Proceedings Of The 4th Many Core Applications Research Community Marc Symposium

Proceedings Of The 4th Many Core Applications Research Community Marc Symposium Book in PDF, ePub and Kindle version is available to download in english. Read online anytime anywhere directly from your device. Click on the download button below to get a free pdf file of Proceedings Of The 4th Many Core Applications Research Community Marc Symposium book. This book definitely worth reading, it is an incredibly well-written.

Proceedings of the 4th Many-Core Applications Research Community (MARC) Symposium

Author : Peter Tröger,Andreas Polze
Publisher : Universitätsverlag Potsdam
Page : 96 pages
File Size : 41,9 Mb
Release : 2012
Category : Computers
ISBN : 9783869561691

Get Book

Proceedings of the 4th Many-Core Applications Research Community (MARC) Symposium by Peter Tröger,Andreas Polze Pdf

In continuation of a successful series of events, the 4th Many-core Applications Research Community (MARC) symposium took place at the HPI in Potsdam on December 8th and 9th 2011. Over 60 researchers from different fields presented their work on many-core hardware architectures, their programming models, and the resulting research questions for the upcoming generation of heterogeneous parallel systems.

Third Many-core Applications Research Community (MARC) Symposium

Author : Diana Göhringer,Michael Hübner,Jürgen Becker
Publisher : KIT Scientific Publishing
Page : 122 pages
File Size : 55,7 Mb
Release : 2011
Category : Electronic
ISBN : 9783866447172

Get Book

Third Many-core Applications Research Community (MARC) Symposium by Diana Göhringer,Michael Hübner,Jürgen Becker Pdf

Advances in Parallel and Distributed Computing and Ubiquitous Services

Author : James J. (Jong Hyuk) Park,Gangman Yi,Young-Sik Jeong,Hong Shen
Publisher : Springer
Page : 236 pages
File Size : 46,8 Mb
Release : 2016-01-23
Category : Computers
ISBN : 9789811000683

Get Book

Advances in Parallel and Distributed Computing and Ubiquitous Services by James J. (Jong Hyuk) Park,Gangman Yi,Young-Sik Jeong,Hong Shen Pdf

This book contains the combined proceedings of the 4th International Conference on Ubiquitous Computing Application and Wireless Sensor Network (UCAWSN-15) and the 16th International Conference on Parallel and Distributed Computing, Applications and Technologies (PDCAT-15). The combined proceedings present peer-reviewed contributions from academic and industrial researchers in fields including ubiquitous and context-aware computing, context-awareness reasoning and representation, location awareness services, and architectures, protocols and algorithms, energy, management and control of wireless sensor networks. The book includes the latest research results, practical developments and applications in parallel/distributed architectures, wireless networks and mobile computing, formal methods and programming languages, network routing and communication algorithms, database applications and data mining, access control and authorization and privacy preserving computation.

Recent Advances in the Message Passing Interface

Author : Jesper Larsson Träff,Siegfried Benkner,Jack Dongarra
Publisher : Springer
Page : 315 pages
File Size : 55,8 Mb
Release : 2012-09-08
Category : Computers
ISBN : 9783642335181

Get Book

Recent Advances in the Message Passing Interface by Jesper Larsson Träff,Siegfried Benkner,Jack Dongarra Pdf

This book constitutes the refereed proceedings of the 19th European MPI Users' Group Meeting, EuroMPI 2012, Vienna, Austria, September 23-26, 2012. The 29 revised papers presented together with 4 invited talks and 7 poster papers were carefully reviewed and selected from 47 submissions. The papers are organized in topical sections on MPI implementation techniques and issues; benchmarking and performance analysis; programming models and new architectures; run-time support; fault-tolerance; message-passing algorithms; message-passing applications; IMUDI, improving MPI user and developer interaction.

MDE Settings in SAP

Author : Regina Hebig,Holger Giese
Publisher : Universitätsverlag Potsdam
Page : 74 pages
File Size : 51,7 Mb
Release : 2012
Category : Computers
ISBN : 9783869561929

Get Book

MDE Settings in SAP by Regina Hebig,Holger Giese Pdf

Industrial Case Study on the Integration of SysML and AUTOSAR with Triple Graph Grammars

Author : Giese, Holger ,Hildebrandt, Stephan,Neumann, Stefan,Wätzold, Sebastian
Publisher : Universitätsverlag Potsdam
Page : 66 pages
File Size : 48,9 Mb
Release : 2012
Category : Computers
ISBN : 9783869561912

Get Book

Industrial Case Study on the Integration of SysML and AUTOSAR with Triple Graph Grammars by Giese, Holger ,Hildebrandt, Stephan,Neumann, Stefan,Wätzold, Sebastian Pdf

During the overall development of complex engineering systems different modeling notations are employed. For example, in the domain of automotive systems system engineering models are employed quite early to capture the requirements and basic structuring of the entire system, while software engineering models are used later on to describe the concrete software architecture. Each model helps in addressing the specific design issue with appropriate notations and at a suitable level of abstraction. However, when we step forward from system design to the software design, the engineers have to ensure that all decisions captured in the system design model are correctly transferred to the software engineering model. Even worse, when changes occur later on in either model, today the consistency has to be reestablished in a cumbersome manual step. In this report, we present in an extended version of [Holger Giese, Stefan Neumann, and Stephan Hildebrandt. Model Synchronization at Work: Keeping SysML and AUTOSAR Models Consistent. In Gregor Engels, Claus Lewerentz, Wilhelm Schäfer, Andy Schürr, and B. Westfechtel, editors, Graph Transformations and Model Driven Enginering - Essays Dedicated to Manfred Nagl on the Occasion of his 65th Birthday, volume 5765 of Lecture Notes in Computer Science, pages 555-579. Springer Berlin / Heidelberg, 2010.] how model synchronization and consistency rules can be applied to automate this task and ensure that the different models are kept consistent. We also introduce a general approach for model synchronization. Besides synchronization, the approach consists of tool adapters as well as consistency rules covering the overlap between the synchronized parts of a model and the rest. We present the model synchronization algorithm based on triple graph grammars in detail and further exemplify the general approach by means of a model synchronization solution between system engineering models in SysML and software engineering models in AUTOSAR which has been developed for an industrial partner. In the appendix as extension to [19] the meta-models and all TGG rules for the SysML to AUTOSAR model synchronization are documented.

Quantitative Modeling and Analysis of Service-oriented Real-time Systems Using Interval Probabilistic Timed Automata

Author : Krause, Christian,Giese, Holger
Publisher : Universitätsverlag Potsdam
Page : 54 pages
File Size : 54,9 Mb
Release : 2012
Category : Computers
ISBN : 9783869561714

Get Book

Quantitative Modeling and Analysis of Service-oriented Real-time Systems Using Interval Probabilistic Timed Automata by Krause, Christian,Giese, Holger Pdf

One of the key challenges in service-oriented systems engineering is the prediction and assurance of non-functional properties, such as the reliability and the availability of composite interorganizational services. Such systems are often characterized by a variety of inherent uncertainties, which must be addressed in the modeling and the analysis approach. The different relevant types of uncertainties can be categorized into (1) epistemic uncertainties due to incomplete knowledge and (2) randomization as explicitly used in protocols or as a result of physical processes. In this report, we study a probabilistic timed model which allows us to quantitatively reason about nonfunctional properties for a restricted class of service-oriented real-time systems using formal methods. To properly motivate the choice for the used approach, we devise a requirements catalogue for the modeling and the analysis of probabilistic real-time systems with uncertainties and provide evidence that the uncertainties of type (1) and (2) in the targeted systems have a major impact on the used models and require distinguished analysis approaches. The formal model we use in this report are Interval Probabilistic Timed Automata (IPTA). Based on the outlined requirements, we give evidence that this model provides both enough expressiveness for a realistic and modular specifiation of the targeted class of systems, and suitable formal methods for analyzing properties, such as safety and reliability properties in a quantitative manner. As technical means for the quantitative analysis, we build on probabilistic model checking, specifically on probabilistic time-bounded reachability analysis and computation of expected reachability rewards and costs. To carry out the quantitative analysis using probabilistic model checking, we developed an extension of the Prism tool for modeling and analyzing IPTA. Our extension of Prism introduces a means for modeling probabilistic uncertainty in the form of probability intervals, as required for IPTA. For analyzing IPTA, our Prism extension moreover adds support for probabilistic reachability checking and computation of expected rewards and costs. We discuss the performance of our extended version of Prism and compare the interval-based IPTA approach to models with fixed probabilities.

HPI Future SOC Lab : proceedings 2011

Author : Meinel, Christoph,Polze, Andreas,Oswald, Gerhard,Strotmann, Rolf,Seibold, Ulrich,D'Errico, Doc
Publisher : Universitätsverlag Potsdam
Page : 92 pages
File Size : 41,7 Mb
Release : 2013
Category : Computers
ISBN : 9783869562308

Get Book

HPI Future SOC Lab : proceedings 2011 by Meinel, Christoph,Polze, Andreas,Oswald, Gerhard,Strotmann, Rolf,Seibold, Ulrich,D'Errico, Doc Pdf

Together with industrial partners Hasso-Plattner-Institut (HPI) is currently establishing a “HPI Future SOC Lab,” which will provide a complete infrastructure for research on on-demand systems. The lab utilizes the latest, multi/many-core hardware and its practical implementation and testing as well as further development. The necessary components for such a highly ambitious project are provided by renowned companies: Fujitsu and Hewlett Packard provide their latest 4 and 8-way servers with 1-2 TB RAM, SAP will make available its latest Business byDesign (ByD) system in its most complete version. EMC² provides high performance storage systems and VMware offers virtualization solutions. The lab will operate on the basis of real data from large enterprises. The HPI Future SOC Lab, which will be open for use by interested researchers also from other universities, will provide an opportunity to study real-life complex systems and follow new ideas all the way to their practical implementation and testing. This technical report presents results of research projects executed in 2011. Selected projects have presented their results on June 15th and October 26th 2011 at the Future SOC Lab Day events.

The JCop language specification : Version 1.0, April 2012

Author : Malte Appeltauer,Robert Hirschfeld
Publisher : Universitätsverlag Potsdam
Page : 60 pages
File Size : 43,7 Mb
Release : 2012
Category : Computers
ISBN : 9783869561936

Get Book

The JCop language specification : Version 1.0, April 2012 by Malte Appeltauer,Robert Hirschfeld Pdf

Program behavior that relies on contextual information, such as physical location or network accessibility, is common in today's applications, yet its representation is not sufficiently supported by programming languages. With context-oriented programming (COP), such context-dependent behavioral variations can be explicitly modularized and dynamically activated. In general, COP could be used to manage any context-specific behavior. However, its contemporary realizations limit the control of dynamic adaptation. This, in turn, limits the interaction of COP's adaptation mechanisms with widely used architectures, such as event-based, mobile, and distributed programming. The JCop programming language extends Java with language constructs for context-oriented programming and additionally provides a domain-specific aspect language for declarative control over runtime adaptations. As a result, these redesigned implementations are more concise and better modularized than their counterparts using plain COP. JCop's main features have been described in our previous publications. However, a complete language specification has not been presented so far. This report presents the entire JCop language including the syntax and semantics of its new language constructs.

Understanding Cryptic Schemata in Large Extract-transform-load Systems

Author : Alexander Albrecht,Felix Naumann
Publisher : Universitätsverlag Potsdam
Page : 28 pages
File Size : 51,9 Mb
Release : 2013
Category : Computers
ISBN : 9783869562018

Get Book

Understanding Cryptic Schemata in Large Extract-transform-load Systems by Alexander Albrecht,Felix Naumann Pdf

Extract-Transform-Load (ETL) tools are used for the creation, maintenance, and evolution of data warehouses, data marts, and operational data stores. ETL workflows populate those systems with data from various data sources by specifying and executing a DAG of transformations. Over time, hundreds of individual workflows evolve as new sources and new requirements are integrated into the system. The maintenance and evolution of large-scale ETL systems requires much time and manual effort. A key problem is to understand the meaning of unfamiliar attribute labels in source and target databases and ETL transformations. Hard-to-understand attribute labels lead to frustration and time spent to develop and understand ETL workflows. We present a schema decryption technique to support ETL developers in understanding cryptic schemata of sources, targets, and ETL transformations. For a given ETL system, our recommender-like approach leverages the large number of mapped attribute labels in existing ETL workflows to produce good and meaningful decryptions. In this way we are able to decrypt attribute labels consisting of a number of unfamiliar few-letter abbreviations, such as UNP_PEN_INT, which we can decrypt to UNPAID_PENALTY_INTEREST. We evaluate our schema decryption approach on three real-world repositories of ETL workflows and show that our approach is able to suggest high-quality decryptions for cryptic attribute labels in a given schema.

Covering Or Complete?

Author : Jana Bauckmann,Abedjan, Ziawasch,Leser, Ulf,Müller, Heiko,Naumann, Felix
Publisher : Universitätsverlag Potsdam
Page : 40 pages
File Size : 43,5 Mb
Release : 2012
Category : Computers
ISBN : 9783869562124

Get Book

Covering Or Complete? by Jana Bauckmann,Abedjan, Ziawasch,Leser, Ulf,Müller, Heiko,Naumann, Felix Pdf

Data dependencies, or integrity constraints, are used to improve the quality of a database schema, to optimize queries, and to ensure consistency in a database. In the last years conditional dependencies have been introduced to analyze and improve data quality. In short, a conditional dependency is a dependency with a limited scope defined by conditions over one or more attributes. Only the matching part of the instance must adhere to the dependency. In this paper we focus on conditional inclusion dependencies (CINDs). We generalize the definition of CINDs, distinguishing covering and completeness conditions. We present a new use case for such CINDs showing their value for solving complex data quality tasks. Further, we define quality measures for conditions inspired by precision and recall. We propose efficient algorithms that identify covering and completeness conditions conforming to given quality thresholds. Our algorithms choose not only the condition values but also the condition attributes automatically. Finally, we show that our approach efficiently provides meaningful and helpful results for our use case.

Theories and Intricacies of Information Security Problems

Author : Anne V. D. M. Kayem
Publisher : Universitätsverlag Potsdam
Page : 60 pages
File Size : 45,7 Mb
Release : 2013
Category : Computers
ISBN : 9783869562049

Get Book

Theories and Intricacies of Information Security Problems by Anne V. D. M. Kayem Pdf

Keine Angaben

Cyber-physical Systems with Dynamic Structure

Author : Basil Becker,Holger Giese
Publisher : Universitätsverlag Potsdam
Page : 40 pages
File Size : 44,5 Mb
Release : 2012
Category : Computers
ISBN : 9783869562179

Get Book

Cyber-physical Systems with Dynamic Structure by Basil Becker,Holger Giese Pdf

Cyber-physical systems achieve sophisticated system behavior exploring the tight interconnection of physical coupling present in classical engineering systems and information technology based coupling. A particular challenging case are systems where these cyber-physical systems are formed ad hoc according to the specific local topology, the available networking capabilities, and the goals and constraints of the subsystems captured by the information processing part. In this paper we present a formalism that permits to model the sketched class of cyber-physical systems. The ad hoc formation of tightly coupled subsystems of arbitrary size are specified using a UML-based graph transformation system approach. Differential equations are employed to define the resulting tightly coupled behavior. Together, both form hybrid graph transformation systems where the graph transformation rules define the discrete steps where the topology or modes may change, while the differential equations capture the continuous behavior in between such discrete changes. In addition, we demonstrate that automated analysis techniques known for timed graph transformation systems for inductive invariants can be extended to also cover the hybrid case for an expressive case of hybrid models where the formed tightly coupled subsystems are restricted to smaller local networks.

Scalable Compatibility for Embedded Real-time Components Via Language Progressive Timed Automata

Author : Stefan Neumann,Holger Giese
Publisher : Universitätsverlag Potsdam
Page : 82 pages
File Size : 40,8 Mb
Release : 2013
Category : Computers
ISBN : 9783869562261

Get Book

Scalable Compatibility for Embedded Real-time Components Via Language Progressive Timed Automata by Stefan Neumann,Holger Giese Pdf

The proper composition of independently developed components of an embedded real- time system is complicated due to the fact that besides the functional behavior also the non-functional properties and in particular the timing have to be compatible. Nowadays related compatibility problems have to be addressed in a cumbersome integration and configuration phase at the end of the development process, that in the worst case may fail. Therefore, a number of formal approaches have been developed, which try to guide the upfront decomposition of the embedded real-time system into components such that integration problems related to timing properties can be excluded and that suitable configurations can be found. However, the proposed solutions require a number of strong assumptions that can be hardly fulfilled or the required analysis does not scale well. In this paper, we present an approach based on timed automata that can provide the required guarantees for the later integration without strong assumptions, which are difficult to match in practice. The approach provides a modular reasoning scheme that permits to establish the required guarantees for the integration employing only local checks, which therefore also scales. It is also possible to determine potential configuration settings by means of timed game synthesis.

Cache Conscious Column Organization in In-memory Column Stores

Author : David Schwalb,Jens Krüger,Hasso Plattner
Publisher : Universitätsverlag Potsdam
Page : 100 pages
File Size : 49,8 Mb
Release : 2013
Category : Computers
ISBN : 9783869562285

Get Book

Cache Conscious Column Organization in In-memory Column Stores by David Schwalb,Jens Krüger,Hasso Plattner Pdf

Cost models are an essential part of database systems, as they are the basis of query performance optimization. Based on predictions made by cost models, the fastest query execution plan can be chosen and executed or algorithms can be tuned and optimised. In-memory databases shifts the focus from disk to main memory accesses and CPU costs, compared to disk based systems where input and output costs dominate the overall costs and other processing costs are often neglected. However, modelling memory accesses is fundamentally different and common models do not apply anymore. This work presents a detailed parameter evaluation for the plan operators scan with equality selection, scan with range selection, positional lookup and insert in in-memory column stores. Based on this evaluation, a cost model based on cache misses for estimating the runtime of the considered plan operators using different data structures is developed. Considered are uncompressed columns, bit compressed and dictionary encoded columns with sorted and unsorted dictionaries. Furthermore, tree indices on the columns and dictionaries are discussed. Finally, partitioned columns consisting of one partition with a sorted and one with an unsorted dictionary are investigated. New values are inserted in the unsorted dictionary partition and moved periodically by a merge process to the sorted partition. An efficient attribute merge algorithm is described, supporting the update performance required to run enterprise applications on read-optimised databases. Further, a memory traffic based cost model for the merge process is provided.