2009 International Conference on High Performance Computing (HiPC) 2009
DOI: 10.1109/hipc.2009.5433181
|View full text |Cite
|
Sign up to set email alerts
|

Continuous performance monitoring for large-scale parallel applications

Abstract: Abstract-Traditional performance analysis techniques are performed after a parallel program has completed. In this paper, we describe an online method for continuously monitoring the performance of a parallel program, specifically the fraction of the time spent in various activities as the program executes. Our implementation of both a visualization client and the parallel performance framework that gathers utilization data are described. The data gathering uses a scalable and asynchronous reduction with an ap… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2014
2014
2015
2015

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(4 citation statements)
references
References 19 publications
0
4
0
Order By: Relevance
“…SC-based schemes are widely accepted because they are compatible with standard protocols. However, they require the interaction between the foreign server and the home server, which may lead to the single point of failure [34], and induce large authentication transmission overhead because of the long distance between the foreign server and the home server. Moreover, recent studies [35], [36] have shown that SC-based schemes cannot provide strong user anonymity and non-traceability, and most of them cannot provide session key security and resistance to sophisticated attacks.…”
Section: Related Workmentioning
confidence: 99%
“…SC-based schemes are widely accepted because they are compatible with standard protocols. However, they require the interaction between the foreign server and the home server, which may lead to the single point of failure [34], and induce large authentication transmission overhead because of the long distance between the foreign server and the home server. Moreover, recent studies [35], [36] have shown that SC-based schemes cannot provide strong user anonymity and non-traceability, and most of them cannot provide session key security and resistance to sophisticated attacks.…”
Section: Related Workmentioning
confidence: 99%
“…The Charm++ developers have utilized LiveViz to build an in situ performance monitoring and visualization tool. [98] This tool gathers utilization statistics about the running program on every processor, efficiently compresses the utilization data, and merges the compressed data in a reduction from all the processors. During execution, the performance monitoring tool is just another module which runs alongside the application (like other Charm++ functionalities do), without affecting the application significantly.…”
Section: Charm ++mentioning
confidence: 99%
“…An AMT RTS provides a specific implementation of an AMT model. 11,12,16,17,22,26,97,98,101,[107][108][109]111 anti-dependency See Write-After-Read. 25, 26, Glossary: Write-After-Read API An application programmer interface (API) is set of functions and tools provided by a library developer to allow an application programmer to interact with a specific piece of software or allow a developer to utilize prebuilt functionality.…”
Section: Glossarymentioning
confidence: 99%
“…Even the most efficient implementation directly in hardware causes some overhead compared to regular floating-point arithmetic. Nevertheless, as shown in [14] , most CPUs do not contain a hardware implementation of subnormal numbers. In this case, a kernel trap is raised to allow the operating system kernel to handle a floating-point operation with a subnormal number.…”
Section: The Influence Of Subnormal Numbersmentioning
confidence: 99%