert** *Department

More information

EECS150 - Digital Design Lecture 26 Faults and Error Correction. Recap

EECS150 - Digital Design Lecture 26 Faults and Error Correction. Recap EECS150 - Digital Design Lecture 26 Faults and Error Correction Nov. 26, 2013 Prof. Ronald Fearing Electrical Engineering and Computer Sciences University of California, Berkeley (slides courtesy of Prof.

More information

Blurring the boundary between dynamics and physics. Tim Palmer, Peter Düben, Hugh McNamara University of Oxford

Blurring the boundary between dynamics and physics. Tim Palmer, Peter Düben, Hugh McNamara University of Oxford Blurring the boundary between dynamics and physics Tim Palmer, Peter Düben, Hugh McNamara University of Oxford ρ +. = ρ p + ν t u u g 2 u Resolved scales The Canonical Numerical Ansatz Unresolved scales

More information

A High-Performance Parallel Hybrid Method for Large Sparse Linear Systems

A High-Performance Parallel Hybrid Method for Large Sparse Linear Systems Outline A High-Performance Parallel Hybrid Method for Large Sparse Linear Systems Azzam Haidar CERFACS, Toulouse joint work with Luc Giraud (N7-IRIT, France) and Layne Watson (Virginia Polytechnic Institute,

More information

A Θ(n) Approximation Algorithm for 2-Dimensional Vector Packing

A Θ(n) Approximation Algorithm for 2-Dimensional Vector Packing A Θ(n) Approximation Algorithm for 2-Dimensional Vector Packing Ekow Otoo a, Ali Pinar b,, Doron Rotem a a Lawrence Berkeley National Laboratory b Sandia National Laboratories Abstract We study the 2-dimensional

More information

Algebraic Coarse Spaces for Overlapping Schwarz Preconditioners

Algebraic Coarse Spaces for Overlapping Schwarz Preconditioners Algebraic Coarse Spaces for Overlapping Schwarz Preconditioners 17 th International Conference on Domain Decomposition Methods St. Wolfgang/Strobl, Austria July 3-7, 2006 Clark R. Dohrmann Sandia National

More information

Resilient and energy-aware algorithms

Resilient and energy-aware algorithms Resilient and energy-aware algorithms Anne Benoit ENS Lyon Anne.Benoit@ens-lyon.fr http://graal.ens-lyon.fr/~abenoit CR02-2016/2017 Anne.Benoit@ens-lyon.fr CR02 Resilient and energy-aware algorithms 1/

More information

Multi-State Availability Modeling in Practice

Multi-State Availability Modeling in Practice Multi-State Availability Modeling in Practice Kishor S. Trivedi, Dong Seong Kim, Xiaoyan Yin Depart ment of Electrical and Computer Engineering, Duke University, Durham, NC 27708 USA kst@ee.duke.edu, {dk76,

More information

NCEP Applications -- HPC Performance and Strategies. Mark Iredell software team lead USDOC/NOAA/NWS/NCEP/EMC

NCEP Applications -- HPC Performance and Strategies. Mark Iredell software team lead USDOC/NOAA/NWS/NCEP/EMC NCEP Applications -- HPC Performance and Strategies Mark Iredell software team lead USDOC/NOAA/NWS/NCEP/EMC Motivation and Outline Challenges in porting NCEP applications to WCOSS and future operational

More information

Numerically Solving Partial Differential Equations

Numerically Solving Partial Differential Equations Numerically Solving Partial Differential Equations Michael Lavell Department of Applied Mathematics and Statistics Abstract The physics describing the fundamental principles of fluid dynamics can be written

More information

Introduction to Side Channel Analysis. Elisabeth Oswald University of Bristol

Introduction to Side Channel Analysis. Elisabeth Oswald University of Bristol Introduction to Side Channel Analysis Elisabeth Oswald University of Bristol Outline Part 1: SCA overview & leakage Part 2: SCA attacks & exploiting leakage and very briefly Part 3: Countermeasures Part

More information

ECC for NAND Flash. Osso Vahabzadeh. TexasLDPC Inc. Flash Memory Summit 2017 Santa Clara, CA 1

ECC for NAND Flash. Osso Vahabzadeh. TexasLDPC Inc. Flash Memory Summit 2017 Santa Clara, CA 1 ECC for NAND Flash Osso Vahabzadeh TexasLDPC Inc. 1 Overview Why Is Error Correction Needed in Flash Memories? Error Correction Codes Fundamentals Low-Density Parity-Check (LDPC) Codes LDPC Encoding and

More information

Optimal checkpointing periods with fail-stop and silent errors

Optimal checkpointing periods with fail-stop and silent errors Optimal checkpointing periods with fail-stop and silent errors Anne Benoit ENS Lyon Anne.Benoit@ens-lyon.fr http://graal.ens-lyon.fr/~abenoit 3rd JLESC Summer School June 30, 2016 Anne.Benoit@ens-lyon.fr

More information

Lecture 4. Writing parallel programs with MPI Measuring performance

Lecture 4. Writing parallel programs with MPI Measuring performance Lecture 4 Writing parallel programs with MPI Measuring performance Announcements Wednesday s office hour moved to 1.30 A new version of Ring (Ring_new) that handles linear sequences of message lengths

More information

Staying on the path Fred Rothganger

Staying on the path Fred Rothganger Staying on the path Fred Rothganger Sandia National Laboratories is a multi-mission laboratory managed and operated by Sandia Corporation, a wholly owned subsidiary of Lockheed Martin Corporation, for

More information

Coordination. Failures and Consensus. Consensus. Consensus. Overview. Properties for Correct Consensus. Variant I: Consensus (C) P 1. v 1.

Coordination. Failures and Consensus. Consensus. Consensus. Overview. Properties for Correct Consensus. Variant I: Consensus (C) P 1. v 1. Coordination Failures and Consensus If the solution to availability and scalability is to decentralize and replicate functions and data, how do we coordinate the nodes? data consistency update propagation

More information

Adaptive and Power-Aware Resilience for Extreme-scale Computing

Adaptive and Power-Aware Resilience for Extreme-scale Computing Adaptive and Power-Aware Resilience for Extreme-scale Computing Xiaolong Cui, Taieb Znati, Rami Melhem Computer Science Department University of Pittsburgh Pittsburgh, USA Email: {mclarencui, znati, melhem}@cs.pitt.edu

More information

Performance and Scalability. Lars Karlsson

Performance and Scalability. Lars Karlsson Performance and Scalability Lars Karlsson Outline Complexity analysis Runtime, speedup, efficiency Amdahl s Law and scalability Cost and overhead Cost optimality Iso-efficiency function Case study: matrix

More information

Utilizing Adjoint-Based Techniques to Improve the Accuracy and Reliability in Uncertainty Quantification

Utilizing Adjoint-Based Techniques to Improve the Accuracy and Reliability in Uncertainty Quantification Utilizing Adjoint-Based Techniques to Improve the Accuracy and Reliability in Uncertainty Quantification Tim Wildey Sandia National Laboratories Center for Computing Research (CCR) Collaborators: E. Cyr,

More information

Coupling of Multi fidelity Models Applications to PNP cdft and local nonlocal Poisson equations

Coupling of Multi fidelity Models Applications to PNP cdft and local nonlocal Poisson equations Coupling of Multi fidelity Models Applications to PNP cdft and local nonlocal Poisson equations P. Bochev, J. Cheung, M. D Elia, A. Frishknecht, K. Kim, M. Parks, M. Perego CM4 summer school, Stanford,

More information

EECS150 - Digital Design Lecture 26 Error Correction Codes, Linear Feedback Shift Registers (LFSRs)

EECS150 - Digital Design Lecture 26 Error Correction Codes, Linear Feedback Shift Registers (LFSRs) EECS150 - igital esign Lecture 26 Error Correction Codes, Linear Feedback Shift Registers (LFSRs) Nov 21, 2002 John Wawrzynek Fall 2002 EECS150 Lec26-ECC Page 1 Outline Error detection using parity Hamming

More information

Marwan Burelle. Parallel and Concurrent Programming. Introduction and Foundation

Marwan Burelle.  Parallel and Concurrent Programming. Introduction and Foundation and and marwan.burelle@lse.epita.fr http://wiki-prog.kh405.net Outline 1 2 and 3 and Evolutions and Next evolutions in processor tends more on more on growing of cores number GPU and similar extensions

More information

Outline. EECS Components and Design Techniques for Digital Systems. Lec 18 Error Coding. In the real world. Our beautiful digital world.

Outline. EECS Components and Design Techniques for Digital Systems. Lec 18 Error Coding. In the real world. Our beautiful digital world. Outline EECS 150 - Components and esign Techniques for igital Systems Lec 18 Error Coding Errors and error models Parity and Hamming Codes (SECE) Errors in Communications LFSRs Cyclic Redundancy Check

More information

Optimal Interface Conditions for an Arbitrary Decomposition into Subdomains

Optimal Interface Conditions for an Arbitrary Decomposition into Subdomains Optimal Interface Conditions for an Arbitrary Decomposition into Subdomains Martin J. Gander and Felix Kwok Section de mathématiques, Université de Genève, Geneva CH-1211, Switzerland, Martin.Gander@unige.ch;

More information

Machine Learning Applied to 3-D Reservoir Simulation

Machine Learning Applied to 3-D Reservoir Simulation Machine Learning Applied to 3-D Reservoir Simulation Marco A. Cardoso 1 Introduction The optimization of subsurface flow processes is important for many applications including oil field operations and

More information

Towards optimal synchronous counting

Towards optimal synchronous counting Towards optimal synchronous counting Christoph Lenzen Joel Rybicki Jukka Suomela MPI for Informatics MPI for Informatics Aalto University Aalto University PODC 5 July 3 Focus on fault-tolerance Fault-tolerant

More information

CSE 312, 2011 Winter, W.L.Ruzzo. 6. random variables

CSE 312, 2011 Winter, W.L.Ruzzo. 6. random variables CSE 312, 2011 Winter, W.L.Ruzzo 6. random variables random variables 23 numbered balls Ross 4.1 ex 1b 24 first head 25 probability mass functions 26 head count Let X be the number of heads observed in

More information

Towards a highly-parallel PDE-Solver using Adaptive Sparse Grids on Compute Clusters

Towards a highly-parallel PDE-Solver using Adaptive Sparse Grids on Compute Clusters Towards a highly-parallel PDE-Solver using Adaptive Sparse Grids on Compute Clusters HIM - Workshop on Sparse Grids and Applications Alexander Heinecke Chair of Scientific Computing May 18 th 2011 HIM

More information

SPECIAL PROJECT PROGRESS REPORT

SPECIAL PROJECT PROGRESS REPORT SPECIAL PROJECT PROGRESS REPORT Reporting year 2015 Project Title: Potential sea-ice predictability with a high resolution Arctic sea ice-ocean model Computer Project Account: Principal Investigator(s):

More information

Ensemble Consistency Testing for CESM: A new form of Quality Assurance

Ensemble Consistency Testing for CESM: A new form of Quality Assurance Ensemble Consistency Testing for CESM: A new form of Quality Assurance Dorit Hammerling Institute for Mathematics Applied to Geosciences National Center for Atmospheric Research (NCAR) Joint work with

More information

Data Mining Classification: Basic Concepts and Techniques. Lecture Notes for Chapter 3. Introduction to Data Mining, 2nd Edition

Data Mining Classification: Basic Concepts and Techniques. Lecture Notes for Chapter 3. Introduction to Data Mining, 2nd Edition Data Mining Classification: Basic Concepts and Techniques Lecture Notes for Chapter 3 by Tan, Steinbach, Karpatne, Kumar 1 Classification: Definition Given a collection of records (training set ) Each

More information

Analysis of the Tradeoffs between Energy and Run Time for Multilevel Checkpointing

Analysis of the Tradeoffs between Energy and Run Time for Multilevel Checkpointing Analysis of the Tradeoffs between Energy and Run Time for Multilevel Checkpointing Prasanna Balaprakash, Leonardo A. Bautista Gomez, Slim Bouguerra, Stefan M. Wild, Franck Cappello, and Paul D. Hovland

More information

UNIVERSITY OF MASSACHUSETTS Dept. of Electrical & Computer Engineering. Fault Tolerant Computing ECE 655

UNIVERSITY OF MASSACHUSETTS Dept. of Electrical & Computer Engineering. Fault Tolerant Computing ECE 655 UNIVERSITY OF MASSACHUSETTS Dept. of Electrical & Computer Engineering Fault Tolerant Computing ECE 655 Part 1 Introduction C. M. Krishna Fall 2006 ECE655/Krishna Part.1.1 Prerequisites Basic courses in

More information

The Generalized Interpolation Material Point Method

The Generalized Interpolation Material Point Method Compaction of a foam microstructure The Generalized Interpolation Material Point Method Tungsten Particle Impacting sandstone The Material Point Method (MPM) 1. Lagrangian material points carry all state

More information

Robust Lifetime Measurement in Large- Scale P2P Systems with Non-Stationary Arrivals

Robust Lifetime Measurement in Large- Scale P2P Systems with Non-Stationary Arrivals Robust Lifetime Measurement in Large- Scale P2P Systems with Non-Stationary Arrivals Xiaoming Wang Joint work with Zhongmei Yao, Yueping Zhang, and Dmitri Loguinov Internet Research Lab Computer Science

More information

Distributed Systems Principles and Paradigms. Chapter 06: Synchronization

Distributed Systems Principles and Paradigms. Chapter 06: Synchronization Distributed Systems Principles and Paradigms Maarten van Steen VU Amsterdam, Dept. Computer Science Room R4.20, steen@cs.vu.nl Chapter 06: Synchronization Version: November 16, 2009 2 / 39 Contents Chapter

More information

Parallelization of the Dirac operator. Pushan Majumdar. Indian Association for the Cultivation of Sciences, Jadavpur, Kolkata

Parallelization of the Dirac operator. Pushan Majumdar. Indian Association for the Cultivation of Sciences, Jadavpur, Kolkata Parallelization of the Dirac operator Pushan Majumdar Indian Association for the Cultivation of Sciences, Jadavpur, Kolkata Outline Introduction Algorithms Parallelization Comparison of performances Conclusions

More information

Scalable Non-blocking Preconditioned Conjugate Gradient Methods

Scalable Non-blocking Preconditioned Conjugate Gradient Methods Scalable Non-blocking Preconditioned Conjugate Gradient Methods Paul Eller and William Gropp University of Illinois at Urbana-Champaign Department of Computer Science Supercomputing 16 Paul Eller and William

More information

Algorithms and Programming I. Lecture#1 Spring 2015

Algorithms and Programming I. Lecture#1 Spring 2015 Algorithms and Programming I Lecture#1 Spring 2015 CS 61002 Algorithms and Programming I Instructor : Maha Ali Allouzi Office: 272 MSB Office Hours: T TH 2:30:3:30 PM Email: mallouzi@kent.edu The Course

More information

Foundations of Cryptography

Foundations of Cryptography - 111 - Foundations of Cryptography Notes of lecture No. 10B & 11 (given on June 11 & 18, 1989) taken by Sergio Rajsbaum Summary In this lecture we define unforgeable digital signatures and present such

More information

A Simple Architectural Enhancement for Fast and Flexible Elliptic Curve Cryptography over Binary Finite Fields GF(2 m )

A Simple Architectural Enhancement for Fast and Flexible Elliptic Curve Cryptography over Binary Finite Fields GF(2 m ) A Simple Architectural Enhancement for Fast and Flexible Elliptic Curve Cryptography over Binary Finite Fields GF(2 m ) Stefan Tillich, Johann Großschädl Institute for Applied Information Processing and

More information

Distributed Systems Principles and Paradigms

Distributed Systems Principles and Paradigms Distributed Systems Principles and Paradigms Chapter 6 (version April 7, 28) Maarten van Steen Vrije Universiteit Amsterdam, Faculty of Science Dept. Mathematics and Computer Science Room R4.2. Tel: (2)

More information

Relyzer: Application Resiliency Analyzer for Transient Faults

Relyzer: Application Resiliency Analyzer for Transient Faults 1 Relyzer: Application Resiliency Analyzer for Transient Faults Siva Kumar Sastry Hari 1,2, Helia Naeimi 2, Pradeep Ramachandran 1, and Sarita V. Adve 1 1 Department of Computer Science, University of

More information

Asynchronous One-Level and Two-Level Domain Decomposition Solvers

Asynchronous One-Level and Two-Level Domain Decomposition Solvers hronous One-Level and Two-Level Domain Decomposition Solvers arxiv:1808.08172v1 [math.na] 24 Aug 2018 Christian Glusa, Paritosh Ramanan, Erik G. Boman, Edmond Chow and Sivasankaran Rajamanickam Center

More information

Quantum Memory Hierarchies

Quantum Memory Hierarchies Quantum Memory Hierarchies Efficient Designs that Match Available Parallelism in Quantum Processors Darshan D. Thaker Tzvetan S. Metodi UC Davis Andrew W. Cross Issac L. Chuang MIT Frederic T. Chong UC

More information

Parallelization of Multilevel Preconditioners Constructed from Inverse-Based ILUs on Shared-Memory Multiprocessors

Parallelization of Multilevel Preconditioners Constructed from Inverse-Based ILUs on Shared-Memory Multiprocessors Parallelization of Multilevel Preconditioners Constructed from Inverse-Based ILUs on Shared-Memory Multiprocessors J.I. Aliaga 1 M. Bollhöfer 2 A.F. Martín 1 E.S. Quintana-Ortí 1 1 Deparment of Computer

More information

Network Algorithms and Complexity (NTUA-MPLA) Reliable Broadcast. Aris Pagourtzis, Giorgos Panagiotakos, Dimitris Sakavalas

Network Algorithms and Complexity (NTUA-MPLA) Reliable Broadcast. Aris Pagourtzis, Giorgos Panagiotakos, Dimitris Sakavalas Network Algorithms and Complexity (NTUA-MPLA) Reliable Broadcast Aris Pagourtzis, Giorgos Panagiotakos, Dimitris Sakavalas Slides are partially based on the joint work of Christos Litsas, Aris Pagourtzis,

More information

BINOMIAL DISTRIBUTION

BINOMIAL DISTRIBUTION BINOMIAL DISTRIBUTION The binomial distribution is a particular type of discrete pmf. It describes random variables which satisfy the following conditions: 1 You perform n identical experiments (called

More information

Highly-scalable branch and bound for maximum monomial agreement

Highly-scalable branch and bound for maximum monomial agreement Highly-scalable branch and bound for maximum monomial agreement Jonathan Eckstein (Rutgers) William Hart Cynthia A. Phillips Sandia National Laboratories Sandia National Laboratories is a multi-program

More information

Nonparametric density estimation for elliptic problems with random perturbations

Nonparametric density estimation for elliptic problems with random perturbations Nonparametric density estimation for elliptic problems with random perturbations, DqF Workshop, Stockholm, Sweden, 28--2 p. /2 Nonparametric density estimation for elliptic problems with random perturbations

More information

A Reconfigurable Quantum Computer

A Reconfigurable Quantum Computer A Reconfigurable Quantum Computer David Moehring CEO, IonQ, Inc. College Park, MD Quantum Computing for Business 4-6 December 2017, Mountain View, CA IonQ Highlights Full Stack Quantum Computing Company

More information

Performance of WRF using UPC

Performance of WRF using UPC Performance of WRF using UPC Hee-Sik Kim and Jong-Gwan Do * Cray Korea ABSTRACT: The Weather Research and Forecasting (WRF) model is a next-generation mesoscale numerical weather prediction system. We

More information

1 Modelling and Simulation

1 Modelling and Simulation 1 Modelling and Simulation 1.1 Introduction This course teaches various aspects of computer-aided modelling for the performance evaluation of computer systems and communication networks. The performance

More information

Efficient implementation of the overlap operator on multi-gpus

Efficient implementation of the overlap operator on multi-gpus Efficient implementation of the overlap operator on multi-gpus Andrei Alexandru Mike Lujan, Craig Pelissier, Ben Gamari, Frank Lee SAAHPC 2011 - University of Tennessee Outline Motivation Overlap operator

More information

Knowledge Discovery and Data Mining 1 (VO) ( )

Knowledge Discovery and Data Mining 1 (VO) ( ) Knowledge Discovery and Data Mining 1 (VO) (707.003) Map-Reduce Denis Helic KTI, TU Graz Oct 24, 2013 Denis Helic (KTI, TU Graz) KDDM1 Oct 24, 2013 1 / 82 Big picture: KDDM Probability Theory Linear Algebra

More information

COMS 4771 Lecture Boosting 1 / 16

COMS 4771 Lecture Boosting 1 / 16 COMS 4771 Lecture 12 1. Boosting 1 / 16 Boosting What is boosting? Boosting: Using a learning algorithm that provides rough rules-of-thumb to construct a very accurate predictor. 3 / 16 What is boosting?

More information

Proper Security Criteria Determination in a Power System with High Penetration of Renewable Resources

Proper Security Criteria Determination in a Power System with High Penetration of Renewable Resources Proper Security Criteria Determination in a Power System with High Penetration of Renewable Resources Mojgan Hedayati, Kory Hedman, and Junshan Zhang School of Electrical, Computer, and Energy Engineering

More information

Validation Metrics. Kathryn Maupin. Laura Swiler. June 28, 2017

Validation Metrics. Kathryn Maupin. Laura Swiler. June 28, 2017 Validation Metrics Kathryn Maupin Laura Swiler June 28, 2017 Sandia National Laboratories is a multimission laboratory managed and operated by National Technology and Engineering Solutions of Sandia LLC,

More information

Time in Distributed Systems: Clocks and Ordering of Events

Time in Distributed Systems: Clocks and Ordering of Events Time in Distributed Systems: Clocks and Ordering of Events Clocks in Distributed Systems Needed to Order two or more events happening at same or different nodes (Ex: Consistent ordering of updates at different

More information

Scalable, Robust, Fault-Tolerant Parallel QR Factorization

Scalable, Robust, Fault-Tolerant Parallel QR Factorization Scalable, Robust, Fault-Tolerant Parallel QR Factorization Camille Coti LIPN, CNRS UMR 7030, Université Paris 13, Sorbonne Paris Cité 99, avenue Jean-Baptiste Clément, F-93430 Villetaneuse, FRANCE camille.coti@lipn.univ-paris13.fr

More information

CS425: Algorithms for Web Scale Data

CS425: Algorithms for Web Scale Data CS425: Algorithms for Web Scale Data Most of the slides are from the Mining of Massive Datasets book. These slides have been modified for CS425. The original slides can be accessed at: www.mmds.org Challenges

More information

ROBUST & SPECULATIVE BYZANTINE RANDOMIZED CONSENSUS WITH CONSTANT TIME COMPLEXITY IN NORMAL CONDITIONS

ROBUST & SPECULATIVE BYZANTINE RANDOMIZED CONSENSUS WITH CONSTANT TIME COMPLEXITY IN NORMAL CONDITIONS ROBUST & SPECULATIVE BYZANTINE RANDOMIZED CONSENSUS WITH CONSTANT TIME COMPLEXITY IN NORMAL CONDITIONS Bruno Vavala University of Lisbon, Portugal Carnegie Mellon University, U.S. Nuno Neves University

More information

Hierarchical Anomaly Detection in Load Testing with StormRunner Load

Hierarchical Anomaly Detection in Load Testing with StormRunner Load White Paper Application Development, Test & Delivery Hierarchical Anomaly Detection in Load Testing with StormRunner Load A fresh approach to cloud-based website load testing is proving more effective

More information

Breaking Computational Barriers: Multi-GPU High-Order RBF Kernel Problems with Millions of Points

Breaking Computational Barriers: Multi-GPU High-Order RBF Kernel Problems with Millions of Points Breaking Computational Barriers: Multi-GPU High-Order RBF Kernel Problems with Millions of Points Michael Griebel Christian Rieger Peter Zaspel Institute for Numerical Simulation Rheinische Friedrich-Wilhelms-Universität

More information

Cactus Tools for Petascale Computing

Cactus Tools for Petascale Computing Cactus Tools for Petascale Computing Erik Schnetter Reno, November 2007 Gamma Ray Bursts ~10 7 km He Protoneutron Star Accretion Collapse to a Black Hole Jet Formation and Sustainment Fe-group nuclei Si

More information

Parallel Preconditioning Methods for Ill-conditioned Problems

Parallel Preconditioning Methods for Ill-conditioned Problems Parallel Preconditioning Methods for Ill-conditioned Problems Kengo Nakajima Information Technology Center, The University of Tokyo 2014 Conference on Advanced Topics and Auto Tuning in High Performance

More information

Lecture 24 - MPI ECE 459: Programming for Performance

Lecture 24 - MPI ECE 459: Programming for Performance ECE 459: Programming for Performance Jon Eyolfson March 9, 2012 What is MPI? Messaging Passing Interface A language-independent communation protocol for parallel computers Run the same code on a number

More information

Convergence Behavior of a Two-Level Optimized Schwarz Preconditioner

Convergence Behavior of a Two-Level Optimized Schwarz Preconditioner Convergence Behavior of a Two-Level Optimized Schwarz Preconditioner Olivier Dubois 1 and Martin J. Gander 2 1 IMA, University of Minnesota, 207 Church St. SE, Minneapolis, MN 55455 dubois@ima.umn.edu

More information

Load Balancing in Distributed Service System: A Survey

Load Balancing in Distributed Service System: A Survey Load Balancing in Distributed Service System: A Survey Xingyu Zhou The Ohio State University zhou.2055@osu.edu November 21, 2016 Xingyu Zhou (OSU) Load Balancing November 21, 2016 1 / 29 Introduction and

More information

CORRECTNESS OF A GOSSIP BASED MEMBERSHIP PROTOCOL BY (ANDRÉ ALLAVENA, ALAN DEMERS, JOHN E. HOPCROFT ) PRATIK TIMALSENA UNIVERSITY OF OSLO

CORRECTNESS OF A GOSSIP BASED MEMBERSHIP PROTOCOL BY (ANDRÉ ALLAVENA, ALAN DEMERS, JOHN E. HOPCROFT ) PRATIK TIMALSENA UNIVERSITY OF OSLO CORRECTNESS OF A GOSSIP BASED MEMBERSHIP PROTOCOL BY (ANDRÉ ALLAVENA, ALAN DEMERS, JOHN E. HOPCROFT ) PRATIK TIMALSENA UNIVERSITY OF OSLO OUTLINE q Contribution of the paper q Gossip algorithm q The corrected

More information

A Computation- and Communication-Optimal Parallel Direct 3-body Algorithm

A Computation- and Communication-Optimal Parallel Direct 3-body Algorithm A Computation- and Communication-Optimal Parallel Direct 3-body Algorithm Penporn Koanantakool and Katherine Yelick {penpornk, yelick}@cs.berkeley.edu Computer Science Division, University of California,

More information

CHAPTER 3 LOW DENSITY PARITY CHECK CODES

CHAPTER 3 LOW DENSITY PARITY CHECK CODES 62 CHAPTER 3 LOW DENSITY PARITY CHECK CODES 3. INTRODUCTION LDPC codes were first presented by Gallager in 962 [] and in 996, MacKay and Neal re-discovered LDPC codes.they proved that these codes approach

More information

Treatment of Error in Experimental Measurements

Treatment of Error in Experimental Measurements in Experimental Measurements All measurements contain error. An experiment is truly incomplete without an evaluation of the amount of error in the results. In this course, you will learn to use some common

More information

Round-off error propagation and non-determinism in parallel applications

Round-off error propagation and non-determinism in parallel applications Round-off error propagation and non-determinism in parallel applications Vincent Baudoui (Argonne/Total SA) vincent.baudoui@gmail.com Franck Cappello (Argonne/INRIA/UIUC-NCSA) Georges Oppenheim (Paris-Sud

More information

ESiWACE. A Center of Excellence for HPC applications to support cloud resolving earth system modelling

ESiWACE. A Center of Excellence for HPC applications to support cloud resolving earth system modelling ESiWACE A Center of Excellence for HPC applications to support cloud resolving earth system modelling Joachim Biercamp, Panagiotis Adamidis, Philipp Neumann Deutsches Klimarechenzentrum (DKRZ) Motivation:

More information

Quantifying Cyber Security for Networked Control Systems

Quantifying Cyber Security for Networked Control Systems Quantifying Cyber Security for Networked Control Systems Henrik Sandberg ACCESS Linnaeus Centre, KTH Royal Institute of Technology Joint work with: André Teixeira, György Dán, Karl H. Johansson (KTH) Kin

More information

Parallel programming using MPI. Analysis and optimization. Bhupender Thakur, Jim Lupo, Le Yan, Alex Pacheco

Parallel programming using MPI. Analysis and optimization. Bhupender Thakur, Jim Lupo, Le Yan, Alex Pacheco Parallel programming using MPI Analysis and optimization Bhupender Thakur, Jim Lupo, Le Yan, Alex Pacheco Outline l Parallel programming: Basic definitions l Choosing right algorithms: Optimal serial and

More information

Crossing the Chasm. On the Paths to Exascale: Presented by Mike Rezny, Monash University, Australia

Crossing the Chasm. On the Paths to Exascale: Presented by Mike Rezny, Monash University, Australia On the Paths to Exascale: Crossing the Chasm Presented by Mike Rezny, Monash University, Australia michael.rezny@monash.edu Crossing the Chasm meeting Reading, 24 th October 2016 Version 0.1 In collaboration

More information

Scalable Tools for Debugging Non-Deterministic MPI Applications

Scalable Tools for Debugging Non-Deterministic MPI Applications Scalable Tools for Debugging Non-Deterministic MPI Applications ReMPI: MPI Record-and-Replay tool Scalable Tools Workshop August 2nd, 2016 Kento Sato, Dong H. Ahn, Ignacio Laguna, Gregory L. Lee, Mar>n

More information

A Hybrid Method for the Wave Equation. beilina

A Hybrid Method for the Wave Equation.   beilina A Hybrid Method for the Wave Equation http://www.math.unibas.ch/ beilina 1 The mathematical model The model problem is the wave equation 2 u t 2 = (a 2 u) + f, x Ω R 3, t > 0, (1) u(x, 0) = 0, x Ω, (2)

More information

Ensemble Data Assimilation and Uncertainty Quantification

Ensemble Data Assimilation and Uncertainty Quantification Ensemble Data Assimilation and Uncertainty Quantification Jeff Anderson National Center for Atmospheric Research pg 1 What is Data Assimilation? Observations combined with a Model forecast + to produce

More information

b. ( ) ( ) ( ) ( ) ( ) 5. Independence: Two events (A & B) are independent if one of the conditions listed below is satisfied; ( ) ( ) ( )

b. ( ) ( ) ( ) ( ) ( ) 5. Independence: Two events (A & B) are independent if one of the conditions listed below is satisfied; ( ) ( ) ( ) 1. Set a. b. 2. Definitions a. Random Experiment: An experiment that can result in different outcomes, even though it is performed under the same conditions and in the same manner. b. Sample Space: This

More information

Exploiting Data Representation for Fault Tolerance

Exploiting Data Representation for Fault Tolerance Exploiting Data Representation for Fault Tolerance J. Elliott a,b,, M. Hoemmen b, F. Mueller a a North Carolina State University, Dept. of Computer Science, Raleigh, N.C. b Center for Computing Research,

More information

The Complexity of a Reliable Distributed System

The Complexity of a Reliable Distributed System The Complexity of a Reliable Distributed System Rachid Guerraoui EPFL Alexandre Maurer EPFL Abstract Studying the complexity of distributed algorithms typically boils down to evaluating how the number

More information

PDE Solvers for Fluid Flow

PDE Solvers for Fluid Flow PDE Solvers for Fluid Flow issues and algorithms for the Streaming Supercomputer Eran Guendelman February 5, 2002 Topics Equations for incompressible fluid flow 3 model PDEs: Hyperbolic, Elliptic, Parabolic

More information

Embedded Systems Design: Optimization Challenges. Paul Pop Embedded Systems Lab (ESLAB) Linköping University, Sweden

Embedded Systems Design: Optimization Challenges. Paul Pop Embedded Systems Lab (ESLAB) Linköping University, Sweden of /4 4 Embedded Systems Design: Optimization Challenges Paul Pop Embedded Systems Lab (ESLAB) Linköping University, Sweden Outline! Embedded systems " Example area: automotive electronics " Embedded systems

More information

Tradeoff between Reliability and Power Management

Tradeoff between Reliability and Power Management Tradeoff between Reliability and Power Management 9/1/2005 FORGE Lee, Kyoungwoo Contents 1. Overview of relationship between reliability and power management 2. Dakai Zhu, Rami Melhem and Daniel Moss e,

More information

MANAGING INFORMATION. On the Complexity of Requirements Flow-down. An Integrate white paper

MANAGING INFORMATION. On the Complexity of Requirements Flow-down. An Integrate white paper MANAGING INFORMATION On the Complexity of Requirements Flow-down An Integrate white paper On the Complexity of Requirements Flow-down Structures An Integrate white paper On the Complexity of Requirements

More information

Behavioral Simulations in MapReduce

Behavioral Simulations in MapReduce Behavioral Simulations in MapReduce Guozhang Wang, Marcos Vaz Salles, Benjamin Sowell, Xun Wang, Tuan Cao, Alan Demers, Johannes Gehrke, Walker White Cornell University 1 What are Behavioral Simulations?

More information

The Performance Evolution of the Parallel Ocean Program on the Cray X1

The Performance Evolution of the Parallel Ocean Program on the Cray X1 The Performance Evolution of the Parallel Ocean Program on the Cray X1 Patrick H. Worley Oak Ridge National Laboratory John Levesque Cray Inc. 46th Cray User Group Conference May 18, 2003 Knoxville Marriott

More information

Scalable Domain Decomposition Preconditioners For Heterogeneous Elliptic Problems

Scalable Domain Decomposition Preconditioners For Heterogeneous Elliptic Problems Scalable Domain Decomposition Preconditioners For Heterogeneous Elliptic Problems Pierre Jolivet, F. Hecht, F. Nataf, C. Prud homme Laboratoire Jacques-Louis Lions Laboratoire Jean Kuntzmann INRIA Rocquencourt

More information