skip to main content
10.1145/1869459.1869525acmconferencesArticle/Chapter ViewAbstractPublication PagessplashConference Proceedingsconference-collections
research-article

Patterns and statistical analysis for understanding reduced resource computing

Authors Info & Claims
Published:17 October 2010Publication History

ABSTRACT

We present several general, broadly applicable mechanisms that enable computations to execute with reduced resources, typically at the cost of some loss in the accuracy of the result they produce.We identify several general computational patterns that interact well with these resource reduction mechanisms, present a concrete manifestation of these patterns in the form of simple model programs, perform simulationbased explorations of the quantitative consequences of applying these mechanisms to our model programs, and relate the model computations (and their interaction with the resource reduction mechanisms) to more complex benchmark applications drawn from a variety of fields.

References

  1. }}J. Ansel, C. Chan, Y. Wong, M. Olszewski, Q. Zhao, A. Edelman, and S. Amarasinghe. PetaBricks: a language and compiler for algorithmic choice. In PLDI '09. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. }}W. Baek and T. Chilimbi. Green: A system for supporting energy-conscious programming using principled approximation. Technical Report TR-2009-089, Microsoft Research, Aug. 2009.Google ScholarGoogle Scholar
  3. }}J. Berg, J. Tymoczko, and L. Stryer. Biochemistry. W.H. Freeman, 2006.Google ScholarGoogle Scholar
  4. }}E. Berger and B. Zorn. DieHard: probabilistic memory safety for unsafe languages. In PLDI, June 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. }}C. Bienia, S. Kumar, J. P. Singh, and K. Li. The PARSEC benchmark suite: Characterization and architectural implications. In PACT '08. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. }}E. Brewer. Towards robust distributed systems. Keynote, ACM Symposium on Principles of Distributed Systems (PODC), 2000. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. }}R. Browning, T. Li, B. Chui, J. Ye, R. Pease, Z. Czyzewski, and D. Joy. Low-energy electron/atom elastic scattering cross sections from 0.1-30 keV. Scanning, 17(4), 1995.Google ScholarGoogle Scholar
  8. }}B. Demsky, M. Ernst, P. Guo, S. McCamant, J. Perkins, and M. Rinard. Inference and enforcement of data structure consistency specifications. In ISSTA '06. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. }}B. Demsky and M. Rinard. Automatic detection and repair of errors in data structures. In OOPSLA '03, 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. }}B. Demsky and M. Rinard. Data structure repair using goal-directed reasoning. In ICSE '05, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. }}R. Floyd. Assigning meanings to programs. In Proceedings of the Symposium in Applied Mathematics, number 19, 1967.Google ScholarGoogle ScholarCross RefCross Ref
  12. }}E. Gamma, R. Helm, R. Johnson, and J. Vlissides. Design Patterns: Elements of Reusable Object-Oriented Software. Addison-Wesley, 1995. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. }}J. Harris, S. Lazaratos, and R. Michelena. Tomographic string inversion. In Proceedings of the 60th Annual International Meeting, Society of Exploration and Geophysics, Extended Abstracts, 1990.Google ScholarGoogle ScholarCross RefCross Ref
  14. }}C. A. R. Hoare. An axiomatic basis for computer programming. Commun. ACM, 12(10), 1969. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. }}H. Hoffmann, S. Misailovic, S. Sidiroglou, A. Agarwal, and M. Rinard. Using Code Perforation to Improve Performance, Reduce Energy Consumption, and Respond to Failures. Technical Report MIT-CSAIL-TR-2009-042, MIT, Sept. 2009.Google ScholarGoogle Scholar
  16. }}D. Le Gall. MPEG: A video compression standard for multimedia applications. CACM, Apr. 1991. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. }}S. Misailovic, D. Kim, and M. Rinard. Parallelizing sequential programs with statistical accuracy tests. Technical Report TR-2010-038, Computer Science and Artificial Intelligence Laboratory, MIT, 2010.Google ScholarGoogle Scholar
  18. }}S. Misailovic, S. Sidiroglou, H. Hoffman, and M. Rinard. Quality of service profiling. In ISCE '10. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. }}H. Nguyen and M. Rinard. Detecting and eliminating memory leaks using cyclic memory allocation. In ISMM '07. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. }}J. Perkins, S. Kim, S. Larsen, S. Amarasinghe, J. Bachrach, M. Carbin, C. Pacheco, F. Sherwood, S. Sidiroglou, G. Sullivan, W. Wong, Y. Zibin, M. Ernst, and M. Rinard. Automatically patching errors in deployed software. In SOSP '09. Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. }}M. Rinard. Probabilistic accuracy bounds for fault-tolerant computations that discard tasks. In ICS '06. Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. }}M. Rinard. Using early phase termination to eliminate load imbalancess at barrier synchronization points. In OOPSLA '07. Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. }}M. Rinard. The Design, Implementation and Evaluation of Jade, a Portable, Implicitly Parallel Programming Language. PhD thesis, Stanford University, Department of Computer Science, 1994. Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. }}M. Rinard. Acceptability-oriented computing. In OOPSLA '03 Companion, Oct. 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. }}M. Rinard, C. Cadar, D. Dumitran, D. M. Roy, T. Leu, and J. William S. Beebee. Enhancing Server Availability and Security Through Failure-Oblivious Computing. In OSDI '04. Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. }}M. Rinard, D. Scales, and M. Lam. Jade: A high-level, machine-independent language for parallel programming. parallel computing, 29, 1993.Google ScholarGoogle Scholar
  27. }}M. C. Rinard, C. Cadar, D. Dumitran, D. M. Roy, and T. Leu. A dynamic technique for eliminating buffer overflow vulnerabilities (and other memory errors). In ACSAC 04. Google ScholarGoogle ScholarDigital LibraryDigital Library
  28. }}M. C. Rinard, C. Cadar, and H. H. Nguyen. Exploring the acceptability envelope. In OOPSLA '05 Companion. Google ScholarGoogle ScholarDigital LibraryDigital Library
  29. }}K. Schmidt-Nielsen, R. Schroter, and A. Shkolnik. Desaturation of exhaled air in camels. Proceedings of the Royal Society of London, Series B, Biological Sciences, 211(1184), 1981.Google ScholarGoogle Scholar
  30. }}S. Sidiroglou, O. Laadan, C. Perez, N. Viennot, J. Nieh, and A. D. Keromytis. Assure: automatic software self-healing using rescue points. In ASPLOS '09. Google ScholarGoogle ScholarDigital LibraryDigital Library
  31. }}S. Sidiroglou, M. E. Locasto, S. W. Boyd, and A. D. Keromytis. Building a reactive immune system for software services. In USENIX '05. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Patterns and statistical analysis for understanding reduced resource computing

              Recommendations

              Comments

              Login options

              Check if you have access through your login credentials or your institution to get full access on this article.

              Sign in

              PDF Format

              View or Download as a PDF file.

              PDF

              eReader

              View online with eReader.

              eReader