2011 IEEE Ninth International Conference on Dependable, Autonomic and Secure Computing 2011
DOI: 10.1109/dasc.2011.78
|View full text |Cite
|
Sign up to set email alerts
|

Analysis of Power-Saving Techniques over a Large Multi-use Cluster

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
21
0

Year Published

2012
2012
2017
2017

Publication Types

Select...
4
2
1

Relationship

5
2

Authors

Journals

citations
Cited by 12 publications
(21 citation statements)
references
References 8 publications
0
21
0
Order By: Relevance
“…Under this situation we seek to record the number of good jobs which have been incorrectly terminated and minimise the number of such circumstances. This reduction can be achieved by looking at the conditions under which jobs have been evicted [59] or providing dedicated resources for jobs which have been evicted [64].…”
Section: Metricsmentioning
confidence: 99%
“…Under this situation we seek to record the number of good jobs which have been incorrectly terminated and minimise the number of such circumstances. This reduction can be achieved by looking at the conditions under which jobs have been evicted [59] or providing dedicated resources for jobs which have been evicted [64].…”
Section: Metricsmentioning
confidence: 99%
“…C2: Targeting less used computers [6]. By selecting resources with longer idle times between users reduces the chance that a task will be deallocated due to preemption.…”
Section: X0mentioning
confidence: 99%
“…We have extended our cluster based simulation for Condor [6] to take account of the data transfer times. The iperf bandwidth testing software [17] was used to compute the maximum bandwidths available between computers for different payload sizes.…”
Section: Simulation Modelmentioning
confidence: 99%
See 1 more Smart Citation
“…In either case such probability models normally lack the fidelity exhibited within real trace-logs. In prior work [19] we have generated synthetic trace-logs derived from statistical analysis of the HTCondor users at Newcastle University in order to upscale the system load. Although this generated data which matched the statistical characteristics of the original trace-log the newly generated data failed to exhibit the finer-grained characteristics of the original trace data.…”
Section: Introductionmentioning
confidence: 99%