Proceedings of the 4th Many-Core Applications Research Community (MARC) Symposium PDF Download

Are you looking for read ebook online? Search for your book and save it on your Kindle device, PC, phones or tablets. Download Proceedings of the 4th Many-Core Applications Research Community (MARC) Symposium PDF full book. Access full book title Proceedings of the 4th Many-Core Applications Research Community (MARC) Symposium by Peter Tröger. Download full books in PDF and EPUB format.

Proceedings of the 4th Many-Core Applications Research Community (MARC) Symposium

Proceedings of the 4th Many-Core Applications Research Community (MARC) Symposium PDF Author: Peter Tröger
Publisher: Universitätsverlag Potsdam
ISBN: 3869561696
Category : Computers
Languages : en
Pages : 96

Book Description
In continuation of a successful series of events, the 4th Many-core Applications Research Community (MARC) symposium took place at the HPI in Potsdam on December 8th and 9th 2011. Over 60 researchers from different fields presented their work on many-core hardware architectures, their programming models, and the resulting research questions for the upcoming generation of heterogeneous parallel systems.

Proceedings of the 4th Many-Core Applications Research Community (MARC) Symposium

Proceedings of the 4th Many-Core Applications Research Community (MARC) Symposium PDF Author: Peter Tröger
Publisher: Universitätsverlag Potsdam
ISBN: 3869561696
Category : Computers
Languages : en
Pages : 96

Book Description
In continuation of a successful series of events, the 4th Many-core Applications Research Community (MARC) symposium took place at the HPI in Potsdam on December 8th and 9th 2011. Over 60 researchers from different fields presented their work on many-core hardware architectures, their programming models, and the resulting research questions for the upcoming generation of heterogeneous parallel systems.

Third Many-core Applications Research Community (MARC) Symposium

Third Many-core Applications Research Community (MARC) Symposium PDF Author: Diana Göhringer
Publisher: KIT Scientific Publishing
ISBN: 3866447175
Category :
Languages : en
Pages : 122

Book Description


Advances in Parallel and Distributed Computing and Ubiquitous Services

Advances in Parallel and Distributed Computing and Ubiquitous Services PDF Author: James J. (Jong Hyuk) Park
Publisher: Springer
ISBN: 9811000689
Category : Computers
Languages : en
Pages : 240

Book Description
This book contains the combined proceedings of the 4th International Conference on Ubiquitous Computing Application and Wireless Sensor Network (UCAWSN-15) and the 16th International Conference on Parallel and Distributed Computing, Applications and Technologies (PDCAT-15). The combined proceedings present peer-reviewed contributions from academic and industrial researchers in fields including ubiquitous and context-aware computing, context-awareness reasoning and representation, location awareness services, and architectures, protocols and algorithms, energy, management and control of wireless sensor networks. The book includes the latest research results, practical developments and applications in parallel/distributed architectures, wireless networks and mobile computing, formal methods and programming languages, network routing and communication algorithms, database applications and data mining, access control and authorization and privacy preserving computation.

Recent Advances in the Message Passing Interface

Recent Advances in the Message Passing Interface PDF Author: Jesper Larsson Träff
Publisher: Springer
ISBN: 3642335187
Category : Computers
Languages : en
Pages : 315

Book Description
This book constitutes the refereed proceedings of the 19th European MPI Users' Group Meeting, EuroMPI 2012, Vienna, Austria, September 23-26, 2012. The 29 revised papers presented together with 4 invited talks and 7 poster papers were carefully reviewed and selected from 47 submissions. The papers are organized in topical sections on MPI implementation techniques and issues; benchmarking and performance analysis; programming models and new architectures; run-time support; fault-tolerance; message-passing algorithms; message-passing applications; IMUDI, improving MPI user and developer interaction.

Industrial Case Study on the Integration of SysML and AUTOSAR with Triple Graph Grammars

Industrial Case Study on the Integration of SysML and AUTOSAR with Triple Graph Grammars PDF Author: Giese, Holger
Publisher: Universitätsverlag Potsdam
ISBN: 3869561912
Category : Computers
Languages : en
Pages : 66

Book Description
During the overall development of complex engineering systems different modeling notations are employed. For example, in the domain of automotive systems system engineering models are employed quite early to capture the requirements and basic structuring of the entire system, while software engineering models are used later on to describe the concrete software architecture. Each model helps in addressing the specific design issue with appropriate notations and at a suitable level of abstraction. However, when we step forward from system design to the software design, the engineers have to ensure that all decisions captured in the system design model are correctly transferred to the software engineering model. Even worse, when changes occur later on in either model, today the consistency has to be reestablished in a cumbersome manual step. In this report, we present in an extended version of [Holger Giese, Stefan Neumann, and Stephan Hildebrandt. Model Synchronization at Work: Keeping SysML and AUTOSAR Models Consistent. In Gregor Engels, Claus Lewerentz, Wilhelm Schäfer, Andy Schürr, and B. Westfechtel, editors, Graph Transformations and Model Driven Enginering - Essays Dedicated to Manfred Nagl on the Occasion of his 65th Birthday, volume 5765 of Lecture Notes in Computer Science, pages 555-579. Springer Berlin / Heidelberg, 2010.] how model synchronization and consistency rules can be applied to automate this task and ensure that the different models are kept consistent. We also introduce a general approach for model synchronization. Besides synchronization, the approach consists of tool adapters as well as consistency rules covering the overlap between the synchronized parts of a model and the rest. We present the model synchronization algorithm based on triple graph grammars in detail and further exemplify the general approach by means of a model synchronization solution between system engineering models in SysML and software engineering models in AUTOSAR which has been developed for an industrial partner. In the appendix as extension to [19] the meta-models and all TGG rules for the SysML to AUTOSAR model synchronization are documented.

MDE Settings in SAP

MDE Settings in SAP PDF Author: Regina Hebig
Publisher: Universitätsverlag Potsdam
ISBN: 3869561920
Category : Computers
Languages : en
Pages : 74

Book Description


HPI Future SOC Lab : proceedings 2011

HPI Future SOC Lab : proceedings 2011 PDF Author: Meinel, Christoph
Publisher: Universitätsverlag Potsdam
ISBN: 3869562307
Category : Computers
Languages : en
Pages : 92

Book Description
Together with industrial partners Hasso-Plattner-Institut (HPI) is currently establishing a “HPI Future SOC Lab,” which will provide a complete infrastructure for research on on-demand systems. The lab utilizes the latest, multi/many-core hardware and its practical implementation and testing as well as further development. The necessary components for such a highly ambitious project are provided by renowned companies: Fujitsu and Hewlett Packard provide their latest 4 and 8-way servers with 1-2 TB RAM, SAP will make available its latest Business byDesign (ByD) system in its most complete version. EMC² provides high performance storage systems and VMware offers virtualization solutions. The lab will operate on the basis of real data from large enterprises. The HPI Future SOC Lab, which will be open for use by interested researchers also from other universities, will provide an opportunity to study real-life complex systems and follow new ideas all the way to their practical implementation and testing. This technical report presents results of research projects executed in 2011. Selected projects have presented their results on June 15th and October 26th 2011 at the Future SOC Lab Day events.

Quantitative Modeling and Analysis of Service-oriented Real-time Systems Using Interval Probabilistic Timed Automata

Quantitative Modeling and Analysis of Service-oriented Real-time Systems Using Interval Probabilistic Timed Automata PDF Author: Krause, Christian
Publisher: Universitätsverlag Potsdam
ISBN: 3869561718
Category : Computers
Languages : en
Pages : 54

Book Description
One of the key challenges in service-oriented systems engineering is the prediction and assurance of non-functional properties, such as the reliability and the availability of composite interorganizational services. Such systems are often characterized by a variety of inherent uncertainties, which must be addressed in the modeling and the analysis approach. The different relevant types of uncertainties can be categorized into (1) epistemic uncertainties due to incomplete knowledge and (2) randomization as explicitly used in protocols or as a result of physical processes. In this report, we study a probabilistic timed model which allows us to quantitatively reason about nonfunctional properties for a restricted class of service-oriented real-time systems using formal methods. To properly motivate the choice for the used approach, we devise a requirements catalogue for the modeling and the analysis of probabilistic real-time systems with uncertainties and provide evidence that the uncertainties of type (1) and (2) in the targeted systems have a major impact on the used models and require distinguished analysis approaches. The formal model we use in this report are Interval Probabilistic Timed Automata (IPTA). Based on the outlined requirements, we give evidence that this model provides both enough expressiveness for a realistic and modular specifiation of the targeted class of systems, and suitable formal methods for analyzing properties, such as safety and reliability properties in a quantitative manner. As technical means for the quantitative analysis, we build on probabilistic model checking, specifically on probabilistic time-bounded reachability analysis and computation of expected reachability rewards and costs. To carry out the quantitative analysis using probabilistic model checking, we developed an extension of the Prism tool for modeling and analyzing IPTA. Our extension of Prism introduces a means for modeling probabilistic uncertainty in the form of probability intervals, as required for IPTA. For analyzing IPTA, our Prism extension moreover adds support for probabilistic reachability checking and computation of expected rewards and costs. We discuss the performance of our extended version of Prism and compare the interval-based IPTA approach to models with fixed probabilities.

The JCop language specification : Version 1.0, April 2012

The JCop language specification : Version 1.0, April 2012 PDF Author: Malte Appeltauer
Publisher: Universitätsverlag Potsdam
ISBN: 3869561939
Category : Computers
Languages : en
Pages : 60

Book Description
Program behavior that relies on contextual information, such as physical location or network accessibility, is common in today's applications, yet its representation is not sufficiently supported by programming languages. With context-oriented programming (COP), such context-dependent behavioral variations can be explicitly modularized and dynamically activated. In general, COP could be used to manage any context-specific behavior. However, its contemporary realizations limit the control of dynamic adaptation. This, in turn, limits the interaction of COP's adaptation mechanisms with widely used architectures, such as event-based, mobile, and distributed programming. The JCop programming language extends Java with language constructs for context-oriented programming and additionally provides a domain-specific aspect language for declarative control over runtime adaptations. As a result, these redesigned implementations are more concise and better modularized than their counterparts using plain COP. JCop's main features have been described in our previous publications. However, a complete language specification has not been presented so far. This report presents the entire JCop language including the syntax and semantics of its new language constructs.

Understanding Cryptic Schemata in Large Extract-transform-load Systems

Understanding Cryptic Schemata in Large Extract-transform-load Systems PDF Author: Alexander Albrecht
Publisher: Universitätsverlag Potsdam
ISBN: 3869562013
Category : Computers
Languages : en
Pages : 28

Book Description
Extract-Transform-Load (ETL) tools are used for the creation, maintenance, and evolution of data warehouses, data marts, and operational data stores. ETL workflows populate those systems with data from various data sources by specifying and executing a DAG of transformations. Over time, hundreds of individual workflows evolve as new sources and new requirements are integrated into the system. The maintenance and evolution of large-scale ETL systems requires much time and manual effort. A key problem is to understand the meaning of unfamiliar attribute labels in source and target databases and ETL transformations. Hard-to-understand attribute labels lead to frustration and time spent to develop and understand ETL workflows. We present a schema decryption technique to support ETL developers in understanding cryptic schemata of sources, targets, and ETL transformations. For a given ETL system, our recommender-like approach leverages the large number of mapped attribute labels in existing ETL workflows to produce good and meaningful decryptions. In this way we are able to decrypt attribute labels consisting of a number of unfamiliar few-letter abbreviations, such as UNP_PEN_INT, which we can decrypt to UNPAID_PENALTY_INTEREST. We evaluate our schema decryption approach on three real-world repositories of ETL workflows and show that our approach is able to suggest high-quality decryptions for cryptic attribute labels in a given schema.