Distributed computing platforms contribute for a large part to some of the most powerful computers. Such architectures raise new challenges, typically in terms of scheduling, adaptability and security. This paper addresses the issue of result-checking in distributed environments, where tasks or their results could have been corrupted due to benign or malicious acts. Using a macro-data flow representation of the program execution, this article presents a novel approach based on work-stealing scheduling to dynamically adapt the execution to sabotage while keeping a reasonable slowdown rate. Unlike static adaptation or adaptation at the source code level, a dynamic adaptation at the middleware level is proposed, enforcing separation of concept...
Work-stealing systems are typically oblivious to the nature of the tasks they are scheduling. They d...
We evaluate four state-of-the-art work-stealing algorithms for distributed systems with non-uniform ...
Task-centric programming models offer a versatile method for exposing parallelism. Such programs are...
Distributed computing platforms contribute for a large part to some of the most powerful computers. ...
Many systems are designed to handle workloads with characteristics that are assumed to be static. T...
Software has an important role in many systems, in particular in critical systems where the correct ...
In this paper, we devise a new method for transparent fault tolerance of distributed programs runnin...
Work-stealing systems are typically oblivious to the nature of the tasks they are scheduling. They d...
Emerging architecture designs include tens of processing cores on a single chip die; it is believed ...
We evaluate four state-of-the-art work-stealing algorithms for distributedsystems with non-uniform c...
The High-Performance Computing ecosystem consists of a large variety of execution platforms that dem...
Distributed programs are hard to get right because they are required to be open, scalable, long-runn...
We have developed an infrastructure for end-to-end run-time monitoring, behavior/performance analysi...
Abstract—Current research into Trojan detection suggests that exhaustive Trojan detection in a chip ...
The traditional defensive security strategy for distributed systems is to safeguard against maliciou...
Work-stealing systems are typically oblivious to the nature of the tasks they are scheduling. They d...
We evaluate four state-of-the-art work-stealing algorithms for distributed systems with non-uniform ...
Task-centric programming models offer a versatile method for exposing parallelism. Such programs are...
Distributed computing platforms contribute for a large part to some of the most powerful computers. ...
Many systems are designed to handle workloads with characteristics that are assumed to be static. T...
Software has an important role in many systems, in particular in critical systems where the correct ...
In this paper, we devise a new method for transparent fault tolerance of distributed programs runnin...
Work-stealing systems are typically oblivious to the nature of the tasks they are scheduling. They d...
Emerging architecture designs include tens of processing cores on a single chip die; it is believed ...
We evaluate four state-of-the-art work-stealing algorithms for distributedsystems with non-uniform c...
The High-Performance Computing ecosystem consists of a large variety of execution platforms that dem...
Distributed programs are hard to get right because they are required to be open, scalable, long-runn...
We have developed an infrastructure for end-to-end run-time monitoring, behavior/performance analysi...
Abstract—Current research into Trojan detection suggests that exhaustive Trojan detection in a chip ...
The traditional defensive security strategy for distributed systems is to safeguard against maliciou...
Work-stealing systems are typically oblivious to the nature of the tasks they are scheduling. They d...
We evaluate four state-of-the-art work-stealing algorithms for distributed systems with non-uniform ...
Task-centric programming models offer a versatile method for exposing parallelism. Such programs are...