Abstract
We present several general, broadly applicable mechanisms that enable computations to execute with reduced resources, typically at the cost of some loss in the accuracy of the result they produce.We identify several general computational patterns that interact well with these resource reduction mechanisms, present a concrete manifestation of these patterns in the form of simple model programs, perform simulationbased explorations of the quantitative consequences of applying these mechanisms to our model programs, and relate the model computations (and their interaction with the resource reduction mechanisms) to more complex benchmark applications drawn from a variety of fields.
- }}J. Ansel, C. Chan, Y. Wong, M. Olszewski, Q. Zhao, A. Edelman, and S. Amarasinghe. PetaBricks: a language and compiler for algorithmic choice. In PLDI '09. Google Scholar
Digital Library
- }}W. Baek and T. Chilimbi. Green: A system for supporting energy-conscious programming using principled approximation. Technical Report TR-2009-089, Microsoft Research, Aug. 2009.Google Scholar
- }}J. Berg, J. Tymoczko, and L. Stryer. Biochemistry. W.H. Freeman, 2006.Google Scholar
- }}E. Berger and B. Zorn. DieHard: probabilistic memory safety for unsafe languages. In PLDI, June 2006. Google Scholar
Digital Library
- }}C. Bienia, S. Kumar, J. P. Singh, and K. Li. The PARSEC benchmark suite: Characterization and architectural implications. In PACT '08. Google Scholar
Digital Library
- }}E. Brewer. Towards robust distributed systems. Keynote, ACM Symposium on Principles of Distributed Systems (PODC), 2000. Google Scholar
Digital Library
- }}R. Browning, T. Li, B. Chui, J. Ye, R. Pease, Z. Czyzewski, and D. Joy. Low-energy electron/atom elastic scattering cross sections from 0.1-30 keV. Scanning, 17(4), 1995.Google Scholar
- }}B. Demsky, M. Ernst, P. Guo, S. McCamant, J. Perkins, and M. Rinard. Inference and enforcement of data structure consistency specifications. In ISSTA '06. Google Scholar
Digital Library
- }}B. Demsky and M. Rinard. Automatic detection and repair of errors in data structures. In OOPSLA '03, 2003. Google Scholar
Digital Library
- }}B. Demsky and M. Rinard. Data structure repair using goal-directed reasoning. In ICSE '05, 2005. Google Scholar
Digital Library
- }}R. Floyd. Assigning meanings to programs. In Proceedings of the Symposium in Applied Mathematics, number 19, 1967.Google Scholar
Cross Ref
- }}E. Gamma, R. Helm, R. Johnson, and J. Vlissides. Design Patterns: Elements of Reusable Object-Oriented Software. Addison-Wesley, 1995. Google Scholar
Digital Library
- }}J. Harris, S. Lazaratos, and R. Michelena. Tomographic string inversion. In Proceedings of the 60th Annual International Meeting, Society of Exploration and Geophysics, Extended Abstracts, 1990.Google Scholar
Cross Ref
- }}C. A. R. Hoare. An axiomatic basis for computer programming. Commun. ACM, 12(10), 1969. Google Scholar
Digital Library
- }}H. Hoffmann, S. Misailovic, S. Sidiroglou, A. Agarwal, and M. Rinard. Using Code Perforation to Improve Performance, Reduce Energy Consumption, and Respond to Failures. Technical Report MIT-CSAIL-TR-2009-042, MIT, Sept. 2009.Google Scholar
- }}D. Le Gall. MPEG: A video compression standard for multimedia applications. CACM, Apr. 1991. Google Scholar
Digital Library
- }}S. Misailovic, D. Kim, and M. Rinard. Parallelizing sequential programs with statistical accuracy tests. Technical Report TR-2010-038, Computer Science and Artificial Intelligence Laboratory, MIT, 2010.Google Scholar
- }}S. Misailovic, S. Sidiroglou, H. Hoffman, and M. Rinard. Quality of service profiling. In ISCE '10. Google Scholar
Digital Library
- }}H. Nguyen and M. Rinard. Detecting and eliminating memory leaks using cyclic memory allocation. In ISMM '07. Google Scholar
Digital Library
- }}J. Perkins, S. Kim, S. Larsen, S. Amarasinghe, J. Bachrach, M. Carbin, C. Pacheco, F. Sherwood, S. Sidiroglou, G. Sullivan, W. Wong, Y. Zibin, M. Ernst, and M. Rinard. Automatically patching errors in deployed software. In SOSP '09. Google Scholar
Digital Library
- }}M. Rinard. Probabilistic accuracy bounds for fault-tolerant computations that discard tasks. In ICS '06. Google Scholar
Digital Library
- }}M. Rinard. Using early phase termination to eliminate load imbalancess at barrier synchronization points. In OOPSLA '07. Google Scholar
Digital Library
- }}M. Rinard. The Design, Implementation and Evaluation of Jade, a Portable, Implicitly Parallel Programming Language. PhD thesis, Stanford University, Department of Computer Science, 1994. Google Scholar
Digital Library
- }}M. Rinard. Acceptability-oriented computing. In OOPSLA '03 Companion, Oct. 2003. Google Scholar
Digital Library
- }}M. Rinard, C. Cadar, D. Dumitran, D. M. Roy, T. Leu, and J. William S. Beebee. Enhancing Server Availability and Security Through Failure-Oblivious Computing. In OSDI '04. Google Scholar
Digital Library
- }}M. Rinard, D. Scales, and M. Lam. Jade: A high-level, machine-independent language for parallel programming. parallel computing, 29, 1993.Google Scholar
- }}M. C. Rinard, C. Cadar, D. Dumitran, D. M. Roy, and T. Leu. A dynamic technique for eliminating buffer overflow vulnerabilities (and other memory errors). In ACSAC 04. Google Scholar
Digital Library
- }}M. C. Rinard, C. Cadar, and H. H. Nguyen. Exploring the acceptability envelope. In OOPSLA '05 Companion. Google Scholar
Digital Library
- }}K. Schmidt-Nielsen, R. Schroter, and A. Shkolnik. Desaturation of exhaled air in camels. Proceedings of the Royal Society of London, Series B, Biological Sciences, 211(1184), 1981.Google Scholar
- }}S. Sidiroglou, O. Laadan, C. Perez, N. Viennot, J. Nieh, and A. D. Keromytis. Assure: automatic software self-healing using rescue points. In ASPLOS '09. Google Scholar
Digital Library
- }}S. Sidiroglou, M. E. Locasto, S. W. Boyd, and A. D. Keromytis. Building a reactive immune system for software services. In USENIX '05. Google Scholar
Digital Library
Index Terms
Patterns and statistical analysis for understanding reduced resource computing
Recommendations
Managing performance vs. accuracy trade-offs with loop perforation
ESEC/FSE '11: Proceedings of the 19th ACM SIGSOFT symposium and the 13th European conference on Foundations of software engineeringMany modern computations (such as video and audio encoders, Monte Carlo simulations, and machine learning algorithms) are designed to trade off accuracy in return for increased performance. To date, such computations typically use ad-hoc, domain-...
Patterns and statistical analysis for understanding reduced resource computing
OOPSLA '10: Proceedings of the ACM international conference on Object oriented programming systems languages and applicationsWe present several general, broadly applicable mechanisms that enable computations to execute with reduced resources, typically at the cost of some loss in the accuracy of the result they produce.We identify several general computational patterns that ...
Resource reconstruction algorithms for on-demand allocation in virtual computing resource pool
Resource reconstruction algorithms are studied in this paper to solve the problem of resource on-demand allocation and improve the efficiency of resource utilization in virtual computing resource pool. Based on the idea of resource virtualization and ...







Comments