MSThesis/Chapter5.aux
2022-03-17 23:52:12 -05:00

54 lines
3.5 KiB
TeX

\relax
\@writefile{toc}{\contentsline {chapter}{\numberline {CHAPTER 5: }{\bf \uppercase {Utilization OF MESSAGE PASSING INTERFACE}}}{25}{}\protected@file@percent }
\@writefile{toc}{\contentsline {section}{\numberline {5.1}\bf Introduction to MPI Utilization for Attack Graph Generation}{25}{}\protected@file@percent }
\@writefile{toc}{\contentsline {section}{\numberline {5.2}\bf Necessary Components}{25}{}\protected@file@percent }
\@writefile{toc}{\contentsline {subsection}{\numberline {5.2.1}\it Serialization}{25}{}\protected@file@percent }
\citation{li_concurrency_2019}
\citation{9150145}
\citation{7087377}
\@writefile{toc}{\contentsline {subsection}{\numberline {5.2.2}\it Data Consistency}{26}{}\protected@file@percent }
\@writefile{toc}{\contentsline {section}{\numberline {5.3}\bf Tasking Approach}{26}{}\protected@file@percent }
\@writefile{toc}{\contentsline {subsection}{\numberline {5.3.1}\it Introduction to the Tasking Approach}{26}{}\protected@file@percent }
\@writefile{toc}{\contentsline {subsection}{\numberline {5.3.2}\it Algorithm Design}{26}{}\protected@file@percent }
\@writefile{lof}{\contentsline {figure}{\numberline {5.1}{\ignorespaces Task Overview of the Attack Graph Generation Process}}{27}{}\protected@file@percent }
\newlabel{fig:tasks}{{5.1}{27}}
\@writefile{toc}{\contentsline {subsubsection}{Communication Structure}{28}{}\protected@file@percent }
\@writefile{toc}{\contentsline {subsubsection}{Task Zero}{28}{}\protected@file@percent }
\@writefile{toc}{\contentsline {subsubsection}{Task One}{28}{}\protected@file@percent }
\@writefile{toc}{\contentsline {subsubsection}{Task Two}{28}{}\protected@file@percent }
\@writefile{toc}{\contentsline {subsubsection}{Task Three}{28}{}\protected@file@percent }
\@writefile{toc}{\contentsline {subsubsection}{Task Four}{28}{}\protected@file@percent }
\@writefile{toc}{\contentsline {subsubsection}{Task Five}{28}{}\protected@file@percent }
\@writefile{toc}{\contentsline {subsection}{\numberline {5.3.3}\it Performance Expectations}{28}{}\protected@file@percent }
\@writefile{lof}{\contentsline {figure}{\numberline {5.2}{\ignorespaces Node Allocation for each Task}}{29}{}\protected@file@percent }
\newlabel{fig:node-alloc}{{5.2}{29}}
\@writefile{toc}{\contentsline {section}{\numberline {5.4}\bf Subgraphing Approach}{30}{}\protected@file@percent }
\@writefile{toc}{\contentsline {subsection}{\numberline {5.4.1}\it Introduction to the Subgraphing Approach}{30}{}\protected@file@percent }
\@writefile{toc}{\contentsline {subsection}{\numberline {5.4.2}\it Algorithm Design}{30}{}\protected@file@percent }
\@writefile{toc}{\contentsline {subsubsection}{Communication Structure}{30}{}\protected@file@percent }
\@writefile{toc}{\contentsline {subsubsection}{Worker Nodes}{30}{}\protected@file@percent }
\@writefile{toc}{\contentsline {subsubsection}{Root Node}{30}{}\protected@file@percent }
\@writefile{toc}{\contentsline {subsubsection}{Database Node}{30}{}\protected@file@percent }
\@writefile{toc}{\contentsline {subsection}{\numberline {5.4.3}\it Performance Expectations}{30}{}\protected@file@percent }
\@setckpt{Chapter5}{
\setcounter{page}{31}
\setcounter{equation}{0}
\setcounter{enumi}{4}
\setcounter{enumii}{0}
\setcounter{enumiii}{0}
\setcounter{enumiv}{0}
\setcounter{footnote}{0}
\setcounter{mpfootnote}{0}
\setcounter{part}{0}
\setcounter{chapter}{5}
\setcounter{section}{4}
\setcounter{subsection}{3}
\setcounter{subsubsection}{0}
\setcounter{paragraph}{0}
\setcounter{subparagraph}{0}
\setcounter{figure}{2}
\setcounter{table}{0}
\setcounter{lofdepth}{1}
\setcounter{lotdepth}{1}
}