First International Conference on E-Science and Grid Computing (E-Science'05)
DOI: 10.1109/e-science.2005.76
|View full text |Cite
|
Sign up to set email alerts
|

The Challenge of Volunteer Computing with Lengthy Climate Model Simulations

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

1
43
2
1

Publication Types

Select...
6
1

Relationship

1
6

Authors

Journals

citations
Cited by 49 publications
(47 citation statements)
references
References 6 publications
1
43
2
1
Order By: Relevance
“…In Table 1, we show the gains in throughput and the costs of using cliques in the computation of a task. We assume the following data (taken from our previous experiments and from [3]): 20 checkpoints of 20MB for task; 40-day computation (so we have a checkpoint on every two days on average); and failure-prone nodes fail 2.66 times during those 40 days (this number matches Figure 4). It should be noticed that the frequency at which we publish checkpoints can be made totally independent from the actual frequency at which nodes produce local checkpoints.…”
Section: A Simple Estimation Of Trade-offsmentioning
confidence: 99%
See 2 more Smart Citations
“…In Table 1, we show the gains in throughput and the costs of using cliques in the computation of a task. We assume the following data (taken from our previous experiments and from [3]): 20 checkpoints of 20MB for task; 40-day computation (so we have a checkpoint on every two days on average); and failure-prone nodes fail 2.66 times during those 40 days (this number matches Figure 4). It should be noticed that the frequency at which we publish checkpoints can be made totally independent from the actual frequency at which nodes produce local checkpoints.…”
Section: A Simple Estimation Of Trade-offsmentioning
confidence: 99%
“…If a worker fails to do so, it can be overrun by another worker. This can be combined with a Trickle mechanism [3] to give the appropriate credits to the right worker, when it reaches certain points in the computation. In this way, nodes can claim their credits as they go, they do not allow other nodes to steal their tasks, while at the same time, they can also claim ownership on a stalled task.…”
Section: Definition Of the Cliquesmentioning
confidence: 99%
See 1 more Smart Citation
“…However, such an attitude would increase the number of messages and consequently stress the supervisor network, possibly disturbing the whole system performance. A more realistic approach is to use the so-called trickle messages [25] to send checkpoint digests to the supervisor. A trickle message is sent by a worker to the supervisor and provides some status information about the worker.…”
Section: Comparing Replicated Checkpoint Hashesmentioning
confidence: 99%
“…The BBC CCE uses the CPDN distributed computing infrastructure described in Christensen et al (2005). The two principal differences between the slab and BBC CCE experiments are that the BBC CCE uses the model with fully dynamical ocean, HadCM3L, described earlier, and that it is run under transient forcing-historical forcings for the period 1920-2000 are Figure 1.…”
Section: Bbc Ccementioning
confidence: 99%