Thanks to the rapid proliferation of connected devices, sensor-generated time
series constitute a large and growing portion of the world's data. Often, this
data is collected from distributed, resource-constrained devices and
centralized at one or more servers. A key challenge in this setup is reducing
the size of the transmitted data without sacrificing its quality. Lower quality
reduces the data's utility, but smaller size enables both reduced network and
storage costs at the servers and reduced power consumption in sensing devices.
A natural solution is to compress the data at the sensing devices.
Unfortunately, existing compression algorithms either violate the memory and
latency constraints common for these devices or, as we show experimentally,
perform poorly on sensor-generated time series.
We introduce a time series compression algorithm that achieves
state-of-the-art compression ratios while requiring less than 1KB of memory and
adding virtually no latency. This method is suitable not only for low-power
devices...

more |
pdf
| html
ComputerPapers:
Sprintz: Time Series Compression for the Internet of Things. https://t.co/w2Vhm2XPis

None.

None.

Sample Sizes : None.

Authors: 3

Total Words: 11888

Unqiue Words: 3444

More and more massive parallel codes running on several hundreds of thousands
of cores enter the computational science and engineering domain, allowing
high-fidelity computations on up to trillions of unknowns for very detailed
analyses of the underlying problems. During such runs, typically gigabytes of
data are being produced, hindering both efficient storage and (interactive)
data exploration. Here, advanced approaches based on inherently distributed
data formats such as HDF5 become necessary in order to avoid long latencies
when storing the data and to support fast (random) access when retrieving the
data for visual processing. Avoiding file locking and using collective
buffering, write bandwidths to a single file close to the theoretical peak on a
modern supercomputing cluster were achieved. The structure of the output file
supports a very fast interactive visualisation and introduces additional
steering functionality.

more |
pdf
| html
None.

None.

Sample Sizes : None.

Authors: 3

Total Words: 8187

Unqiue Words: 2529

In a superscalar processor, instructions of various types flow through an
execution pipeline, traversing hardware resources which are mostly shared among
many different instruction types. A notable exception to shared pipeline
resources is the collection of functional units, the hardware that performs
specific computations. In a trade-off of cost versus performance, a pipeline
designer must decide how many of each type of functional unit to place in a
processor's pipeline. In this paper, we model a superscalar processor's issue
queue and functional units as a novel queuing network. We treat the issue queue
as a finite-sized waiting area and the functional units as servers. In addition
to common queuing problems, customers of the network share the queue but wait
for specific servers to become ready (e.g., addition instructions wait for
adders). Furthermore, the customers in this queue are not necessary ready for
service, since instructions may be waiting for operands. In this paper we model
a novel queuing network that provides a...

more |
pdf
| html
None.

None.

Sample Sizes : None.

Authors: 2

Total Words: 10537

Unqiue Words: 2294

Mean field approximation is a popular method to study the behaviour of
stochastic models composed of a large number of interacting objects. When the
objects are asynchronous, the mean field approximation of a population model
can be expressed as an ordinary differential equation. When the objects are
(clock-) synchronous the mean field approximation is a discrete time dynamical
system. We focus on the latter.We study the accuracy of mean field
approximation when this approximation is a discrete-time dynamical system. We
extend a result that was shown for the continuous time case and we prove that
expected performance indicators estimated by mean field approximation are
$O(1/N)$-accurate. We provide simple expressions to effectively compute the
asymptotic error of mean field approximation, for finite time-horizon and
steady-state, and we use this computed error to propose what we call a
\emph{refined} mean field approximation. We show, by using a few numerical
examples, that this technique improves the quality of approximation...

more |
pdf
| html
Paper "A Refined Mean Field Approximation for Synchronous Population Processes"

Stargazers: 0

Subscribers: 0

Subscribers: 0

Forks: 0

Open Issues: 0

Open Issues: 0

None.

Sample Sizes : None.

Authors: 3

Total Words: 12733

Unqiue Words: 2703

SSDs are currently replacing magnetic disks in many application areas. A
challenge of the underlying flash technology is that data cannot be updated
in-place. A block consisting of many pages must be completely erased before a
single page can be rewritten. This victim block can still contain valid pages
which need to be copied to other blocks before erasure. The objective of
garbage collection strategies is to minimize write amplification induced by
copying valid pages from victim blocks while minimizing the performance
overhead of the victim selection. Victim selection strategies minimizing write
amplification, like the cost-benefit approach, have linear runtime, while the
write amplifications of time-efficient strategies, like the greedy strategy,
significantly reduce the lifetime of SSDs. In this paper, we propose two
strategies which optimize the performance of cost-benefit, while (almost)
preserving its write amplification. Trace-driven simulations for single- and
multi-channel SSDs show that the optimizations help to keep...

more |
pdf
| html
None.

None.

Sample Sizes : None.

Authors: 6

Total Words: 8891

Unqiue Words: 2273

We consider two types of problems associated with a bufferless server with
service preemption (push-out). One type is motivated by "adversarial" coupon
collection with applications to modeling the surveillance of a set of servers
by a botnet planning a DDoS attack on them collectively. The servers
dynamically change according to a moving-target defense. Another type of
problem has to do with a sequence of messages handled by the (transmission)
server wherein each message obsoletes all previous ones. The objective is to
assess the freshness of the latest message/information that has been
successfully transmitted, i.e., "age of information".

more |
pdf
| html
ComputerPapers:
Average age of coupon type and related average age of information. https://t.co/wvgNDzaUyg

None.

None.

Sample Sizes : None.

Authors: 1

Total Words: 3923

Unqiue Words: 1098

Memory bandwidth is critical in today's high performance computing systems.
The bandwidth is particularly paramount for GPU workloads such as 3D Gaming,
Imaging and Perceptual Computing, GPGPU due to their data-intensive nature. As
the number of threads and data streams in the GPUs increases with each
generation, along with a high available memory bandwidth, memory efficiency is
also crucial in order to achieve desired performance. In presence of multiple
concurrent data streams, the inherent locality in a single data stream is often
lost as these streams are interleaved while moving through multiple levels of
memory system. In DRAM based main memory, the poor request locality reduces
row-buffer reuse resulting in underutilized and inefficient memory bandwidth.
In this paper we propose Memory-Aware Reordered Source (\textit{MARS})
architecture to address memory inefficiency arising from highly interleaved
data streams. The key idea of \textit{MARS} is that with a sufficiently large
lookahead before the main memory, data streams...

more |
pdf
| html
None.

M157q_News_RSS:
MARS: Memory Aware Reordered Source. (arXiv:1808.03518v1 [https://t.co/iN1HmYxuOB])
https://t.co/bz31i4V29O
Memory bandwidth is critical in today's high perfo

None.

None.

Sample Sizes : None.

Authors: 5

Total Words: 3542

Unqiue Words: 1395

In this paper, we consider a load balancing system under a general pull-based
policy. In particular, each arrival is randomly dispatched to one of the
servers whose queue lengths are below a threshold, if there are any; otherwise,
this arrival is randomly dispatched to one of the entire set of servers. We are
interested in the fundamental relationship between the threshold and the delay
performance of the system in heavy traffic. To this end, we first establish the
following necessary condition to guarantee heavy-traffic delay optimality: the
threshold will grow to infinity as the exogenous arrival rate approaches the
boundary of the capacity region (i.e., the load intensity approaches one) but
the growth rate should be slower than a polynomial function of the mean number
of tasks in the system. As a special case of this result, we directly show that
the delay performance of the popular pull-based policy Join-Idle-Queue (JIQ)
lies strictly between that of any heavy-traffic delay optimal policy and that
of random routing. We...

more |
pdf
| html
None.

M157q_News_RSS:
Heavy-traffic Delay Optimality in Pull-based Load Balancing Systems: Necessary and Sufficient Conditions. (arXiv:180
https://t.co/ZJshY9q5rx

ComputerPapers:
Heavy-traffic Delay Optimality in Pull-based Load Balancing Systems: Necessary and Sufficient Conditions. https://t.co/rzO6HxA4QC

None.

None.

Sample Sizes : None.

Authors: 3

Total Words: 15974

Unqiue Words: 2422

We consider a connection-level model proposed by Massouli\'{e} and Roberts
for bandwidth sharing among file transfer flows in a communication network, and
we study weighted proportionally fair sharing policies where the weights
represent the relative importance of flows on different routes. We are
interested in characterizing performance in the heavy-traffic regime. Existing
work on this problem has focused on diffusion approximations, which were first
studied by Kang et al. (2009). However, except for the case where the weights
of all the routes are equal, the steady-state distribution of the limiting
diffusion process is unknown and thus there are no explicit-form
characterizations, even when exponential file size distributions are assumed.
For more general file size distributions, the diffusion approximation was
derived for the equal-weights case by Vlasiou, Zhang and Zwart (2014), but an
interchange-of-limits result was lacking.
We take a Lyapunov-drift-based approach that is different from the diffusion
approximation...

more |
pdf
| html
None.

None.

None.

Sample Sizes : None.

Authors: 4

Total Words: 22188

Unqiue Words: 2880

Data center networks are an important infrastructure in various applications
of modern information technologies. Note that each data center always has a
finite lifetime, thus once a data center fails, then it will lose all its
storage files and useful information. For this, it is necessary to replicate
and copy each important file into other data centers such that this file can
increase its lifetime of staying in a data center network. In this paper, we
describe a large-scale data center network with a file d-threshold policy,
which is to replicate each important file into at most d-1 other data centers
such that this file can maintain in the data center network under a given level
of data security in the long-term. To this end, we develop three relevant
Markov processes to propose two effective methods for assessing the file
lifetime and data security. By using the RG-factorizations, we show that the
two methods are used to be able to more effectively evaluate the file lifetime
of large-scale data center networks. We hope the...

more |
pdf
| html
None.

None.

Sample Sizes : None.

Authors: 3

Total Words: 4463

Unqiue Words: 1118

Assert is a website where the best academic papers on arXiv (computer science, math, physics), bioRxiv (biology), BITSS (reproducibility), EarthArXiv (earth science), engrXiv (engineering), LawArXiv (law), PsyArXiv (psychology), SocArXiv (social science), and SportRxiv (sport research) bubble to the top each day.

Papers are scored (in real-time) based on how verifiable they are (as determined by their Github repos) and how interesting they are (based on Twitter).

To see top papers, follow us on twitter @assertpub_ (arXiv), @assert_pub (bioRxiv), and @assertpub_dev (everything else).

To see beautiful figures extracted from papers, follow us on Instagram.

*Tracking 58,338 papers.*

Sort results based on if they are interesting or reproducible.

Interesting

Reproducible