\relax \@writefile{toc}{\contentsline {chapter}{\numberline {CHAPTER 5: }{\bf \uppercase {Utilization OF MESSAGE PASSING INTERFACE}}}{28}{}\protected@file@percent } \@writefile{toc}{\contentsline {section}{\numberline {5.1}\bf Introduction to MPI Utilization for Attack Graph Generation}{28}{}\protected@file@percent } \@writefile{toc}{\contentsline {section}{\numberline {5.2}\bf Necessary Components}{28}{}\protected@file@percent } \@writefile{toc}{\contentsline {subsection}{\numberline {5.2.1}\it Serialization}{28}{}\protected@file@percent } \citation{li_concurrency_2019} \citation{9150145} \citation{7087377} \@writefile{toc}{\contentsline {subsection}{\numberline {5.2.2}\it Data Consistency}{29}{}\protected@file@percent } \@writefile{toc}{\contentsline {section}{\numberline {5.3}\bf Tasking Approach}{29}{}\protected@file@percent } \newlabel{sec:Tasking-Approach}{{5.3}{29}} \@writefile{toc}{\contentsline {subsection}{\numberline {5.3.1}\it Introduction to the Tasking Approach}{29}{}\protected@file@percent } \@writefile{toc}{\contentsline {subsection}{\numberline {5.3.2}\it Algorithm Design}{29}{}\protected@file@percent } \@writefile{lof}{\contentsline {figure}{\numberline {5.1}{\ignorespaces Task Overview of the Attack Graph Generation Process\relax }}{30}{}\protected@file@percent } \newlabel{fig:tasks}{{5.1}{30}} \@writefile{lof}{\contentsline {figure}{\numberline {5.2}{\ignorespaces Node Allocation for each Task\relax }}{31}{}\protected@file@percent } \newlabel{fig:node-alloc}{{5.2}{31}} \@writefile{toc}{\contentsline {subsubsection}{Communication Structure}{32}{}\protected@file@percent } \@writefile{toc}{\contentsline {subsubsection}{Task 0}{32}{}\protected@file@percent } \@writefile{toc}{\contentsline {subsubsection}{Task 1}{32}{}\protected@file@percent } \@writefile{lof}{\contentsline {figure}{\numberline {5.3}{\ignorespaces Data Distribution of Task One\relax }}{33}{}\protected@file@percent } \newlabel{fig:Task1-Data-Dist}{{5.3}{33}} \@writefile{toc}{\contentsline {subsubsection}{Task 2}{33}{}\protected@file@percent } \@writefile{lof}{\contentsline {figure}{\numberline {5.4}{\ignorespaces Communication From Task 1 to Task 2 when the Number of Nodes Allocated is Equal\relax }}{34}{}\protected@file@percent } \newlabel{fig:Task1-Case1}{{5.4}{34}} \@writefile{lof}{\contentsline {figure}{\numberline {5.5}{\ignorespaces Communication From Task 1 to Task 2 when Task 1 Has More Nodes Allocated\relax }}{35}{}\protected@file@percent } \newlabel{fig:Task1-Case2}{{5.5}{35}} \@writefile{toc}{\contentsline {subsubsection}{Task 3}{35}{}\protected@file@percent } \@writefile{toc}{\contentsline {subsubsection}{Task 4 and Task 5}{35}{}\protected@file@percent } \newlabel{sec:T4T5}{{5.3.2}{35}} \newlabel{table:tasking-tag}{{\caption@xref {table:tasking-tag}{ on input line 104}}{36}} \@writefile{lot}{\contentsline {table}{\numberline {5.1}{\ignorespaces MPI Tags for the MPI Tasking Approach\relax }}{36}{}\protected@file@percent } \@writefile{toc}{\contentsline {subsubsection}{MPI Tags}{36}{}\protected@file@percent } \@writefile{toc}{\contentsline {subsection}{\numberline {5.3.3}\it Performance Expectations}{37}{}\protected@file@percent } \newlabel{Task-perf-expec}{{5.3.3}{37}} \@writefile{toc}{\contentsline {subsection}{\numberline {5.3.4}\it Results}{37}{}\protected@file@percent } \citation{li_concurrency_2019} \@writefile{toc}{\contentsline {section}{\numberline {5.4}\bf Subgraphing Approach}{38}{}\protected@file@percent } \@writefile{lof}{\contentsline {figure}{\numberline {5.6}{\ignorespaces Example of a Not Applicable Exploit for the MPI Tasking Testing\relax }}{39}{}\protected@file@percent } \newlabel{fig:NA-exp}{{5.6}{39}} \@writefile{lof}{\contentsline {figure}{\numberline {5.7}{\ignorespaces Speedup and Efficiency of the MPI Tasking Approach for a Varying Number of Compute Nodes with an Increasing Problem Size\relax }}{39}{}\protected@file@percent } \newlabel{fig:Spd-Eff-Task}{{5.7}{39}} \@writefile{toc}{\contentsline {subsection}{\numberline {5.4.1}\it Introduction to the Subgraphing Approach}{40}{}\protected@file@percent } \@writefile{toc}{\contentsline {subsection}{\numberline {5.4.2}\it Algorithm Design}{40}{}\protected@file@percent } \@writefile{lof}{\contentsline {figure}{\numberline {5.8}{\ignorespaces Example Graph Using the MPI Subgraphing Approach\relax }}{41}{}\protected@file@percent } \newlabel{fig:subg}{{5.8}{41}} \@writefile{toc}{\contentsline {subsubsection}{Worker Nodes}{41}{}\protected@file@percent } \@writefile{toc}{\contentsline {subsubsection}{Root Node}{42}{}\protected@file@percent } \@writefile{lof}{\contentsline {figure}{\numberline {5.9}{\ignorespaces Frontier Merging and Data Distribution Process\relax }}{43}{}\protected@file@percent } \newlabel{fig:front-merg}{{5.9}{43}} \@writefile{toc}{\contentsline {subsubsection}{Database Node}{43}{}\protected@file@percent } \@writefile{toc}{\contentsline {subsection}{\numberline {5.4.3}\it Performance Expectations}{43}{}\protected@file@percent } \@writefile{toc}{\contentsline {subsection}{\numberline {5.4.4}\it Results}{44}{}\protected@file@percent } \@setckpt{Chapter5}{ \setcounter{page}{45} \setcounter{equation}{0} \setcounter{enumi}{4} \setcounter{enumii}{0} \setcounter{enumiii}{0} \setcounter{enumiv}{0} \setcounter{footnote}{0} \setcounter{mpfootnote}{0} \setcounter{part}{0} \setcounter{chapter}{5} \setcounter{section}{4} \setcounter{subsection}{4} \setcounter{subsubsection}{0} \setcounter{paragraph}{0} \setcounter{subparagraph}{0} \setcounter{figure}{9} \setcounter{table}{1} \setcounter{caption@flags}{2} \setcounter{continuedfloat}{0} \setcounter{subfigure}{0} \setcounter{subtable}{0} \setcounter{lofdepth}{1} \setcounter{lotdepth}{1} }