Home About us Contact | |||
Programming Models (programming + models)
Selected AbstractsVisualizing massively multithreaded applications with ThreadScopeCONCURRENCY AND COMPUTATION: PRACTICE & EXPERIENCE, Issue 1 2010Kyle B. Wheeler Abstract As highly parallel multicore machines become commonplace, programs must exhibit more concurrency to exploit the available hardware. Many multithreaded programming models already encourage programmers to create hundreds or thousands of short-lived threads that interact in complex ways. Programmers need to be able to analyze, tune, and troubleshoot these large-scale multithreaded programs. To address this problem, we present ThreadScope: a tool for tracing, visualizing, and analyzing massively multithreaded programs. ThreadScope extracts the machine-independent program structure from execution trace data from a variety of tracing tools and displays it as a graph of dependent execution blocks and memory objects, enabling identification of synchronization and structural problems, even if they did not occur in the traced run. It also uses graph-based analysis to identify potential problems. We demonstrate the use of ThreadScope to view program structure, memory access patterns, and synchronization problems in three programming environments and seven applications. Copyright © 2009 John Wiley & Sons, Ltd. [source] Bridging the language gap in scientific computing: the Chasm approachCONCURRENCY AND COMPUTATION: PRACTICE & EXPERIENCE, Issue 2 2006C. E. Rasmussen Abstract Chasm is a toolkit providing seamless language interoperability between Fortran 95 and C++. Language interoperability is important to scientific programmers because scientific applications are predominantly written in Fortran, while software tools are mostly written in C++. Two design features differentiate Chasm from other related tools. First, we avoid the common-denominator type systems and programming models found in most Interface Definition Language (IDL)-based interoperability systems. Chasm uses the intermediate representation generated by a compiler front-end for each supported language as its source of interface information instead of an IDL. Second, bridging code is generated for each pairwise language binding, removing the need for a common intermediate data representation and multiple levels of indirection between the caller and callee. These features make Chasm a simple system that performs well, requires minimal user intervention and, in most instances, bridging code generation can be performed automatically. Chasm is also easily extensible and highly portable. Copyright © 2005 John Wiley & Sons, Ltd. [source] Evidential reasoning-based nonlinear programming model for MCDA under fuzzy weights and utilities,INTERNATIONAL JOURNAL OF INTELLIGENT SYSTEMS, Issue 1 2010Mi Zhou In a multiple-criteria decision analysis (MCDA) problem, qualitative information with subjective judgments of ambiguity is often provided by people, together with quantitative data that may also be imprecise or incomplete. There are several uncertainties that may be considered in an MCDA problem, such as fuzziness and ambiguity. The evidential reasoning (ER) approach is well suited for dealing with such MCDA problems and can generate comprehensive distributed assessments for different alternatives. Many researches in dealing with imprecise or uncertain belief structures have been conducted on the ER approach. In this paper, both triangular fuzzy weights of criteria and fuzzy utilities assigned to evaluation grades are introduced to the ER approach, which may be incurred in several circumstances such as group decision-making situation. The Hadamard multiplicative combination of judgment matrix is extended for the aggregation of triangular fuzzy judgment matrices, the result of which is applied as the fuzzy weights used in the fuzzy ER approach. The consistency of the aggregated triangular fuzzy judgment matrix is also proved. Several pairs of ER-based programming models are designed to generate the total fuzzy belief degrees and the overall expected fuzzy utilities for the comparison of alternatives. A numerical example is conducted to show the effectiveness of the proposed approach. © 2009 Wiley Periodicals, Inc. [source] Portfolio selection on the Madrid Exchange: a compromise programming modelINTERNATIONAL TRANSACTIONS IN OPERATIONAL RESEARCH, Issue 1 2003E. Ballestero As a contribution to portfolio selection analysis, we develop a compromise programming approach to the investor's utility optimum on the Madrid Online Market. This approach derives from linkages between utility functions under incomplete information, Yu's compromise set, and certain biased sets of portfolios on the efficient frontier. These linkages rely on recent theorems in multi,criteria literature, which allow us to approximate the investor's utility optimum between bounds which are determined either by linear programming models or graphic techniques. Returns on 104 stocks are computed from capital gains and cash,flows, including dividends and rights offerings, over the period 1992,1997. The first step consists in normalizing the mean,variance efficient frontier, which is defined in terms of two indexes, profitability and safety. In the second step, interactive dialogues to elicit the investor's preferences for profitability and safety are described. In the third step, the utility optimum for each particular investor who pursues a buy,&,hold policy is bounded on the efficient frontier. From this step, a number of portfolios close to the investor's utility optimum are obtained. In the fourth step, compromise programming is used again to select one ,satisficing' portfolio from the set already bounded for each investor. This step is new with respect to previous papers in which compromise/utility models are employed. Computing processes are detailed in tables and figures which also display the numerical results. Extensions to active management policies are suggested. [source] Aggregation of ordinal and cardinal preferences: a framework based on distance functionsJOURNAL OF MULTI CRITERIA DECISION ANALYSIS, Issue 3-4 2008Jacinto González-Pachón Abstract In this paper a collective choice function (CCF), formulated within a p -metric distance function framework, is proposed as a generator of several compromise consensuses. Even though, the proposed CCF is not smooth, it is however demonstrated that it can be straightforwardly transformed into easily computable goal programming models. Finally, several cases of individual preferences aggregation are obtained by providing different interpretations of the CCF parameters: ordinal and complete information, ordinal and partial information and a cardinal case through ,pairwise' comparison matrices. Copyright © 2009 John Wiley & Sons, Ltd. [source] Modeling the operation of multireservoir systems using decomposition and stochastic dynamic programmingNAVAL RESEARCH LOGISTICS: AN INTERNATIONAL JOURNAL, Issue 3 2006T.W. Archibald Abstract Stochastic dynamic programming models are attractive for multireservoir control problems because they allow non-linear features to be incorporated and changes in hydrological conditions to be modeled as Markov processes. However, with the exception of the simplest cases, these models are computationally intractable because of the high dimension of the state and action spaces involved. This paper proposes a new method of determining an operating policy for a multireservoir control problem that uses stochastic dynamic programming, but is practical for systems with many reservoirs. Decomposition is first used to reduce the problem to a number of independent subproblems. Each subproblem is formulated as a low-dimensional stochastic dynamic program and solved to determine the operating policy for one of the reservoirs in the system. © 2006 Wiley Periodicals, Inc. Naval Research Logistics, 2006 [source] Radar pulse interleaving for multi-target trackingNAVAL RESEARCH LOGISTICS: AN INTERNATIONAL JOURNAL, Issue 1 2004Moustafa Elshafei Abstract In a multifunction radar, the maximum number of targets that can be managed or tracked is an important performance measure. Interleaving algorithms developed to operate radars exploit the dead-times between the transmitted and the received pulses to allocate new tracking tasks that might involve transmitting or receiving pulses, thus increasing the capacity of the system. The problem of interleaving N targets involves a search among N! possibilities, and suboptimal solutions are usually employed to satisfy the real-time constraints of the radar system. In this paper, we present new tight 0,1 integer programming models for the radar pulse interleaving problem and develop effective solution methods based on Lagrangian relaxation techniques. © 2003 Wiley Periodicals, Inc. Naval Research Logistics, 2004. [source] Mathematical models to reconstruct phylogenetic trees under the minimum evolution criterionNETWORKS: AN INTERNATIONAL JOURNAL, Issue 2 2009Daniele Catanzaro Abstract A basic problem in molecular biology is to rebuild phylogenetic trees (PT) from a set of DNA or protein sequences. Among different criteria used for this purpose, the minimum evolution criterion is an optimality based criterion aiming to rebuild PT characterized by a minimal length. This problem is known to be ,,,,-hard. We introduce in this article some mixed integer programming models, and we also study possible cuts and lower bounds for the optimal value. So far, the number of sequences that can be involved in optimal phylogenetic reconstruction is still limited to 10. © 2008 Wiley Periodicals, Inc. NETWORKS, 2009 [source] The 2-path network problemNETWORKS: AN INTERNATIONAL JOURNAL, Issue 3 2004Geir Dahl Abstract Given a graph with nonnegative edge weights and a set D of node pairs, the 2- path network problem requires a minimum weight set of edges such that the induced subgraph contains a path with one or two edges connecting each pair in D. The problem is NP -hard. We present two integer programming models for the problem and study properties of associated polytopes, including cutting planes. Two approximation algorithms are suggested and analyzed. Some computational experience is reported. © 2004 Wiley Periodicals, Inc. [source] |