Grad School Edits

This commit is contained in:
Noah L. Schrick 2022-05-03 16:41:37 -05:00
parent 962a95a942
commit a0681d0046
19 changed files with 744 additions and 422 deletions

View File

@ -0,0 +1 @@
,noah,NovaArchSys,21.04.2022 19:39,file:///home/noah/.config/libreoffice/4;

View File

@ -1 +0,0 @@
,noah,NovaArchSys,20.04.2022 11:33,file:///home/noah/.config/libreoffice/4;

View File

@ -1,30 +1,31 @@
\relax
\providecommand\hyper@newdestlabel[2]{}
\citation{phillips_graph-based_1998}
\citation{schneier_modeling_1999}
\citation{ou_scalable_2006}
\citation{sheyner_automated_2002}
\citation{ou_scalable_2006}
\citation{zhang_boosting_2017}
\@writefile{toc}{\contentsline {chapter}{\numberline {CHAPTER 1: }{\bf \uppercase {INTRODUCTION}}}{1}{}\protected@file@percent }
\@writefile{toc}{\contentsline {section}{\numberline {1.1}\bf Introduction to Attack Graphs}{1}{}\protected@file@percent }
\newlabel{sec:Intro}{{1.1}{1}}
\@writefile{toc}{\contentsline {chapter}{\numberline {CHAPTER 1: }{\bf \uppercase {INTRODUCTION}}}{1}{chapter.1}\protected@file@percent }
\@writefile{toc}{\contentsline {section}{\numberline {1.1}\bf Introduction to Attack Graphs}{1}{section.1.1}\protected@file@percent }
\newlabel{sec:Intro}{{1.1}{1}{\bf Introduction to Attack Graphs}{section.1.1}{}}
\citation{j_hale_compliance_nodate}
\citation{baloyi_guidelines_2019}
\citation{allman_complying_2006}
\citation{j_hale_compliance_nodate}
\@writefile{toc}{\contentsline {section}{\numberline {1.2}\bf Application to Compliance}{2}{}\protected@file@percent }
\@writefile{toc}{\contentsline {subsection}{\numberline {1.2.1}\it Introduction to Compliance Graphs}{2}{}\protected@file@percent }
\@writefile{toc}{\contentsline {section}{\numberline {1.2}\bf Application to Compliance}{2}{section.1.2}\protected@file@percent }
\@writefile{toc}{\contentsline {subsection}{\numberline {1.2.1}\it Introduction to Compliance Graphs}{2}{subsection.1.2.1}\protected@file@percent }
\citation{j_hale_compliance_nodate}
\citation{noauthor_sarbanes-oxley_2002}
\citation{noauthor_health_1996}
\citation{EUdataregulations2018}
\citation{PCI}
\citation{cook_rage_2018}
\@writefile{toc}{\contentsline {subsection}{\numberline {1.2.2}\it Defining Compliance Graphs}{3}{}\protected@file@percent }
\newlabel{sec:CG-alter}{{1.2.2}{3}}
\@writefile{toc}{\contentsline {subsection}{\numberline {1.2.3}\it Difficulties of Compliance Graphs}{3}{}\protected@file@percent }
\newlabel{sec:CG-diff}{{1.2.3}{3}}
\@writefile{toc}{\contentsline {section}{\numberline {1.3}\bf Objectives and Contributions}{4}{}\protected@file@percent }
\@writefile{toc}{\contentsline {subsection}{\numberline {1.2.2}\it Defining Compliance Graphs}{3}{subsection.1.2.2}\protected@file@percent }
\newlabel{sec:CG-alter}{{1.2.2}{3}{\it Defining Compliance Graphs}{subsection.1.2.2}{}}
\@writefile{toc}{\contentsline {subsection}{\numberline {1.2.3}\it Difficulties of Compliance Graphs}{3}{subsection.1.2.3}\protected@file@percent }
\newlabel{sec:CG-diff}{{1.2.3}{3}{\it Difficulties of Compliance Graphs}{subsection.1.2.3}{}}
\@writefile{toc}{\contentsline {section}{\numberline {1.3}\bf Objectives and Contributions}{4}{section.1.3}\protected@file@percent }
\@setckpt{Chapter1}{
\setcounter{page}{5}
\setcounter{equation}{0}
@ -56,6 +57,10 @@
\setcounter{ALG@blocknr}{10}
\setcounter{ALG@storecount}{0}
\setcounter{ALG@tmpcounter}{0}
\setcounter{Item}{4}
\setcounter{Hfootnote}{0}
\setcounter{bookmark@seq@number}{13}
\setcounter{lofdepth}{1}
\setcounter{lotdepth}{1}
\setcounter{section@level}{1}
}

View File

@ -1,4 +1,5 @@
\relax
\providecommand\hyper@newdestlabel[2]{}
\citation{berry_graph_2007}
\citation{berry_graph_2007}
\citation{zhang_boosting_2017}
@ -9,10 +10,10 @@
\citation{yao_efficient_2018}
\citation{zhang_boosting_2017}
\citation{dai_fpgp_2016}
\@writefile{toc}{\contentsline {chapter}{\numberline {CHAPTER 2: }{\bf \uppercase {RELATED WORKS}}}{5}{}\protected@file@percent }
\@writefile{toc}{\contentsline {section}{\numberline {2.1}\bf Introduction to Graph Generation}{5}{}\protected@file@percent }
\@writefile{toc}{\contentsline {section}{\numberline {2.2}\bf Graph Generation Improvements}{5}{}\protected@file@percent }
\newlabel{sec:gen_improv}{{2.2}{5}}
\@writefile{toc}{\contentsline {chapter}{\numberline {CHAPTER 2: }{\bf \uppercase {RELATED WORKS}}}{5}{chapter.2}\protected@file@percent }
\@writefile{toc}{\contentsline {section}{\numberline {2.1}\bf Introduction to Graph Generation}{5}{section.2.1}\protected@file@percent }
\@writefile{toc}{\contentsline {section}{\numberline {2.2}\bf Graph Generation Improvements}{5}{section.2.2}\protected@file@percent }
\newlabel{sec:gen_improv}{{2.2}{5}{\bf Graph Generation Improvements}{section.2.2}{}}
\citation{arifuzzaman_fast_2015}
\citation{yu_construction_2018}
\citation{liakos_memory-optimized_2016}
@ -24,8 +25,8 @@
\citation{ou_scalable_2006}
\citation{cook_scalable_2016}
\citation{li_concurrency_2019}
\@writefile{toc}{\contentsline {section}{\numberline {2.3}\bf Improvements Specific to Attack Graph Generation}{6}{}\protected@file@percent }
\newlabel{sec:related_works}{{2.3}{6}}
\@writefile{toc}{\contentsline {section}{\numberline {2.3}\bf Improvements Specific to Attack Graph Generation}{6}{section.2.3}\protected@file@percent }
\newlabel{sec:related_works}{{2.3}{6}{\bf Improvements Specific to Attack Graph Generation}{section.2.3}{}}
\citation{li_concurrency_2019}
\citation{9150145}
\citation{7087377}
@ -60,6 +61,10 @@
\setcounter{ALG@blocknr}{10}
\setcounter{ALG@storecount}{0}
\setcounter{ALG@tmpcounter}{0}
\setcounter{Item}{4}
\setcounter{Hfootnote}{0}
\setcounter{bookmark@seq@number}{17}
\setcounter{lofdepth}{1}
\setcounter{lotdepth}{1}
\setcounter{section@level}{1}
}

View File

@ -1,25 +1,29 @@
\relax
\providecommand\hyper@newdestlabel[2]{}
\citation{Graphviz}
\@writefile{toc}{\contentsline {chapter}{\numberline {CHAPTER 3: }{\bf \uppercase {UTILITY EXTENSIONS TO THE RAGE ATTACK GRAPH GENERATOR}}}{8}{}\protected@file@percent }
\@writefile{toc}{\contentsline {section}{\numberline {3.1}\bf Path Walking}{8}{}\protected@file@percent }
\newlabel{sec:PW}{{3.1}{8}}
\@writefile{lof}{\contentsline {figure}{\numberline {3.1}{\ignorespaces Path Walking to State 14\relax }}{9}{}\protected@file@percent }
\@writefile{toc}{\contentsline {chapter}{\numberline {CHAPTER 3: }{\bf \uppercase {UTILITY EXTENSIONS TO THE RAGE ATTACK GRAPH GENERATOR}}}{8}{chapter.3}\protected@file@percent }
\@writefile{toc}{\contentsline {section}{\numberline {3.1}\bf Path Walking}{8}{section.3.1}\protected@file@percent }
\newlabel{sec:PW}{{3.1}{8}{\bf Path Walking}{section.3.1}{}}
\@writefile{lof}{\contentsline {figure}{\numberline {3.1}{\ignorespaces Path Walking to State 14\relax }}{9}{figure.caption.1}\protected@file@percent }
\providecommand*\caption@xref[2]{\@setref\relax\@undefined{#1}}
\newlabel{fig:PW}{{3.1}{9}}
\@writefile{toc}{\contentsline {section}{\numberline {3.2}\bf Color Coding}{9}{}\protected@file@percent }
\newlabel{fig:PW}{{3.1}{9}{Path Walking to State 14\relax }{figure.caption.1}{}}
\@writefile{toc}{\contentsline {section}{\numberline {3.2}\bf Color Coding}{9}{section.3.2}\protected@file@percent }
\@writefile{lof}{\contentsline {figure}{\numberline {3.2}{\ignorespaces Color Coding a Small Network Based on Violations\relax }}{10}{figure.caption.2}\protected@file@percent }
\newlabel{fig:CC}{{3.2}{10}{Color Coding a Small Network Based on Violations\relax }{figure.caption.2}{}}
\citation{nichols_2018}
\citation{cook_rage_2018}
\@writefile{lof}{\contentsline {figure}{\numberline {3.2}{\ignorespaces Color Coding a Small Network Based on Violations\relax }}{10}{}\protected@file@percent }
\newlabel{fig:CC}{{3.2}{10}}
\@writefile{toc}{\contentsline {section}{\numberline {3.3}\bf Compound Operators}{10}{}\protected@file@percent }
\newlabel{sec:compops}{{3.3}{10}}
\citation{cook_rage_2018}
\@writefile{toc}{\contentsline {section}{\numberline {3.3}\bf Compound Operators}{11}{section.3.3}\protected@file@percent }
\newlabel{sec:compops}{{3.3}{11}{\bf Compound Operators}{section.3.3}{}}
\citation{CVE-2019-10747}
\@writefile{toc}{\contentsline {section}{\numberline {3.4}\bf Relational Operators}{12}{}\protected@file@percent }
\newlabel{sec:relops}{{3.4}{12}}
\@writefile{toc}{\contentsline {section}{\numberline {3.4}\bf Relational Operators}{12}{section.3.4}\protected@file@percent }
\newlabel{sec:relops}{{3.4}{12}{\bf Relational Operators}{section.3.4}{}}
\citation{nichols_2018}
\citation{cook_rage_2018}
\citation{cook_rage_2018}
\@writefile{toc}{\contentsline {section}{\numberline {3.5}\bf Intermediate Database Storage}{13}{section.3.5}\protected@file@percent }
\newlabel{sec:db-stor}{{3.5}{13}{\bf Intermediate Database Storage}{section.3.5}{}}
\@writefile{toc}{\contentsline {subsection}{\numberline {3.5.1}\it Introduction to Intermediate Database Storage}{13}{subsection.3.5.1}\protected@file@percent }
\citation{cook_rage_2018}
\citation{li_concurrency_2019}
\citation{li_combining_2019}
@ -27,13 +31,10 @@
\citation{ainsworth_graph_2016}
\citation{berry_graph_2007}
\citation{cook_rage_2018}
\@writefile{toc}{\contentsline {section}{\numberline {3.5}\bf Intermediate Database Storage}{13}{}\protected@file@percent }
\newlabel{sec:db-stor}{{3.5}{13}}
\@writefile{toc}{\contentsline {subsection}{\numberline {3.5.1}\it Introduction to Intermediate Database Storage}{13}{}\protected@file@percent }
\@writefile{toc}{\contentsline {subsection}{\numberline {3.5.2}\it Memory Constraint Difficulties}{13}{}\protected@file@percent }
\citation{zhang_boosting_2017}
\@writefile{toc}{\contentsline {subsection}{\numberline {3.5.3}\it Maximizing Performance with Intermediate Database Storage}{15}{}\protected@file@percent }
\@writefile{toc}{\contentsline {subsection}{\numberline {3.5.4}\it Portability}{16}{}\protected@file@percent }
\@writefile{toc}{\contentsline {subsection}{\numberline {3.5.2}\it Memory Constraint Difficulties}{14}{subsection.3.5.2}\protected@file@percent }
\@writefile{toc}{\contentsline {subsection}{\numberline {3.5.3}\it Maximizing Performance with Intermediate Database Storage}{15}{subsection.3.5.3}\protected@file@percent }
\@writefile{toc}{\contentsline {subsection}{\numberline {3.5.4}\it Portability}{17}{subsection.3.5.4}\protected@file@percent }
\@setckpt{Chapter3}{
\setcounter{page}{18}
\setcounter{equation}{0}
@ -65,6 +66,10 @@
\setcounter{ALG@blocknr}{10}
\setcounter{ALG@storecount}{0}
\setcounter{ALG@tmpcounter}{0}
\setcounter{Item}{4}
\setcounter{Hfootnote}{0}
\setcounter{bookmark@seq@number}{27}
\setcounter{lofdepth}{1}
\setcounter{lotdepth}{1}
\setcounter{section@level}{2}
}

View File

@ -1,44 +1,45 @@
\relax
\@writefile{toc}{\contentsline {chapter}{\numberline {CHAPTER 4: }{\bf \uppercase {SYNCHRONOUS FIRING}}}{18}{}\protected@file@percent }
\newlabel{ch:Sync-Fire}{{4}{18}}
\@writefile{toc}{\contentsline {section}{\numberline {4.1}\bf Introduction}{18}{}\protected@file@percent }
\providecommand\hyper@newdestlabel[2]{}
\@writefile{toc}{\contentsline {chapter}{\numberline {CHAPTER 4: }{\bf \uppercase {SYNCHRONOUS FIRING}}}{18}{chapter.4}\protected@file@percent }
\newlabel{ch:Sync-Fire}{{4}{18}{\bf \uppercase \expandafter {SYNCHRONOUS FIRING}}{chapter.4}{}}
\@writefile{toc}{\contentsline {section}{\numberline {4.1}\bf Introduction}{18}{section.4.1}\protected@file@percent }
\citation{louthan_hybrid_2011}
\citation{louthan_hybrid_2011}
\citation{louthan_hybrid_2011}
\citation{louthan_hybrid_2011}
\citation{louthan_hybrid_2011}
\citation{cook_rage_2018}
\@writefile{lof}{\contentsline {figure}{\numberline {4.1}{\ignorespaces A network without Synchronous Firing generating infeasible states\relax }}{19}{}\protected@file@percent }
\newlabel{fig:non-sync_ex}{{4.1}{19}}
\@writefile{toc}{\contentsline {subsection}{\numberline {4.1.1}\it Related Synchronous Firing Work}{19}{}\protected@file@percent }
\newlabel{sec:sync-lit}{{4.1.1}{19}}
\@writefile{lof}{\contentsline {figure}{\numberline {4.1}{\ignorespaces A network without Synchronous Firing generating infeasible states\relax }}{19}{figure.caption.3}\protected@file@percent }
\newlabel{fig:non-sync_ex}{{4.1}{19}{A network without Synchronous Firing generating infeasible states\relax }{figure.caption.3}{}}
\@writefile{toc}{\contentsline {subsection}{\numberline {4.1.1}\it Related Synchronous Firing Work}{19}{subsection.4.1.1}\protected@file@percent }
\newlabel{sec:sync-lit}{{4.1.1}{19}{\it Related Synchronous Firing Work}{subsection.4.1.1}{}}
\citation{cook_rage_2018}
\citation{louthan_hybrid_2011}
\@writefile{toc}{\contentsline {section}{\numberline {4.2}\bf Necessary Alterations and Additions}{20}{}\protected@file@percent }
\@writefile{toc}{\contentsline {subsection}{\numberline {4.2.1}\it GNU Bison and Flex}{20}{}\protected@file@percent }
\@writefile{toc}{\contentsline {subsection}{\numberline {4.2.2}\it PostgreSQL}{21}{}\protected@file@percent }
\@writefile{lof}{\contentsline {figure}{\numberline {4.2}{\ignorespaces Inclusion of Synchronous Firing into GNU Bison, GNU Flex, and the overall program\relax }}{22}{}\protected@file@percent }
\newlabel{fig:bison-flex}{{4.2}{22}}
\@writefile{toc}{\contentsline {subsection}{\numberline {4.2.3}\it Compound Operators}{22}{}\protected@file@percent }
\@writefile{toc}{\contentsline {subsection}{\numberline {4.2.4}\it Graph Generation}{22}{}\protected@file@percent }
\@writefile{toc}{\contentsline {section}{\numberline {4.3}\bf Experimental Networks and Results}{23}{}\protected@file@percent }
\newlabel{sec:test-platform}{{4.3}{23}}
\@writefile{toc}{\contentsline {subsection}{\numberline {4.3.1}\it Experimental Networks}{23}{}\protected@file@percent }
\newlabel{sec:Sync-Test}{{4.3.1}{23}}
\@writefile{lof}{\contentsline {figure}{\numberline {4.3}{\ignorespaces Synchronous Firing in the Graph Generation Process\relax }}{24}{}\protected@file@percent }
\newlabel{fig:sync-fire}{{4.3}{24}}
\@writefile{toc}{\contentsline {subsection}{\numberline {4.3.2}\it Results}{25}{}\protected@file@percent }
\newlabel{sec:Sync-Results}{{4.3.2}{25}}
\@writefile{lof}{\contentsline {figure}{\numberline {4.4}{\ignorespaces Bar Graph and Line Graph Representations of Synchronous Firing on Runtime\relax }}{26}{}\protected@file@percent }
\newlabel{fig:Sync-RT}{{4.4}{26}}
\@writefile{lof}{\contentsline {figure}{\numberline {4.5}{\ignorespaces Bar Graph and Line Graph Representations of Synchronous Firing on State Space\relax }}{27}{}\protected@file@percent }
\newlabel{fig:Sync-State}{{4.5}{27}}
\@writefile{lof}{\contentsline {figure}{\numberline {4.6}{\ignorespaces Speedup Obtained When Using Synchronous Firing\relax }}{27}{}\protected@file@percent }
\newlabel{fig:Sync-Spd}{{4.6}{27}}
\@writefile{lot}{\contentsline {table}{\numberline {4.1}{\ignorespaces Tabled Results for the Non-Synchronous Firing Testing\relax }}{28}{}\protected@file@percent }
\newlabel{table:NS-Table}{{4.1}{28}}
\@writefile{lot}{\contentsline {table}{\numberline {4.2}{\ignorespaces Tabled Results for the Synchronous Firing Testing\relax }}{28}{}\protected@file@percent }
\newlabel{table:S-Table}{{4.2}{28}}
\@writefile{toc}{\contentsline {section}{\numberline {4.2}\bf Necessary Alterations and Additions}{20}{section.4.2}\protected@file@percent }
\@writefile{toc}{\contentsline {subsection}{\numberline {4.2.1}\it GNU Bison and Flex}{20}{subsection.4.2.1}\protected@file@percent }
\@writefile{lof}{\contentsline {figure}{\numberline {4.2}{\ignorespaces Inclusion of Synchronous Firing into GNU Bison, GNU Flex, and the overall program\relax }}{22}{figure.caption.4}\protected@file@percent }
\newlabel{fig:bison-flex}{{4.2}{22}{Inclusion of Synchronous Firing into GNU Bison, GNU Flex, and the overall program\relax }{figure.caption.4}{}}
\@writefile{toc}{\contentsline {subsection}{\numberline {4.2.2}\it PostgreSQL}{22}{subsection.4.2.2}\protected@file@percent }
\@writefile{toc}{\contentsline {subsection}{\numberline {4.2.3}\it Compound Operators}{22}{subsection.4.2.3}\protected@file@percent }
\@writefile{toc}{\contentsline {subsection}{\numberline {4.2.4}\it Graph Generation}{23}{subsection.4.2.4}\protected@file@percent }
\@writefile{toc}{\contentsline {section}{\numberline {4.3}\bf Experimental Networks and Results}{23}{section.4.3}\protected@file@percent }
\newlabel{sec:test-platform}{{4.3}{23}{\bf Experimental Networks and Results}{section.4.3}{}}
\@writefile{lof}{\contentsline {figure}{\numberline {4.3}{\ignorespaces Synchronous Firing in the Graph Generation Process\relax }}{24}{figure.caption.5}\protected@file@percent }
\newlabel{fig:sync-fire}{{4.3}{24}{Synchronous Firing in the Graph Generation Process\relax }{figure.caption.5}{}}
\@writefile{toc}{\contentsline {subsection}{\numberline {4.3.1}\it Experimental Networks}{25}{subsection.4.3.1}\protected@file@percent }
\newlabel{sec:Sync-Test}{{4.3.1}{25}{\it Experimental Networks}{subsection.4.3.1}{}}
\@writefile{toc}{\contentsline {subsection}{\numberline {4.3.2}\it Results}{26}{subsection.4.3.2}\protected@file@percent }
\newlabel{sec:Sync-Results}{{4.3.2}{26}{\it Results}{subsection.4.3.2}{}}
\@writefile{lot}{\contentsline {table}{\numberline {4.1}{\ignorespaces Tabled Results for the Non-Synchronous Firing Testing\relax }}{26}{table.caption.9}\protected@file@percent }
\newlabel{table:NS-Table}{{4.1}{26}{Tabled Results for the Non-Synchronous Firing Testing\relax }{table.caption.9}{}}
\@writefile{lof}{\contentsline {figure}{\numberline {4.4}{\ignorespaces Synchronous Firing on Runtime}}{27}{figure.caption.6}\protected@file@percent }
\newlabel{fig:Sync-RT}{{4.4}{27}{Synchronous Firing on Runtime}{figure.caption.6}{}}
\@writefile{lot}{\contentsline {table}{\numberline {4.2}{\ignorespaces Tabled Results for the Synchronous Firing Testing\relax }}{27}{table.caption.10}\protected@file@percent }
\newlabel{table:S-Table}{{4.2}{27}{Tabled Results for the Synchronous Firing Testing\relax }{table.caption.10}{}}
\@writefile{lof}{\contentsline {figure}{\numberline {4.5}{\ignorespaces Bar Graph and Line Graph Representations of Synchronous Firing on State Space\relax }}{28}{figure.caption.7}\protected@file@percent }
\newlabel{fig:Sync-State}{{4.5}{28}{Bar Graph and Line Graph Representations of Synchronous Firing on State Space\relax }{figure.caption.7}{}}
\@writefile{lof}{\contentsline {figure}{\numberline {4.6}{\ignorespaces Speedup Obtained When Using Synchronous Firing\relax }}{28}{figure.caption.8}\protected@file@percent }
\newlabel{fig:Sync-Spd}{{4.6}{28}{Speedup Obtained When Using Synchronous Firing\relax }{figure.caption.8}{}}
\@setckpt{Chapter4}{
\setcounter{page}{29}
\setcounter{equation}{0}
@ -70,6 +71,10 @@
\setcounter{ALG@blocknr}{10}
\setcounter{ALG@storecount}{0}
\setcounter{ALG@tmpcounter}{0}
\setcounter{Item}{4}
\setcounter{Hfootnote}{0}
\setcounter{bookmark@seq@number}{38}
\setcounter{lofdepth}{1}
\setcounter{lotdepth}{1}
\setcounter{section@level}{2}
}

View File

@ -122,7 +122,7 @@ Using the testing setup described in Section \ref{sec:Sync-Test} on the platform
\centering
\includegraphics[width=\linewidth]{"./Chapter4_img/Sync-Runtime-Bar.png"}
\includegraphics[width=\linewidth]{"./Chapter4_img/Sync-Runtime.png"}
\caption{Bar Graph and Line Graph Representations of Synchronous Firing on Runtime}
\caption[Synchronous Firing on Runtime]{Bar Graph and Line Graph Representations of Synchronous Firing on Runtime}
\label{fig:Sync-RT}
\end{figure}

View File

@ -1,93 +1,94 @@
\relax
\providecommand\hyper@newdestlabel[2]{}
\citation{pacheco_introduction_2011}
\@writefile{toc}{\contentsline {chapter}{\numberline {CHAPTER 5: }{\bf \uppercase {Parallelization Using MESSAGE PASSING INTERFACE}}}{29}{}\protected@file@percent }
\newlabel{ch:MPI}{{5}{29}}
\@writefile{toc}{\contentsline {section}{\numberline {5.1}\bf Introduction to MPI Utilization for Attack and Compliance Graph Generation}{29}{}\protected@file@percent }
\@writefile{toc}{\contentsline {section}{\numberline {5.2}\bf Necessary Components}{29}{}\protected@file@percent }
\@writefile{toc}{\contentsline {subsection}{\numberline {5.2.1}\it Serialization}{29}{}\protected@file@percent }
\@writefile{toc}{\contentsline {chapter}{\numberline {CHAPTER 5: }{\bf \uppercase {Parallelization Using MESSAGE PASSING INTERFACE}}}{29}{chapter.5}\protected@file@percent }
\newlabel{ch:MPI}{{5}{29}{\bf \uppercase \expandafter {Parallelization Using MESSAGE PASSING INTERFACE}}{chapter.5}{}}
\@writefile{toc}{\contentsline {section}{\numberline {5.1}\bf Introduction to MPI Utilization for Attack and Compliance Graph Generation}{29}{section.5.1}\protected@file@percent }
\@writefile{toc}{\contentsline {section}{\numberline {5.2}\bf Necessary Components}{29}{section.5.2}\protected@file@percent }
\@writefile{toc}{\contentsline {subsection}{\numberline {5.2.1}\it Serialization}{29}{subsection.5.2.1}\protected@file@percent }
\citation{li_concurrency_2019}
\citation{9150145}
\citation{7087377}
\@writefile{toc}{\contentsline {section}{\numberline {5.3}\bf Tasking Approach}{30}{}\protected@file@percent }
\newlabel{sec:Tasking-Approach}{{5.3}{30}}
\@writefile{toc}{\contentsline {subsection}{\numberline {5.3.1}\it Introduction to the Tasking Approach}{30}{}\protected@file@percent }
\@writefile{lof}{\contentsline {figure}{\numberline {5.1}{\ignorespaces Task Overview of the Attack and Compliance Graph Generation Process\relax }}{31}{}\protected@file@percent }
\newlabel{fig:tasks}{{5.1}{31}}
\@writefile{toc}{\contentsline {subsection}{\numberline {5.3.2}\it Algorithm Design}{32}{}\protected@file@percent }
\@writefile{lof}{\contentsline {figure}{\numberline {5.2}{\ignorespaces Node Allocation for each Task\relax }}{33}{}\protected@file@percent }
\newlabel{fig:node-alloc}{{5.2}{33}}
\@writefile{toc}{\contentsline {subsubsection}{\numberline {5.3.2.1}Communication Structure}{34}{}\protected@file@percent }
\@writefile{toc}{\contentsline {subsubsection}{\numberline {5.3.2.2}Task 0}{34}{}\protected@file@percent }
\@writefile{toc}{\contentsline {subsubsection}{\numberline {5.3.2.3}Task 1}{34}{}\protected@file@percent }
\@writefile{lof}{\contentsline {figure}{\numberline {5.3}{\ignorespaces Data Distribution of Task One\relax }}{35}{}\protected@file@percent }
\newlabel{fig:Task1-Data-Dist}{{5.3}{35}}
\@writefile{toc}{\contentsline {subsubsection}{\numberline {5.3.2.4}Task 2}{35}{}\protected@file@percent }
\@writefile{lof}{\contentsline {figure}{\numberline {5.4}{\ignorespaces Communication From Task 1 to Task 2 when the Number of Nodes Allocated is Equal\relax }}{36}{}\protected@file@percent }
\newlabel{fig:Task1-Case1}{{5.4}{36}}
\@writefile{lof}{\contentsline {figure}{\numberline {5.5}{\ignorespaces Communication From Task 1 to Task 2 when Task 1 Has More Nodes Allocated\relax }}{37}{}\protected@file@percent }
\newlabel{fig:Task1-Case2}{{5.5}{37}}
\@writefile{toc}{\contentsline {subsubsection}{\numberline {5.3.2.5}Task 3}{37}{}\protected@file@percent }
\@writefile{toc}{\contentsline {subsubsection}{\numberline {5.3.2.6}Task 4 and Task 5}{37}{}\protected@file@percent }
\newlabel{sec:T4T5}{{5.3.2.6}{37}}
\@writefile{toc}{\contentsline {subsubsection}{\numberline {5.3.2.7}MPI Tags}{38}{}\protected@file@percent }
\newlabel{sec:tasking-tag}{{5.3.2.7}{38}}
\@writefile{toc}{\contentsline {subsection}{\numberline {5.3.3}\it Performance Expectations and Use Cases}{38}{}\protected@file@percent }
\newlabel{sec:Task-perf-expec}{{5.3.3}{38}}
\@writefile{lot}{\contentsline {table}{\numberline {5.1}{\ignorespaces MPI Tags for the MPI Tasking Approach\relax }}{39}{}\protected@file@percent }
\newlabel{table:tasking-tag}{{5.1}{39}}
\@writefile{toc}{\contentsline {subsection}{\numberline {5.3.4}\it Results}{39}{}\protected@file@percent }
\newlabel{sec:Tasking-Results}{{5.3.4}{39}}
\@writefile{lof}{\contentsline {figure}{\numberline {5.6}{\ignorespaces Example of a Not Applicable Exploit for the MPI Tasking Testing\relax }}{41}{}\protected@file@percent }
\newlabel{fig:NA-exp}{{5.6}{41}}
\@writefile{lof}{\contentsline {figure}{\numberline {5.7}{\ignorespaces Speedup and Efficiency of the MPI Tasking Approach for a Varying Number of Compute Nodes with an Increasing Problem Size\relax }}{41}{}\protected@file@percent }
\newlabel{fig:Spd-Eff-Task}{{5.7}{41}}
\@writefile{lof}{\contentsline {figure}{\numberline {5.8}{\ignorespaces Results for the MPI Tasking Approach in Terms of Runtime in Milliseconds\relax }}{42}{}\protected@file@percent }
\newlabel{fig:Tasking-RT}{{5.8}{42}}
\@writefile{lof}{\contentsline {figure}{\numberline {5.9}{\ignorespaces Results for the MPI Tasking Approach in Terms of Speedup\relax }}{42}{}\protected@file@percent }
\newlabel{fig:Tasking-Spd}{{5.9}{42}}
\@writefile{lof}{\contentsline {figure}{\numberline {5.10}{\ignorespaces Results for the MPI Tasking Approach in Terms of Efficiency\relax }}{42}{}\protected@file@percent }
\newlabel{fig:Tasking-Eff}{{5.10}{42}}
\@writefile{toc}{\contentsline {section}{\numberline {5.3}\bf Tasking Approach}{30}{section.5.3}\protected@file@percent }
\newlabel{sec:Tasking-Approach}{{5.3}{30}{\bf Tasking Approach}{section.5.3}{}}
\@writefile{toc}{\contentsline {subsection}{\numberline {5.3.1}\it Introduction to the Tasking Approach}{30}{subsection.5.3.1}\protected@file@percent }
\@writefile{lof}{\contentsline {figure}{\numberline {5.1}{\ignorespaces Task Overview of the Attack and Compliance Graph Generation Process\relax }}{31}{figure.caption.11}\protected@file@percent }
\newlabel{fig:tasks}{{5.1}{31}{Task Overview of the Attack and Compliance Graph Generation Process\relax }{figure.caption.11}{}}
\@writefile{toc}{\contentsline {subsection}{\numberline {5.3.2}\it Algorithm Design}{32}{subsection.5.3.2}\protected@file@percent }
\@writefile{lof}{\contentsline {figure}{\numberline {5.2}{\ignorespaces Node Allocation for each Task\relax }}{33}{figure.caption.12}\protected@file@percent }
\newlabel{fig:node-alloc}{{5.2}{33}{Node Allocation for each Task\relax }{figure.caption.12}{}}
\@writefile{toc}{\contentsline {subsubsection}{\numberline {5.3.2.1}Communication Structure}{34}{subsubsection.5.3.2.1}\protected@file@percent }
\@writefile{toc}{\contentsline {subsubsection}{\numberline {5.3.2.2}Task 0}{34}{subsubsection.5.3.2.2}\protected@file@percent }
\@writefile{toc}{\contentsline {subsubsection}{\numberline {5.3.2.3}Task 1}{34}{subsubsection.5.3.2.3}\protected@file@percent }
\@writefile{lof}{\contentsline {figure}{\numberline {5.3}{\ignorespaces Data Distribution of Task One\relax }}{35}{figure.caption.13}\protected@file@percent }
\newlabel{fig:Task1-Data-Dist}{{5.3}{35}{Data Distribution of Task One\relax }{figure.caption.13}{}}
\@writefile{toc}{\contentsline {subsubsection}{\numberline {5.3.2.4}Task 2}{35}{subsubsection.5.3.2.4}\protected@file@percent }
\@writefile{lof}{\contentsline {figure}{\numberline {5.4}{\ignorespaces Communication From Task 1 to Task 2 when the Number of Nodes Allocated is Equal\relax }}{36}{figure.caption.14}\protected@file@percent }
\newlabel{fig:Task1-Case1}{{5.4}{36}{Communication From Task 1 to Task 2 when the Number of Nodes Allocated is Equal\relax }{figure.caption.14}{}}
\@writefile{lof}{\contentsline {figure}{\numberline {5.5}{\ignorespaces Task 1 to Task 2 Communication, Case 2}}{37}{figure.caption.15}\protected@file@percent }
\newlabel{fig:Task1-Case2}{{5.5}{37}{Task 1 to Task 2 Communication, Case 2}{figure.caption.15}{}}
\@writefile{toc}{\contentsline {subsubsection}{\numberline {5.3.2.5}Task 3}{37}{subsubsection.5.3.2.5}\protected@file@percent }
\@writefile{toc}{\contentsline {subsubsection}{\numberline {5.3.2.6}Task 4 and Task 5}{38}{subsubsection.5.3.2.6}\protected@file@percent }
\newlabel{sec:T4T5}{{5.3.2.6}{38}{Task 4 and Task 5}{subsubsection.5.3.2.6}{}}
\@writefile{toc}{\contentsline {subsubsection}{\numberline {5.3.2.7}MPI Tags}{38}{subsubsection.5.3.2.7}\protected@file@percent }
\newlabel{sec:tasking-tag}{{5.3.2.7}{38}{MPI Tags}{subsubsection.5.3.2.7}{}}
\@writefile{toc}{\contentsline {subsection}{\numberline {5.3.3}\it Performance Expectations and Use Cases}{38}{subsection.5.3.3}\protected@file@percent }
\newlabel{sec:Task-perf-expec}{{5.3.3}{38}{\it Performance Expectations and Use Cases}{subsection.5.3.3}{}}
\@writefile{lot}{\contentsline {table}{\numberline {5.1}{\ignorespaces MPI Tags for the MPI Tasking Approach\relax }}{39}{table.caption.16}\protected@file@percent }
\newlabel{table:tasking-tag}{{5.1}{39}{MPI Tags for the MPI Tasking Approach\relax }{table.caption.16}{}}
\@writefile{toc}{\contentsline {subsection}{\numberline {5.3.4}\it Results}{39}{subsection.5.3.4}\protected@file@percent }
\newlabel{sec:Tasking-Results}{{5.3.4}{39}{\it Results}{subsection.5.3.4}{}}
\citation{li_concurrency_2019}
\@writefile{toc}{\contentsline {section}{\numberline {5.4}\bf Subgraphing Approach}{43}{}\protected@file@percent }
\newlabel{sec:Subgraphing_Approach}{{5.4}{43}}
\@writefile{toc}{\contentsline {subsection}{\numberline {5.4.1}\it Introduction to the Subgraphing Approach}{43}{}\protected@file@percent }
\@writefile{toc}{\contentsline {subsection}{\numberline {5.4.2}\it Algorithm Design}{43}{}\protected@file@percent }
\@writefile{lof}{\contentsline {figure}{\numberline {5.11}{\ignorespaces Example Graph Using the MPI Subgraphing Approach\relax }}{44}{}\protected@file@percent }
\newlabel{fig:subg}{{5.11}{44}}
\@writefile{toc}{\contentsline {subsubsection}{\numberline {5.4.2.1}Worker Nodes}{44}{}\protected@file@percent }
\@writefile{toc}{\contentsline {subsubsection}{\numberline {5.4.2.2}Root Node}{45}{}\protected@file@percent }
\@writefile{lof}{\contentsline {figure}{\numberline {5.12}{\ignorespaces Frontier Merging and Data Distribution Process\relax }}{46}{}\protected@file@percent }
\newlabel{fig:front-merg}{{5.12}{46}}
\@writefile{toc}{\contentsline {subsubsection}{\numberline {5.4.2.3}Database Node}{46}{}\protected@file@percent }
\@writefile{toc}{\contentsline {subsubsection}{\numberline {5.4.2.4}MPI Tags}{46}{}\protected@file@percent }
\@writefile{toc}{\contentsline {subsection}{\numberline {5.4.3}\it Performance Expectations and Use Cases}{46}{}\protected@file@percent }
\newlabel{sec:perf_expec_subg}{{5.4.3}{46}}
\@writefile{lot}{\contentsline {table}{\numberline {5.2}{\ignorespaces MPI Tags for the MPI Subgraphing Approach\relax }}{47}{}\protected@file@percent }
\newlabel{table:subg-tag}{{5.2}{47}}
\@writefile{toc}{\contentsline {subsection}{\numberline {5.4.4}\it Results}{47}{}\protected@file@percent }
\newlabel{sec:Subgraphing-Results}{{5.4.4}{47}}
\@writefile{lof}{\contentsline {figure}{\numberline {5.6}{\ignorespaces Example of a Not Applicable Exploit for the MPI Tasking Testing\relax }}{41}{figure.caption.17}\protected@file@percent }
\newlabel{fig:NA-exp}{{5.6}{41}{Example of a Not Applicable Exploit for the MPI Tasking Testing\relax }{figure.caption.17}{}}
\@writefile{toc}{\contentsline {section}{\numberline {5.4}\bf Subgraphing Approach}{41}{section.5.4}\protected@file@percent }
\newlabel{sec:Subgraphing_Approach}{{5.4}{41}{\bf Subgraphing Approach}{section.5.4}{}}
\@writefile{toc}{\contentsline {subsection}{\numberline {5.4.1}\it Introduction to the Subgraphing Approach}{41}{subsection.5.4.1}\protected@file@percent }
\@writefile{lof}{\contentsline {figure}{\numberline {5.7}{\ignorespaces Speedup and Efficiency of the MPI Tasking Approach for a Varying Number of Compute Nodes with an Increasing Problem Size\relax }}{42}{figure.caption.18}\protected@file@percent }
\newlabel{fig:Spd-Eff-Task}{{5.7}{42}{Speedup and Efficiency of the MPI Tasking Approach for a Varying Number of Compute Nodes with an Increasing Problem Size\relax }{figure.caption.18}{}}
\@writefile{lof}{\contentsline {figure}{\numberline {5.8}{\ignorespaces MPI Tasking Approach Runtime Results}}{43}{figure.caption.19}\protected@file@percent }
\newlabel{fig:Tasking-RT}{{5.8}{43}{MPI Tasking Approach Runtime Results}{figure.caption.19}{}}
\@writefile{lof}{\contentsline {figure}{\numberline {5.9}{\ignorespaces Results for the MPI Tasking Approach in Terms of Speedup\relax }}{43}{figure.caption.20}\protected@file@percent }
\newlabel{fig:Tasking-Spd}{{5.9}{43}{Results for the MPI Tasking Approach in Terms of Speedup\relax }{figure.caption.20}{}}
\@writefile{lof}{\contentsline {figure}{\numberline {5.10}{\ignorespaces Results for the MPI Tasking Approach in Terms of Efficiency\relax }}{43}{figure.caption.21}\protected@file@percent }
\newlabel{fig:Tasking-Eff}{{5.10}{43}{Results for the MPI Tasking Approach in Terms of Efficiency\relax }{figure.caption.21}{}}
\@writefile{toc}{\contentsline {subsection}{\numberline {5.4.2}\it Algorithm Design}{44}{subsection.5.4.2}\protected@file@percent }
\@writefile{toc}{\contentsline {subsubsection}{\numberline {5.4.2.1}Worker Nodes}{44}{subsubsection.5.4.2.1}\protected@file@percent }
\@writefile{lof}{\contentsline {figure}{\numberline {5.11}{\ignorespaces Example Graph Using the MPI Subgraphing Approach\relax }}{45}{figure.caption.22}\protected@file@percent }
\newlabel{fig:subg}{{5.11}{45}{Example Graph Using the MPI Subgraphing Approach\relax }{figure.caption.22}{}}
\@writefile{toc}{\contentsline {subsubsection}{\numberline {5.4.2.2}Root Node}{45}{subsubsection.5.4.2.2}\protected@file@percent }
\@writefile{lof}{\contentsline {figure}{\numberline {5.12}{\ignorespaces Frontier Merging and Data Distribution Process\relax }}{46}{figure.caption.23}\protected@file@percent }
\newlabel{fig:front-merg}{{5.12}{46}{Frontier Merging and Data Distribution Process\relax }{figure.caption.23}{}}
\@writefile{lot}{\contentsline {table}{\numberline {5.2}{\ignorespaces MPI Tags for the MPI Subgraphing Approach\relax }}{47}{table.caption.24}\protected@file@percent }
\newlabel{table:subg-tag}{{5.2}{47}{MPI Tags for the MPI Subgraphing Approach\relax }{table.caption.24}{}}
\@writefile{toc}{\contentsline {subsubsection}{\numberline {5.4.2.3}Database Node}{47}{subsubsection.5.4.2.3}\protected@file@percent }
\@writefile{toc}{\contentsline {subsubsection}{\numberline {5.4.2.4}MPI Tags}{47}{subsubsection.5.4.2.4}\protected@file@percent }
\@writefile{toc}{\contentsline {subsection}{\numberline {5.4.3}\it Performance Expectations and Use Cases}{47}{subsection.5.4.3}\protected@file@percent }
\newlabel{sec:perf_expec_subg}{{5.4.3}{47}{\it Performance Expectations and Use Cases}{subsection.5.4.3}{}}
\@writefile{toc}{\contentsline {subsection}{\numberline {5.4.4}\it Results}{48}{subsection.5.4.4}\protected@file@percent }
\newlabel{sec:Subgraphing-Results}{{5.4.4}{48}{\it Results}{subsection.5.4.4}{}}
\citation{lawrence_livermore_national_laboratory_mpip_nodate}
\@writefile{lof}{\contentsline {figure}{\numberline {5.13}{\ignorespaces First iteration results of MPI Subgraphing in terms of Runtime\relax }}{48}{}\protected@file@percent }
\newlabel{fig:Subg_base}{{5.13}{48}}
\@writefile{lof}{\contentsline {figure}{\numberline {5.14}{\ignorespaces First iteration results of MPI Subgraphing in terms of Speedup and Efficiency\relax }}{49}{}\protected@file@percent }
\newlabel{fig:Subg_SE}{{5.14}{49}}
\@writefile{lof}{\contentsline {figure}{\numberline {5.15}{\ignorespaces Modified Subgraphing Example Graph with Two New Edges\relax }}{51}{}\protected@file@percent }
\newlabel{fig:subg_mod}{{5.15}{51}}
\@writefile{lof}{\contentsline {figure}{\numberline {5.16}{\ignorespaces Duplicate States Explored vs Actual Number of States for the 1-4 Service Tests\relax }}{52}{}\protected@file@percent }
\newlabel{fig:subg_dup}{{5.16}{52}}
\@writefile{lot}{\contentsline {table}{\numberline {5.3}{\ignorespaces MPI Communication Time Percentage in Relation to the Overall Program Runtime for the 1 Service Test\relax }}{53}{}\protected@file@percent }
\newlabel{table:1_serv_comm}{{5.3}{53}}
\@writefile{toc}{\contentsline {subsection}{\numberline {5.4.5}\it Subgraphing Result Analysis}{53}{}\protected@file@percent }
\newlabel{sec:Subg_Discuss}{{5.4.5}{53}}
\@writefile{lof}{\contentsline {figure}{\numberline {5.17}{\ignorespaces Speedup and Efficiency of MPI Subgraphing when using a DHT\relax }}{54}{}\protected@file@percent }
\newlabel{fig:subg_DHT_Spd}{{5.17}{54}}
\@writefile{lof}{\contentsline {figure}{\numberline {5.18}{\ignorespaces Runtime of MPI Subgraphing when using a DHT vs not using a DHT\relax }}{55}{}\protected@file@percent }
\newlabel{fig:subg_DHT_base}{{5.18}{55}}
\@writefile{lot}{\contentsline {table}{\numberline {5.4}{\ignorespaces MPI Communication Time Percentage in Relation to the Overall Program Runtime for the 4 Service Test\relax }}{55}{}\protected@file@percent }
\newlabel{table:4_serv_comm}{{5.4}{55}}
\@writefile{lof}{\contentsline {figure}{\numberline {5.13}{\ignorespaces First iteration results of MPI Subgraphing in terms of Runtime\relax }}{49}{figure.caption.25}\protected@file@percent }
\newlabel{fig:Subg_base}{{5.13}{49}{First iteration results of MPI Subgraphing in terms of Runtime\relax }{figure.caption.25}{}}
\@writefile{lof}{\contentsline {figure}{\numberline {5.14}{\ignorespaces MPI Subgraphing Results for Approach 1}}{50}{figure.caption.26}\protected@file@percent }
\newlabel{fig:Subg_SE}{{5.14}{50}{MPI Subgraphing Results for Approach 1}{figure.caption.26}{}}
\@writefile{lof}{\contentsline {figure}{\numberline {5.15}{\ignorespaces Modified Subgraphing Example Graph with Two New Edges\relax }}{52}{figure.caption.27}\protected@file@percent }
\newlabel{fig:subg_mod}{{5.15}{52}{Modified Subgraphing Example Graph with Two New Edges\relax }{figure.caption.27}{}}
\@writefile{lof}{\contentsline {figure}{\numberline {5.16}{\ignorespaces MPI Subgraphing Duplicate States}}{53}{figure.caption.28}\protected@file@percent }
\newlabel{fig:subg_dup}{{5.16}{53}{MPI Subgraphing Duplicate States}{figure.caption.28}{}}
\@writefile{lot}{\contentsline {table}{\numberline {5.3}{\ignorespaces MPI Communication Time Percentage in Relation to the Overall Program Runtime for the 1 Service Test\relax }}{54}{table.caption.31}\protected@file@percent }
\newlabel{table:1_serv_comm}{{5.3}{54}{MPI Communication Time Percentage in Relation to the Overall Program Runtime for the 1 Service Test\relax }{table.caption.31}{}}
\@writefile{toc}{\contentsline {subsection}{\numberline {5.4.5}\it Subgraphing Result Analysis}{54}{subsection.5.4.5}\protected@file@percent }
\newlabel{sec:Subg_Discuss}{{5.4.5}{54}{\it Subgraphing Result Analysis}{subsection.5.4.5}{}}
\@writefile{lof}{\contentsline {figure}{\numberline {5.17}{\ignorespaces Speedup and Efficiency of MPI Subgraphing when using a DHT\relax }}{55}{figure.caption.29}\protected@file@percent }
\newlabel{fig:subg_DHT_Spd}{{5.17}{55}{Speedup and Efficiency of MPI Subgraphing when using a DHT\relax }{figure.caption.29}{}}
\@writefile{lof}{\contentsline {figure}{\numberline {5.18}{\ignorespaces Runtime of MPI Subgraphing when using a DHT vs not using a DHT\relax }}{56}{figure.caption.30}\protected@file@percent }
\newlabel{fig:subg_DHT_base}{{5.18}{56}{Runtime of MPI Subgraphing when using a DHT vs not using a DHT\relax }{figure.caption.30}{}}
\@writefile{lot}{\contentsline {table}{\numberline {5.4}{\ignorespaces MPI Communication Time Percentage in Relation to the Overall Program Runtime for the 4 Service Test\relax }}{56}{table.caption.32}\protected@file@percent }
\newlabel{table:4_serv_comm}{{5.4}{56}{MPI Communication Time Percentage in Relation to the Overall Program Runtime for the 4 Service Test\relax }{table.caption.32}{}}
\citation{7087377}
\@setckpt{Chapter5}{
\setcounter{page}{57}
\setcounter{page}{58}
\setcounter{equation}{0}
\setcounter{enumi}{4}
\setcounter{enumii}{0}
@ -117,6 +118,10 @@
\setcounter{ALG@blocknr}{10}
\setcounter{ALG@storecount}{0}
\setcounter{ALG@tmpcounter}{0}
\setcounter{Item}{4}
\setcounter{Hfootnote}{0}
\setcounter{bookmark@seq@number}{64}
\setcounter{lofdepth}{1}
\setcounter{lotdepth}{1}
\setcounter{section@level}{2}
}

View File

@ -85,7 +85,7 @@ Once the computation work of Task 1 is completed, each node must send their comp
\begin{figure}[htp]
\includegraphics[width=\linewidth]{"./Chapter5_img/Task1-Case2.png"}
\vspace{.2truein} \centerline{}
\caption{Communication From Task 1 to Task 2 when Task 1 Has More Nodes Allocated}
\caption[Task 1 to Task 2 Communication, Case 2]{Communication From Task 1 to Task 2 when Task 1 Has More Nodes Allocated}
\label{fig:Task1-Case2}
\end{figure}
@ -159,7 +159,7 @@ Figures \ref{fig:Tasking-RT}, \ref{fig:Tasking-Spd}, and \ref{fig:Tasking-Eff} d
\begin{figure}
\centering
\includegraphics[width=\linewidth]{"./Chapter5_img/Tasking_RT.png"}
\caption{Results for the MPI Tasking Approach in Terms of Runtime in Milliseconds}
\caption[MPI Tasking Approach Runtime Results]{Results for the MPI Tasking Approach in Terms of Runtime in Milliseconds}
\label{fig:Tasking-RT}
\end{figure}
@ -261,7 +261,7 @@ All tests used synchronous firing. Figure \ref{fig:Subg_base} shows the runtimes
\centering
\includegraphics[width=\linewidth]{"./Chapter5_img/no_DHT_Spd.png"}
\includegraphics[width=\linewidth]{"./Chapter5_img/no_DHT_eff.png"}
\caption{First iteration results of MPI Subgraphing in terms of Speedup and Efficiency}
\caption[MPI Subgraphing Results for Approach 1]{First iteration results of MPI Subgraphing in terms of Speedup and Efficiency}
\label{fig:Subg_SE}
\end{figure}
@ -277,7 +277,7 @@ As noted from Figures \ref{fig:Subg_base} and \ref{fig:Subg_SE}, the performance
\begin{figure}[htp]
\includegraphics[width=\linewidth]{"./Chapter5_img/Dup_DHT.png"}
\vspace{.2truein} \centerline{}
\caption{Duplicate States Explored vs Actual Number of States for the 1-4 Service Tests}
\caption[MPI Subgraphing Duplicate States]{Duplicate States Explored vs Actual Number of States for the 1-4 Service Tests}
\label{fig:subg_dup}
\end{figure}

View File

@ -1,12 +1,13 @@
\relax
\@writefile{toc}{\contentsline {chapter}{\numberline {CHAPTER 6: }{\bf \uppercase {CONCLUSIONS AND FUTURE WORKS}}}{57}{}\protected@file@percent }
\@writefile{toc}{\contentsline {section}{\numberline {6.1}\bf Conclusions}{57}{}\protected@file@percent }
\@writefile{toc}{\contentsline {section}{\numberline {6.2}\bf Future Work}{58}{}\protected@file@percent }
\newlabel{sec:FW}{{6.2}{58}}
\@writefile{lof}{\contentsline {figure}{\numberline {6.1}{\ignorespaces Possible Method for Blending MPI and OpenMP for Task 2 of the MPI Tasking Approach\relax }}{59}{}\protected@file@percent }
\newlabel{fig:OMP_MPI_Blend}{{6.1}{59}}
\providecommand\hyper@newdestlabel[2]{}
\@writefile{toc}{\contentsline {chapter}{\numberline {CHAPTER 6: }{\bf \uppercase {CONCLUSIONS AND FUTURE WORKS}}}{58}{chapter.6}\protected@file@percent }
\@writefile{toc}{\contentsline {section}{\numberline {6.1}\bf Conclusions}{58}{section.6.1}\protected@file@percent }
\@writefile{toc}{\contentsline {section}{\numberline {6.2}\bf Future Work}{59}{section.6.2}\protected@file@percent }
\newlabel{sec:FW}{{6.2}{59}{\bf Future Work}{section.6.2}{}}
\@writefile{lof}{\contentsline {figure}{\numberline {6.1}{\ignorespaces Possible Method for Blending MPI and OpenMP for Task 2 of the MPI Tasking Approach\relax }}{60}{figure.caption.33}\protected@file@percent }
\newlabel{fig:OMP_MPI_Blend}{{6.1}{60}{Possible Method for Blending MPI and OpenMP for Task 2 of the MPI Tasking Approach\relax }{figure.caption.33}{}}
\@setckpt{Chapter6}{
\setcounter{page}{61}
\setcounter{page}{62}
\setcounter{equation}{0}
\setcounter{enumi}{4}
\setcounter{enumii}{0}
@ -36,6 +37,10 @@
\setcounter{ALG@blocknr}{10}
\setcounter{ALG@storecount}{0}
\setcounter{ALG@tmpcounter}{0}
\setcounter{Item}{4}
\setcounter{Hfootnote}{0}
\setcounter{bookmark@seq@number}{67}
\setcounter{lofdepth}{1}
\setcounter{lotdepth}{1}
\setcounter{section@level}{1}
}

View File

@ -1,18 +1,35 @@
\relax
\providecommand\hyper@newdestlabel[2]{}
\providecommand\HyperFirstAtBeginDocument{\AtBeginDocument}
\HyperFirstAtBeginDocument{\ifx\hyper@anchor\@undefined
\global\let\oldcontentsline\contentsline
\gdef\contentsline#1#2#3#4{\oldcontentsline{#1}{#2}{#3}}
\global\let\oldnewlabel\newlabel
\gdef\newlabel#1#2{\newlabelxx{#1}#2}
\gdef\newlabelxx#1#2#3#4#5#6{\oldnewlabel{#1}{{#2}{#3}}}
\AtEndDocument{\ifx\hyper@anchor\@undefined
\let\contentsline\oldcontentsline
\let\newlabel\oldnewlabel
\fi}
\fi}
\global\let\hyper@last\relax
\gdef\HyperFirstAtBeginDocument#1{#1}
\providecommand\HyField@AuxAddToFields[1]{}
\providecommand\HyField@AuxAddToCoFields[2]{}
\@writefile{toc}{{\vspace {3\baselineskip }}}
\@writefile{toc}{\contentsline {section}{\hspace {-\parindent }COPYRIGHT}{iii}{}\protected@file@percent }
\@writefile{toc}{\contentsline {section}{\hspace {-\parindent }COPYRIGHT}{iii}{Doc-Start}\protected@file@percent }
\@writefile{toc}{{\hfill \ }}
\@writefile{toc}{\contentsline {section}{\hspace {-\parindent }ABSTRACT}{iv}{}\protected@file@percent }
\@writefile{toc}{\contentsline {section}{\hspace {-\parindent }ABSTRACT}{iv}{Doc-Start}\protected@file@percent }
\@writefile{toc}{{\hfill \ }}
\@writefile{toc}{\contentsline {section}{\hspace {-\parindent }ACKNOWLEDGEMENTS}{v}{}\protected@file@percent }
\@writefile{toc}{\contentsline {section}{\hspace {-\parindent }ACKNOWLEDGEMENTS}{v}{Doc-Start}\protected@file@percent }
\@writefile{toc}{{\hfill \ }}
\@writefile{toc}{\contentsline {section}{\hspace {-\parindent }TABLE OF CONTENTS}{viii}{}\protected@file@percent }
\@writefile{toc}{\contentsline {section}{\hspace {-\parindent }TABLE OF CONTENTS}{viii}{Doc-Start}\protected@file@percent }
\@writefile{toc}{{\hfill \ }}
\@writefile{lot}{{\vspace {\baselineskip }}}
\@writefile{toc}{\contentsline {section}{\hspace {-\parindent }LIST OF TABLES}{ix}{}\protected@file@percent }
\@writefile{toc}{\contentsline {section}{\hspace {-\parindent }LIST OF TABLES}{ix}{Doc-Start}\protected@file@percent }
\@writefile{toc}{{\hfill \ }}
\@writefile{lof}{{\vspace {\baselineskip }}}
\@writefile{toc}{\contentsline {section}{\hspace {-\parindent }LIST OF FIGURES}{xi}{}\protected@file@percent }
\@writefile{toc}{\contentsline {section}{\hspace {-\parindent }LIST OF FIGURES}{xi}{Doc-Start}\protected@file@percent }
\@input{Chapter1.aux}
\@input{Chapter2.aux}
\@input{Chapter3.aux}
@ -29,9 +46,9 @@
\bibcite{baloyi_guidelines_2019}{7}
\bibcite{allman_complying_2006}{8}
\@writefile{toc}{{\hfill \ }}
\@writefile{toc}{\contentsline {section}{\hspace {-\parindent }NOMENCLATURE}{61}{}\protected@file@percent }
\@writefile{toc}{\contentsline {section}{\hspace {-\parindent }NOMENCLATURE}{62}{figure.caption.33}\protected@file@percent }
\@writefile{toc}{\addvspace {10pt}}
\@writefile{toc}{\contentsline {section}{\hspace {-\parindent }BIBLIOGRAPHY}{61}{}\protected@file@percent }
\@writefile{toc}{\contentsline {section}{\hspace {-\parindent }BIBLIOGRAPHY}{62}{figure.caption.33}\protected@file@percent }
\@writefile{toc}{{\hfill \ }}
\bibcite{noauthor_sarbanes-oxley_2002}{9}
\bibcite{noauthor_health_1996}{10}
@ -60,4 +77,4 @@
\bibcite{pacheco_introduction_2011}{33}
\bibcite{lawrence_livermore_national_laboratory_mpip_nodate}{34}
\bibstyle{ieeetr}
\gdef \@abspage@last{75}
\gdef \@abspage@last{76}

View File

@ -1,28 +1,28 @@
{\vspace {\baselineskip }}
\contentsline {figure}{\numberline {3.1}{\ignorespaces Path Walking to State 14\relax }}{9}{}%
\contentsline {figure}{\numberline {3.2}{\ignorespaces Color Coding a Small Network Based on Violations\relax }}{10}{}%
\contentsline {figure}{\numberline {4.1}{\ignorespaces A network without Synchronous Firing generating infeasible states\relax }}{19}{}%
\contentsline {figure}{\numberline {4.2}{\ignorespaces Inclusion of Synchronous Firing into GNU Bison, GNU Flex, and the overall program\relax }}{22}{}%
\contentsline {figure}{\numberline {4.3}{\ignorespaces Synchronous Firing in the Graph Generation Process\relax }}{24}{}%
\contentsline {figure}{\numberline {4.4}{\ignorespaces Bar Graph and Line Graph Representations of Synchronous Firing on Runtime\relax }}{26}{}%
\contentsline {figure}{\numberline {4.5}{\ignorespaces Bar Graph and Line Graph Representations of Synchronous Firing on State Space\relax }}{27}{}%
\contentsline {figure}{\numberline {4.6}{\ignorespaces Speedup Obtained When Using Synchronous Firing\relax }}{27}{}%
\contentsline {figure}{\numberline {5.1}{\ignorespaces Task Overview of the Attack and Compliance Graph Generation Process\relax }}{31}{}%
\contentsline {figure}{\numberline {5.2}{\ignorespaces Node Allocation for each Task\relax }}{33}{}%
\contentsline {figure}{\numberline {5.3}{\ignorespaces Data Distribution of Task One\relax }}{35}{}%
\contentsline {figure}{\numberline {5.4}{\ignorespaces Communication From Task 1 to Task 2 when the Number of Nodes Allocated is Equal\relax }}{36}{}%
\contentsline {figure}{\numberline {5.5}{\ignorespaces Communication From Task 1 to Task 2 when Task 1 Has More Nodes Allocated\relax }}{37}{}%
\contentsline {figure}{\numberline {5.6}{\ignorespaces Example of a Not Applicable Exploit for the MPI Tasking Testing\relax }}{41}{}%
\contentsline {figure}{\numberline {5.7}{\ignorespaces Speedup and Efficiency of the MPI Tasking Approach for a Varying Number of Compute Nodes with an Increasing Problem Size\relax }}{41}{}%
\contentsline {figure}{\numberline {5.8}{\ignorespaces Results for the MPI Tasking Approach in Terms of Runtime in Milliseconds\relax }}{42}{}%
\contentsline {figure}{\numberline {5.9}{\ignorespaces Results for the MPI Tasking Approach in Terms of Speedup\relax }}{42}{}%
\contentsline {figure}{\numberline {5.10}{\ignorespaces Results for the MPI Tasking Approach in Terms of Efficiency\relax }}{42}{}%
\contentsline {figure}{\numberline {5.11}{\ignorespaces Example Graph Using the MPI Subgraphing Approach\relax }}{44}{}%
\contentsline {figure}{\numberline {5.12}{\ignorespaces Frontier Merging and Data Distribution Process\relax }}{46}{}%
\contentsline {figure}{\numberline {5.13}{\ignorespaces First iteration results of MPI Subgraphing in terms of Runtime\relax }}{48}{}%
\contentsline {figure}{\numberline {5.14}{\ignorespaces First iteration results of MPI Subgraphing in terms of Speedup and Efficiency\relax }}{49}{}%
\contentsline {figure}{\numberline {5.15}{\ignorespaces Modified Subgraphing Example Graph with Two New Edges\relax }}{51}{}%
\contentsline {figure}{\numberline {5.16}{\ignorespaces Duplicate States Explored vs Actual Number of States for the 1-4 Service Tests\relax }}{52}{}%
\contentsline {figure}{\numberline {5.17}{\ignorespaces Speedup and Efficiency of MPI Subgraphing when using a DHT\relax }}{54}{}%
\contentsline {figure}{\numberline {5.18}{\ignorespaces Runtime of MPI Subgraphing when using a DHT vs not using a DHT\relax }}{55}{}%
\contentsline {figure}{\numberline {6.1}{\ignorespaces Possible Method for Blending MPI and OpenMP for Task 2 of the MPI Tasking Approach\relax }}{59}{}%
\contentsline {figure}{\numberline {3.1}{\ignorespaces Path Walking to State 14\relax }}{9}{figure.caption.1}%
\contentsline {figure}{\numberline {3.2}{\ignorespaces Color Coding a Small Network Based on Violations\relax }}{10}{figure.caption.2}%
\contentsline {figure}{\numberline {4.1}{\ignorespaces A network without Synchronous Firing generating infeasible states\relax }}{19}{figure.caption.3}%
\contentsline {figure}{\numberline {4.2}{\ignorespaces Inclusion of Synchronous Firing into GNU Bison, GNU Flex, and the overall program\relax }}{22}{figure.caption.4}%
\contentsline {figure}{\numberline {4.3}{\ignorespaces Synchronous Firing in the Graph Generation Process\relax }}{24}{figure.caption.5}%
\contentsline {figure}{\numberline {4.4}{\ignorespaces Synchronous Firing on Runtime}}{27}{figure.caption.6}%
\contentsline {figure}{\numberline {4.5}{\ignorespaces Bar Graph and Line Graph Representations of Synchronous Firing on State Space\relax }}{28}{figure.caption.7}%
\contentsline {figure}{\numberline {4.6}{\ignorespaces Speedup Obtained When Using Synchronous Firing\relax }}{28}{figure.caption.8}%
\contentsline {figure}{\numberline {5.1}{\ignorespaces Task Overview of the Attack and Compliance Graph Generation Process\relax }}{31}{figure.caption.11}%
\contentsline {figure}{\numberline {5.2}{\ignorespaces Node Allocation for each Task\relax }}{33}{figure.caption.12}%
\contentsline {figure}{\numberline {5.3}{\ignorespaces Data Distribution of Task One\relax }}{35}{figure.caption.13}%
\contentsline {figure}{\numberline {5.4}{\ignorespaces Communication From Task 1 to Task 2 when the Number of Nodes Allocated is Equal\relax }}{36}{figure.caption.14}%
\contentsline {figure}{\numberline {5.5}{\ignorespaces Task 1 to Task 2 Communication, Case 2}}{37}{figure.caption.15}%
\contentsline {figure}{\numberline {5.6}{\ignorespaces Example of a Not Applicable Exploit for the MPI Tasking Testing\relax }}{41}{figure.caption.17}%
\contentsline {figure}{\numberline {5.7}{\ignorespaces Speedup and Efficiency of the MPI Tasking Approach for a Varying Number of Compute Nodes with an Increasing Problem Size\relax }}{42}{figure.caption.18}%
\contentsline {figure}{\numberline {5.8}{\ignorespaces MPI Tasking Approach Runtime Results}}{43}{figure.caption.19}%
\contentsline {figure}{\numberline {5.9}{\ignorespaces Results for the MPI Tasking Approach in Terms of Speedup\relax }}{43}{figure.caption.20}%
\contentsline {figure}{\numberline {5.10}{\ignorespaces Results for the MPI Tasking Approach in Terms of Efficiency\relax }}{43}{figure.caption.21}%
\contentsline {figure}{\numberline {5.11}{\ignorespaces Example Graph Using the MPI Subgraphing Approach\relax }}{45}{figure.caption.22}%
\contentsline {figure}{\numberline {5.12}{\ignorespaces Frontier Merging and Data Distribution Process\relax }}{46}{figure.caption.23}%
\contentsline {figure}{\numberline {5.13}{\ignorespaces First iteration results of MPI Subgraphing in terms of Runtime\relax }}{49}{figure.caption.25}%
\contentsline {figure}{\numberline {5.14}{\ignorespaces MPI Subgraphing Results for Approach 1}}{50}{figure.caption.26}%
\contentsline {figure}{\numberline {5.15}{\ignorespaces Modified Subgraphing Example Graph with Two New Edges\relax }}{52}{figure.caption.27}%
\contentsline {figure}{\numberline {5.16}{\ignorespaces MPI Subgraphing Duplicate States}}{53}{figure.caption.28}%
\contentsline {figure}{\numberline {5.17}{\ignorespaces Speedup and Efficiency of MPI Subgraphing when using a DHT\relax }}{55}{figure.caption.29}%
\contentsline {figure}{\numberline {5.18}{\ignorespaces Runtime of MPI Subgraphing when using a DHT vs not using a DHT\relax }}{56}{figure.caption.30}%
\contentsline {figure}{\numberline {6.1}{\ignorespaces Possible Method for Blending MPI and OpenMP for Task 2 of the MPI Tasking Approach\relax }}{60}{figure.caption.33}%

View File

@ -1,11 +1,11 @@
This is pdfTeX, Version 3.141592653-2.6-1.40.23 (TeX Live 2021/Arch Linux) (preloaded format=pdflatex 2022.4.17) 20 APR 2022 12:37
This is pdfTeX, Version 3.141592653-2.6-1.40.24 (TeX Live 2022/Arch Linux) (preloaded format=pdflatex 2022.4.29) 3 MAY 2022 16:41
entering extended mode
restricted \write18 enabled.
%&-line parsing enabled.
**Schrick-Noah_MS-Thesis
**Schrick-Noah_MS-Thesis.tex
(./Schrick-Noah_MS-Thesis.tex
LaTeX2e <2021-11-15> patch level 1
L3 programming layer <2022-02-24>
L3 programming layer <2022-04-10>
(/usr/share/texmf-dist/tex/latex/base/report.cls
Document Class: report 2021/10/04 v1.4n Standard LaTeX document class
(/usr/share/texmf-dist/tex/latex/base/size12.clo
@ -118,91 +118,225 @@ Document Style algorithmicx 1.2 - a greatly improved `algorithmic' style
\ALG@tmplength=\skip53
)
Document Style - pseudocode environments for use with the `algorithmicx' style
) (/usr/share/texmf-dist/tex/latex/tocloft/tocloft.sty
) (/usr/share/texmf-dist/tex/latex/hyperref/hyperref.sty
Package: hyperref 2022-02-21 v7.00n Hypertext links for LaTeX
(/usr/share/texmf-dist/tex/generic/ltxcmds/ltxcmds.sty
Package: ltxcmds 2020-05-10 v1.25 LaTeX kernel commands for general use (HO)
)
(/usr/share/texmf-dist/tex/generic/iftex/iftex.sty
Package: iftex 2022/02/03 v1.0f TeX engine tests
)
(/usr/share/texmf-dist/tex/generic/pdftexcmds/pdftexcmds.sty
Package: pdftexcmds 2020-06-27 v0.33 Utility functions of pdfTeX for LuaTeX (HO
)
(/usr/share/texmf-dist/tex/generic/infwarerr/infwarerr.sty
Package: infwarerr 2019/12/03 v1.5 Providing info/warning/error messages (HO)
)
Package pdftexcmds Info: \pdf@primitive is available.
Package pdftexcmds Info: \pdf@ifprimitive is available.
Package pdftexcmds Info: \pdfdraftmode found.
)
(/usr/share/texmf-dist/tex/generic/kvsetkeys/kvsetkeys.sty
Package: kvsetkeys 2019/12/15 v1.18 Key value parser (HO)
)
(/usr/share/texmf-dist/tex/generic/kvdefinekeys/kvdefinekeys.sty
Package: kvdefinekeys 2019-12-19 v1.6 Define keys (HO)
)
(/usr/share/texmf-dist/tex/generic/pdfescape/pdfescape.sty
Package: pdfescape 2019/12/09 v1.15 Implements pdfTeX's escape features (HO)
)
(/usr/share/texmf-dist/tex/latex/hycolor/hycolor.sty
Package: hycolor 2020-01-27 v1.10 Color options for hyperref/bookmark (HO)
)
(/usr/share/texmf-dist/tex/latex/letltxmacro/letltxmacro.sty
Package: letltxmacro 2019/12/03 v1.6 Let assignment for LaTeX macros (HO)
)
(/usr/share/texmf-dist/tex/latex/auxhook/auxhook.sty
Package: auxhook 2019-12-17 v1.6 Hooks for auxiliary files (HO)
)
(/usr/share/texmf-dist/tex/latex/kvoptions/kvoptions.sty
Package: kvoptions 2020-10-07 v3.14 Key value format for package options (HO)
)
\@linkdim=\dimen149
\Hy@linkcounter=\count273
\Hy@pagecounter=\count274
(/usr/share/texmf-dist/tex/latex/hyperref/pd1enc.def
File: pd1enc.def 2022-02-21 v7.00n Hyperref: PDFDocEncoding definition (HO)
Now handling font encoding PD1 ...
... no UTF-8 mapping file for font encoding PD1
)
(/usr/share/texmf-dist/tex/generic/intcalc/intcalc.sty
Package: intcalc 2019/12/15 v1.3 Expandable calculations with integers (HO)
)
(/usr/share/texmf-dist/tex/generic/etexcmds/etexcmds.sty
Package: etexcmds 2019/12/15 v1.7 Avoid name clashes with e-TeX commands (HO)
)
\Hy@SavedSpaceFactor=\count275
(/usr/share/texmf-dist/tex/latex/hyperref/puenc.def
File: puenc.def 2022-02-21 v7.00n Hyperref: PDF Unicode definition (HO)
Now handling font encoding PU ...
... no UTF-8 mapping file for font encoding PU
)
Package hyperref Info: Hyper figures OFF on input line 4137.
Package hyperref Info: Link nesting OFF on input line 4142.
Package hyperref Info: Hyper index ON on input line 4145.
Package hyperref Info: Plain pages OFF on input line 4152.
Package hyperref Info: Backreferencing OFF on input line 4157.
Package hyperref Info: Implicit mode ON; LaTeX internals redefined.
Package hyperref Info: Bookmarks ON on input line 4390.
\c@Hy@tempcnt=\count276
(/usr/share/texmf-dist/tex/latex/url/url.sty
\Urlmuskip=\muskip16
Package: url 2013/09/16 ver 3.4 Verb mode for urls, etc.
)
LaTeX Info: Redefining \url on input line 4749.
\XeTeXLinkMargin=\dimen150
(/usr/share/texmf-dist/tex/generic/bitset/bitset.sty
Package: bitset 2019/12/09 v1.3 Handle bit-vector datatype (HO)
(/usr/share/texmf-dist/tex/generic/bigintcalc/bigintcalc.sty
Package: bigintcalc 2019/12/15 v1.5 Expandable calculations on big integers (HO
)
))
\Fld@menulength=\count277
\Field@Width=\dimen151
\Fld@charsize=\dimen152
Package hyperref Info: Hyper figures OFF on input line 6027.
Package hyperref Info: Link nesting OFF on input line 6032.
Package hyperref Info: Hyper index ON on input line 6035.
Package hyperref Info: backreferencing OFF on input line 6042.
Package hyperref Info: Link coloring OFF on input line 6047.
Package hyperref Info: Link coloring with OCG OFF on input line 6052.
Package hyperref Info: PDF/A mode OFF on input line 6057.
LaTeX Info: Redefining \ref on input line 6097.
LaTeX Info: Redefining \pageref on input line 6101.
(/usr/share/texmf-dist/tex/latex/base/atbegshi-ltx.sty
Package: atbegshi-ltx 2021/01/10 v1.0c Emulation of the original atbegshi
package with kernel methods
)
\Hy@abspage=\count278
\c@Item=\count279
\c@Hfootnote=\count280
)
Package hyperref Info: Driver (autodetected): hpdftex.
(/usr/share/texmf-dist/tex/latex/hyperref/hpdftex.def
File: hpdftex.def 2022-02-21 v7.00n Hyperref driver for pdfTeX
(/usr/share/texmf-dist/tex/latex/base/atveryend-ltx.sty
Package: atveryend-ltx 2020/08/19 v1.0a Emulation of the original atveryend pac
kage
with kernel methods
)
\Fld@listcount=\count281
\c@bookmark@seq@number=\count282
(/usr/share/texmf-dist/tex/latex/rerunfilecheck/rerunfilecheck.sty
Package: rerunfilecheck 2019/12/05 v1.9 Rerun checks for auxiliary files (HO)
(/usr/share/texmf-dist/tex/generic/uniquecounter/uniquecounter.sty
Package: uniquecounter 2019/12/15 v1.4 Provide unlimited unique counter (HO)
)
Package uniquecounter Info: New unique counter `rerunfilecheck' on input line 2
86.
)
\Hy@SectionHShift=\skip54
)
Package hyperref Info: Option `colorlinks' set `true' on input line 106.
(/usr/share/texmf-dist/tex/latex/tocloft/tocloft.sty
Package: tocloft 2017/08/31 v2.3i parameterised ToC, etc., typesetting
Package tocloft Info: The document has chapter divisions on input line 51.
\cftparskip=\skip54
\cftbeforetoctitleskip=\skip55
\cftaftertoctitleskip=\skip56
\cftbeforepartskip=\skip57
\cftpartnumwidth=\skip58
\cftpartindent=\skip59
\cftbeforechapskip=\skip60
\cftchapindent=\skip61
\cftchapnumwidth=\skip62
\cftbeforesecskip=\skip63
\cftsecindent=\skip64
\cftsecnumwidth=\skip65
\cftbeforesubsecskip=\skip66
\cftsubsecindent=\skip67
\cftsubsecnumwidth=\skip68
\cftbeforesubsubsecskip=\skip69
\cftsubsubsecindent=\skip70
\cftsubsubsecnumwidth=\skip71
\cftbeforeparaskip=\skip72
\cftparaindent=\skip73
\cftparanumwidth=\skip74
\cftbeforesubparaskip=\skip75
\cftsubparaindent=\skip76
\cftsubparanumwidth=\skip77
\cftbeforeloftitleskip=\skip78
\cftafterloftitleskip=\skip79
\cftbeforefigskip=\skip80
\cftfigindent=\skip81
\cftfignumwidth=\skip82
\c@lofdepth=\count273
\c@lotdepth=\count274
\cftbeforelottitleskip=\skip83
\cftafterlottitleskip=\skip84
\cftbeforetabskip=\skip85
\cfttabindent=\skip86
\cfttabnumwidth=\skip87
\cftparskip=\skip55
\cftbeforetoctitleskip=\skip56
\cftaftertoctitleskip=\skip57
\cftbeforepartskip=\skip58
\cftpartnumwidth=\skip59
\cftpartindent=\skip60
\cftbeforechapskip=\skip61
\cftchapindent=\skip62
\cftchapnumwidth=\skip63
\cftbeforesecskip=\skip64
\cftsecindent=\skip65
\cftsecnumwidth=\skip66
\cftbeforesubsecskip=\skip67
\cftsubsecindent=\skip68
\cftsubsecnumwidth=\skip69
\cftbeforesubsubsecskip=\skip70
\cftsubsubsecindent=\skip71
\cftsubsubsecnumwidth=\skip72
\cftbeforeparaskip=\skip73
\cftparaindent=\skip74
\cftparanumwidth=\skip75
\cftbeforesubparaskip=\skip76
\cftsubparaindent=\skip77
\cftsubparanumwidth=\skip78
\cftbeforeloftitleskip=\skip79
\cftafterloftitleskip=\skip80
\cftbeforefigskip=\skip81
\cftfigindent=\skip82
\cftfignumwidth=\skip83
\c@lofdepth=\count283
\c@lotdepth=\count284
\cftbeforelottitleskip=\skip84
\cftafterlottitleskip=\skip85
\cftbeforetabskip=\skip86
\cfttabindent=\skip87
\cfttabnumwidth=\skip88
)
(/usr/share/texmf-dist/tex/generic/iftex/ifpdf.sty
Package: ifpdf 2019/10/25 v3.4 ifpdf legacy package. Use iftex instead.
(/usr/share/texmf-dist/tex/generic/iftex/iftex.sty
Package: iftex 2022/02/03 v1.0f TeX engine tests
)) (./TUthesis.sty
\numofchapters=\count275
\committeesize=\count276
) (./TUthesis.sty
\numofchapters=\count285
\committeesize=\count286
)
(/usr/share/texmf-dist/tex/latex/l3backend/l3backend-pdftex.def
File: l3backend-pdftex.def 2022-02-07 L3 backend support: PDF output (pdfTeX)
\l__color_backend_stack_int=\count277
File: l3backend-pdftex.def 2022-04-14 L3 backend support: PDF output (pdfTeX)
\l__color_backend_stack_int=\count287
\l__pdf_internal_box=\box53
)
(./Schrick-Noah_MS-Thesis.aux (./Chapter1.aux) (./Chapter2.aux) (./Chapter3.aux
) (./Chapter4.aux) (./Chapter5.aux) (./Chapter6.aux))
\openout1 = `Schrick-Noah_MS-Thesis.aux'.
LaTeX Font Info: Checking defaults for OML/cmm/m/it on input line 122.
LaTeX Font Info: ... okay on input line 122.
LaTeX Font Info: Checking defaults for OMS/cmsy/m/n on input line 122.
LaTeX Font Info: ... okay on input line 122.
LaTeX Font Info: Checking defaults for OT1/cmr/m/n on input line 122.
LaTeX Font Info: ... okay on input line 122.
LaTeX Font Info: Checking defaults for T1/cmr/m/n on input line 122.
LaTeX Font Info: ... okay on input line 122.
LaTeX Font Info: Checking defaults for TS1/cmr/m/n on input line 122.
LaTeX Font Info: ... okay on input line 122.
LaTeX Font Info: Checking defaults for OMX/cmex/m/n on input line 122.
LaTeX Font Info: ... okay on input line 122.
LaTeX Font Info: Checking defaults for U/cmr/m/n on input line 122.
LaTeX Font Info: ... okay on input line 122.
LaTeX Font Info: Checking defaults for OML/cmm/m/it on input line 133.
LaTeX Font Info: ... okay on input line 133.
LaTeX Font Info: Checking defaults for OMS/cmsy/m/n on input line 133.
LaTeX Font Info: ... okay on input line 133.
LaTeX Font Info: Checking defaults for OT1/cmr/m/n on input line 133.
LaTeX Font Info: ... okay on input line 133.
LaTeX Font Info: Checking defaults for T1/cmr/m/n on input line 133.
LaTeX Font Info: ... okay on input line 133.
LaTeX Font Info: Checking defaults for TS1/cmr/m/n on input line 133.
LaTeX Font Info: ... okay on input line 133.
LaTeX Font Info: Checking defaults for OMX/cmex/m/n on input line 133.
LaTeX Font Info: ... okay on input line 133.
LaTeX Font Info: Checking defaults for U/cmr/m/n on input line 133.
LaTeX Font Info: ... okay on input line 133.
LaTeX Font Info: Checking defaults for PD1/pdf/m/n on input line 133.
LaTeX Font Info: ... okay on input line 133.
LaTeX Font Info: Checking defaults for PU/pdf/m/n on input line 133.
LaTeX Font Info: ... okay on input line 133.
(/usr/share/texmf-dist/tex/context/base/mkii/supp-pdf.mkii
[Loading MPS to PDF converter (version 2006.09.02).]
\scratchcounter=\count278
\scratchdimen=\dimen149
\scratchcounter=\count288
\scratchdimen=\dimen153
\scratchbox=\box54
\nofMPsegments=\count279
\nofMParguments=\count280
\nofMPsegments=\count289
\nofMParguments=\count290
\everyMPshowfont=\toks20
\MPscratchCnt=\count281
\MPscratchDim=\dimen150
\MPnumerator=\count282
\makeMPintoPDFobject=\count283
\MPscratchCnt=\count291
\MPscratchDim=\dimen154
\MPnumerator=\count292
\makeMPintoPDFobject=\count293
\everyMPtoPDFconversion=\toks21
) (/usr/share/texmf-dist/tex/latex/epstopdf-pkg/epstopdf-base.sty
Package: epstopdf-base 2020-01-24 v2.11 Base part for package epstopdf
@ -215,11 +349,42 @@ e
))
Package caption Info: Begin \AtBeginDocument code.
Package caption Info: float package is loaded.
Package caption Info: hyperref package is loaded.
Package caption Info: End \AtBeginDocument code.
(/usr/share/texmf-dist/tex/latex/graphics/color.sty
Package: color 2021/12/07 v1.3c Standard LaTeX Color (DPC)
(/usr/share/texmf-dist/tex/latex/graphics-cfg/color.cfg
File: color.cfg 2016/01/02 v1.6 sample color configuration
)
Package color Info: Driver file: pdftex.def on input line 149.
)
Package hyperref Info: Link coloring ON on input line 133.
(/usr/share/texmf-dist/tex/latex/hyperref/nameref.sty
Package: nameref 2021-04-02 v2.47 Cross-referencing by name of section
(/usr/share/texmf-dist/tex/latex/refcount/refcount.sty
Package: refcount 2019/12/15 v3.6 Data extraction from label references (HO)
)
(/usr/share/texmf-dist/tex/generic/gettitlestring/gettitlestring.sty
Package: gettitlestring 2019/12/15 v1.6 Cleanup title references (HO)
)
\c@section@level=\count294
)
LaTeX Info: Redefining \ref on input line 133.
LaTeX Info: Redefining \pageref on input line 133.
LaTeX Info: Redefining \nameref on input line 133.
(./Schrick-Noah_MS-Thesis.out) (./Schrick-Noah_MS-Thesis.out)
\@outlinefile=\write3
\openout3 = `Schrick-Noah_MS-Thesis.out'.
[1
{/var/lib/texmf/fonts/map/pdftex/updmap/pdftex.map}]
Underfull \hbox (badness 10000) in paragraph at lines 183--183
Underfull \hbox (badness 10000) in paragraph at lines 194--194
[]
@ -236,23 +401,23 @@ LaTeX Font Info: External font `cmex10' loaded for size
(Font) <6> on input line 2.
Overfull \hbox (1.75291pt too wide) in paragraph at lines 24--24
[] []\OT1/cmr/bx/n/12 UTILITY EX-TEN-SIONS TO THE RAGE AT-TACK GRAPH
[] [][][]\OT1/cmr/bx/n/12 UTILITY EX-TEN-SIONS TO THE RAGE AT-TACK GRAPH
[]
[6
]
Overfull \hbox (1.5755pt too wide) in paragraph at lines 45--45
[] []\OT1/cmr/bx/n/12 PARALLELIZATION US-ING MES-SAGE PASS-ING IN-TER-
[] [][][]\OT1/cmr/bx/n/12 PARALLELIZATION US-ING MES-SAGE PASS-ING IN-TER-
[]
[7])
\tf@toc=\write3
\openout3 = `Schrick-Noah_MS-Thesis.toc'.
\tf@toc=\write4
\openout4 = `Schrick-Noah_MS-Thesis.toc'.
[8] (./Schrick-Noah_MS-Thesis.lot)
\tf@lot=\write4
\openout4 = `Schrick-Noah_MS-Thesis.lot'.
\tf@lot=\write5
\openout5 = `Schrick-Noah_MS-Thesis.lot'.
[9
@ -260,14 +425,18 @@ Overfull \hbox (1.5755pt too wide) in paragraph at lines 45--45
[10
])
\tf@lof=\write5
\openout5 = `Schrick-Noah_MS-Thesis.lof'.
\tf@lof=\write6
\openout6 = `Schrick-Noah_MS-Thesis.lof'.
[11]
\openout2 = `Chapter1.aux'.
(./Chapter1.tex
CHAPTER 1.
Package hyperref Warning: Token not allowed in a PDF string (Unicode):
(hyperref) removing `\uppercase' on input line 1.
[1
@ -277,6 +446,10 @@ CHAPTER 1.
(./Chapter2.tex
CHAPTER 2.
Package hyperref Warning: Token not allowed in a PDF string (Unicode):
(hyperref) removing `\uppercase' on input line 1.
[5
@ -287,12 +460,16 @@ CHAPTER 2.
(./Chapter3.tex
CHAPTER 3.
<./Chapter3_img/PW.png, id=66, 958.58125pt x 525.965pt>
Package hyperref Warning: Token not allowed in a PDF string (Unicode):
(hyperref) removing `\uppercase' on input line 1.
<./Chapter3_img/PW.png, id=578, 958.58125pt x 525.965pt>
File: ./Chapter3_img/PW.png Graphic file (type png)
<use ./Chapter3_img/PW.png>
Package pdftex.def Info: ./Chapter3_img/PW.png used on input line 17.
(pdftex.def) Requested size: 469.75499pt x 257.74918pt.
<./Chapter3_img/CC.png, id=67, 658.46pt x 527.9725pt>
<./Chapter3_img/CC.png, id=581, 658.46pt x 527.9725pt>
File: ./Chapter3_img/CC.png Graphic file (type png)
<use ./Chapter3_img/CC.png>
Package pdftex.def Info: ./Chapter3_img/CC.png used on input line 32.
@ -308,7 +485,11 @@ Package pdftex.def Info: ./Chapter3_img/CC.png used on input line 32.
(./Chapter4.tex
CHAPTER 4.
<./Chapter4_img/non-sync_ex.drawio.png, id=100, 1014.79124pt x 400.49625pt>
Package hyperref Warning: Token not allowed in a PDF string (Unicode):
(hyperref) removing `\uppercase' on input line 1.
<./Chapter4_img/non-sync_ex.drawio.png, id=647, 1014.79124pt x 400.49625pt>
File: ./Chapter4_img/non-sync_ex.drawio.png Graphic file (type png)
<use ./Chapter4_img/non-sync_ex.drawio.png>
Package pdftex.def Info: ./Chapter4_img/non-sync_ex.drawio.png used on input l
@ -325,89 +506,93 @@ Overfull \hbox (30.42026pt too wide) in paragraph at lines 49--49
, (<parameter-list>)=
[]
<./Chapter4_img/Bison-Flex-v2.png, id=113, 1029.8475pt x 330.23375pt>
<./Chapter4_img/Bison-Flex-v2.png, id=675, 1029.8475pt x 330.23375pt>
File: ./Chapter4_img/Bison-Flex-v2.png Graphic file (type png)
<use ./Chapter4_img/Bison-Flex-v2.png>
Package pdftex.def Info: ./Chapter4_img/Bison-Flex-v2.png used on input line 6
1.
(pdftex.def) Requested size: 469.75499pt x 150.62946pt.
[21] [22 <./Chapter4_img/Bison-Flex-v2.png>]
<./Chapter4_img/Sync-Fire.png, id=122, 489.83pt x 1052.93375pt>
<./Chapter4_img/Sync-Fire.png, id=689, 489.83pt x 1052.93375pt>
File: ./Chapter4_img/Sync-Fire.png Graphic file (type png)
<use ./Chapter4_img/Sync-Fire.png>
Package pdftex.def Info: ./Chapter4_img/Sync-Fire.png used on input line 85.
(pdftex.def) Requested size: 244.9144pt x 526.46559pt.
[23] [24 <./Chapter4_img/Sync-Fire.png>] [25]
<./Chapter4_img/Sync-Runtime-Bar.png, id=133, 609.696pt x 231.483pt>
<./Chapter4_img/Sync-Runtime-Bar.png, id=711, 609.696pt x 231.483pt>
File: ./Chapter4_img/Sync-Runtime-Bar.png Graphic file (type png)
<use ./Chapter4_img/Sync-Runtime-Bar.png>
Package pdftex.def Info: ./Chapter4_img/Sync-Runtime-Bar.png used on input lin
e 123.
(pdftex.def) Requested size: 469.75499pt x 178.35194pt.
<./Chapter4_img/Sync-Runtime.png, id=134, 576.627pt x 229.293pt>
<./Chapter4_img/Sync-Runtime.png, id=712, 576.627pt x 229.293pt>
File: ./Chapter4_img/Sync-Runtime.png Graphic file (type png)
<use ./Chapter4_img/Sync-Runtime.png>
Package pdftex.def Info: ./Chapter4_img/Sync-Runtime.png used on input line 12
4.
(pdftex.def) Requested size: 469.75499pt x 186.79341pt.
<./Chapter4_img/Sync-StateSpace-Bar.png, id=135, 608.163pt x 223.38pt>
<./Chapter4_img/Sync-StateSpace-Bar.png, id=713, 608.163pt x 223.38pt>
File: ./Chapter4_img/Sync-StateSpace-Bar.png Graphic file (type png)
<use ./Chapter4_img/Sync-StateSpace-Bar.png>
Package pdftex.def Info: ./Chapter4_img/Sync-StateSpace-Bar.png used on input
line 131.
(pdftex.def) Requested size: 469.75499pt x 172.54166pt.
<./Chapter4_img/Sync-StateSpace.png, id=136, 557.574pt x 229.512pt>
<./Chapter4_img/Sync-StateSpace.png, id=714, 557.574pt x 229.512pt>
File: ./Chapter4_img/Sync-StateSpace.png Graphic file (type png)
<use ./Chapter4_img/Sync-StateSpace.png>
Package pdftex.def Info: ./Chapter4_img/Sync-StateSpace.png used on input line
132.
(pdftex.def) Requested size: 469.75499pt x 193.3666pt.
<./Chapter4_img/Sync_Speedup.png, id=137, 557.355pt x 229.512pt>
<./Chapter4_img/Sync_Speedup.png, id=715, 557.355pt x 229.512pt>
File: ./Chapter4_img/Sync_Speedup.png Graphic file (type png)
<use ./Chapter4_img/Sync_Speedup.png>
Package pdftex.def Info: ./Chapter4_img/Sync_Speedup.png used on input line 13
9.
(pdftex.def) Requested size: 469.75499pt x 193.44014pt.
) [26 <./Chapter4_img/Sync-Runtime-Bar.png> <./Chapter4_img/Sync-Runtime.png>]
[27 <./Chapter4_img/Sync-StateSpace-Bar.png> <./Chapter4_img/Sync-StateSpace.pn
g> <./Chapter4_img/Sync_Speedup.png>] [28]
) [26] [27 <./Chapter4_img/Sync-Runtime-Bar.png> <./Chapter4_img/Sync-Runtime.p
ng>] [28 <./Chapter4_img/Sync-StateSpace-Bar.png> <./Chapter4_img/Sync-StateSpa
ce.png> <./Chapter4_img/Sync_Speedup.png>]
\openout2 = `Chapter5.aux'.
(./Chapter5.tex
CHAPTER 5.
Package hyperref Warning: Token not allowed in a PDF string (Unicode):
(hyperref) removing `\uppercase' on input line 1.
[29
]
<./Chapter5_img/horiz_task.drawio.png, id=156, 1181.41376pt x 785.93625pt>
<./Chapter5_img/horiz_task.drawio.png, id=749, 1181.41376pt x 785.93625pt>
File: ./Chapter5_img/horiz_task.drawio.png Graphic file (type png)
<use ./Chapter5_img/horiz_task.drawio.png>
Package pdftex.def Info: ./Chapter5_img/horiz_task.drawio.png used on input li
ne 42.
(pdftex.def) Requested size: 469.75499pt x 312.49811pt.
[30] [31 <./Chapter5_img/horiz_task.drawio.png>]
<./Chapter5_img/node-alloc.png, id=164, 818.30719pt x 536.75531pt>
<./Chapter5_img/node-alloc.png, id=760, 818.30719pt x 536.75531pt>
File: ./Chapter5_img/node-alloc.png Graphic file (type png)
<use ./Chapter5_img/node-alloc.png>
Package pdftex.def Info: ./Chapter5_img/node-alloc.png used on input line 54.
(pdftex.def) Requested size: 469.75499pt x 308.1323pt.
[32] [33 <./Chapter5_img/node-alloc.PNG>]
<./Chapter5_img/Task1-Data-Dist.png, id=173, 597.98407pt x 197.48781pt>
<./Chapter5_img/Task1-Data-Dist.png, id=774, 597.98407pt x 197.48781pt>
File: ./Chapter5_img/Task1-Data-Dist.png Graphic file (type png)
<use ./Chapter5_img/Task1-Data-Dist.png>
Package pdftex.def Info: ./Chapter5_img/Task1-Data-Dist.png used on input line
70.
(pdftex.def) Requested size: 469.75499pt x 155.14278pt.
[34]
<./Chapter5_img/Task1-Case1.png, id=177, 586.44093pt x 339.51843pt>
<./Chapter5_img/Task1-Case1.png, id=782, 586.44093pt x 339.51843pt>
File: ./Chapter5_img/Task1-Case1.png Graphic file (type png)
<use ./Chapter5_img/Task1-Case1.png>
Package pdftex.def Info: ./Chapter5_img/Task1-Case1.png used on input line 79.
(pdftex.def) Requested size: 469.75499pt x 271.9622pt.
<./Chapter5_img/Task1-Case2.png, id=178, 702.37407pt x 414.79968pt>
<./Chapter5_img/Task1-Case2.png, id=783, 702.37407pt x 414.79968pt>
File: ./Chapter5_img/Task1-Case2.png Graphic file (type png)
<use ./Chapter5_img/Task1-Case2.png>
Package pdftex.def Info: ./Chapter5_img/Task1-Case2.png used on input line 86.
@ -419,108 +604,109 @@ Package pdftex.def Info: ./Chapter5_img/Task1-Case2.png used on input line 86.
LaTeX Warning: No positions in optional float specifier.
Default added (so using `tbp') on input line 104.
[38] [39]
<./Chapter5_img/NA.png, id=199, 369.38pt x 118.4425pt>
[38] [39] [40]
<./Chapter5_img/NA.png, id=826, 369.38pt x 118.4425pt>
File: ./Chapter5_img/NA.png Graphic file (type png)
<use ./Chapter5_img/NA.png>
Package pdftex.def Info: ./Chapter5_img/NA.png used on input line 145.
(pdftex.def) Requested size: 184.68954pt x 59.2211pt.
<./Chapter5_img/Speedup-Esize-Tasking.png, id=200, 620.208pt x 321.93pt>
<./Chapter5_img/Speedup-Esize-Tasking.png, id=827, 620.208pt x 321.93pt>
File: ./Chapter5_img/Speedup-Esize-Tasking.png Graphic file (type png)
<use ./Chapter5_img/Speedup-Esize-Tasking.png>
Package pdftex.def Info: ./Chapter5_img/Speedup-Esize-Tasking.png used on inpu
t line 153.
(pdftex.def) Requested size: 469.75499pt x 243.83916pt.
<./Chapter5_img/Eff-Esize-Tasking.png, id=201, 620.208pt x 322.149pt>
<./Chapter5_img/Eff-Esize-Tasking.png, id=828, 620.208pt x 322.149pt>
File: ./Chapter5_img/Eff-Esize-Tasking.png Graphic file (type png)
<use ./Chapter5_img/Eff-Esize-Tasking.png>
Package pdftex.def Info: ./Chapter5_img/Eff-Esize-Tasking.png used on input li
ne 154.
(pdftex.def) Requested size: 469.75499pt x 244.00504pt.
<./Chapter5_img/Tasking_RT.png, id=202, 860.46469pt x 257.96375pt>
<./Chapter5_img/Tasking_RT.png, id=829, 860.46469pt x 257.96375pt>
File: ./Chapter5_img/Tasking_RT.png Graphic file (type png)
<use ./Chapter5_img/Tasking_RT.png>
Package pdftex.def Info: ./Chapter5_img/Tasking_RT.png used on input line 161.
(pdftex.def) Requested size: 469.75499pt x 140.83345pt.
<./Chapter5_img/Tasking_Spd.png, id=203, 860.46469pt x 276.53313pt>
<./Chapter5_img/Tasking_Spd.png, id=830, 860.46469pt x 276.53313pt>
File: ./Chapter5_img/Tasking_Spd.png Graphic file (type png)
<use ./Chapter5_img/Tasking_Spd.png>
Package pdftex.def Info: ./Chapter5_img/Tasking_Spd.png used on input line 168
.
(pdftex.def) Requested size: 469.75499pt x 150.97128pt.
<./Chapter5_img/Tasking_Eff.png, id=204, 860.46469pt x 276.53313pt>
<./Chapter5_img/Tasking_Eff.png, id=831, 860.46469pt x 276.53313pt>
File: ./Chapter5_img/Tasking_Eff.png Graphic file (type png)
<use ./Chapter5_img/Tasking_Eff.png>
Package pdftex.def Info: ./Chapter5_img/Tasking_Eff.png used on input line 175
.
(pdftex.def) Requested size: 469.75499pt x 150.97128pt.
[40] [41 <./Chapter5_img/NA.png> <./Chapter5_img/Speedup-Esize-Tasking.png> <.
/Chapter5_img/Eff-Esize-Tasking.png>] [42 <./Chapter5_img/Tasking_RT.png> <./Ch
apter5_img/Tasking_Spd.png> <./Chapter5_img/Tasking_Eff.png>] [43]
<./Chapter5_img/subgraphing.drawio.png, id=219, 816.04875pt x 745.78625pt>
[41 <./Chapter5_img/NA.png>] [42 <./Chapter5_img/Speedup-Esize-Tasking.png> <.
/Chapter5_img/Eff-Esize-Tasking.png>] [43 <./Chapter5_img/Tasking_RT.png> <./Ch
apter5_img/Tasking_Spd.png> <./Chapter5_img/Tasking_Eff.png>]
<./Chapter5_img/subgraphing.drawio.png, id=852, 816.04875pt x 745.78625pt>
File: ./Chapter5_img/subgraphing.drawio.png Graphic file (type png)
<use ./Chapter5_img/subgraphing.drawio.png>
Package pdftex.def Info: ./Chapter5_img/subgraphing.drawio.png used on input l
ine 189.
(pdftex.def) Requested size: 244.81651pt x 223.7376pt.
[44 <./Chapter5_img/subgraphing.drawio.png>]
<./Chapter5_img/front_merge.drawio.png, id=225, 1059.96pt x 465.74pt>
[44] [45 <./Chapter5_img/subgraphing.drawio.png>]
<./Chapter5_img/front_merge.drawio.png, id=864, 1059.96pt x 465.74pt>
File: ./Chapter5_img/front_merge.drawio.png Graphic file (type png)
<use ./Chapter5_img/front_merge.drawio.png>
Package pdftex.def Info: ./Chapter5_img/front_merge.drawio.png used on input l
ine 202.
(pdftex.def) Requested size: 469.75499pt x 206.4044pt.
[45]
[46 <./Chapter5_img/front_merge.drawio.png>]
LaTeX Warning: No positions in optional float specifier.
Default added (so using `tbp') on input line 216.
[46 <./Chapter5_img/front_merge.drawio.png>] [47]
<./Chapter5_img/MPISubg_RT_No_DHT.png, id=236, 399.018pt x 250.098pt>
[47]
<./Chapter5_img/MPISubg_RT_No_DHT.png, id=880, 399.018pt x 250.098pt>
File: ./Chapter5_img/MPISubg_RT_No_DHT.png Graphic file (type png)
<use ./Chapter5_img/MPISubg_RT_No_DHT.png>
Package pdftex.def Info: ./Chapter5_img/MPISubg_RT_No_DHT.png used on input li
ne 254.
(pdftex.def) Requested size: 469.75499pt x 294.44524pt.
<./Chapter5_img/no_DHT_Spd.png, id=237, 424.422pt x 249.003pt>
[48]
<./Chapter5_img/no_DHT_Spd.png, id=885, 424.422pt x 249.003pt>
File: ./Chapter5_img/no_DHT_Spd.png Graphic file (type png)
<use ./Chapter5_img/no_DHT_Spd.png>
Package pdftex.def Info: ./Chapter5_img/no_DHT_Spd.png used on input line 262.
(pdftex.def) Requested size: 469.75499pt x 275.60631pt.
<./Chapter5_img/no_DHT_eff.png, id=238, 429.021pt x 249.222pt>
<./Chapter5_img/no_DHT_eff.png, id=886, 429.021pt x 249.222pt>
File: ./Chapter5_img/no_DHT_eff.png Graphic file (type png)
<use ./Chapter5_img/no_DHT_eff.png>
Package pdftex.def Info: ./Chapter5_img/no_DHT_eff.png used on input line 263.
(pdftex.def) Requested size: 469.75499pt x 272.8939pt.
[48 <./Chapter5_img/MPISubg_RT_No_DHT.png>] [49 <./Chapter5_img/no_DHT_Spd.png
[49 <./Chapter5_img/MPISubg_RT_No_DHT.png>] [50 <./Chapter5_img/no_DHT_Spd.png
> <./Chapter5_img/no_DHT_eff.png>]
<./Chapter5_img/dup.drawio.png, id=248, 815.045pt x 744.7825pt>
<./Chapter5_img/dup.drawio.png, id=907, 815.045pt x 744.7825pt>
File: ./Chapter5_img/dup.drawio.png Graphic file (type png)
<use ./Chapter5_img/dup.drawio.png>
Package pdftex.def Info: ./Chapter5_img/dup.drawio.png used on input line 271.
(pdftex.def) Requested size: 469.75499pt x 429.25806pt.
<./Chapter5_img/Dup_DHT.png, id=249, 796.065pt x 483.99pt>
<./Chapter5_img/Dup_DHT.png, id=908, 796.065pt x 483.99pt>
File: ./Chapter5_img/Dup_DHT.png Graphic file (type png)
<use ./Chapter5_img/Dup_DHT.png>
Package pdftex.def Info: ./Chapter5_img/Dup_DHT.png used on input line 278.
(pdftex.def) Requested size: 469.75499pt x 285.59593pt.
[50] [51 <./Chapter5_img/dup.drawio.png>] [52 <./Chapter5_img/Dup_DHT.png>]
<./Chapter5_img/DHT_Spd.png, id=262, 421.575pt x 233.235pt>
[51] [52 <./Chapter5_img/dup.drawio.png>] [53 <./Chapter5_img/Dup_DHT.png>]
<./Chapter5_img/DHT_Spd.png, id=926, 421.575pt x 233.235pt>
File: ./Chapter5_img/DHT_Spd.png Graphic file (type png)
<use ./Chapter5_img/DHT_Spd.png>
Package pdftex.def Info: ./Chapter5_img/DHT_Spd.png used on input line 288.
(pdftex.def) Requested size: 469.75499pt x 259.89395pt.
<./Chapter5_img/DHT_Eff.png, id=263, 422.889pt x 233.235pt>
<./Chapter5_img/DHT_Eff.png, id=927, 422.889pt x 233.235pt>
File: ./Chapter5_img/DHT_Eff.png Graphic file (type png)
<use ./Chapter5_img/DHT_Eff.png>
Package pdftex.def Info: ./Chapter5_img/DHT_Eff.png used on input line 289.
(pdftex.def) Requested size: 469.75499pt x 259.08965pt.
<./Chapter5_img/DHT_noDHT.png, id=264, 806.577pt x 496.692pt>
<./Chapter5_img/DHT_noDHT.png, id=928, 806.577pt x 496.692pt>
File: ./Chapter5_img/DHT_noDHT.png Graphic file (type png)
<use ./Chapter5_img/DHT_noDHT.png>
Package pdftex.def Info: ./Chapter5_img/DHT_noDHT.png used on input line 295.
@ -534,26 +720,30 @@ LaTeX Warning: No positions in optional float specifier.
LaTeX Warning: No positions in optional float specifier.
Default added (so using `tbp') on input line 326.
[53] [54 <./Chapter5_img/DHT_Spd.png> <./Chapter5_img/DHT_Eff.png>] [55 <./Chap
ter5_img/DHT_noDHT.png>]) [56]
[54] [55 <./Chapter5_img/DHT_Spd.png> <./Chapter5_img/DHT_Eff.png>] [56 <./Chap
ter5_img/DHT_noDHT.png>]) [57]
\openout2 = `Chapter6.aux'.
(./Chapter6.tex
CHAPTER 6.
[57
Package hyperref Warning: Token not allowed in a PDF string (Unicode):
(hyperref) removing `\uppercase' on input line 1.
[58
]
<./Chapter5_img/MPI-OpenMP-Blend.PNG, id=284, 613.04031pt x 354.07281pt>
<./Chapter5_img/MPI-OpenMP-Blend.PNG, id=975, 613.04031pt x 354.07281pt>
File: ./Chapter5_img/MPI-OpenMP-Blend.PNG Graphic file (type png)
<use ./Chapter5_img/MPI-OpenMP-Blend.PNG>
Package pdftex.def Info: ./Chapter5_img/MPI-OpenMP-Blend.PNG used on input lin
e 21.
(pdftex.def) Requested size: 469.75499pt x 271.31865pt.
[58] [59 <./Chapter5_img/MPI-OpenMP-Blend.PNG>]) [60]
(./Schrick-Noah_MS-Thesis.bbl [61
[59] [60 <./Chapter5_img/MPI-OpenMP-Blend.PNG>]) [61]
(./Schrick-Noah_MS-Thesis.bbl [62
@ -581,31 +771,35 @@ Underfull \hbox (badness 2119) in paragraph at lines 51--54
ntent/pkg/PLAW-
[]
[62] [63]
[63] [64]
Underfull \hbox (badness 1383) in paragraph at lines 175--178
[]\OT1/cmr/m/n/12 Lawrence Liv-er-more Na-tional Lab-o-ra-tory, ``mpiP, a light
-weight MPI pro-filer.''
[]
) [64] (./Schrick-Noah_MS-Thesis.aux (./Chapter1.aux) (./Chapter2.aux)
(./Chapter3.aux) (./Chapter4.aux) (./Chapter5.aux) (./Chapter6.aux)) )
) [65] (./Schrick-Noah_MS-Thesis.aux (./Chapter1.aux) (./Chapter2.aux)
(./Chapter3.aux) (./Chapter4.aux) (./Chapter5.aux) (./Chapter6.aux))
Package rerunfilecheck Info: File `Schrick-Noah_MS-Thesis.out' has not changed.
(rerunfilecheck) Checksum: 72B182CEA8EA838D8E69B93377827AA4;11879.
)
(\end occurred inside a group at level 6)
### semi simple group (level 6) entered at line 198 (\begingroup)
### semi simple group (level 5) entered at line 183 (\begingroup)
### semi simple group (level 4) entered at line 183 (\begingroup)
### semi simple group (level 3) entered at line 183 (\begingroup)
### semi simple group (level 2) entered at line 183 (\begingroup)
### semi simple group (level 6) entered at line 210 (\begingroup)
### semi simple group (level 5) entered at line 194 (\begingroup)
### semi simple group (level 4) entered at line 194 (\begingroup)
### semi simple group (level 3) entered at line 194 (\begingroup)
### semi simple group (level 2) entered at line 194 (\begingroup)
### semi simple group (level 1) entered at line 52 (\begingroup)
### bottom level
Here is how much of TeX's memory you used:
4485 strings out of 478276
84152 string characters out of 5853013
387130 words of memory out of 5000000
22591 multiletter control sequences out of 15000+600000
11500 strings out of 478238
194018 string characters out of 5850456
500725 words of memory out of 5000000
29324 multiletter control sequences out of 15000+600000
473155 words of font info for 41 fonts, out of 8000000 for 9000
1141 hyphenation exceptions out of 8191
67i,9n,77p,2339b,1440s stack positions out of 5000i,500n,10000p,200000b,80000s
67i,9n,77p,2343b,2200s stack positions out of 5000i,500n,10000p,200000b,80000s
{/usr/share/texmf-dist/fonts/enc/dvips/cm-super/cm-super-ts1.en
c}</usr/share/texmf-dist/fonts/type1/public/amsfonts/cm/cmbx12.pfb></usr/share/
texmf-dist/fonts/type1/public/amsfonts/cm/cmmi12.pfb></usr/share/texmf-dist/fon
@ -614,10 +808,10 @@ ts/type1/public/amsfonts/cm/cmr12.pfb></usr/share/texmf-dist/fonts/type1/public
y10.pfb></usr/share/texmf-dist/fonts/type1/public/amsfonts/cm/cmti12.pfb></usr/
share/texmf-dist/fonts/type1/public/amsfonts/cm/cmtt12.pfb></usr/share/texmf-di
st/fonts/type1/public/cm-super/sfrm1200.pfb>
Output written on Schrick-Noah_MS-Thesis.pdf (75 pages, 2642634 bytes).
Output written on Schrick-Noah_MS-Thesis.pdf (76 pages, 2666133 bytes).
PDF statistics:
347 PDF objects out of 1000 (max. 8388607)
194 compressed objects within 2 object streams
0 named destinations out of 1000 (max. 500000)
161 words of extra memory for PDF output out of 10000 (max. 10000000)
1092 PDF objects out of 1200 (max. 8388607)
930 compressed objects within 10 object streams
209 named destinations out of 1000 (max. 500000)
713 words of extra memory for PDF output out of 10000 (max. 10000000)

View File

@ -1,7 +1,7 @@
{\vspace {\baselineskip }}
\contentsline {table}{\numberline {4.1}{\ignorespaces Tabled Results for the Non-Synchronous Firing Testing\relax }}{28}{}%
\contentsline {table}{\numberline {4.2}{\ignorespaces Tabled Results for the Synchronous Firing Testing\relax }}{28}{}%
\contentsline {table}{\numberline {5.1}{\ignorespaces MPI Tags for the MPI Tasking Approach\relax }}{39}{}%
\contentsline {table}{\numberline {5.2}{\ignorespaces MPI Tags for the MPI Subgraphing Approach\relax }}{47}{}%
\contentsline {table}{\numberline {5.3}{\ignorespaces MPI Communication Time Percentage in Relation to the Overall Program Runtime for the 1 Service Test\relax }}{53}{}%
\contentsline {table}{\numberline {5.4}{\ignorespaces MPI Communication Time Percentage in Relation to the Overall Program Runtime for the 4 Service Test\relax }}{55}{}%
\contentsline {table}{\numberline {4.1}{\ignorespaces Tabled Results for the Non-Synchronous Firing Testing\relax }}{26}{table.caption.9}%
\contentsline {table}{\numberline {4.2}{\ignorespaces Tabled Results for the Synchronous Firing Testing\relax }}{27}{table.caption.10}%
\contentsline {table}{\numberline {5.1}{\ignorespaces MPI Tags for the MPI Tasking Approach\relax }}{39}{table.caption.16}%
\contentsline {table}{\numberline {5.2}{\ignorespaces MPI Tags for the MPI Subgraphing Approach\relax }}{47}{table.caption.24}%
\contentsline {table}{\numberline {5.3}{\ignorespaces MPI Communication Time Percentage in Relation to the Overall Program Runtime for the 1 Service Test\relax }}{54}{table.caption.31}%
\contentsline {table}{\numberline {5.4}{\ignorespaces MPI Communication Time Percentage in Relation to the Overall Program Runtime for the 4 Service Test\relax }}{56}{table.caption.32}%

View File

@ -0,0 +1,69 @@
\BOOKMARK [1][-]{Doc-Start}{\376\377\000C\000O\000P\000Y\000R\000I\000G\000H\000T}{}% 1
\BOOKMARK [1][-]{Doc-Start}{\376\377\000A\000B\000S\000T\000R\000A\000C\000T}{}% 2
\BOOKMARK [1][-]{Doc-Start}{\376\377\000A\000C\000K\000N\000O\000W\000L\000E\000D\000G\000E\000M\000E\000N\000T\000S}{}% 3
\BOOKMARK [1][-]{Doc-Start}{\376\377\000T\000A\000B\000L\000E\000\040\000O\000F\000\040\000C\000O\000N\000T\000E\000N\000T\000S}{}% 4
\BOOKMARK [1][-]{Doc-Start}{\376\377\000L\000I\000S\000T\000\040\000O\000F\000\040\000T\000A\000B\000L\000E\000S}{}% 5
\BOOKMARK [1][-]{Doc-Start}{\376\377\000L\000I\000S\000T\000\040\000O\000F\000\040\000F\000I\000G\000U\000R\000E\000S}{}% 6
\BOOKMARK [0][-]{chapter.1}{\376\377\000I\000N\000T\000R\000O\000D\000U\000C\000T\000I\000O\000N}{}% 7
\BOOKMARK [1][-]{section.1.1}{\376\377\000I\000n\000t\000r\000o\000d\000u\000c\000t\000i\000o\000n\000\040\000t\000o\000\040\000A\000t\000t\000a\000c\000k\000\040\000G\000r\000a\000p\000h\000s}{chapter.1}% 8
\BOOKMARK [1][-]{section.1.2}{\376\377\000A\000p\000p\000l\000i\000c\000a\000t\000i\000o\000n\000\040\000t\000o\000\040\000C\000o\000m\000p\000l\000i\000a\000n\000c\000e}{chapter.1}% 9
\BOOKMARK [2][-]{subsection.1.2.1}{\376\377\000I\000n\000t\000r\000o\000d\000u\000c\000t\000i\000o\000n\000\040\000t\000o\000\040\000C\000o\000m\000p\000l\000i\000a\000n\000c\000e\000\040\000G\000r\000a\000p\000h\000s}{section.1.2}% 10
\BOOKMARK [2][-]{subsection.1.2.2}{\376\377\000D\000e\000f\000i\000n\000i\000n\000g\000\040\000C\000o\000m\000p\000l\000i\000a\000n\000c\000e\000\040\000G\000r\000a\000p\000h\000s}{section.1.2}% 11
\BOOKMARK [2][-]{subsection.1.2.3}{\376\377\000D\000i\000f\000f\000i\000c\000u\000l\000t\000i\000e\000s\000\040\000o\000f\000\040\000C\000o\000m\000p\000l\000i\000a\000n\000c\000e\000\040\000G\000r\000a\000p\000h\000s}{section.1.2}% 12
\BOOKMARK [1][-]{section.1.3}{\376\377\000O\000b\000j\000e\000c\000t\000i\000v\000e\000s\000\040\000a\000n\000d\000\040\000C\000o\000n\000t\000r\000i\000b\000u\000t\000i\000o\000n\000s}{chapter.1}% 13
\BOOKMARK [0][-]{chapter.2}{\376\377\000R\000E\000L\000A\000T\000E\000D\000\040\000W\000O\000R\000K\000S}{}% 14
\BOOKMARK [1][-]{section.2.1}{\376\377\000I\000n\000t\000r\000o\000d\000u\000c\000t\000i\000o\000n\000\040\000t\000o\000\040\000G\000r\000a\000p\000h\000\040\000G\000e\000n\000e\000r\000a\000t\000i\000o\000n}{chapter.2}% 15
\BOOKMARK [1][-]{section.2.2}{\376\377\000G\000r\000a\000p\000h\000\040\000G\000e\000n\000e\000r\000a\000t\000i\000o\000n\000\040\000I\000m\000p\000r\000o\000v\000e\000m\000e\000n\000t\000s}{chapter.2}% 16
\BOOKMARK [1][-]{section.2.3}{\376\377\000I\000m\000p\000r\000o\000v\000e\000m\000e\000n\000t\000s\000\040\000S\000p\000e\000c\000i\000f\000i\000c\000\040\000t\000o\000\040\000A\000t\000t\000a\000c\000k\000\040\000G\000r\000a\000p\000h\000\040\000G\000e\000n\000e\000r\000a\000t\000i\000o\000n}{chapter.2}% 17
\BOOKMARK [0][-]{chapter.3}{\376\377\000U\000T\000I\000L\000I\000T\000Y\000\040\000E\000X\000T\000E\000N\000S\000I\000O\000N\000S\000\040\000T\000O\000\040\000T\000H\000E\000\040\000R\000A\000G\000E\000\040\000A\000T\000T\000A\000C\000K\000\040\000G\000R\000A\000P\000H\000\040\000G\000E\000N\000E\000R\000A\000T\000O\000R}{}% 18
\BOOKMARK [1][-]{section.3.1}{\376\377\000P\000a\000t\000h\000\040\000W\000a\000l\000k\000i\000n\000g}{chapter.3}% 19
\BOOKMARK [1][-]{section.3.2}{\376\377\000C\000o\000l\000o\000r\000\040\000C\000o\000d\000i\000n\000g}{chapter.3}% 20
\BOOKMARK [1][-]{section.3.3}{\376\377\000C\000o\000m\000p\000o\000u\000n\000d\000\040\000O\000p\000e\000r\000a\000t\000o\000r\000s}{chapter.3}% 21
\BOOKMARK [1][-]{section.3.4}{\376\377\000R\000e\000l\000a\000t\000i\000o\000n\000a\000l\000\040\000O\000p\000e\000r\000a\000t\000o\000r\000s}{chapter.3}% 22
\BOOKMARK [1][-]{section.3.5}{\376\377\000I\000n\000t\000e\000r\000m\000e\000d\000i\000a\000t\000e\000\040\000D\000a\000t\000a\000b\000a\000s\000e\000\040\000S\000t\000o\000r\000a\000g\000e}{chapter.3}% 23
\BOOKMARK [2][-]{subsection.3.5.1}{\376\377\000I\000n\000t\000r\000o\000d\000u\000c\000t\000i\000o\000n\000\040\000t\000o\000\040\000I\000n\000t\000e\000r\000m\000e\000d\000i\000a\000t\000e\000\040\000D\000a\000t\000a\000b\000a\000s\000e\000\040\000S\000t\000o\000r\000a\000g\000e}{section.3.5}% 24
\BOOKMARK [2][-]{subsection.3.5.2}{\376\377\000M\000e\000m\000o\000r\000y\000\040\000C\000o\000n\000s\000t\000r\000a\000i\000n\000t\000\040\000D\000i\000f\000f\000i\000c\000u\000l\000t\000i\000e\000s}{section.3.5}% 25
\BOOKMARK [2][-]{subsection.3.5.3}{\376\377\000M\000a\000x\000i\000m\000i\000z\000i\000n\000g\000\040\000P\000e\000r\000f\000o\000r\000m\000a\000n\000c\000e\000\040\000w\000i\000t\000h\000\040\000I\000n\000t\000e\000r\000m\000e\000d\000i\000a\000t\000e\000\040\000D\000a\000t\000a\000b\000a\000s\000e\000\040\000S\000t\000o\000r\000a\000g\000e}{section.3.5}% 26
\BOOKMARK [2][-]{subsection.3.5.4}{\376\377\000P\000o\000r\000t\000a\000b\000i\000l\000i\000t\000y}{section.3.5}% 27
\BOOKMARK [0][-]{chapter.4}{\376\377\000S\000Y\000N\000C\000H\000R\000O\000N\000O\000U\000S\000\040\000F\000I\000R\000I\000N\000G}{}% 28
\BOOKMARK [1][-]{section.4.1}{\376\377\000I\000n\000t\000r\000o\000d\000u\000c\000t\000i\000o\000n}{chapter.4}% 29
\BOOKMARK [2][-]{subsection.4.1.1}{\376\377\000R\000e\000l\000a\000t\000e\000d\000\040\000S\000y\000n\000c\000h\000r\000o\000n\000o\000u\000s\000\040\000F\000i\000r\000i\000n\000g\000\040\000W\000o\000r\000k}{section.4.1}% 30
\BOOKMARK [1][-]{section.4.2}{\376\377\000N\000e\000c\000e\000s\000s\000a\000r\000y\000\040\000A\000l\000t\000e\000r\000a\000t\000i\000o\000n\000s\000\040\000a\000n\000d\000\040\000A\000d\000d\000i\000t\000i\000o\000n\000s}{chapter.4}% 31
\BOOKMARK [2][-]{subsection.4.2.1}{\376\377\000G\000N\000U\000\040\000B\000i\000s\000o\000n\000\040\000a\000n\000d\000\040\000F\000l\000e\000x}{section.4.2}% 32
\BOOKMARK [2][-]{subsection.4.2.2}{\376\377\000P\000o\000s\000t\000g\000r\000e\000S\000Q\000L}{section.4.2}% 33
\BOOKMARK [2][-]{subsection.4.2.3}{\376\377\000C\000o\000m\000p\000o\000u\000n\000d\000\040\000O\000p\000e\000r\000a\000t\000o\000r\000s}{section.4.2}% 34
\BOOKMARK [2][-]{subsection.4.2.4}{\376\377\000G\000r\000a\000p\000h\000\040\000G\000e\000n\000e\000r\000a\000t\000i\000o\000n}{section.4.2}% 35
\BOOKMARK [1][-]{section.4.3}{\376\377\000E\000x\000p\000e\000r\000i\000m\000e\000n\000t\000a\000l\000\040\000N\000e\000t\000w\000o\000r\000k\000s\000\040\000a\000n\000d\000\040\000R\000e\000s\000u\000l\000t\000s}{chapter.4}% 36
\BOOKMARK [2][-]{subsection.4.3.1}{\376\377\000E\000x\000p\000e\000r\000i\000m\000e\000n\000t\000a\000l\000\040\000N\000e\000t\000w\000o\000r\000k\000s}{section.4.3}% 37
\BOOKMARK [2][-]{subsection.4.3.2}{\376\377\000R\000e\000s\000u\000l\000t\000s}{section.4.3}% 38
\BOOKMARK [0][-]{chapter.5}{\376\377\000P\000a\000r\000a\000l\000l\000e\000l\000i\000z\000a\000t\000i\000o\000n\000\040\000U\000s\000i\000n\000g\000\040\000M\000E\000S\000S\000A\000G\000E\000\040\000P\000A\000S\000S\000I\000N\000G\000\040\000I\000N\000T\000E\000R\000F\000A\000C\000E}{}% 39
\BOOKMARK [1][-]{section.5.1}{\376\377\000I\000n\000t\000r\000o\000d\000u\000c\000t\000i\000o\000n\000\040\000t\000o\000\040\000M\000P\000I\000\040\000U\000t\000i\000l\000i\000z\000a\000t\000i\000o\000n\000\040\000f\000o\000r\000\040\000A\000t\000t\000a\000c\000k\000\040\000a\000n\000d\000\040\000C\000o\000m\000p\000l\000i\000a\000n\000c\000e\000\040\000G\000r\000a\000p\000h\000\040\000G\000e\000n\000e\000r\000a\000t\000i\000o\000n}{chapter.5}% 40
\BOOKMARK [1][-]{section.5.2}{\376\377\000N\000e\000c\000e\000s\000s\000a\000r\000y\000\040\000C\000o\000m\000p\000o\000n\000e\000n\000t\000s}{chapter.5}% 41
\BOOKMARK [2][-]{subsection.5.2.1}{\376\377\000S\000e\000r\000i\000a\000l\000i\000z\000a\000t\000i\000o\000n}{section.5.2}% 42
\BOOKMARK [1][-]{section.5.3}{\376\377\000T\000a\000s\000k\000i\000n\000g\000\040\000A\000p\000p\000r\000o\000a\000c\000h}{chapter.5}% 43
\BOOKMARK [2][-]{subsection.5.3.1}{\376\377\000I\000n\000t\000r\000o\000d\000u\000c\000t\000i\000o\000n\000\040\000t\000o\000\040\000t\000h\000e\000\040\000T\000a\000s\000k\000i\000n\000g\000\040\000A\000p\000p\000r\000o\000a\000c\000h}{section.5.3}% 44
\BOOKMARK [2][-]{subsection.5.3.2}{\376\377\000A\000l\000g\000o\000r\000i\000t\000h\000m\000\040\000D\000e\000s\000i\000g\000n}{section.5.3}% 45
\BOOKMARK [3][-]{subsubsection.5.3.2.1}{\376\377\000C\000o\000m\000m\000u\000n\000i\000c\000a\000t\000i\000o\000n\000\040\000S\000t\000r\000u\000c\000t\000u\000r\000e}{subsection.5.3.2}% 46
\BOOKMARK [3][-]{subsubsection.5.3.2.2}{\376\377\000T\000a\000s\000k\000\040\0000}{subsection.5.3.2}% 47
\BOOKMARK [3][-]{subsubsection.5.3.2.3}{\376\377\000T\000a\000s\000k\000\040\0001}{subsection.5.3.2}% 48
\BOOKMARK [3][-]{subsubsection.5.3.2.4}{\376\377\000T\000a\000s\000k\000\040\0002}{subsection.5.3.2}% 49
\BOOKMARK [3][-]{subsubsection.5.3.2.5}{\376\377\000T\000a\000s\000k\000\040\0003}{subsection.5.3.2}% 50
\BOOKMARK [3][-]{subsubsection.5.3.2.6}{\376\377\000T\000a\000s\000k\000\040\0004\000\040\000a\000n\000d\000\040\000T\000a\000s\000k\000\040\0005}{subsection.5.3.2}% 51
\BOOKMARK [3][-]{subsubsection.5.3.2.7}{\376\377\000M\000P\000I\000\040\000T\000a\000g\000s}{subsection.5.3.2}% 52
\BOOKMARK [2][-]{subsection.5.3.3}{\376\377\000P\000e\000r\000f\000o\000r\000m\000a\000n\000c\000e\000\040\000E\000x\000p\000e\000c\000t\000a\000t\000i\000o\000n\000s\000\040\000a\000n\000d\000\040\000U\000s\000e\000\040\000C\000a\000s\000e\000s}{section.5.3}% 53
\BOOKMARK [2][-]{subsection.5.3.4}{\376\377\000R\000e\000s\000u\000l\000t\000s}{section.5.3}% 54
\BOOKMARK [1][-]{section.5.4}{\376\377\000S\000u\000b\000g\000r\000a\000p\000h\000i\000n\000g\000\040\000A\000p\000p\000r\000o\000a\000c\000h}{chapter.5}% 55
\BOOKMARK [2][-]{subsection.5.4.1}{\376\377\000I\000n\000t\000r\000o\000d\000u\000c\000t\000i\000o\000n\000\040\000t\000o\000\040\000t\000h\000e\000\040\000S\000u\000b\000g\000r\000a\000p\000h\000i\000n\000g\000\040\000A\000p\000p\000r\000o\000a\000c\000h}{section.5.4}% 56
\BOOKMARK [2][-]{subsection.5.4.2}{\376\377\000A\000l\000g\000o\000r\000i\000t\000h\000m\000\040\000D\000e\000s\000i\000g\000n}{section.5.4}% 57
\BOOKMARK [3][-]{subsubsection.5.4.2.1}{\376\377\000W\000o\000r\000k\000e\000r\000\040\000N\000o\000d\000e\000s}{subsection.5.4.2}% 58
\BOOKMARK [3][-]{subsubsection.5.4.2.2}{\376\377\000R\000o\000o\000t\000\040\000N\000o\000d\000e}{subsection.5.4.2}% 59
\BOOKMARK [3][-]{subsubsection.5.4.2.3}{\376\377\000D\000a\000t\000a\000b\000a\000s\000e\000\040\000N\000o\000d\000e}{subsection.5.4.2}% 60
\BOOKMARK [3][-]{subsubsection.5.4.2.4}{\376\377\000M\000P\000I\000\040\000T\000a\000g\000s}{subsection.5.4.2}% 61
\BOOKMARK [2][-]{subsection.5.4.3}{\376\377\000P\000e\000r\000f\000o\000r\000m\000a\000n\000c\000e\000\040\000E\000x\000p\000e\000c\000t\000a\000t\000i\000o\000n\000s\000\040\000a\000n\000d\000\040\000U\000s\000e\000\040\000C\000a\000s\000e\000s}{section.5.4}% 62
\BOOKMARK [2][-]{subsection.5.4.4}{\376\377\000R\000e\000s\000u\000l\000t\000s}{section.5.4}% 63
\BOOKMARK [2][-]{subsection.5.4.5}{\376\377\000S\000u\000b\000g\000r\000a\000p\000h\000i\000n\000g\000\040\000R\000e\000s\000u\000l\000t\000\040\000A\000n\000a\000l\000y\000s\000i\000s}{section.5.4}% 64
\BOOKMARK [0][-]{chapter.6}{\376\377\000C\000O\000N\000C\000L\000U\000S\000I\000O\000N\000S\000\040\000A\000N\000D\000\040\000F\000U\000T\000U\000R\000E\000\040\000W\000O\000R\000K\000S}{}% 65
\BOOKMARK [1][-]{section.6.1}{\376\377\000C\000o\000n\000c\000l\000u\000s\000i\000o\000n\000s}{chapter.6}% 66
\BOOKMARK [1][-]{section.6.2}{\376\377\000F\000u\000t\000u\000r\000e\000\040\000W\000o\000r\000k}{chapter.6}% 67
\BOOKMARK [1][-]{figure.caption.33}{\376\377\000N\000O\000M\000E\000N\000C\000L\000A\000T\000U\000R\000E}{chapter.6}% 68
\BOOKMARK [1][-]{figure.caption.33}{\376\377\000B\000I\000B\000L\000I\000O\000G\000R\000A\000P\000H\000Y}{chapter.6}% 69

Binary file not shown.

View File

@ -94,6 +94,16 @@
\usepackage{subcaption}
\usepackage{algorithm}
\usepackage[noend]{algpseudocode}
\setlength\intextsep{20mm}
\setlength\textfloatsep{20mm}
\usepackage[hidelinks]{hyperref}
\hypersetup{
colorlinks,
citecolor=black,
filecolor=black,
linkcolor=black,
urlcolor=black
}
% Added by Richard D Redner 2017-08-16
% If, in the List of Tables or List of Figures, the figure/table numbers
@ -103,6 +113,7 @@
\cftsetindents{figure}{0em}{3.5em}
\cftsetindents{table}{0em}{3.5em}
% Modified by Richard D. Redner on February 1, 2016.
% Uncomment \pdffalse if your are using plain LaTeX.
\usepackage{ifpdf} %\pdffalse
@ -155,10 +166,10 @@
\fifthmember{} % as needed
\sixthmember{} % as needed
\numofpages{75} % number of pages in the document
\numofpages{76} % number of pages in the document
\numofchapters=6 % number of chapters in the document
\lastchapter{Conclusions and Future Works} % the title of the last numbered chapter
\numofabstractwords{196} % number of words in the abstract
\numofabstractwords{203} % number of words in the abstract
%
% If this is a thesis use \thesistrue
@ -186,14 +197,15 @@
%
% Place the text of the abstract here
%
Attack graphs have historically been used to represent the state of a system or set of systems, and illustrate ways that attackers can carry out exploits to put the systems in a critical position. By refining the information and format of attack graphs, a similar process can be applied for compliance and regulation representations to illustrate ways that systems may violate or fall out of compliance in a format called compliance graphs. Like attack graphs, compliance graphs also suffer from the state space explosion problem, and generated graphs quickly become very large even for small networks. This work introduces extensions to an attack graph generator, RAGE attack graph engine (RAGE), to support compliance graph generation, and these extensions have led to successfully generating compliance graphs that can then be analyzed through an independent process. Additional extensions have been introduced to support the utility of RAGE, and this includes the implementation of a synchronous firing feature to prevent generation of states where assets deviate from a shared, inseparable feature such as time. The compliance graph generation algorithm has also been modified by two different approaches to expand the generation process to function for distributed computing environments using Message Passing Interface (MPI).
Attack graphs have historically been used to represent the state of a system or set of systems, and illustrate ways that attackers can carry out exploits to put the systems in a critical position. By refining the information and format of attack graphs, a similar process can be applied for compliance and regulation representations to illustrate ways that systems may violate or fall out of compliance. These representations are in formats known as compliance graphs. Like attack graphs, compliance graphs also suffer from the state space explosion problem, and generated graphs quickly become very large even for small networks. This work introduces extensions to an attack graph generator, RAGE attack graph engine (RAGE), to support compliance graph generation, and these extensions have led to successfully generating compliance graphs that can then be analyzed through an independent process. Additional extensions have been introduced to support the utility of RAGE, and this includes the implementation of a synchronous firing feature to prevent generation of states where assets deviate from a shared, inseparable feature such as time. The compliance graph generation algorithm has also been modified by two different approaches to expand the generation process to function for distributed computing environments using Message Passing Interface (MPI).
\acknowledgementsp
%
% Place the text of your acknowledgements page here
%
I would like to acknowledge and give my sincerest gratitude to my wife for all of her continued support and patience through this process. I would also like to extend this appreciation to all my family and friends, who have provided constant encouragement and motivation during my work.
I would also like to greatly thank my advisor, Dr. Hawrylak, for his guidance, support, and motivation during my time through this program. He has served as a remarkably vital role not only through this thesis, but also for the advice and encouragement offered throughout my graduate career. Further thanks to the members of my committee, Dr. Papa and Dr. Hale, who have also provided their expertise and support throughout this journey.
I would like to greatly thank my advisor, Dr. Hawrylak, for his guidance, support, and motivation during my time through this program. He has served as a remarkably vital role not only through this thesis, but also for the advice and encouragement offered throughout my graduate career. Further thanks to the members of my committee, Dr. Papa and Dr. Hale, who have also provided their expertise and support throughout this journey.
I would like to acknowledge and give my sincerest gratitude to my wife for all of her continued support and patience through this process. I would also like to extend this appreciation to all my family and friends, who have provided constant encouragement and motivation during my work.
\afteracknowledgementsp

View File

@ -1,78 +1,78 @@
{\vspace {3\baselineskip }}
\contentsline {section}{\hspace {-\parindent }COPYRIGHT}{iii}{}%
\contentsline {section}{\hspace {-\parindent }COPYRIGHT}{iii}{Doc-Start}%
{\hfill \ }
\contentsline {section}{\hspace {-\parindent }ABSTRACT}{iv}{}%
\contentsline {section}{\hspace {-\parindent }ABSTRACT}{iv}{Doc-Start}%
{\hfill \ }
\contentsline {section}{\hspace {-\parindent }ACKNOWLEDGEMENTS}{v}{}%
\contentsline {section}{\hspace {-\parindent }ACKNOWLEDGEMENTS}{v}{Doc-Start}%
{\hfill \ }
\contentsline {section}{\hspace {-\parindent }TABLE OF CONTENTS}{viii}{}%
\contentsline {section}{\hspace {-\parindent }TABLE OF CONTENTS}{viii}{Doc-Start}%
{\hfill \ }
\contentsline {section}{\hspace {-\parindent }LIST OF TABLES}{ix}{}%
\contentsline {section}{\hspace {-\parindent }LIST OF TABLES}{ix}{Doc-Start}%
{\hfill \ }
\contentsline {section}{\hspace {-\parindent }LIST OF FIGURES}{xi}{}%
\contentsline {chapter}{\numberline {CHAPTER 1: }{\bf \uppercase {INTRODUCTION}}}{1}{}%
\contentsline {section}{\numberline {1.1}\bf Introduction to Attack Graphs}{1}{}%
\contentsline {section}{\numberline {1.2}\bf Application to Compliance}{2}{}%
\contentsline {subsection}{\numberline {1.2.1}\it Introduction to Compliance Graphs}{2}{}%
\contentsline {subsection}{\numberline {1.2.2}\it Defining Compliance Graphs}{3}{}%
\contentsline {subsection}{\numberline {1.2.3}\it Difficulties of Compliance Graphs}{3}{}%
\contentsline {section}{\numberline {1.3}\bf Objectives and Contributions}{4}{}%
\contentsline {chapter}{\numberline {CHAPTER 2: }{\bf \uppercase {RELATED WORKS}}}{5}{}%
\contentsline {section}{\numberline {2.1}\bf Introduction to Graph Generation}{5}{}%
\contentsline {section}{\numberline {2.2}\bf Graph Generation Improvements}{5}{}%
\contentsline {section}{\numberline {2.3}\bf Improvements Specific to Attack Graph Generation}{6}{}%
\contentsline {chapter}{\numberline {CHAPTER 3: }{\bf \uppercase {UTILITY EXTENSIONS TO THE RAGE ATTACK GRAPH GENERATOR}}}{8}{}%
\contentsline {section}{\numberline {3.1}\bf Path Walking}{8}{}%
\contentsline {section}{\numberline {3.2}\bf Color Coding}{9}{}%
\contentsline {section}{\numberline {3.3}\bf Compound Operators}{10}{}%
\contentsline {section}{\numberline {3.4}\bf Relational Operators}{12}{}%
\contentsline {section}{\numberline {3.5}\bf Intermediate Database Storage}{13}{}%
\contentsline {subsection}{\numberline {3.5.1}\it Introduction to Intermediate Database Storage}{13}{}%
\contentsline {subsection}{\numberline {3.5.2}\it Memory Constraint Difficulties}{13}{}%
\contentsline {subsection}{\numberline {3.5.3}\it Maximizing Performance with Intermediate Database Storage}{15}{}%
\contentsline {subsection}{\numberline {3.5.4}\it Portability}{16}{}%
\contentsline {chapter}{\numberline {CHAPTER 4: }{\bf \uppercase {SYNCHRONOUS FIRING}}}{18}{}%
\contentsline {section}{\numberline {4.1}\bf Introduction}{18}{}%
\contentsline {subsection}{\numberline {4.1.1}\it Related Synchronous Firing Work}{19}{}%
\contentsline {section}{\numberline {4.2}\bf Necessary Alterations and Additions}{20}{}%
\contentsline {subsection}{\numberline {4.2.1}\it GNU Bison and Flex}{20}{}%
\contentsline {subsection}{\numberline {4.2.2}\it PostgreSQL}{21}{}%
\contentsline {subsection}{\numberline {4.2.3}\it Compound Operators}{22}{}%
\contentsline {subsection}{\numberline {4.2.4}\it Graph Generation}{22}{}%
\contentsline {section}{\numberline {4.3}\bf Experimental Networks and Results}{23}{}%
\contentsline {subsection}{\numberline {4.3.1}\it Experimental Networks}{23}{}%
\contentsline {subsection}{\numberline {4.3.2}\it Results}{25}{}%
\contentsline {chapter}{\numberline {CHAPTER 5: }{\bf \uppercase {Parallelization Using MESSAGE PASSING INTERFACE}}}{29}{}%
\contentsline {section}{\numberline {5.1}\bf Introduction to MPI Utilization for Attack and Compliance Graph Generation}{29}{}%
\contentsline {section}{\numberline {5.2}\bf Necessary Components}{29}{}%
\contentsline {subsection}{\numberline {5.2.1}\it Serialization}{29}{}%
\contentsline {section}{\numberline {5.3}\bf Tasking Approach}{30}{}%
\contentsline {subsection}{\numberline {5.3.1}\it Introduction to the Tasking Approach}{30}{}%
\contentsline {subsection}{\numberline {5.3.2}\it Algorithm Design}{32}{}%
\contentsline {subsubsection}{\numberline {5.3.2.1}Communication Structure}{34}{}%
\contentsline {subsubsection}{\numberline {5.3.2.2}Task 0}{34}{}%
\contentsline {subsubsection}{\numberline {5.3.2.3}Task 1}{34}{}%
\contentsline {subsubsection}{\numberline {5.3.2.4}Task 2}{35}{}%
\contentsline {subsubsection}{\numberline {5.3.2.5}Task 3}{37}{}%
\contentsline {subsubsection}{\numberline {5.3.2.6}Task 4 and Task 5}{37}{}%
\contentsline {subsubsection}{\numberline {5.3.2.7}MPI Tags}{38}{}%
\contentsline {subsection}{\numberline {5.3.3}\it Performance Expectations and Use Cases}{38}{}%
\contentsline {subsection}{\numberline {5.3.4}\it Results}{39}{}%
\contentsline {section}{\numberline {5.4}\bf Subgraphing Approach}{43}{}%
\contentsline {subsection}{\numberline {5.4.1}\it Introduction to the Subgraphing Approach}{43}{}%
\contentsline {subsection}{\numberline {5.4.2}\it Algorithm Design}{43}{}%
\contentsline {subsubsection}{\numberline {5.4.2.1}Worker Nodes}{44}{}%
\contentsline {subsubsection}{\numberline {5.4.2.2}Root Node}{45}{}%
\contentsline {subsubsection}{\numberline {5.4.2.3}Database Node}{46}{}%
\contentsline {subsubsection}{\numberline {5.4.2.4}MPI Tags}{46}{}%
\contentsline {subsection}{\numberline {5.4.3}\it Performance Expectations and Use Cases}{46}{}%
\contentsline {subsection}{\numberline {5.4.4}\it Results}{47}{}%
\contentsline {subsection}{\numberline {5.4.5}\it Subgraphing Result Analysis}{53}{}%
\contentsline {chapter}{\numberline {CHAPTER 6: }{\bf \uppercase {CONCLUSIONS AND FUTURE WORKS}}}{57}{}%
\contentsline {section}{\numberline {6.1}\bf Conclusions}{57}{}%
\contentsline {section}{\numberline {6.2}\bf Future Work}{58}{}%
\contentsline {section}{\hspace {-\parindent }LIST OF FIGURES}{xi}{Doc-Start}%
\contentsline {chapter}{\numberline {CHAPTER 1: }{\bf \uppercase {INTRODUCTION}}}{1}{chapter.1}%
\contentsline {section}{\numberline {1.1}\bf Introduction to Attack Graphs}{1}{section.1.1}%
\contentsline {section}{\numberline {1.2}\bf Application to Compliance}{2}{section.1.2}%
\contentsline {subsection}{\numberline {1.2.1}\it Introduction to Compliance Graphs}{2}{subsection.1.2.1}%
\contentsline {subsection}{\numberline {1.2.2}\it Defining Compliance Graphs}{3}{subsection.1.2.2}%
\contentsline {subsection}{\numberline {1.2.3}\it Difficulties of Compliance Graphs}{3}{subsection.1.2.3}%
\contentsline {section}{\numberline {1.3}\bf Objectives and Contributions}{4}{section.1.3}%
\contentsline {chapter}{\numberline {CHAPTER 2: }{\bf \uppercase {RELATED WORKS}}}{5}{chapter.2}%
\contentsline {section}{\numberline {2.1}\bf Introduction to Graph Generation}{5}{section.2.1}%
\contentsline {section}{\numberline {2.2}\bf Graph Generation Improvements}{5}{section.2.2}%
\contentsline {section}{\numberline {2.3}\bf Improvements Specific to Attack Graph Generation}{6}{section.2.3}%
\contentsline {chapter}{\numberline {CHAPTER 3: }{\bf \uppercase {UTILITY EXTENSIONS TO THE RAGE ATTACK GRAPH GENERATOR}}}{8}{chapter.3}%
\contentsline {section}{\numberline {3.1}\bf Path Walking}{8}{section.3.1}%
\contentsline {section}{\numberline {3.2}\bf Color Coding}{9}{section.3.2}%
\contentsline {section}{\numberline {3.3}\bf Compound Operators}{11}{section.3.3}%
\contentsline {section}{\numberline {3.4}\bf Relational Operators}{12}{section.3.4}%
\contentsline {section}{\numberline {3.5}\bf Intermediate Database Storage}{13}{section.3.5}%
\contentsline {subsection}{\numberline {3.5.1}\it Introduction to Intermediate Database Storage}{13}{subsection.3.5.1}%
\contentsline {subsection}{\numberline {3.5.2}\it Memory Constraint Difficulties}{14}{subsection.3.5.2}%
\contentsline {subsection}{\numberline {3.5.3}\it Maximizing Performance with Intermediate Database Storage}{15}{subsection.3.5.3}%
\contentsline {subsection}{\numberline {3.5.4}\it Portability}{17}{subsection.3.5.4}%
\contentsline {chapter}{\numberline {CHAPTER 4: }{\bf \uppercase {SYNCHRONOUS FIRING}}}{18}{chapter.4}%
\contentsline {section}{\numberline {4.1}\bf Introduction}{18}{section.4.1}%
\contentsline {subsection}{\numberline {4.1.1}\it Related Synchronous Firing Work}{19}{subsection.4.1.1}%
\contentsline {section}{\numberline {4.2}\bf Necessary Alterations and Additions}{20}{section.4.2}%
\contentsline {subsection}{\numberline {4.2.1}\it GNU Bison and Flex}{20}{subsection.4.2.1}%
\contentsline {subsection}{\numberline {4.2.2}\it PostgreSQL}{22}{subsection.4.2.2}%
\contentsline {subsection}{\numberline {4.2.3}\it Compound Operators}{22}{subsection.4.2.3}%
\contentsline {subsection}{\numberline {4.2.4}\it Graph Generation}{23}{subsection.4.2.4}%
\contentsline {section}{\numberline {4.3}\bf Experimental Networks and Results}{23}{section.4.3}%
\contentsline {subsection}{\numberline {4.3.1}\it Experimental Networks}{25}{subsection.4.3.1}%
\contentsline {subsection}{\numberline {4.3.2}\it Results}{26}{subsection.4.3.2}%
\contentsline {chapter}{\numberline {CHAPTER 5: }{\bf \uppercase {Parallelization Using MESSAGE PASSING INTERFACE}}}{29}{chapter.5}%
\contentsline {section}{\numberline {5.1}\bf Introduction to MPI Utilization for Attack and Compliance Graph Generation}{29}{section.5.1}%
\contentsline {section}{\numberline {5.2}\bf Necessary Components}{29}{section.5.2}%
\contentsline {subsection}{\numberline {5.2.1}\it Serialization}{29}{subsection.5.2.1}%
\contentsline {section}{\numberline {5.3}\bf Tasking Approach}{30}{section.5.3}%
\contentsline {subsection}{\numberline {5.3.1}\it Introduction to the Tasking Approach}{30}{subsection.5.3.1}%
\contentsline {subsection}{\numberline {5.3.2}\it Algorithm Design}{32}{subsection.5.3.2}%
\contentsline {subsubsection}{\numberline {5.3.2.1}Communication Structure}{34}{subsubsection.5.3.2.1}%
\contentsline {subsubsection}{\numberline {5.3.2.2}Task 0}{34}{subsubsection.5.3.2.2}%
\contentsline {subsubsection}{\numberline {5.3.2.3}Task 1}{34}{subsubsection.5.3.2.3}%
\contentsline {subsubsection}{\numberline {5.3.2.4}Task 2}{35}{subsubsection.5.3.2.4}%
\contentsline {subsubsection}{\numberline {5.3.2.5}Task 3}{37}{subsubsection.5.3.2.5}%
\contentsline {subsubsection}{\numberline {5.3.2.6}Task 4 and Task 5}{38}{subsubsection.5.3.2.6}%
\contentsline {subsubsection}{\numberline {5.3.2.7}MPI Tags}{38}{subsubsection.5.3.2.7}%
\contentsline {subsection}{\numberline {5.3.3}\it Performance Expectations and Use Cases}{38}{subsection.5.3.3}%
\contentsline {subsection}{\numberline {5.3.4}\it Results}{39}{subsection.5.3.4}%
\contentsline {section}{\numberline {5.4}\bf Subgraphing Approach}{41}{section.5.4}%
\contentsline {subsection}{\numberline {5.4.1}\it Introduction to the Subgraphing Approach}{41}{subsection.5.4.1}%
\contentsline {subsection}{\numberline {5.4.2}\it Algorithm Design}{44}{subsection.5.4.2}%
\contentsline {subsubsection}{\numberline {5.4.2.1}Worker Nodes}{44}{subsubsection.5.4.2.1}%
\contentsline {subsubsection}{\numberline {5.4.2.2}Root Node}{45}{subsubsection.5.4.2.2}%
\contentsline {subsubsection}{\numberline {5.4.2.3}Database Node}{47}{subsubsection.5.4.2.3}%
\contentsline {subsubsection}{\numberline {5.4.2.4}MPI Tags}{47}{subsubsection.5.4.2.4}%
\contentsline {subsection}{\numberline {5.4.3}\it Performance Expectations and Use Cases}{47}{subsection.5.4.3}%
\contentsline {subsection}{\numberline {5.4.4}\it Results}{48}{subsection.5.4.4}%
\contentsline {subsection}{\numberline {5.4.5}\it Subgraphing Result Analysis}{54}{subsection.5.4.5}%
\contentsline {chapter}{\numberline {CHAPTER 6: }{\bf \uppercase {CONCLUSIONS AND FUTURE WORKS}}}{58}{chapter.6}%
\contentsline {section}{\numberline {6.1}\bf Conclusions}{58}{section.6.1}%
\contentsline {section}{\numberline {6.2}\bf Future Work}{59}{section.6.2}%
{\hfill \ }
\contentsline {section}{\hspace {-\parindent }NOMENCLATURE}{61}{}%
\contentsline {section}{\hspace {-\parindent }NOMENCLATURE}{62}{figure.caption.33}%
\addvspace {10pt}
\contentsline {section}{\hspace {-\parindent }BIBLIOGRAPHY}{61}{}%
\contentsline {section}{\hspace {-\parindent }BIBLIOGRAPHY}{62}{figure.caption.33}%
{\hfill \ }

Binary file not shown.