Proceedings. The Sixth IEEE International Symposium on High Performance Distributed Computing (Cat. No.97TB100183)
DOI: 10.1109/hpdc.1997.626436
|View full text |Cite
|
Sign up to set email alerts
|

Lilith: Scalable execution of user code for distributed computing

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
7
0

Publication Types

Select...
5
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 7 publications
(7 citation statements)
references
References 1 publication
0
7
0
Order By: Relevance
“…For example, software multicast/reduction networks are crucial to scalable tool use [1,6,11,16]. The RM must be aware of and willing to launch this second kind of non-application entity.…”
Section: Figure 1: Remote Execution With Resource Manager and Run-timmentioning
confidence: 99%
“…For example, software multicast/reduction networks are crucial to scalable tool use [1,6,11,16]. The RM must be aware of and willing to launch this second kind of non-application entity.…”
Section: Figure 1: Remote Execution With Resource Manager and Run-timmentioning
confidence: 99%
“…Furthermore, the moderate fan-outs at each MRNet process allows data reductions to be pipelined as they pass through the network, keeping reduction throughput high as application size increases. The trends in MRNet's micro-benchmark scalability studies are perhaps to be expected; previous tool infrastructures using a hierarchy of processes such as the Ladebug parallel debugger [4] and Lilith [11] show similar scalability trends.…”
Section: Micro-benchmark Resultsmentioning
confidence: 88%
“…This type of communication structure has been examined previously (e.g., [3,11,17,20,21,25,28]). However, several features make MRNet especially wellsuited as a general facility for building scalable parallel tools: • Flexible organization.…”
Section: Introductionmentioning
confidence: 99%
“…Although there exist tools [7] to accomplish some of these tasks, they are either not scalable or rely on relatively weak security. We describe Lilith's functionality and API, present an example tool that capitalizes on Lilith's features, and discuss the security model under design.…”
Section: Introductionmentioning
confidence: 99%