ID 原文 译文
44426 随着大量应用任务在 CPU+GPU 异构平台上的部署日益广泛,如何高效地利用 GPU 并行资源,提升平台的执行效率成为研究者普遍关注的问题。 Utilizing GPU parallel resource efficiently as the application task of large data quantity deployed on the rapid development CPU+GPU heterogeneous became an urgent problem.
44427 通过分析 CPU+GPU 异构平台的执行特点,设计了基于 GPU 容器的分层排序列表调度算法。 Proposed the hierarchical scheduling algorithm based on GPU container by analyzing the execution characteristics of CPU+GPU heterogeneous platform.
44428 通过将不同架构的 GPU 封装到同一 GPU 容器中,可以有效屏蔽底层架构差异带来的影响,提升平台的扩展能力。 The model could effectively shield the impact of the architectural differences and improved the platform's ability by encapsulating the GPU with same architectures into the same GPU container.
44429 任务的调度以应用的 DAG 为基础,将节点的计算量和父子节点的通信需求作为评判优先级的复合标准,复合标准更符合 CPU+GPU 异构平台的高吞吐量、低传输效率的特点,可以有效降低处理器间的通信开销。HSLS 算法采用轮询的方式为节点分配处理器。 The task scheduling based on the application of DAG graph. And the HSLS algorithm reduced the communication overhead between processors by the composite standard included the computing amount of nodes and the communication requirements of parent-child nodes, the composite standard was more consistent with the high throughput and low transmission efficiency of CPU+GPU heterogeneous platform characteristics,and polling the processors to the nodes.
44430 通过实验仿真测试可以看出,HSLS 算法与 HEFT算法的仿真结果相比,随着节点数的增加,任务调度效率性能提升大约 40%。 Compared the performance of HSLS algorithm with the performance of HEFT algorithm, the comparison showed that, the HSLS algorithm has approximately 40% performance improvement with the increase of the number of nodes.
44431 网络空间安全领域,邬江兴院士提出了拟态防御理论及动态异构冗余(DHR,dynamic heterogeneous redundancy)架构。 In the field of Cyberspace Security, Wu Jiangxing, academician of Chinese Academy of Engineering, put forward the theory of Cyber Mimic Defense (CMD).
44432 目前对该机制的实现都着眼于系统全栈化,有复杂度大与成本高等问题。 At present, the implementation of the CMD mechanism focuses on the full stack of the system,which has the problems of complexity and high cost.
44433 由于应用层具有可控性,有利于被引入该机制。 Due to the controllability of the application layer, it is convenient to introduce CMD mechanism in this layer.
44434 因此,在应用层上通过对业务功能进行分割切片,再引入 DHR 架构,构建出了基于功能切片的拟态防御体系结构。 Therefore, in the application layer, a business function was segmented and sliced,and then DHR architecture was introduced to construct a mimic defense organization structure based on functional slice in this paper.
44435 同时,提出了一种拟态安全等级评估方法,并用此方法进行分析评估,最后通过实验验证了该体系结构的可行性和安全性。 At the same time, a method of evaluating the level of mimic security was proposed, and this method was used to analyze and evaluate the proposed mimic defense organization structure. Finally, the feasibility and security of the organization structure are verified by experimental tests.