The thesis presents a contribution to the analysis and visualization of computational performance based on event traces with a particular focus on parallel programs and High Performance Computing (HPC). Event traces contain detailed information about specified incidents (events) during run-time of programs and allow minute investigation of dynamic program behavior, various performance metrics, and possible causes of performance flaws. Due to long running and highly parallel programs and very fine detail resolutions, event traces can accumulate huge amounts of data which become a challenge for interactive as well as automatic analysis and visualization tools. The thesis proposes a method of exploiting redundancy in the event traces in order to ...
Die Dissertation User-Aware Performance Evaluation and Optimization of Parallel Job Schedulers besch...
Energy consumption has become a first-class optimization goal in design and implementation of data-i...
Cryptographic operations are more and more popular because unencrypted information is a security lea...
With the widespread use of information technologies, more and more complex data is generated and col...
Prediction problems on high-dimensional molecular data, e.g. the classification of microar- ray sam...
Machine learning is aimed at the automatic extraction of semantic-level information from potentially...
Computer-Aided Design (CAD) bezeichnet den Entwurf industrieller Produkte mit Hilfe von virtuellen 3...
At the starting point of the work leading to this doctoral thesis, in January 2005, the work on pede...
The next decades are crucially important to putting the world on a path of reduced greenhouse gas em...
Relation prediction seeks to predict unknown but potentially true relations by revealing missing rel...
With the advance of high-throughput techniques, the amount of available data in the bio-molecular fi...
The Belle II experiment, the upgrade of the Belle experiment, at KEK (High Energy Accelerator Resear...
Physics is about building a model of the world. Building a model can have two different interpretati...
Understanding the neurophysiological mechanisms of information processing within and across brain re...
While product design has sparked a stream of research, practitioners and academics alike are still u...
Die Dissertation User-Aware Performance Evaluation and Optimization of Parallel Job Schedulers besch...
Energy consumption has become a first-class optimization goal in design and implementation of data-i...
Cryptographic operations are more and more popular because unencrypted information is a security lea...
With the widespread use of information technologies, more and more complex data is generated and col...
Prediction problems on high-dimensional molecular data, e.g. the classification of microar- ray sam...
Machine learning is aimed at the automatic extraction of semantic-level information from potentially...
Computer-Aided Design (CAD) bezeichnet den Entwurf industrieller Produkte mit Hilfe von virtuellen 3...
At the starting point of the work leading to this doctoral thesis, in January 2005, the work on pede...
The next decades are crucially important to putting the world on a path of reduced greenhouse gas em...
Relation prediction seeks to predict unknown but potentially true relations by revealing missing rel...
With the advance of high-throughput techniques, the amount of available data in the bio-molecular fi...
The Belle II experiment, the upgrade of the Belle experiment, at KEK (High Energy Accelerator Resear...
Physics is about building a model of the world. Building a model can have two different interpretati...
Understanding the neurophysiological mechanisms of information processing within and across brain re...
While product design has sparked a stream of research, practitioners and academics alike are still u...
Die Dissertation User-Aware Performance Evaluation and Optimization of Parallel Job Schedulers besch...
Energy consumption has become a first-class optimization goal in design and implementation of data-i...
Cryptographic operations are more and more popular because unencrypted information is a security lea...