heterogeneous hardware
Recently Published Documents


TOTAL DOCUMENTS

96
(FIVE YEARS 30)

H-INDEX

9
(FIVE YEARS 2)

Author(s):  
Leandro Diaz ◽  
Rodrigo Moreira ◽  
Federico Favaro ◽  
Ernesto Dufrechou ◽  
Juan P Oliver

2021 ◽  
Vol 11 (21) ◽  
pp. 9940
Author(s):  
Jack Marquez ◽  
Oscar H. Mondragon ◽  
Juan D. Gonzalez

Cloud computing systems are rapidly evolving toward multicloud architectures supported on heterogeneous hardware. Cloud service providers are widely offering different types of storage infrastructures and multi-NUMA architecture servers. Existing cloud resource allocation solutions do not comprehensively consider this heterogeneous infrastructure. In this study, we present a novel approach comprised of a hierarchical framework based on genetic programming to solve problems related to data placement and virtual machine allocation for analytics applications running on heterogeneous hardware with a variety of storage types and nonuniform memory access. Our approach optimizes data placement using the Hadoop File System on heterogeneous storage devices on multicloud systems. It guarantees the efficient allocation of virtual machines on physical machines with multiple NUMA (nonuniform memory access) domains by minimizing contention between workloads. We prove that our solutions for data placement and virtual machine allocation outperform other state-of-the-art approaches.


2021 ◽  
Author(s):  
Baolin Li ◽  
Vijay Gadepally ◽  
Siddharth Samsi ◽  
Mark Veillette ◽  
Devesh Tiwari

2021 ◽  
Author(s):  
Yoji Yamato

IEICE Technical Report, IN2020-30.In recent years, utilization of heterogeneous hardware other than small core CPU such as GPU, FPGA or many core CPU is increasing. However, when using heterogeneous hardware, barriers of technical skills such as OpenMP, CUDA and OpenCL are high. Based on that, I have proposed environment-adaptive software that enables automatic conversion, configuration, and high performance operation of once written code, according to the hardware to be placed. However, including existing technologies, there has been no research to properly and automatically offload the mixed offloading destination environment such as GPU, FPGA and many core CPU. In this paper, as a new element of environment-adaptive software, I study a method for offloading applications properly and automatically in the environment where the offloading destination is mixed with GPU, FPGA and many core CPU. I evaluate the effectiveness of the proposed method in multiple applications.


2021 ◽  
pp. 101425
Author(s):  
Rafael Ravedutti L. Machado ◽  
Jonas Schmitt ◽  
Sebastian Eibl ◽  
Jan Eitzinger ◽  
Roland Leißa ◽  
...  

2021 ◽  
Author(s):  
Yoji Yamato

IEICE technical workshop on Network Software, NWS-19-6.Recently, heterogeneous hardware such as GPU and FPGA is used in many systems and also IoT devices are increased rapidly. However, to utilize heterogeneous hardware, the hurdles are high because of much technical skills. I have proposed environment adaptive software to operate an once written application with high performance by automatically converting the code and configuring setting so that we can utilize GPU, FPGA and IoT devices in the location to be deployed and I have also achieved automatic GPU offloading partly. In this paper, I study a method of FPGA offloading which automatically extracts appropriate loop statements of application software.


2021 ◽  
Vol 31 (2) ◽  
pp. 1-26
Author(s):  
Quang Anh Pham Nguyen ◽  
Philipp Andelfinger ◽  
Wen Jun Tan ◽  
Wentong Cai ◽  
Alois Knoll

Spiking neural networks (SNN) are among the most computationally intensive types of simulation models, with node counts on the order of up to 10 11 . Currently, there is intensive research into hardware platforms suitable to support large-scale SNN simulations, whereas several of the most widely used simulators still rely purely on the execution on CPUs. Enabling the execution of these established simulators on heterogeneous hardware allows new studies to exploit the many-core hardware prevalent in modern supercomputing environments, while still being able to reproduce and compare with results from a vast body of existing literature. In this article, we propose a transition approach for CPU-based SNN simulators to enable the execution on heterogeneous hardware (e.g., CPUs, GPUs, and FPGAs), with only limited modifications to an existing simulator code base and without changes to model code. Our approach relies on manual porting of a small number of core simulator functionalities as found in common SNN simulators, whereas the unmodified model code is analyzed and transformed automatically. We apply our approach to the well-known simulator NEST and make a version executable on heterogeneous hardware available to the community. Our measurements show that at full utilization, a single GPU achieves the performance of about 9 CPU cores. A CPU-GPU co-execution with load balancing is also demonstrated, which shows better performance compared to CPU-only or GPU-only execution. Finally, an analytical performance model is proposed to heuristically determine the optimal parameters to execute the heterogeneous NEST.


Sensors ◽  
2021 ◽  
Vol 21 (4) ◽  
pp. 1140
Author(s):  
Eva Papadogiannaki ◽  
Sotiris Ioannidis

More than 75% of Internet traffic is now encrypted, and this percentage is constantly increasing. The majority of communications are secured using common encryption protocols such as SSL/TLS and IPsec to ensure security and protect the privacy of Internet users. However, encryption can be exploited to hide malicious activities, camouflaged into normal network traffic. Traditionally, network traffic inspection is based on techniques like deep packet inspection (DPI). Common applications for DPI include but are not limited to firewalls, intrusion detection and prevention systems, L7 filtering, and packet forwarding. With the widespread adoption of network encryption though, DPI tools that rely on packet payload content are becoming less effective, demanding the development of more sophisticated techniques in order to adapt to current network encryption trends. In this work, we present HeaderHunter, a fast signature-based intrusion detection system even for encrypted network traffic. We generate signatures using only network packet metadata extracted from packet headers. In addition, we examine the processing acceleration of the intrusion detection engine using different heterogeneous hardware architectures.


Sign in / Sign up

Export Citation Format

Share Document