86 lines
7.5 KiB
TeX
86 lines
7.5 KiB
TeX
\relax
|
|
\providecommand\hyper@newdestlabel[2]{}
|
|
\providecommand\babel@aux[2]{}
|
|
\@nameuse{bbl@beforestart}
|
|
\providecommand\HyperFirstAtBeginDocument{\AtBeginDocument}
|
|
\HyperFirstAtBeginDocument{\ifx\hyper@anchor\@undefined
|
|
\global\let\oldcontentsline\contentsline
|
|
\gdef\contentsline#1#2#3#4{\oldcontentsline{#1}{#2}{#3}}
|
|
\global\let\oldnewlabel\newlabel
|
|
\gdef\newlabel#1#2{\newlabelxx{#1}#2}
|
|
\gdef\newlabelxx#1#2#3#4#5#6{\oldnewlabel{#1}{{#2}{#3}}}
|
|
\AtEndDocument{\ifx\hyper@anchor\@undefined
|
|
\let\contentsline\oldcontentsline
|
|
\let\newlabel\oldnewlabel
|
|
\fi}
|
|
\fi}
|
|
\global\let\hyper@last\relax
|
|
\gdef\HyperFirstAtBeginDocument#1{#1}
|
|
\providecommand\HyField@AuxAddToFields[1]{}
|
|
\providecommand\HyField@AuxAddToCoFields[2]{}
|
|
\citation{pacheco_introduction_2011}
|
|
\citation{li_concurrency_2019}
|
|
\citation{9150145}
|
|
\citation{7087377}
|
|
\babel@aux{nil}{}
|
|
\@writefile{toc}{\contentsline {section}{\numberline {I}Introduction}{1}{section.1}\protected@file@percent }
|
|
\@writefile{toc}{\contentsline {section}{\numberline {II}Related Works}{1}{section.2}\protected@file@percent }
|
|
\@writefile{toc}{\contentsline {section}{\numberline {III}Necessary Components}{1}{section.3}\protected@file@percent }
|
|
\@writefile{toc}{\contentsline {subsection}{\numberline {\mbox {III-A}}Serialization}{1}{subsection.3.1}\protected@file@percent }
|
|
\@writefile{toc}{\contentsline {section}{\numberline {IV}Implementation of the Tasking Approach}{1}{section.4}\protected@file@percent }
|
|
\newlabel{sec:Tasking-Approach}{{IV}{1}{Implementation of the Tasking Approach}{section.4}{}}
|
|
\@writefile{toc}{\contentsline {subsection}{\numberline {\mbox {IV-A}}Algorithm Design}{1}{subsection.4.1}\protected@file@percent }
|
|
\@writefile{lof}{\contentsline {figure}{\numberline {1}{\ignorespaces Task Overview of the Attack and Compliance Graph Generation Process}}{2}{figure.1}\protected@file@percent }
|
|
\newlabel{fig:tasks}{{1}{2}{Task Overview of the Attack and Compliance Graph Generation Process}{figure.1}{}}
|
|
\@writefile{toc}{\contentsline {subsection}{\numberline {\mbox {IV-B}}Communication Structure}{2}{subsection.4.2}\protected@file@percent }
|
|
\@writefile{lof}{\contentsline {figure}{\numberline {2}{\ignorespaces Node Allocation for each Task}}{2}{figure.2}\protected@file@percent }
|
|
\newlabel{fig:node-alloc}{{2}{2}{Node Allocation for each Task}{figure.2}{}}
|
|
\@writefile{toc}{\contentsline {subsection}{\numberline {\mbox {IV-C}}Task Breakdown}{2}{subsection.4.3}\protected@file@percent }
|
|
\@writefile{toc}{\contentsline {subsubsection}{\numberline {\mbox {IV-C}1}Task 0}{2}{subsubsection.4.3.1}\protected@file@percent }
|
|
\@writefile{toc}{\contentsline {subsubsection}{\numberline {\mbox {IV-C}2}Task 1}{2}{subsubsection.4.3.2}\protected@file@percent }
|
|
\@writefile{lof}{\contentsline {figure}{\numberline {3}{\ignorespaces Data Distribution of Task One}}{3}{figure.3}\protected@file@percent }
|
|
\newlabel{fig:Task1-Data-Dist}{{3}{3}{Data Distribution of Task One}{figure.3}{}}
|
|
\@writefile{lof}{\contentsline {figure}{\numberline {4}{\ignorespaces Communication From Task 1 to Task 2 when the Number of Nodes Allocated is Equal}}{3}{figure.4}\protected@file@percent }
|
|
\newlabel{fig:Task1-Case1}{{4}{3}{Communication From Task 1 to Task 2 when the Number of Nodes Allocated is Equal}{figure.4}{}}
|
|
\@writefile{toc}{\contentsline {subsubsection}{\numberline {\mbox {IV-C}3}Task 2}{3}{subsubsection.4.3.3}\protected@file@percent }
|
|
\@writefile{lof}{\contentsline {figure}{\numberline {5}{\ignorespaces Task 1 to Task 2 Communication, Case 2}}{3}{figure.5}\protected@file@percent }
|
|
\newlabel{fig:Task1-Case2}{{5}{3}{Task 1 to Task 2 Communication, Case 2}{figure.5}{}}
|
|
\@writefile{toc}{\contentsline {subsubsection}{\numberline {\mbox {IV-C}4}Task 3}{3}{subsubsection.4.3.4}\protected@file@percent }
|
|
\newlabel{sec:T4T5}{{\mbox {IV-C}5}{3}{Task 4 and Task 5}{subsubsection.4.3.5}{}}
|
|
\@writefile{toc}{\contentsline {subsubsection}{\numberline {\mbox {IV-C}5}Task 4 and Task 5}{3}{subsubsection.4.3.5}\protected@file@percent }
|
|
\@writefile{toc}{\contentsline {subsection}{\numberline {\mbox {IV-D}}MPI Tags}{3}{subsection.4.4}\protected@file@percent }
|
|
\newlabel{sec:tasking-tag}{{\mbox {IV-D}}{3}{MPI Tags}{subsection.4.4}{}}
|
|
\@writefile{lot}{\contentsline {table}{\numberline {I}{\ignorespaces MPI Tags for the MPI Tasking Approach}}{4}{table.1}\protected@file@percent }
|
|
\newlabel{table:tasking-tag}{{I}{4}{MPI Tags for the MPI Tasking Approach}{table.1}{}}
|
|
\@writefile{toc}{\contentsline {section}{\numberline {V}Performance Expectations and Use Cases}{4}{section.5}\protected@file@percent }
|
|
\newlabel{sec:Task-perf-expec}{{V}{4}{Performance Expectations and Use Cases}{section.5}{}}
|
|
\@writefile{toc}{\contentsline {section}{\numberline {VI}Experimental Setup}{4}{section.6}\protected@file@percent }
|
|
\@writefile{lot}{\contentsline {table}{\numberline {II}{\ignorespaces Task Descriptions and Performance Notes}}{4}{table.2}\protected@file@percent }
|
|
\newlabel{table:tasking-gen-perf}{{II}{4}{Task Descriptions and Performance Notes}{table.2}{}}
|
|
\@writefile{toc}{\contentsline {subsection}{\numberline {\mbox {VI-A}}Number of Exploits}{4}{subsection.6.1}\protected@file@percent }
|
|
\@writefile{toc}{\contentsline {subsection}{\numberline {\mbox {VI-B}}Applicability of Exploits}{4}{subsection.6.2}\protected@file@percent }
|
|
\@writefile{toc}{\contentsline {subsection}{\numberline {\mbox {VI-C}}Database Load}{4}{subsection.6.3}\protected@file@percent }
|
|
\@writefile{toc}{\contentsline {subsection}{\numberline {\mbox {VI-D}}Testing Platform}{4}{subsection.6.4}\protected@file@percent }
|
|
\@writefile{toc}{\contentsline {section}{\numberline {VII}Results}{4}{section.7}\protected@file@percent }
|
|
\newlabel{sec:Tasking-Results}{{VII}{4}{Results}{section.7}{}}
|
|
\bibdata{Bibliography}
|
|
\bibcite{pacheco_introduction_2011}{1}
|
|
\@writefile{lof}{\contentsline {figure}{\numberline {6}{\ignorespaces Example of a Not Applicable Exploit for the MPI Tasking Testing}}{5}{figure.6}\protected@file@percent }
|
|
\newlabel{fig:NA-exp}{{6}{5}{Example of a Not Applicable Exploit for the MPI Tasking Testing}{figure.6}{}}
|
|
\@writefile{lof}{\contentsline {figure}{\numberline {7}{\ignorespaces Speedup and Efficiency of the MPI Tasking Approach for a Varying Number of Compute Nodes with an Increasing Problem Size}}{5}{figure.7}\protected@file@percent }
|
|
\newlabel{fig:Spd-Eff-Task}{{7}{5}{Speedup and Efficiency of the MPI Tasking Approach for a Varying Number of Compute Nodes with an Increasing Problem Size}{figure.7}{}}
|
|
\@writefile{lof}{\contentsline {figure}{\numberline {8}{\ignorespaces MPI Tasking Approach Runtime Results}}{5}{figure.8}\protected@file@percent }
|
|
\newlabel{fig:Tasking-RT}{{8}{5}{MPI Tasking Approach Runtime Results}{figure.8}{}}
|
|
\@writefile{lof}{\contentsline {figure}{\numberline {9}{\ignorespaces Results for the MPI Tasking Approach in Terms of Speedup}}{5}{figure.9}\protected@file@percent }
|
|
\newlabel{fig:Tasking-Spd}{{9}{5}{Results for the MPI Tasking Approach in Terms of Speedup}{figure.9}{}}
|
|
\@writefile{lof}{\contentsline {figure}{\numberline {10}{\ignorespaces Results for the MPI Tasking Approach in Terms of Efficiency}}{5}{figure.10}\protected@file@percent }
|
|
\newlabel{fig:Tasking-Eff}{{10}{5}{Results for the MPI Tasking Approach in Terms of Efficiency}{figure.10}{}}
|
|
\bibcite{li_concurrency_2019}{2}
|
|
\bibcite{9150145}{3}
|
|
\bibcite{7087377}{4}
|
|
\bibstyle{ieeetr}
|
|
\@writefile{toc}{\contentsline {section}{\numberline {VIII}Analysis}{6}{section.8}\protected@file@percent }
|
|
\@writefile{toc}{\contentsline {section}{\numberline {IX}Conclusion}{6}{section.9}\protected@file@percent }
|
|
\@writefile{toc}{\contentsline {section}{References}{6}{section*.1}\protected@file@percent }
|
|
\gdef \@abspage@last{6}
|