18th International Parallel and Distributed Processing Symposium, 2004. Proceedings.
DOI: 10.1109/ipdps.2004.1303319
|View full text |Cite
|
Sign up to set email alerts
|

Computation-at-risk: assessing job portfolio management risk on clusters

Abstract: In this paper we introduce the concept of Computationat-Risk, CaR, a methodology, procedure, and quantity of computational risk and reward resulting from running a particular portfolio of jobs on a cluster under a specific queue policy. Modeled after Value-at-Risk, VaR, from the financial community, CaR introduces the new element of computational risk into the management of a computational cluster. Specifically, administrators of clusters and other large-scale computing systems must deal with a wide range of j… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
4
0

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 11 publications
(4 citation statements)
references
References 5 publications
0
4
0
Order By: Relevance
“…The success of Value-at-Risk in financial community has inspired many researches in applying it to the risk management of computer and networking systems [8][9] . But the community has not yet laid out the evaluation of the DoS vulnerability in security protocols.…”
Section: Motivationmentioning
confidence: 99%
See 1 more Smart Citation
“…The success of Value-at-Risk in financial community has inspired many researches in applying it to the risk management of computer and networking systems [8][9] . But the community has not yet laid out the evaluation of the DoS vulnerability in security protocols.…”
Section: Motivationmentioning
confidence: 99%
“…Although proposed in financial community, VaR is not a new comer for computer scientists and engineers. Kleban and Clearwater did the first job employing the idea of VaR to evaluate the risk of computer systems [8][9] , however, little effort has been made to apply VaR to the risk evaluation of security protocols since then. Value-at-Risk has a solid mathematical foundation and has achieved a great success in financial risk evaluation.…”
Section: Related Workmentioning
confidence: 99%
“…Various other works [12,15,16,22] have addressed some form of risk in computing jobs. In [12] and [22], the risk of paying penalties to compensate users is minimized so as not to reduce the profit of service providers.…”
Section: Related Workmentioning
confidence: 99%
“…In [12] and [22], the risk of paying penalties to compensate users is minimized so as not to reduce the profit of service providers. Computation-atRisk [15,16] determines the risk of completing jobs later than expected based on either the makespan (response time) or the expansion factor (slowdown). GridIS [31] shows that a conservative provider earns much less profit due to accepting too few jobs to run, as compared to an aggressive provider who earn more profit even though more jobs result in deadline violations.…”
Section: Related Workmentioning
confidence: 99%