University of Hawaii

Displaying 1-26 of 26 results

  • White Papers // Apr 2013

    Scheduling Tightly-Coupled Applications on Heterogeneous Desktop Grids

    Platforms that comprise volatile processors, such as desktop grids, have been traditionally used for executing independent-task applications. In this paper, the authors examine the scheduling of tightly-coupled iterative master-worker applications onto volatile processors. The main challenge is that workers must be simultaneously available for the application to make progress. They...

    Provided By University of Hawaii

  • White Papers // Jan 2013

    Layout-Conscious Random Topologies for HPC Off-Chip Interconnects

    In this paper the authors propose two new methods for generating random topologies and their physical layout on a floor-plan: randomize links after optimizing the physical layout, or optimize the layout after randomizing links. The first method randomly swaps link endpoints for a given non-random topology for which a good...

    Provided By University of Hawaii

  • White Papers // Nov 2012

    Mapping Tightly-Coupled Applications on Volatile Resources

    Platforms that comprise volatile processors, such as desktop grids, have been traditionally used for executing independent-task applications. In this paper the authors study the scheduling of tightly-coupled iterative master-worker applications onto volatile processors. The main challenge is that workers must be simultaneously available for the application to make progress. They...

    Provided By University of Hawaii

  • White Papers // Sep 2012

    Cabinet Layout Optimization of Supercomputer Topologies for Shorter Cable Length

    In this paper, the authors examine the optimization of the physical layout of topologies of switches on a machine room floor with the goal of reducing cable length. For a given topology, using graph clustering algorithms, they group switches logically into cabinets so that the number of inter-cabinet cables is...

    Provided By University of Hawaii

  • White Papers // Jun 2012

    Energy-Aware Service Allocation

    In this paper the authors examine the problem of energy-aware resource allocation for hosting long-term services or on-demand compute jobs in clusters, e.g., deployed as part of computing infrastructures. They formalize the problem as three constrained optimization problems: maximize job performance under power consumption constraints, minimize power consumption under job...

    Provided By University of Hawaii

  • White Papers // Apr 2012

    A Case for Random Shortcut Topologies for HPC Interconnects

    As the scales of parallel applications and platforms increase the negative impact of communication latencies on performance becomes large. Fortunately, modern High Performance Computing (HPC) systems can exploit low-latency topologies of high-radix switches. In this paper, the authors propose the use of random shortcut topologies, which are generated by augmenting...

    Provided By University of Hawaii

  • White Papers // Oct 2011

    IT Security Plan for Flight Simulation Program

    Information security is one of the most important aspects of technology, the authors cannot protect the best interests of their organizations' assets (be that personnel, data, or other resources), without ensuring that these assets are protected to the best of their ability. Within the Defense Department, this is vital to...

    Provided By University of Hawaii

  • White Papers // Jun 2011

    Information Security Policy Concerns as Case Law Shifts Toward Balance Between Employer Security and Employee Privacy

    Employee expectation of privacy within the workplace diminished as information technology use increased within the enterprise. During the same time period, increased use of information technology within the enterprise created a corresponding need for heightened information security. Technology use has continued to become increasingly ingrained within society as a whole...

    Provided By University of Hawaii

  • White Papers // Jun 2011

    Information Security Plan for Flight Simulator Applications

    The Department of Defense has a need for an identity management system that uses two factor authentications to ensure that only the correct individuals get access to their top secret flight simulator program. Currently the Department of Defense does not have a web interface sign in system. The authors will...

    Provided By University of Hawaii

  • White Papers // May 2011

    Intermediates Import And Gains From Trade Liberalization

    This paper uses matched Chinese firm and trade data to investigate the importing channels of productivity gains from trade liberalization. The authors show that input tariff reductions encourage the importers to increase the volume of imported inputs and capital goods, to expand product margin and source country margin, to access...

    Provided By University of Hawaii

  • White Papers // Jan 2011

    Scheduling Parallel Iterative Applications on Volatile Resources

    In this paper the authors examine the execution of iterative applications on volatile processors such as those found on desktop grids. They develop master-worker scheduling schemes that attempt to achieve good trade-offs between worker speed and worker availability. A key feature of their approach is that they consider a communication...

    Provided By University of Hawaii

  • White Papers // Jan 2011

    Preventive Migration Vs. Preventive Checkpointing for Extreme Scale Supercomputers

    The authors developed analytical performance models for two types of preventive measures: preventive check-pointing and preventive migration. They instantiate these models for platform scenarios representative of current and future technology trends. They find that preventive migration is the better approach in the short term by orders of magnitude. However, in...

    Provided By University of Hawaii

  • White Papers // Jan 2011

    Simple Layout Algorithms to Maintain Network Connectivity Under Faults

    A problem of survivable layout of an IP network topology on a wavelength division multiplexed network is considered. Simple layout algorithms are given that have low time complexities. The algorithms are variations of a basic algorithm that lays out IP links as lightpaths sequentially according to some order and with...

    Provided By University of Hawaii

  • White Papers // Dec 2010

    The Employment Effects Of Fiscal Policy: How Costly Are ARRA Jobs?

    The American Recovery and Reinvestment Act were intended to stimulate the U.S. economy and to create jobs. But at what cost? In this paper, the authors discuss the range of potential benefits and costs associated with counter-cyclical fiscal policy. Benefits and costs may be social, macroeconomic, systemic, and budgetary. They...

    Provided By University of Hawaii

  • White Papers // Nov 2010

    Health Investment Over The Life-Cycle

    The authors study quantitatively what drives the rise in medical expenditures over the life-cycle. Two motives are considered. First, health delivers a flow of utility each period. Second, better health enables people to allocate more time to productive or pleasurable activities. They calibrate a model of endogenous health accumulation to...

    Provided By University of Hawaii

  • White Papers // Nov 2010

    Cloud Hooks: Security and Privacy Issues in Cloud Computing

    In meteorology, the most destructive extratropical cyclones evolve with the formation of a bent-back front and cloud head separated from the main polar-front, creating a hook that completely encircles a pocket of warm air with colder air. The most damaging winds occur near the tip of the hook. The cloud...

    Provided By University of Hawaii

  • White Papers // Nov 2010

    Architecture and Design of Medical Processor Units for Medical Networks

    This paper introduces analogical and deductive methodologies for the design Medical Processor Units (MPUs). From the study of evolution of numerous earlier processors, the authors derive the basis for the architecture of MPUs. These specialized processors perform unique medical functions encoded as medical operational codes (mopcs). From a pragmatic perspective,...

    Provided By University of Hawaii

  • White Papers // Oct 2010

    Single Node On-Line Simulation of MPI Applications With SMPI

    In this paper, the authors present SMPI, a simulator for MPI applications that uses on-line simulation, i.e., the application is executed but part of the execution takes place within a simulation component. SMPI simulations account for network contention in a fast and scalable manner. SMPI also implements an original and...

    Provided By University of Hawaii

  • White Papers // Sep 2010

    Optimizing Access Across Multiple Hierarchies in DataWarehouses

    In enterprise data warehouses, different users in different business units often define their own application specific dimension hierarchies tailor made to their reporting and business performance monitoring needs. Due to resource constraints, only on a small number of these hierarchies are precomputed for performance optimization. Consequently aggregations over hierarchies without...

    Provided By University of Hawaii

  • White Papers // Apr 2010

    A Pilot Evaluation Of Distance Education Modalities For Health Workers In The U.S. - Affiliated Pacific Islands

    Healthcare workers in many parts of the U.S. Affiliated Pacific Islands (USAPI) have limited access to continuing education. Barriers to traditional on-site continuing education programs include the diversity of educational needs, limited health staffing, the distances between islands and associated high travel costs. A pilot evaluation of distance education modalities...

    Provided By University of Hawaii

  • White Papers // Apr 2010

    American Samoa Assessment For Continuing Health Care Professional Development Program

    In 2003, the University of Hawai'i Department of Family Medicine and Community Health entered a four-year cooperative agreement with the U.S. Health Resources and Services Administration to establish the "Pacific Association for Clinical Training" (PACT). PACT's goal is to develop effective distance education methods to improve the education and skills...

    Provided By University of Hawaii

  • White Papers // Mar 2010

    An Instructional Video Module on Spreadsheets Accommodating the Needs of Senior Citizens

    An increasing number of senior citizens are motivated to learn how to use computers to make everyday tasks more effective and efficient. However, due to changes that occur with aging, they require specific accommodations to satisfy their learning deficits and needs. Much computer instruction is provided for the younger generation,...

    Provided By University of Hawaii

  • White Papers // Mar 2010

    Global Production Networks In Electronics And Intra-Asian Trade

    The growth of East Asia's intra-regional trade is driven largely by increased component trade within global electronics production networks. Data on both electronics trade and production elucidate a pattern of specialization in which upper- and middle-income countries produce sophisticated components and lower-income countries assemble lower-value-added final goods. There is evidence...

    Provided By University of Hawaii

  • White Papers // Feb 2010

    Convergence of Corporate and Information Security

    As physical and information security boundaries have become increasingly blurry many organizations are experiencing challenges with how to effectively and efficiently manage security within the corporate. There is no current standard or best practice offered by the security community regarding convergence; however many organizations such as the Alliance for Enterprise...

    Provided By University of Hawaii

  • White Papers // Feb 2009

    Offshore Call Centers and the Role of National Identity Management on Customer Trust

    Offshore call centers are regarded as an important strategic decision for organizations to save the cost. Despite wide spread use of the practice, many organizations seem to be reluctant to openly admit this fact when interacting with customers and confusion exists about where to draw the line to make customers...

    Provided By University of Hawaii

  • White Papers // Jan 2008

    Towards Service Engineering: Service Orientation and Business-IT Alignment

    The rapid movement towards service orientation, on both the business and technology fronts, offers unprecedented opportunities for business-IT alignment. As the authors will argue, to achieve true agility in its service provisioning to meet rapidly changing requirements, an organization needs a multi-dimensional business-IT alignment strategy - alignment via architecture, via...

    Provided By University of Hawaii

  • White Papers // Mar 2010

    An Instructional Video Module on Spreadsheets Accommodating the Needs of Senior Citizens

    An increasing number of senior citizens are motivated to learn how to use computers to make everyday tasks more effective and efficient. However, due to changes that occur with aging, they require specific accommodations to satisfy their learning deficits and needs. Much computer instruction is provided for the younger generation,...

    Provided By University of Hawaii

  • White Papers // Feb 2009

    Offshore Call Centers and the Role of National Identity Management on Customer Trust

    Offshore call centers are regarded as an important strategic decision for organizations to save the cost. Despite wide spread use of the practice, many organizations seem to be reluctant to openly admit this fact when interacting with customers and confusion exists about where to draw the line to make customers...

    Provided By University of Hawaii

  • White Papers // Jan 2011

    Simple Layout Algorithms to Maintain Network Connectivity Under Faults

    A problem of survivable layout of an IP network topology on a wavelength division multiplexed network is considered. Simple layout algorithms are given that have low time complexities. The algorithms are variations of a basic algorithm that lays out IP links as lightpaths sequentially according to some order and with...

    Provided By University of Hawaii

  • White Papers // Nov 2010

    Cloud Hooks: Security and Privacy Issues in Cloud Computing

    In meteorology, the most destructive extratropical cyclones evolve with the formation of a bent-back front and cloud head separated from the main polar-front, creating a hook that completely encircles a pocket of warm air with colder air. The most damaging winds occur near the tip of the hook. The cloud...

    Provided By University of Hawaii

  • White Papers // Dec 2010

    The Employment Effects Of Fiscal Policy: How Costly Are ARRA Jobs?

    The American Recovery and Reinvestment Act were intended to stimulate the U.S. economy and to create jobs. But at what cost? In this paper, the authors discuss the range of potential benefits and costs associated with counter-cyclical fiscal policy. Benefits and costs may be social, macroeconomic, systemic, and budgetary. They...

    Provided By University of Hawaii

  • White Papers // Nov 2010

    Health Investment Over The Life-Cycle

    The authors study quantitatively what drives the rise in medical expenditures over the life-cycle. Two motives are considered. First, health delivers a flow of utility each period. Second, better health enables people to allocate more time to productive or pleasurable activities. They calibrate a model of endogenous health accumulation to...

    Provided By University of Hawaii

  • White Papers // Jun 2011

    Information Security Plan for Flight Simulator Applications

    The Department of Defense has a need for an identity management system that uses two factor authentications to ensure that only the correct individuals get access to their top secret flight simulator program. Currently the Department of Defense does not have a web interface sign in system. The authors will...

    Provided By University of Hawaii

  • White Papers // Oct 2011

    IT Security Plan for Flight Simulation Program

    Information security is one of the most important aspects of technology, the authors cannot protect the best interests of their organizations' assets (be that personnel, data, or other resources), without ensuring that these assets are protected to the best of their ability. Within the Defense Department, this is vital to...

    Provided By University of Hawaii

  • White Papers // Feb 2010

    Convergence of Corporate and Information Security

    As physical and information security boundaries have become increasingly blurry many organizations are experiencing challenges with how to effectively and efficiently manage security within the corporate. There is no current standard or best practice offered by the security community regarding convergence; however many organizations such as the Alliance for Enterprise...

    Provided By University of Hawaii

  • White Papers // Jun 2012

    Energy-Aware Service Allocation

    In this paper the authors examine the problem of energy-aware resource allocation for hosting long-term services or on-demand compute jobs in clusters, e.g., deployed as part of computing infrastructures. They formalize the problem as three constrained optimization problems: maximize job performance under power consumption constraints, minimize power consumption under job...

    Provided By University of Hawaii

  • White Papers // Apr 2013

    Scheduling Tightly-Coupled Applications on Heterogeneous Desktop Grids

    Platforms that comprise volatile processors, such as desktop grids, have been traditionally used for executing independent-task applications. In this paper, the authors examine the scheduling of tightly-coupled iterative master-worker applications onto volatile processors. The main challenge is that workers must be simultaneously available for the application to make progress. They...

    Provided By University of Hawaii

  • White Papers // Jan 2013

    Layout-Conscious Random Topologies for HPC Off-Chip Interconnects

    In this paper the authors propose two new methods for generating random topologies and their physical layout on a floor-plan: randomize links after optimizing the physical layout, or optimize the layout after randomizing links. The first method randomly swaps link endpoints for a given non-random topology for which a good...

    Provided By University of Hawaii

  • White Papers // Nov 2012

    Mapping Tightly-Coupled Applications on Volatile Resources

    Platforms that comprise volatile processors, such as desktop grids, have been traditionally used for executing independent-task applications. In this paper the authors study the scheduling of tightly-coupled iterative master-worker applications onto volatile processors. The main challenge is that workers must be simultaneously available for the application to make progress. They...

    Provided By University of Hawaii

  • White Papers // Apr 2012

    A Case for Random Shortcut Topologies for HPC Interconnects

    As the scales of parallel applications and platforms increase the negative impact of communication latencies on performance becomes large. Fortunately, modern High Performance Computing (HPC) systems can exploit low-latency topologies of high-radix switches. In this paper, the authors propose the use of random shortcut topologies, which are generated by augmenting...

    Provided By University of Hawaii

  • White Papers // Jan 2011

    Preventive Migration Vs. Preventive Checkpointing for Extreme Scale Supercomputers

    The authors developed analytical performance models for two types of preventive measures: preventive check-pointing and preventive migration. They instantiate these models for platform scenarios representative of current and future technology trends. They find that preventive migration is the better approach in the short term by orders of magnitude. However, in...

    Provided By University of Hawaii

  • White Papers // Sep 2012

    Cabinet Layout Optimization of Supercomputer Topologies for Shorter Cable Length

    In this paper, the authors examine the optimization of the physical layout of topologies of switches on a machine room floor with the goal of reducing cable length. For a given topology, using graph clustering algorithms, they group switches logically into cabinets so that the number of inter-cabinet cables is...

    Provided By University of Hawaii

  • White Papers // Oct 2010

    Single Node On-Line Simulation of MPI Applications With SMPI

    In this paper, the authors present SMPI, a simulator for MPI applications that uses on-line simulation, i.e., the application is executed but part of the execution takes place within a simulation component. SMPI simulations account for network contention in a fast and scalable manner. SMPI also implements an original and...

    Provided By University of Hawaii

  • White Papers // Jan 2011

    Scheduling Parallel Iterative Applications on Volatile Resources

    In this paper the authors examine the execution of iterative applications on volatile processors such as those found on desktop grids. They develop master-worker scheduling schemes that attempt to achieve good trade-offs between worker speed and worker availability. A key feature of their approach is that they consider a communication...

    Provided By University of Hawaii

  • White Papers // Sep 2010

    Optimizing Access Across Multiple Hierarchies in DataWarehouses

    In enterprise data warehouses, different users in different business units often define their own application specific dimension hierarchies tailor made to their reporting and business performance monitoring needs. Due to resource constraints, only on a small number of these hierarchies are precomputed for performance optimization. Consequently aggregations over hierarchies without...

    Provided By University of Hawaii

  • White Papers // Nov 2010

    Architecture and Design of Medical Processor Units for Medical Networks

    This paper introduces analogical and deductive methodologies for the design Medical Processor Units (MPUs). From the study of evolution of numerous earlier processors, the authors derive the basis for the architecture of MPUs. These specialized processors perform unique medical functions encoded as medical operational codes (mopcs). From a pragmatic perspective,...

    Provided By University of Hawaii

  • White Papers // Mar 2010

    Global Production Networks In Electronics And Intra-Asian Trade

    The growth of East Asia's intra-regional trade is driven largely by increased component trade within global electronics production networks. Data on both electronics trade and production elucidate a pattern of specialization in which upper- and middle-income countries produce sophisticated components and lower-income countries assemble lower-value-added final goods. There is evidence...

    Provided By University of Hawaii

  • White Papers // May 2011

    Intermediates Import And Gains From Trade Liberalization

    This paper uses matched Chinese firm and trade data to investigate the importing channels of productivity gains from trade liberalization. The authors show that input tariff reductions encourage the importers to increase the volume of imported inputs and capital goods, to expand product margin and source country margin, to access...

    Provided By University of Hawaii

  • White Papers // Apr 2010

    A Pilot Evaluation Of Distance Education Modalities For Health Workers In The U.S. - Affiliated Pacific Islands

    Healthcare workers in many parts of the U.S. Affiliated Pacific Islands (USAPI) have limited access to continuing education. Barriers to traditional on-site continuing education programs include the diversity of educational needs, limited health staffing, the distances between islands and associated high travel costs. A pilot evaluation of distance education modalities...

    Provided By University of Hawaii

  • White Papers // Apr 2010

    American Samoa Assessment For Continuing Health Care Professional Development Program

    In 2003, the University of Hawai'i Department of Family Medicine and Community Health entered a four-year cooperative agreement with the U.S. Health Resources and Services Administration to establish the "Pacific Association for Clinical Training" (PACT). PACT's goal is to develop effective distance education methods to improve the education and skills...

    Provided By University of Hawaii

  • White Papers // Jan 2008

    Towards Service Engineering: Service Orientation and Business-IT Alignment

    The rapid movement towards service orientation, on both the business and technology fronts, offers unprecedented opportunities for business-IT alignment. As the authors will argue, to achieve true agility in its service provisioning to meet rapidly changing requirements, an organization needs a multi-dimensional business-IT alignment strategy - alignment via architecture, via...

    Provided By University of Hawaii

  • White Papers // Jun 2011

    Information Security Policy Concerns as Case Law Shifts Toward Balance Between Employer Security and Employee Privacy

    Employee expectation of privacy within the workplace diminished as information technology use increased within the enterprise. During the same time period, increased use of information technology within the enterprise created a corresponding need for heightened information security. Technology use has continued to become increasingly ingrained within society as a whole...

    Provided By University of Hawaii