“…(6) Search for methods, based on CPU and network load measures, to automatically locate the limiting machine in a PVM configuration, so that it may be removed during future application runs. (7) Determine ways in which the information learned in (3), (4), (5), and (6) may be used durmg the implementation of a scheduler for compute-intensive programs on workstation networks; specifically, examine the role of run time prediction and load monitoring in common scheduling algorithms.…”