54 lines
3.5 KiB
TeX
54 lines
3.5 KiB
TeX
\relax
|
|
\@writefile{toc}{\contentsline {chapter}{\numberline {CHAPTER 5: }{\bf \uppercase {Utilization OF MESSAGE PASSING INTERFACE}}}{25}{}\protected@file@percent }
|
|
\@writefile{toc}{\contentsline {section}{\numberline {5.1}\bf Introduction to MPI Utilization for Attack Graph Generation}{25}{}\protected@file@percent }
|
|
\@writefile{toc}{\contentsline {section}{\numberline {5.2}\bf Necessary Components}{25}{}\protected@file@percent }
|
|
\@writefile{toc}{\contentsline {subsection}{\numberline {5.2.1}\it Serialization}{25}{}\protected@file@percent }
|
|
\citation{li_concurrency_2019}
|
|
\citation{9150145}
|
|
\citation{7087377}
|
|
\@writefile{toc}{\contentsline {subsection}{\numberline {5.2.2}\it Data Consistency}{26}{}\protected@file@percent }
|
|
\@writefile{toc}{\contentsline {section}{\numberline {5.3}\bf Tasking Approach}{26}{}\protected@file@percent }
|
|
\@writefile{toc}{\contentsline {subsection}{\numberline {5.3.1}\it Introduction to the Tasking Approach}{26}{}\protected@file@percent }
|
|
\@writefile{toc}{\contentsline {subsection}{\numberline {5.3.2}\it Algorithm Design}{26}{}\protected@file@percent }
|
|
\@writefile{lof}{\contentsline {figure}{\numberline {5.1}{\ignorespaces Task Overview of the Attack Graph Generation Process}}{27}{}\protected@file@percent }
|
|
\newlabel{fig:tasks}{{5.1}{27}}
|
|
\@writefile{toc}{\contentsline {subsubsection}{Communication Structure}{28}{}\protected@file@percent }
|
|
\@writefile{toc}{\contentsline {subsubsection}{Task Zero}{28}{}\protected@file@percent }
|
|
\@writefile{toc}{\contentsline {subsubsection}{Task One}{28}{}\protected@file@percent }
|
|
\@writefile{toc}{\contentsline {subsubsection}{Task Two}{28}{}\protected@file@percent }
|
|
\@writefile{toc}{\contentsline {subsubsection}{Task Three}{28}{}\protected@file@percent }
|
|
\@writefile{toc}{\contentsline {subsubsection}{Task Four}{28}{}\protected@file@percent }
|
|
\@writefile{toc}{\contentsline {subsubsection}{Task Five}{28}{}\protected@file@percent }
|
|
\@writefile{toc}{\contentsline {subsection}{\numberline {5.3.3}\it Performance Expectations}{28}{}\protected@file@percent }
|
|
\@writefile{lof}{\contentsline {figure}{\numberline {5.2}{\ignorespaces Node Allocation for each Task}}{29}{}\protected@file@percent }
|
|
\newlabel{fig:node-alloc}{{5.2}{29}}
|
|
\@writefile{toc}{\contentsline {section}{\numberline {5.4}\bf Subgraphing Approach}{30}{}\protected@file@percent }
|
|
\@writefile{toc}{\contentsline {subsection}{\numberline {5.4.1}\it Introduction to the Subgraphing Approach}{30}{}\protected@file@percent }
|
|
\@writefile{toc}{\contentsline {subsection}{\numberline {5.4.2}\it Algorithm Design}{30}{}\protected@file@percent }
|
|
\@writefile{toc}{\contentsline {subsubsection}{Communication Structure}{30}{}\protected@file@percent }
|
|
\@writefile{toc}{\contentsline {subsubsection}{Worker Nodes}{30}{}\protected@file@percent }
|
|
\@writefile{toc}{\contentsline {subsubsection}{Root Node}{30}{}\protected@file@percent }
|
|
\@writefile{toc}{\contentsline {subsubsection}{Database Node}{30}{}\protected@file@percent }
|
|
\@writefile{toc}{\contentsline {subsection}{\numberline {5.4.3}\it Performance Expectations}{30}{}\protected@file@percent }
|
|
\@setckpt{Chapter5}{
|
|
\setcounter{page}{31}
|
|
\setcounter{equation}{0}
|
|
\setcounter{enumi}{4}
|
|
\setcounter{enumii}{0}
|
|
\setcounter{enumiii}{0}
|
|
\setcounter{enumiv}{0}
|
|
\setcounter{footnote}{0}
|
|
\setcounter{mpfootnote}{0}
|
|
\setcounter{part}{0}
|
|
\setcounter{chapter}{5}
|
|
\setcounter{section}{4}
|
|
\setcounter{subsection}{3}
|
|
\setcounter{subsubsection}{0}
|
|
\setcounter{paragraph}{0}
|
|
\setcounter{subparagraph}{0}
|
|
\setcounter{figure}{2}
|
|
\setcounter{table}{0}
|
|
\setcounter{lofdepth}{1}
|
|
\setcounter{lotdepth}{1}
|
|
}
|