Work-in-Progress: Communication-Aware Scheduling of Data-Parallel Tasks

Author(s):  
Kana Shimada ◽  
Ittetsu Taniguchi ◽  
Hiroyuki Tomiyama
Author(s):  
M. Raviraja Holla ◽  
Alwyn R. Pais ◽  
D. Suma

The logistic map is a class of chaotic maps. It is still in use in image cryptography. The logistic map cryptosystem has two stages, namely permutation, and diffusion. These two stages being computationally intensive, the permutation relocates the pixels, whereas the diffusion rescales them. The research on refining the logistic map is progressing to make the encryption more secure. Now there is a need to improve its efficiency to enable such models to fit for high-speed applications. The new invention of accelerators offers efficiency. But the inherent data dependencies hinder the use of accelerators. This paper discusses the novelty of identifying independent data-parallel tasks in a logistic map, handing them over to the accelerators, and improving their efficiency. Among the two accelerator models proposed, the first one achieves peak efficiency using coalesced memory access. The other cryptosystem further improves performance at the cost of more execution resources. In this investigation, it is noteworthy that the parallelly accelerated logistic map achieved a significant speedup to the larger grayscale image used. The objective security estimates proved that the two stages of the proposed systems progressively ensure security.


2019 ◽  
Vol 12 (0) ◽  
pp. 65-73 ◽  
Author(s):  
Kana Shimada ◽  
Ittetsu Taniguchi ◽  
Hiroyuki Tomiyama

2020 ◽  
Vol 12 (1) ◽  
pp. 125
Author(s):  
Ittetsu Taniguchi ◽  
Hiroyuki Tomiyama ◽  
Lin Meng ◽  
Yang Liu

2000 ◽  
Vol 11 (01) ◽  
pp. 183-204 ◽  
Author(s):  
ARNOLD L. ROSENBERG

We derive efficient guidelines for scheduling data-parallel computations within a draconian mode of cycle-stealing in networks of workstations. In this computing regimen, (the owner of) workstation A contracts with (the owner of) workstation B to take control of B's processor for a guaranteed total of U time units, punctuated by up to some prespecified number p of interrupts which kill any work A has in progress on B. On the one hand, the high overhead — of c time units — for setting up the communications that supply workstation B with work and receive its results recommends that A communicate with B infrequently, supplying B with large amounts of work each time. On the other hand, the risk of losing work in progress when workstation B is interrupted recommends that A supply B with a long sequence of small bundles of work. In this paper, we derive two sets of scheduling guidelines that balance these conflicting pressures in a way that optimizes, up to low-order additive terms, the amount of work that A is guaranteed to accomplish during the cycle-stealing opportunity. Our non-adaptive guidelines, which employ a single fixed strategy until all p interrupts have occurred, produce schedules that achieve at least [Formula: see text] units of work. Our adaptive guidelines, which change strategy after each interrupt, produce schedules that achieve at least [Formula: see text] (low-order terms) units of work. By deriving the theoretical underpinnings of our guidelines, we show that our non-adaptive schedules are optimal in guaranteed work-output and that our adaptive schedules are within low-order additive terms of being optimal.


Author(s):  
Erwin Laure ◽  
Hans Zima ◽  
Matthew Haines ◽  
Piyush Mehrotra
Keyword(s):  

Sign in / Sign up

Export Citation Format

Share Document