Results 361-380 of 407.
![]() Dorronsoro, Bernabé ![]() ![]() in Lecture Notes in Computer Science (2010), 6114 The sequencing process of a DNA chain for reading its components supposes a complex process, since only small DNA fragments can be read nowadays. Therefore, the use of optimization algorithms is required ... [more ▼] The sequencing process of a DNA chain for reading its components supposes a complex process, since only small DNA fragments can be read nowadays. Therefore, the use of optimization algorithms is required to rebuild a single chain from all the small pieces. We address here a simplified version of the problem, in which no errors in the sequencing process are allowed. The methods typically used in the literature for this problem are not satisfactory when solving realistic size instances, so there is a need for new more efficient and accurate methods. We propose a new iterated local search algorithm, highly competitive with the best algorithms in the literature, and considerably faster. [less ▲] Detailed reference viewed: 147 (0 UL)![]() Pinel, Frédéric ![]() ![]() ![]() in Parallel & Distributed Processing, Workshops and Phd Forum (IPDPSW), 2010 IEEE International Symposium on (2010) Detailed reference viewed: 161 (2 UL)![]() Kliazovich, Dzmitry ![]() ![]() in IEEE/ACM International Conference on Green Computing and Communications (GreenCom), Hangzhou, China, 2010 (2010) In modern data centers, energy consumption accounts for a considerably large slice of operational expenses. The state of the art in data center energy optimization is focusing only on job distribution ... [more ▼] In modern data centers, energy consumption accounts for a considerably large slice of operational expenses. The state of the art in data center energy optimization is focusing only on job distribution between computing servers based on workload or thermal profiles. This paper underlines the role of communication fabric in data center energy consumption and presents a scheduling approach that combines energy efficiency and network awareness, termed DENS. The DENS methodology balances the energy consumption of a data center, individual job performance, and traffic demands. The proposed approach optimizes the tradeoff between job consolidation (to minimize the amount of computing servers) and distribution of traffic patterns (to avoid hotspots in the data center network). [less ▲] Detailed reference viewed: 154 (0 UL)![]() Guzek, Mateusz ![]() ![]() ![]() in Proceedings of the 2010 International Conference on High Performance Computing & Simulation (2010) Detailed reference viewed: 160 (2 UL)![]() Danoy, Grégoire ![]() ![]() in International Conference on Metaheuristics and Nature Inspired Computing (2010) Detailed reference viewed: 112 (6 UL)![]() Schleich, Julien ![]() ![]() ![]() in ACM International Symposium on Mobility Management and Wireless Access (2010) We propose to study the quality of CDS-based virtual backbones generated by fully distributed algorithms in mobile environments. As virtual-backbones may be used for different purposes, the importance of ... [more ▼] We propose to study the quality of CDS-based virtual backbones generated by fully distributed algorithms in mobile environments. As virtual-backbones may be used for different purposes, the importance of a characteristic may vary accordingly. In order to deal with this variety issue, we provide a set of quality criteria quantifying different suitable aspects for virtual backbones in mobile ad hoc net- works. Distributed and localized algorithms are then compared through simulations with respect to these measures and criterion-specific optimizations are proposed for the Blackbone2 algorithm. [less ▲] Detailed reference viewed: 163 (10 UL)![]() Dorronsoro, Bernabé ![]() ![]() ![]() in World Conference in Computational Intelligence (WCCI) (2010) We study the problem of efficiently allocating incoming independent tasks onto the resources of a Grid system. Typically, it is assumed that the estimated time to compute each task on every machine is ... [more ▼] We study the problem of efficiently allocating incoming independent tasks onto the resources of a Grid system. Typically, it is assumed that the estimated time to compute each task on every machine is known. We are making the same assumption in this work, but we allow the existence of inaccuracies in these values. Our schedule will be robust versus such inaccuracies, ensuring that even when the estimated time to compute all the tasks is increased by a given percentage, the makespan of the schedule (i.e., the time when the last machine finishes its tasks) will not grow behind that percentage. We propose a new multi-objective definition of the problem, optimizing at the same time the makespan of the schedule and its robustness. Four well-known multi-objective evolutionary algorithms are used to find competitive results to the new problem. Finally, a new population initialization method for scheduling problems is proposed, leading to more efficient and accurate algorithms. [less ▲] Detailed reference viewed: 135 (1 UL)![]() Pinel, Frédéric ![]() ![]() in 2009 International Conference of Soft Computing and Pattern Recognition (2009, December 31) Detailed reference viewed: 97 (1 UL)![]() Dunlop, Dominic ![]() ![]() ![]() in Proceedings of 8th Intl. conf. on Parallel Processing and Applied Mathematics (PPAM 2009) (2009, September), 6068(LNCS), 102--114 The High-Performance Linpack (HPL) benchmark is the ac- cepted standard for measuring the capacity of the world’s most powerful computers, which are ranked twice yearly in the Top 500 List. Since just a ... [more ▼] The High-Performance Linpack (HPL) benchmark is the ac- cepted standard for measuring the capacity of the world’s most powerful computers, which are ranked twice yearly in the Top 500 List. Since just a small deficit in performance can cost a computer several places, it is impor- tant to tune the benchmark to obtain the best possible result. However, the adjustment of HPL’s seventeen configuration parameters to obtain maximum performance is a time-consuming task that must be performed by hand. In a previous paper, we provided a preliminary study that proposed the tuning of HPL parameters by means of an Evolutionary Algorithm. The approach was validated on a small cluster hosted at the University of Luxembourg. In this article, we extend this initial work by describing Acbea, a fully-automatic benchmark tuning tool that performs both the configuration and installation of HPL followed by an automatic search for optimized parameters that will lead to the best benchmark results. Experiments have been conducted to validate this tool on several clusters, exploiting in particular the Grid’5000 infrastructure. [less ▲] Detailed reference viewed: 129 (2 UL)![]() Pinel, Frédéric ![]() ![]() in International Conference on Parallel Processing and Applied Mathematics (2009) Detailed reference viewed: 62 (1 UL)![]() Seredynski, Marcin ![]() ![]() ![]() in Parallel Processing and Applied Mathematics (2009) Detailed reference viewed: 90 (6 UL)![]() Ostaszewski, Marek ![]() ![]() in GECCO '09: Proceedings of the 11th Annual conference on Genetic and evolutionary computation (2009) The paper proposes a multiobjective approach to the problem of malicious network traffic classification, with specificity and sensitivity criteria as objective functions for the problem. The ... [more ▼] The paper proposes a multiobjective approach to the problem of malicious network traffic classification, with specificity and sensitivity criteria as objective functions for the problem. The multiobjective version of Gene Expression Programming (GEP) called moGEP is proposed and applied to find proper classifiers in the multiobjective search space. The purpose of the classifiers is to discriminate information about the network traffic obtained from Idiotypic Network-based Intrusion Detection System (INIDS), transformed into time series. The proposed approach is validated using the network traffic simulator ns2. Classifiers of high accuracy are obtained and their diversity offers interesting possibilities to the domain of network security. [less ▲] Detailed reference viewed: 144 (3 UL)![]() Berhe, Girma ![]() ![]() ![]() in PARENG 2007 (2009) The objective of this study is to apply a domain decomposition algorithm to the La- grangian based Discrete Particle Method (DPM). The latter deals with the thermal decomposition of solid e.g. biomass ... [more ▼] The objective of this study is to apply a domain decomposition algorithm to the La- grangian based Discrete Particle Method (DPM). The latter deals with the thermal decomposition of solid e.g. biomass fuel particles. It considers each particle as an individual entity that is represented by an instantiation of a class. Modelizing thermal conversion of biomass in real systems involves a large number of particles. This can be achieved in a reasonable computing time only through a parallel implementation able to distribute the particles e.g. objects onto the participating processors. This pa- per present such an implementation based on Orthogonal Recursive Bisection (ORB) method. Due to the fact that the particles may take arbitrary positions within the do- main, a particular issue addressed by the domain decomposition technic used in this work is to generate a load balance for each processors as uniform as possible. Fur- thermore, the particles are coupled via heat transfer. One challenge for the designed algorithm is then to identify the nearest neighbours of each particle so that the nec- essary information can be communicated between them. Since the positions of all particles are subject to change and may migrate from one processor to another, the communication links together with the number of neighbors are highly dynamic. The implementation is carried out using the KAAPI API, a C++ library for parallel pro- gramming that allows to execute ?ne/medium grain multithreaded computation with dynamic data ?ow synchronizations. First results are very promising since they indi- cate that our algorithm creates sub domains with an average imbalance ranging from 2.5% to 6.3% for uniformly distributed particles. [less ▲] Detailed reference viewed: 237 (3 UL)![]() Varrette, Sébastien ![]() ![]() ![]() Presentation (2009) Detailed reference viewed: 92 (3 UL)![]() Danoy, Grégoire ![]() ![]() in ANNIE '09: Proceedings of the 19th international conference on Articial Neural Networks In Engineering (to appear) (2009) Detailed reference viewed: 146 (3 UL)![]() Danoy, Grégoire ![]() ![]() ![]() in GECCO '09: Proceedings of the 11th Annual conference on Genetic and evolutionary computation (2009) Detailed reference viewed: 148 (8 UL)![]() Danoy, Grégoire ![]() ![]() in 1st International Workshop on Organizational Modeling (ORGMOD'09) (2009) Detailed reference viewed: 84 (6 UL)![]() Danoy, Grégoire ![]() ![]() ![]() in IAIT '09: Proceedings of the 3rd International Conference on Advances in Information Technology (2009) Detailed reference viewed: 150 (9 UL)![]() Kliazovich, Dzmitry ![]() ![]() in IEEE Global Communications Conference (GLOBECOM), Miami, FL, USA, 2009 (2009) Detailed reference viewed: 532 (1 UL)![]() Piyatumrong, Apivadee ![]() ![]() ![]() in IAIT (2009) This paper presents three distributed and decentralized strategies used for token traversal in spanning forest over Mobile Ad Hoc Delay Tolerant Networks. Such networks are characterized by behaviors like ... [more ▼] This paper presents three distributed and decentralized strategies used for token traversal in spanning forest over Mobile Ad Hoc Delay Tolerant Networks. Such networks are characterized by behaviors like disappearance of mobile devices, connection disruptions, network partitioning, etc. Techniques based on tree topologies are well known for increasing the efficiency of network protocols and/or applications, such as Dynamicity Aware - Graph Relabeling System (DA-GRS). One of the main features of these tree based topologies is the existence of a token traversing in every tree. The use of tokens enables the creation and maintenance of spanning trees in dynamic environments. Subsequently, managing tree-based backbones relies heavily on the token behavior. An efficient and optimal token traversal can highly impact the design of the tree and its usage. In this article, we present a comparison of three distributed and decentralized techniques available for token management, which are Randomness, TABU and Depth First Search. [less ▲] Detailed reference viewed: 162 (0 UL) |
||