SlideShare a Scribd company logo
1 of 16
Download to read offline
10th International Conference on Large-Scale Scientific Computations
Sensitivity Analysis of Checkpointing Strategies
for Multimemetic Algorithms on Unstable
Complex Networks
Rafael Nogueras Carlos Cotta
Departamento de Lenguajes y Ciencias de la Computación
Universidad de Málaga, Spain
LSSC 2015, Sozopol, 8-12 June 2015
Analysis of Checkpointing for MMAs on Unstable Complex Networks Universidad de Málaga 1 / 16
Introduction Model Description Experimental Analysis Conclusions
Parallel Computing & EAs
Use of parallel and distributed
models of EAs (GAs, MAs,
MMAs, etc.) to improve solution
quality and reduce computational
times.
The island model spatially
organizes populations into
partially isolated panmictic
demes.
island1
island2
island3
island4
migrants
Analysis of Checkpointing for MMAs on Unstable Complex Networks Universidad de Málaga 2 / 16
Introduction Model Description Experimental Analysis Conclusions
Emergent Paralell Environments
Two emergent computational environments are offering new
opportunities to EAs:
I P2P networks: Equally privileged computing nodes carry out a
distributed computation without need for central coordination.
I Desktop Grids: Distributed networks of heterogeneous systems
which typically contribute computing cycles while they are
inactive (volunteer computing platforms).
Churn
The combined effect of multiple computing nodes leaving and
entering the system along time.
Analysis of Checkpointing for MMAs on Unstable Complex Networks Universidad de Málaga 3 / 16
Introduction Model Description Experimental Analysis Conclusions
Scope
Some mechanism is required to deal with resource volatility.
1. Use of fault-tolerance strategies (e.g. restoration checkpoints).
2. Use of reactive policies to self-adapt the MMA.
Goal
Study EAs running on unstable computational environments with
SF/SW topologies:
I Use of restoration checkpoints with different frequencies.
I Impact on performance and comparison with random
strategies.
Analysis of Checkpointing for MMAs on Unstable Complex Networks Universidad de Málaga 4 / 16
Introduction Model Description Experimental Analysis Conclusions
Network Topology
Scale-free Networks
I SF networks are often observed in many
natural processes.
I They feature a power-law distribution in
node degrees.
I We use the Barabási-Albert (BA) model.
I This model uses preferential attachment
to grow a network.
Analysis of Checkpointing for MMAs on Unstable Complex Networks Universidad de Málaga 5 / 16
Introduction Model Description Experimental Analysis Conclusions
Network Topology
Small-world Networks
I SW networks have a very small
–O(log n)– average distances among
nodes.
I We use a variant of the
Barmpoutis-Murray (BM) model.
I This model uses a backtracking procedure
to build the largest clique leaving enough
links for the rest of the network.
I Each clique is connected using random
vertices in the first clique to make it more
resilient.
Analysis of Checkpointing for MMAs on Unstable Complex Networks Universidad de Málaga 6 / 16
Introduction Model Description Experimental Analysis Conclusions
Instability
Algorithms must be executed on platforms with multiple
computing elements (processors)...
...but distributed platforms are prone to errors.
0 100 200 300 400 500 600 700 800 900 1000
0
0.1
0.2
0.3
0.4
0.5
0.6
0.7
0.8
0.9
1
time
survival
probability
k=1
k=2
k=5
k=10
k=20
We assume node availability
follows a Weibull distributiona:
p(t1 | t0) = e
−
h
t1
β
η
−

t0
β
ηi
If the scale parameter η  1 the
hazard rate increases with time.
a
J Grid Comput, doi: 10.1007/s10723-014-9315-6, 2015
Analysis of Checkpointing for MMAs on Unstable Complex Networks Universidad de Málaga 7 / 16
Introduction Model Description Experimental Analysis Conclusions
Coping with Instability
Computing in an unstable environment requires fault-tolerance.
Two strategies are considered:
I rand: initialization from scratch for nodes becoming available
again.
I checkpoint: periodical backups of each subpopulation in
external safe storage, intended to recover the last state when
a node is reactivated.
The rand strategy is simpler and has the advantage of boosting
diversity.
Analysis of Checkpointing for MMAs on Unstable Complex Networks Universidad de Málaga 8 / 16
Introduction Model Description Experimental Analysis Conclusions
Coping with Instability
Cloud
Storage
Islandi
save state
save state
load state
save state
λ
fault
recovery
The checkpoint strategy
saves the previous progress
of the search.
It requires external safe
storage, i.e.,
I centralization
I overhead
The latter drawback could
be mitigated by tuning
parameter λ.
Analysis of Checkpointing for MMAs on Unstable Complex Networks Universidad de Málaga 9 / 16
Introduction Model Description Experimental Analysis Conclusions
Benchmark and Settings
Parameters for island-based model:
I nι = 32 islands and µ = 16 individuals (at the beginning).
I m = 2 (SF/SW topologies).
Node deactivation/reactivation:
I shape parameter η = 1.5.
I scale parameters β = −1/ log(p) for p = 1 − (knι)−1,
k ∈ {1, 2, 5, 10, 20}.
Problems used:
I Deb’s trap function (concatenating 32 four-bit traps).
I HIFF  HXOR functions (using 128 bits).
I MMDP (using 24 six-bit blocks).
25 runs @ 50,000 evaluations are performed for each problem,
algorithm, churn scenario, network topology and
λ ∈ {µ, 10µ, 100µ}.
Analysis of Checkpointing for MMAs on Unstable Complex Networks Universidad de Málaga 10 / 16
Introduction Model Description Experimental Analysis Conclusions
Numerical Results
Approximation to the Optimum
Deviation from the optimum as a function of the churn rate.
0 0.2 0.4 0.6 0.8 1
0
10
20
30
40
50
60
70
80
90
100
1/k
deviation
from
optimum
(%)
rand
λ=16
λ=160
λ=1600
0 0.2 0.4 0.6 0.8 1
0
10
20
30
40
50
60
70
80
90
100
1/k
deviation
from
optimum
(%)
rand
λ=16
λ=160
λ=1600
Performance degrades with increasing churn rates but not in the
same way for the different λ values (degradation according to λ
increases).
Analysis of Checkpointing for MMAs on Unstable Complex Networks Universidad de Málaga 11 / 16
Introduction Model Description Experimental Analysis Conclusions
Numerical Results
Statistical Analysis
i strategy z-statistic p-value α/i
1 λ = 160 2.598e+00 4.687e–03 5.000e–02
2 λ = 1600 7.015e+00 1.151e–12 2.500e–02
3 rand 8.747e+00 1.097e–18 1.667e–02
I Degradation is statistically significant according to Quade test
(p-value ≈ 0).
I The use of checkpoint with λ = µ is statistically superior
according to Holm test at α = 0.05 level.
I Strategies with less frequent snapshots are not capable of
dealing with churn.
Analysis of Checkpointing for MMAs on Unstable Complex Networks Universidad de Málaga 12 / 16
Introduction Model Description Experimental Analysis Conclusions
Numerical Results
Evolution of Best Fitness
Evolution of best fitness on the TRAP function for different churn
rates with SF topology. (Left) k = 20 (Center) k = 5 and (Right)
k = 1.
1 2 3 4 5
x 10
4
14
16
18
20
22
24
26
28
30
32
evaluations
best
fitness
λ = 16
λ = 160
λ = 1600
1 2 3 4 5
x 10
4
14
16
18
20
22
24
26
28
30
32
evaluations
best
fitness
λ = 16
λ = 160
λ = 1600
1 2 3 4 5
x 10
4
14
16
18
20
22
24
26
28
30
32
evaluations
best
fitness
λ = 16
λ = 160
λ = 1600
As churn increases the difference in fitness is favourable to λ = µ.
Low λ values support better the degradation as churn increases.
Analysis of Checkpointing for MMAs on Unstable Complex Networks Universidad de Málaga 13 / 16
Introduction Model Description Experimental Analysis Conclusions
Numerical Results
Evolution of Genetic Diversity
Evolution of genetic diversity on the TRAP function for different
churn rates with SF topology. (Left) k = 20 (Center) k = 5 and
(Right) k = 1.
1 2 3 4 5
x 10
4
0
0.1
0.2
0.3
0.4
0.5
0.6
0.7
0.8
0.9
1
evaluations
entropy
λ = 16
λ = 160
λ = 1600
1 2 3 4 5
x 10
4
0
0.1
0.2
0.3
0.4
0.5
0.6
0.7
0.8
0.9
1
evaluations
entropy
λ = 16
λ = 160
λ = 1600
1 2 3 4 5
x 10
4
0
0.1
0.2
0.3
0.4
0.5
0.6
0.7
0.8
0.9
1
evaluations
entropy
λ = 16
λ = 160
λ = 1600
MMA has convergence problems as churn increases when λ is high.
Analysis of Checkpointing for MMAs on Unstable Complex Networks Universidad de Málaga 14 / 16
Introduction Model Description Experimental Analysis Conclusions
Conclusions
Resilience is a key feature on unstable computational environments.
Policies in order to cope with the loss of information must be
introduced.
A possibility is the creation of periodical backups of the state of
the nodes to recover from failures.
Large churn rates require frequent backups to cope with node
volatility.
Ongoing work:
I Autonomous or self-adaptive approaches to react to churn.
I Use of purely local strategies.
Analysis of Checkpointing for MMAs on Unstable Complex Networks Universidad de Málaga 15 / 16
Introduction Model Description Experimental Analysis Conclusions
Thank You!
AnySelf Project
Please find us in Facebook
http://facebook.com/AnySelfProject
and in Twitter
@anyselfproject
Analysis of Checkpointing for MMAs on Unstable Complex Networks Universidad de Málaga 16 / 16

More Related Content

What's hot

Lightning talk at MLConf NYC 2015
Lightning talk at MLConf NYC 2015Lightning talk at MLConf NYC 2015
Lightning talk at MLConf NYC 2015Mohitdeep Singh
 
Reading group nfm - 20170312
Reading group  nfm - 20170312Reading group  nfm - 20170312
Reading group nfm - 20170312Shuai Zhang
 
Multilayer perceptron
Multilayer perceptronMultilayer perceptron
Multilayer perceptronomaraldabash
 
Aj Copulas V4
Aj Copulas V4Aj Copulas V4
Aj Copulas V4jainan33
 
Robust Low-rank and Sparse Decomposition for Moving Object Detection
Robust Low-rank and Sparse Decomposition for Moving Object DetectionRobust Low-rank and Sparse Decomposition for Moving Object Detection
Robust Low-rank and Sparse Decomposition for Moving Object DetectionActiveEon
 
Online Stochastic Tensor Decomposition for Background Subtraction in Multispe...
Online Stochastic Tensor Decomposition for Background Subtraction in Multispe...Online Stochastic Tensor Decomposition for Background Subtraction in Multispe...
Online Stochastic Tensor Decomposition for Background Subtraction in Multispe...ActiveEon
 
010_20160216_Variational Gaussian Process
010_20160216_Variational Gaussian Process010_20160216_Variational Gaussian Process
010_20160216_Variational Gaussian ProcessHa Phuong
 
Generative Models and Adversarial Training (D2L3 Insight@DCU Machine Learning...
Generative Models and Adversarial Training (D2L3 Insight@DCU Machine Learning...Generative Models and Adversarial Training (D2L3 Insight@DCU Machine Learning...
Generative Models and Adversarial Training (D2L3 Insight@DCU Machine Learning...Universitat Politècnica de Catalunya
 
Towards annotating potential incoherences in BioPortal mappings
Towards annotating potential incoherences in BioPortal mappingsTowards annotating potential incoherences in BioPortal mappings
Towards annotating potential incoherences in BioPortal mappingsErnesto Jimenez Ruiz
 
LogMap: Logic-based and Scalable Ontology Matching
LogMap: Logic-based and Scalable Ontology MatchingLogMap: Logic-based and Scalable Ontology Matching
LogMap: Logic-based and Scalable Ontology MatchingErnesto Jimenez Ruiz
 
AILABS - Lecture Series - Is AI the New Electricity? Topic:- Classification a...
AILABS - Lecture Series - Is AI the New Electricity? Topic:- Classification a...AILABS - Lecture Series - Is AI the New Electricity? Topic:- Classification a...
AILABS - Lecture Series - Is AI the New Electricity? Topic:- Classification a...AILABS Academy
 
An Optimal Iterative Algorithm for Extracting MUCs in a Black-box Constraint ...
An Optimal Iterative Algorithm for Extracting MUCs in a Black-box Constraint ...An Optimal Iterative Algorithm for Extracting MUCs in a Black-box Constraint ...
An Optimal Iterative Algorithm for Extracting MUCs in a Black-box Constraint ...Philippe Laborie
 
Optimal real-time landing using DNN
Optimal real-time landing using DNNOptimal real-time landing using DNN
Optimal real-time landing using DNN홍배 김
 
Fault detection and_diagnosis
Fault detection and_diagnosisFault detection and_diagnosis
Fault detection and_diagnosisM Reza Rahmati
 
Artificial Neural Network Based Fault Classifier for Transmission Line Protec...
Artificial Neural Network Based Fault Classifier for Transmission Line Protec...Artificial Neural Network Based Fault Classifier for Transmission Line Protec...
Artificial Neural Network Based Fault Classifier for Transmission Line Protec...IJERD Editor
 
On Partitioned Fitness Distributions of Genetic Operators for Predicting GA P...
On Partitioned Fitness Distributions of Genetic Operators for Predicting GA P...On Partitioned Fitness Distributions of Genetic Operators for Predicting GA P...
On Partitioned Fitness Distributions of Genetic Operators for Predicting GA P...Rafael Nogueras
 
Differential analyses of structures in HiC data
Differential analyses of structures in HiC dataDifferential analyses of structures in HiC data
Differential analyses of structures in HiC datatuxette
 

What's hot (20)

Lightning talk at MLConf NYC 2015
Lightning talk at MLConf NYC 2015Lightning talk at MLConf NYC 2015
Lightning talk at MLConf NYC 2015
 
Reading group nfm - 20170312
Reading group  nfm - 20170312Reading group  nfm - 20170312
Reading group nfm - 20170312
 
Multilayer perceptron
Multilayer perceptronMultilayer perceptron
Multilayer perceptron
 
Aj Copulas V4
Aj Copulas V4Aj Copulas V4
Aj Copulas V4
 
Robust Low-rank and Sparse Decomposition for Moving Object Detection
Robust Low-rank and Sparse Decomposition for Moving Object DetectionRobust Low-rank and Sparse Decomposition for Moving Object Detection
Robust Low-rank and Sparse Decomposition for Moving Object Detection
 
Online Stochastic Tensor Decomposition for Background Subtraction in Multispe...
Online Stochastic Tensor Decomposition for Background Subtraction in Multispe...Online Stochastic Tensor Decomposition for Background Subtraction in Multispe...
Online Stochastic Tensor Decomposition for Background Subtraction in Multispe...
 
010_20160216_Variational Gaussian Process
010_20160216_Variational Gaussian Process010_20160216_Variational Gaussian Process
010_20160216_Variational Gaussian Process
 
Generative Models and Adversarial Training (D2L3 Insight@DCU Machine Learning...
Generative Models and Adversarial Training (D2L3 Insight@DCU Machine Learning...Generative Models and Adversarial Training (D2L3 Insight@DCU Machine Learning...
Generative Models and Adversarial Training (D2L3 Insight@DCU Machine Learning...
 
Towards annotating potential incoherences in BioPortal mappings
Towards annotating potential incoherences in BioPortal mappingsTowards annotating potential incoherences in BioPortal mappings
Towards annotating potential incoherences in BioPortal mappings
 
Nonnegative Matrix Factorization with Side Information for Time Series Recove...
Nonnegative Matrix Factorization with Side Information for Time Series Recove...Nonnegative Matrix Factorization with Side Information for Time Series Recove...
Nonnegative Matrix Factorization with Side Information for Time Series Recove...
 
LogMap: Logic-based and Scalable Ontology Matching
LogMap: Logic-based and Scalable Ontology MatchingLogMap: Logic-based and Scalable Ontology Matching
LogMap: Logic-based and Scalable Ontology Matching
 
AILABS - Lecture Series - Is AI the New Electricity? Topic:- Classification a...
AILABS - Lecture Series - Is AI the New Electricity? Topic:- Classification a...AILABS - Lecture Series - Is AI the New Electricity? Topic:- Classification a...
AILABS - Lecture Series - Is AI the New Electricity? Topic:- Classification a...
 
An Optimal Iterative Algorithm for Extracting MUCs in a Black-box Constraint ...
An Optimal Iterative Algorithm for Extracting MUCs in a Black-box Constraint ...An Optimal Iterative Algorithm for Extracting MUCs in a Black-box Constraint ...
An Optimal Iterative Algorithm for Extracting MUCs in a Black-box Constraint ...
 
JOURNALnew
JOURNALnewJOURNALnew
JOURNALnew
 
Optimal real-time landing using DNN
Optimal real-time landing using DNNOptimal real-time landing using DNN
Optimal real-time landing using DNN
 
Fault detection and_diagnosis
Fault detection and_diagnosisFault detection and_diagnosis
Fault detection and_diagnosis
 
Artificial Neural Network Based Fault Classifier for Transmission Line Protec...
Artificial Neural Network Based Fault Classifier for Transmission Line Protec...Artificial Neural Network Based Fault Classifier for Transmission Line Protec...
Artificial Neural Network Based Fault Classifier for Transmission Line Protec...
 
On Partitioned Fitness Distributions of Genetic Operators for Predicting GA P...
On Partitioned Fitness Distributions of Genetic Operators for Predicting GA P...On Partitioned Fitness Distributions of Genetic Operators for Predicting GA P...
On Partitioned Fitness Distributions of Genetic Operators for Predicting GA P...
 
PR12-CAM
PR12-CAMPR12-CAM
PR12-CAM
 
Differential analyses of structures in HiC data
Differential analyses of structures in HiC dataDifferential analyses of structures in HiC data
Differential analyses of structures in HiC data
 

Similar to Sensitivity Analysis of Checkpointing Strategies for Multimemetic Algorithms on Unstable Complex Networks

Cross-Talk Control with Analog In-Memory-Compute for Artificial Intelligence ...
Cross-Talk Control with Analog In-Memory-Compute for Artificial Intelligence ...Cross-Talk Control with Analog In-Memory-Compute for Artificial Intelligence ...
Cross-Talk Control with Analog In-Memory-Compute for Artificial Intelligence ...Bruce Morton
 
Optimum Network Reconfiguration using Grey Wolf Optimizer
Optimum Network Reconfiguration using Grey Wolf OptimizerOptimum Network Reconfiguration using Grey Wolf Optimizer
Optimum Network Reconfiguration using Grey Wolf OptimizerTELKOMNIKA JOURNAL
 
Short Term Electrical Load Forecasting by Artificial Neural Network
Short Term Electrical Load Forecasting by Artificial Neural NetworkShort Term Electrical Load Forecasting by Artificial Neural Network
Short Term Electrical Load Forecasting by Artificial Neural NetworkIJERA Editor
 
IEEE Wireless communication 2016 Title and Abstract
IEEE Wireless communication 2016 Title and AbstractIEEE Wireless communication 2016 Title and Abstract
IEEE Wireless communication 2016 Title and Abstracttsysglobalsolutions
 
Mobile Networking and Mobile Ad Hoc Routing Protocol Modeling
Mobile Networking and Mobile Ad Hoc Routing Protocol ModelingMobile Networking and Mobile Ad Hoc Routing Protocol Modeling
Mobile Networking and Mobile Ad Hoc Routing Protocol ModelingIOSR Journals
 
Randomizing genome-scale metabolic networks
Randomizing genome-scale metabolic networksRandomizing genome-scale metabolic networks
Randomizing genome-scale metabolic networksAreejit Samal
 
Performance prediction of PV & PV/T systems using Artificial Neural Networks ...
Performance prediction of PV & PV/T systems using Artificial Neural Networks ...Performance prediction of PV & PV/T systems using Artificial Neural Networks ...
Performance prediction of PV & PV/T systems using Artificial Neural Networks ...Ali Al-Waeli
 
Study on the application of genetic algorithms in the optimization of wireles...
Study on the application of genetic algorithms in the optimization of wireles...Study on the application of genetic algorithms in the optimization of wireles...
Study on the application of genetic algorithms in the optimization of wireles...Amir Shokri
 
A SURVEY OF ARTIFICIAL NEURAL NETWORKS APPLICATIONS IN WEAR AND MANUFACTURING...
A SURVEY OF ARTIFICIAL NEURAL NETWORKS APPLICATIONS IN WEAR AND MANUFACTURING...A SURVEY OF ARTIFICIAL NEURAL NETWORKS APPLICATIONS IN WEAR AND MANUFACTURING...
A SURVEY OF ARTIFICIAL NEURAL NETWORKS APPLICATIONS IN WEAR AND MANUFACTURING...Monique Carr
 
Implementing a neural network potential for exascale molecular dynamics
Implementing a neural network potential for exascale molecular dynamicsImplementing a neural network potential for exascale molecular dynamics
Implementing a neural network potential for exascale molecular dynamicsPFHub PFHub
 
Signal-Energy Based Fault Classification of Unbalanced Network using S-Transf...
Signal-Energy Based Fault Classification of Unbalanced Network using S-Transf...Signal-Energy Based Fault Classification of Unbalanced Network using S-Transf...
Signal-Energy Based Fault Classification of Unbalanced Network using S-Transf...idescitation
 
NS-CUK Seminar: S.T.Nguyen, Review on "Hierarchical Graph Transformer with Ad...
NS-CUK Seminar: S.T.Nguyen, Review on "Hierarchical Graph Transformer with Ad...NS-CUK Seminar: S.T.Nguyen, Review on "Hierarchical Graph Transformer with Ad...
NS-CUK Seminar: S.T.Nguyen, Review on "Hierarchical Graph Transformer with Ad...ssuser4b1f48
 
Aging aware reliable multiplier design with
Aging aware reliable multiplier design withAging aware reliable multiplier design with
Aging aware reliable multiplier design withLogicMindtech Nologies
 
Forecasting Default Probabilities in Emerging Markets and Dynamical Regula...
Forecasting Default Probabilities  in Emerging Markets and   Dynamical Regula...Forecasting Default Probabilities  in Emerging Markets and   Dynamical Regula...
Forecasting Default Probabilities in Emerging Markets and Dynamical Regula...SSA KPI
 

Similar to Sensitivity Analysis of Checkpointing Strategies for Multimemetic Algorithms on Unstable Complex Networks (20)

ANN.pdf
ANN.pdfANN.pdf
ANN.pdf
 
Cross-Talk Control with Analog In-Memory-Compute for Artificial Intelligence ...
Cross-Talk Control with Analog In-Memory-Compute for Artificial Intelligence ...Cross-Talk Control with Analog In-Memory-Compute for Artificial Intelligence ...
Cross-Talk Control with Analog In-Memory-Compute for Artificial Intelligence ...
 
Gene's law
Gene's lawGene's law
Gene's law
 
Optimum Network Reconfiguration using Grey Wolf Optimizer
Optimum Network Reconfiguration using Grey Wolf OptimizerOptimum Network Reconfiguration using Grey Wolf Optimizer
Optimum Network Reconfiguration using Grey Wolf Optimizer
 
G011136871
G011136871G011136871
G011136871
 
H046014853
H046014853H046014853
H046014853
 
Short Term Electrical Load Forecasting by Artificial Neural Network
Short Term Electrical Load Forecasting by Artificial Neural NetworkShort Term Electrical Load Forecasting by Artificial Neural Network
Short Term Electrical Load Forecasting by Artificial Neural Network
 
FINAL VERSION sss.pptx
FINAL VERSION sss.pptxFINAL VERSION sss.pptx
FINAL VERSION sss.pptx
 
IEEE Wireless communication 2016 Title and Abstract
IEEE Wireless communication 2016 Title and AbstractIEEE Wireless communication 2016 Title and Abstract
IEEE Wireless communication 2016 Title and Abstract
 
Mobile Networking and Mobile Ad Hoc Routing Protocol Modeling
Mobile Networking and Mobile Ad Hoc Routing Protocol ModelingMobile Networking and Mobile Ad Hoc Routing Protocol Modeling
Mobile Networking and Mobile Ad Hoc Routing Protocol Modeling
 
E021052327
E021052327E021052327
E021052327
 
Randomizing genome-scale metabolic networks
Randomizing genome-scale metabolic networksRandomizing genome-scale metabolic networks
Randomizing genome-scale metabolic networks
 
Performance prediction of PV & PV/T systems using Artificial Neural Networks ...
Performance prediction of PV & PV/T systems using Artificial Neural Networks ...Performance prediction of PV & PV/T systems using Artificial Neural Networks ...
Performance prediction of PV & PV/T systems using Artificial Neural Networks ...
 
Study on the application of genetic algorithms in the optimization of wireles...
Study on the application of genetic algorithms in the optimization of wireles...Study on the application of genetic algorithms in the optimization of wireles...
Study on the application of genetic algorithms in the optimization of wireles...
 
A SURVEY OF ARTIFICIAL NEURAL NETWORKS APPLICATIONS IN WEAR AND MANUFACTURING...
A SURVEY OF ARTIFICIAL NEURAL NETWORKS APPLICATIONS IN WEAR AND MANUFACTURING...A SURVEY OF ARTIFICIAL NEURAL NETWORKS APPLICATIONS IN WEAR AND MANUFACTURING...
A SURVEY OF ARTIFICIAL NEURAL NETWORKS APPLICATIONS IN WEAR AND MANUFACTURING...
 
Implementing a neural network potential for exascale molecular dynamics
Implementing a neural network potential for exascale molecular dynamicsImplementing a neural network potential for exascale molecular dynamics
Implementing a neural network potential for exascale molecular dynamics
 
Signal-Energy Based Fault Classification of Unbalanced Network using S-Transf...
Signal-Energy Based Fault Classification of Unbalanced Network using S-Transf...Signal-Energy Based Fault Classification of Unbalanced Network using S-Transf...
Signal-Energy Based Fault Classification of Unbalanced Network using S-Transf...
 
NS-CUK Seminar: S.T.Nguyen, Review on "Hierarchical Graph Transformer with Ad...
NS-CUK Seminar: S.T.Nguyen, Review on "Hierarchical Graph Transformer with Ad...NS-CUK Seminar: S.T.Nguyen, Review on "Hierarchical Graph Transformer with Ad...
NS-CUK Seminar: S.T.Nguyen, Review on "Hierarchical Graph Transformer with Ad...
 
Aging aware reliable multiplier design with
Aging aware reliable multiplier design withAging aware reliable multiplier design with
Aging aware reliable multiplier design with
 
Forecasting Default Probabilities in Emerging Markets and Dynamical Regula...
Forecasting Default Probabilities  in Emerging Markets and   Dynamical Regula...Forecasting Default Probabilities  in Emerging Markets and   Dynamical Regula...
Forecasting Default Probabilities in Emerging Markets and Dynamical Regula...
 

More from Rafael Nogueras

A Study on Multimemetic Estimation of Distribution Algorithms
A Study on Multimemetic Estimation of Distribution AlgorithmsA Study on Multimemetic Estimation of Distribution Algorithms
A Study on Multimemetic Estimation of Distribution AlgorithmsRafael Nogueras
 
An Analysis of Migration Strategies in Island-Based Multimemetic Algorithms
An Analysis of Migration Strategies in Island-Based Multimemetic AlgorithmsAn Analysis of Migration Strategies in Island-Based Multimemetic Algorithms
An Analysis of Migration Strategies in Island-Based Multimemetic AlgorithmsRafael Nogueras
 
An Analysis of a Selecto-Lamarckian Model of Multimemetic Algorithms with Dyn...
An Analysis of a Selecto-Lamarckian Model of Multimemetic Algorithms with Dyn...An Analysis of a Selecto-Lamarckian Model of Multimemetic Algorithms with Dyn...
An Analysis of a Selecto-Lamarckian Model of Multimemetic Algorithms with Dyn...Rafael Nogueras
 
Analyzing Meme Propagation in Multimemetic Algorithms
Analyzing Meme Propagation in Multimemetic AlgorithmsAnalyzing Meme Propagation in Multimemetic Algorithms
Analyzing Meme Propagation in Multimemetic AlgorithmsRafael Nogueras
 
Introducción de Sesgo Heurístico en Algoritmos Genéticos Mediante Operadores ...
Introducción de Sesgo Heurístico en Algoritmos Genéticos Mediante Operadores ...Introducción de Sesgo Heurístico en Algoritmos Genéticos Mediante Operadores ...
Introducción de Sesgo Heurístico en Algoritmos Genéticos Mediante Operadores ...Rafael Nogueras
 
Análisis de llamadas telefónicas con Teoría de Grafos y R
Análisis de llamadas telefónicas con Teoría de Grafos y RAnálisis de llamadas telefónicas con Teoría de Grafos y R
Análisis de llamadas telefónicas con Teoría de Grafos y RRafael Nogueras
 

More from Rafael Nogueras (6)

A Study on Multimemetic Estimation of Distribution Algorithms
A Study on Multimemetic Estimation of Distribution AlgorithmsA Study on Multimemetic Estimation of Distribution Algorithms
A Study on Multimemetic Estimation of Distribution Algorithms
 
An Analysis of Migration Strategies in Island-Based Multimemetic Algorithms
An Analysis of Migration Strategies in Island-Based Multimemetic AlgorithmsAn Analysis of Migration Strategies in Island-Based Multimemetic Algorithms
An Analysis of Migration Strategies in Island-Based Multimemetic Algorithms
 
An Analysis of a Selecto-Lamarckian Model of Multimemetic Algorithms with Dyn...
An Analysis of a Selecto-Lamarckian Model of Multimemetic Algorithms with Dyn...An Analysis of a Selecto-Lamarckian Model of Multimemetic Algorithms with Dyn...
An Analysis of a Selecto-Lamarckian Model of Multimemetic Algorithms with Dyn...
 
Analyzing Meme Propagation in Multimemetic Algorithms
Analyzing Meme Propagation in Multimemetic AlgorithmsAnalyzing Meme Propagation in Multimemetic Algorithms
Analyzing Meme Propagation in Multimemetic Algorithms
 
Introducción de Sesgo Heurístico en Algoritmos Genéticos Mediante Operadores ...
Introducción de Sesgo Heurístico en Algoritmos Genéticos Mediante Operadores ...Introducción de Sesgo Heurístico en Algoritmos Genéticos Mediante Operadores ...
Introducción de Sesgo Heurístico en Algoritmos Genéticos Mediante Operadores ...
 
Análisis de llamadas telefónicas con Teoría de Grafos y R
Análisis de llamadas telefónicas con Teoría de Grafos y RAnálisis de llamadas telefónicas con Teoría de Grafos y R
Análisis de llamadas telefónicas con Teoría de Grafos y R
 

Recently uploaded

Vision and reflection on Mining Software Repositories research in 2024
Vision and reflection on Mining Software Repositories research in 2024Vision and reflection on Mining Software Repositories research in 2024
Vision and reflection on Mining Software Repositories research in 2024AyushiRastogi48
 
Speech, hearing, noise, intelligibility.pptx
Speech, hearing, noise, intelligibility.pptxSpeech, hearing, noise, intelligibility.pptx
Speech, hearing, noise, intelligibility.pptxpriyankatabhane
 
Grafana in space: Monitoring Japan's SLIM moon lander in real time
Grafana in space: Monitoring Japan's SLIM moon lander  in real timeGrafana in space: Monitoring Japan's SLIM moon lander  in real time
Grafana in space: Monitoring Japan's SLIM moon lander in real timeSatoshi NAKAHIRA
 
Microphone- characteristics,carbon microphone, dynamic microphone.pptx
Microphone- characteristics,carbon microphone, dynamic microphone.pptxMicrophone- characteristics,carbon microphone, dynamic microphone.pptx
Microphone- characteristics,carbon microphone, dynamic microphone.pptxpriyankatabhane
 
Transposable elements in prokaryotes.ppt
Transposable elements in prokaryotes.pptTransposable elements in prokaryotes.ppt
Transposable elements in prokaryotes.pptArshadWarsi13
 
Call Girls in Munirka Delhi 💯Call Us 🔝9953322196🔝 💯Escort.
Call Girls in Munirka Delhi 💯Call Us 🔝9953322196🔝 💯Escort.Call Girls in Munirka Delhi 💯Call Us 🔝9953322196🔝 💯Escort.
Call Girls in Munirka Delhi 💯Call Us 🔝9953322196🔝 💯Escort.aasikanpl
 
Scheme-of-Work-Science-Stage-4 cambridge science.docx
Scheme-of-Work-Science-Stage-4 cambridge science.docxScheme-of-Work-Science-Stage-4 cambridge science.docx
Scheme-of-Work-Science-Stage-4 cambridge science.docxyaramohamed343013
 
Base editing, prime editing, Cas13 & RNA editing and organelle base editing
Base editing, prime editing, Cas13 & RNA editing and organelle base editingBase editing, prime editing, Cas13 & RNA editing and organelle base editing
Base editing, prime editing, Cas13 & RNA editing and organelle base editingNetHelix
 
Davis plaque method.pptx recombinant DNA technology
Davis plaque method.pptx recombinant DNA technologyDavis plaque method.pptx recombinant DNA technology
Davis plaque method.pptx recombinant DNA technologycaarthichand2003
 
STOPPED FLOW METHOD & APPLICATION MURUGAVENI B.pptx
STOPPED FLOW METHOD & APPLICATION MURUGAVENI B.pptxSTOPPED FLOW METHOD & APPLICATION MURUGAVENI B.pptx
STOPPED FLOW METHOD & APPLICATION MURUGAVENI B.pptxMurugaveni B
 
Sulphur & Phosphrus Cycle PowerPoint Presentation (2) [Autosaved]-3-1.pptx
Sulphur & Phosphrus Cycle PowerPoint Presentation (2) [Autosaved]-3-1.pptxSulphur & Phosphrus Cycle PowerPoint Presentation (2) [Autosaved]-3-1.pptx
Sulphur & Phosphrus Cycle PowerPoint Presentation (2) [Autosaved]-3-1.pptxnoordubaliya2003
 
Pests of Blackgram, greengram, cowpea_Dr.UPR.pdf
Pests of Blackgram, greengram, cowpea_Dr.UPR.pdfPests of Blackgram, greengram, cowpea_Dr.UPR.pdf
Pests of Blackgram, greengram, cowpea_Dr.UPR.pdfPirithiRaju
 
Call Girls in Munirka Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Munirka Delhi 💯Call Us 🔝8264348440🔝Call Girls in Munirka Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Munirka Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
Pests of castor_Binomics_Identification_Dr.UPR.pdf
Pests of castor_Binomics_Identification_Dr.UPR.pdfPests of castor_Binomics_Identification_Dr.UPR.pdf
Pests of castor_Binomics_Identification_Dr.UPR.pdfPirithiRaju
 
Microteaching on terms used in filtration .Pharmaceutical Engineering
Microteaching on terms used in filtration .Pharmaceutical EngineeringMicroteaching on terms used in filtration .Pharmaceutical Engineering
Microteaching on terms used in filtration .Pharmaceutical EngineeringPrajakta Shinde
 
User Guide: Pulsar™ Weather Station (Columbia Weather Systems)
User Guide: Pulsar™ Weather Station (Columbia Weather Systems)User Guide: Pulsar™ Weather Station (Columbia Weather Systems)
User Guide: Pulsar™ Weather Station (Columbia Weather Systems)Columbia Weather Systems
 
Is RISC-V ready for HPC workload? Maybe?
Is RISC-V ready for HPC workload? Maybe?Is RISC-V ready for HPC workload? Maybe?
Is RISC-V ready for HPC workload? Maybe?Patrick Diehl
 
User Guide: Capricorn FLX™ Weather Station
User Guide: Capricorn FLX™ Weather StationUser Guide: Capricorn FLX™ Weather Station
User Guide: Capricorn FLX™ Weather StationColumbia Weather Systems
 

Recently uploaded (20)

Vision and reflection on Mining Software Repositories research in 2024
Vision and reflection on Mining Software Repositories research in 2024Vision and reflection on Mining Software Repositories research in 2024
Vision and reflection on Mining Software Repositories research in 2024
 
Speech, hearing, noise, intelligibility.pptx
Speech, hearing, noise, intelligibility.pptxSpeech, hearing, noise, intelligibility.pptx
Speech, hearing, noise, intelligibility.pptx
 
Grafana in space: Monitoring Japan's SLIM moon lander in real time
Grafana in space: Monitoring Japan's SLIM moon lander  in real timeGrafana in space: Monitoring Japan's SLIM moon lander  in real time
Grafana in space: Monitoring Japan's SLIM moon lander in real time
 
Microphone- characteristics,carbon microphone, dynamic microphone.pptx
Microphone- characteristics,carbon microphone, dynamic microphone.pptxMicrophone- characteristics,carbon microphone, dynamic microphone.pptx
Microphone- characteristics,carbon microphone, dynamic microphone.pptx
 
Transposable elements in prokaryotes.ppt
Transposable elements in prokaryotes.pptTransposable elements in prokaryotes.ppt
Transposable elements in prokaryotes.ppt
 
Call Girls in Munirka Delhi 💯Call Us 🔝9953322196🔝 💯Escort.
Call Girls in Munirka Delhi 💯Call Us 🔝9953322196🔝 💯Escort.Call Girls in Munirka Delhi 💯Call Us 🔝9953322196🔝 💯Escort.
Call Girls in Munirka Delhi 💯Call Us 🔝9953322196🔝 💯Escort.
 
Scheme-of-Work-Science-Stage-4 cambridge science.docx
Scheme-of-Work-Science-Stage-4 cambridge science.docxScheme-of-Work-Science-Stage-4 cambridge science.docx
Scheme-of-Work-Science-Stage-4 cambridge science.docx
 
Base editing, prime editing, Cas13 & RNA editing and organelle base editing
Base editing, prime editing, Cas13 & RNA editing and organelle base editingBase editing, prime editing, Cas13 & RNA editing and organelle base editing
Base editing, prime editing, Cas13 & RNA editing and organelle base editing
 
Davis plaque method.pptx recombinant DNA technology
Davis plaque method.pptx recombinant DNA technologyDavis plaque method.pptx recombinant DNA technology
Davis plaque method.pptx recombinant DNA technology
 
STOPPED FLOW METHOD & APPLICATION MURUGAVENI B.pptx
STOPPED FLOW METHOD & APPLICATION MURUGAVENI B.pptxSTOPPED FLOW METHOD & APPLICATION MURUGAVENI B.pptx
STOPPED FLOW METHOD & APPLICATION MURUGAVENI B.pptx
 
Sulphur & Phosphrus Cycle PowerPoint Presentation (2) [Autosaved]-3-1.pptx
Sulphur & Phosphrus Cycle PowerPoint Presentation (2) [Autosaved]-3-1.pptxSulphur & Phosphrus Cycle PowerPoint Presentation (2) [Autosaved]-3-1.pptx
Sulphur & Phosphrus Cycle PowerPoint Presentation (2) [Autosaved]-3-1.pptx
 
Pests of Blackgram, greengram, cowpea_Dr.UPR.pdf
Pests of Blackgram, greengram, cowpea_Dr.UPR.pdfPests of Blackgram, greengram, cowpea_Dr.UPR.pdf
Pests of Blackgram, greengram, cowpea_Dr.UPR.pdf
 
Call Girls in Munirka Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Munirka Delhi 💯Call Us 🔝8264348440🔝Call Girls in Munirka Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Munirka Delhi 💯Call Us 🔝8264348440🔝
 
Pests of castor_Binomics_Identification_Dr.UPR.pdf
Pests of castor_Binomics_Identification_Dr.UPR.pdfPests of castor_Binomics_Identification_Dr.UPR.pdf
Pests of castor_Binomics_Identification_Dr.UPR.pdf
 
Microteaching on terms used in filtration .Pharmaceutical Engineering
Microteaching on terms used in filtration .Pharmaceutical EngineeringMicroteaching on terms used in filtration .Pharmaceutical Engineering
Microteaching on terms used in filtration .Pharmaceutical Engineering
 
Volatile Oils Pharmacognosy And Phytochemistry -I
Volatile Oils Pharmacognosy And Phytochemistry -IVolatile Oils Pharmacognosy And Phytochemistry -I
Volatile Oils Pharmacognosy And Phytochemistry -I
 
User Guide: Pulsar™ Weather Station (Columbia Weather Systems)
User Guide: Pulsar™ Weather Station (Columbia Weather Systems)User Guide: Pulsar™ Weather Station (Columbia Weather Systems)
User Guide: Pulsar™ Weather Station (Columbia Weather Systems)
 
Hot Sexy call girls in Moti Nagar,🔝 9953056974 🔝 escort Service
Hot Sexy call girls in  Moti Nagar,🔝 9953056974 🔝 escort ServiceHot Sexy call girls in  Moti Nagar,🔝 9953056974 🔝 escort Service
Hot Sexy call girls in Moti Nagar,🔝 9953056974 🔝 escort Service
 
Is RISC-V ready for HPC workload? Maybe?
Is RISC-V ready for HPC workload? Maybe?Is RISC-V ready for HPC workload? Maybe?
Is RISC-V ready for HPC workload? Maybe?
 
User Guide: Capricorn FLX™ Weather Station
User Guide: Capricorn FLX™ Weather StationUser Guide: Capricorn FLX™ Weather Station
User Guide: Capricorn FLX™ Weather Station
 

Sensitivity Analysis of Checkpointing Strategies for Multimemetic Algorithms on Unstable Complex Networks

  • 1. 10th International Conference on Large-Scale Scientific Computations Sensitivity Analysis of Checkpointing Strategies for Multimemetic Algorithms on Unstable Complex Networks Rafael Nogueras Carlos Cotta Departamento de Lenguajes y Ciencias de la Computación Universidad de Málaga, Spain LSSC 2015, Sozopol, 8-12 June 2015 Analysis of Checkpointing for MMAs on Unstable Complex Networks Universidad de Málaga 1 / 16
  • 2. Introduction Model Description Experimental Analysis Conclusions Parallel Computing & EAs Use of parallel and distributed models of EAs (GAs, MAs, MMAs, etc.) to improve solution quality and reduce computational times. The island model spatially organizes populations into partially isolated panmictic demes. island1 island2 island3 island4 migrants Analysis of Checkpointing for MMAs on Unstable Complex Networks Universidad de Málaga 2 / 16
  • 3. Introduction Model Description Experimental Analysis Conclusions Emergent Paralell Environments Two emergent computational environments are offering new opportunities to EAs: I P2P networks: Equally privileged computing nodes carry out a distributed computation without need for central coordination. I Desktop Grids: Distributed networks of heterogeneous systems which typically contribute computing cycles while they are inactive (volunteer computing platforms). Churn The combined effect of multiple computing nodes leaving and entering the system along time. Analysis of Checkpointing for MMAs on Unstable Complex Networks Universidad de Málaga 3 / 16
  • 4. Introduction Model Description Experimental Analysis Conclusions Scope Some mechanism is required to deal with resource volatility. 1. Use of fault-tolerance strategies (e.g. restoration checkpoints). 2. Use of reactive policies to self-adapt the MMA. Goal Study EAs running on unstable computational environments with SF/SW topologies: I Use of restoration checkpoints with different frequencies. I Impact on performance and comparison with random strategies. Analysis of Checkpointing for MMAs on Unstable Complex Networks Universidad de Málaga 4 / 16
  • 5. Introduction Model Description Experimental Analysis Conclusions Network Topology Scale-free Networks I SF networks are often observed in many natural processes. I They feature a power-law distribution in node degrees. I We use the Barabási-Albert (BA) model. I This model uses preferential attachment to grow a network. Analysis of Checkpointing for MMAs on Unstable Complex Networks Universidad de Málaga 5 / 16
  • 6. Introduction Model Description Experimental Analysis Conclusions Network Topology Small-world Networks I SW networks have a very small –O(log n)– average distances among nodes. I We use a variant of the Barmpoutis-Murray (BM) model. I This model uses a backtracking procedure to build the largest clique leaving enough links for the rest of the network. I Each clique is connected using random vertices in the first clique to make it more resilient. Analysis of Checkpointing for MMAs on Unstable Complex Networks Universidad de Málaga 6 / 16
  • 7. Introduction Model Description Experimental Analysis Conclusions Instability Algorithms must be executed on platforms with multiple computing elements (processors)... ...but distributed platforms are prone to errors. 0 100 200 300 400 500 600 700 800 900 1000 0 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 1 time survival probability k=1 k=2 k=5 k=10 k=20 We assume node availability follows a Weibull distributiona: p(t1 | t0) = e − h t1 β η − t0 β ηi If the scale parameter η 1 the hazard rate increases with time. a J Grid Comput, doi: 10.1007/s10723-014-9315-6, 2015 Analysis of Checkpointing for MMAs on Unstable Complex Networks Universidad de Málaga 7 / 16
  • 8. Introduction Model Description Experimental Analysis Conclusions Coping with Instability Computing in an unstable environment requires fault-tolerance. Two strategies are considered: I rand: initialization from scratch for nodes becoming available again. I checkpoint: periodical backups of each subpopulation in external safe storage, intended to recover the last state when a node is reactivated. The rand strategy is simpler and has the advantage of boosting diversity. Analysis of Checkpointing for MMAs on Unstable Complex Networks Universidad de Málaga 8 / 16
  • 9. Introduction Model Description Experimental Analysis Conclusions Coping with Instability Cloud Storage Islandi save state save state load state save state λ fault recovery The checkpoint strategy saves the previous progress of the search. It requires external safe storage, i.e., I centralization I overhead The latter drawback could be mitigated by tuning parameter λ. Analysis of Checkpointing for MMAs on Unstable Complex Networks Universidad de Málaga 9 / 16
  • 10. Introduction Model Description Experimental Analysis Conclusions Benchmark and Settings Parameters for island-based model: I nι = 32 islands and µ = 16 individuals (at the beginning). I m = 2 (SF/SW topologies). Node deactivation/reactivation: I shape parameter η = 1.5. I scale parameters β = −1/ log(p) for p = 1 − (knι)−1, k ∈ {1, 2, 5, 10, 20}. Problems used: I Deb’s trap function (concatenating 32 four-bit traps). I HIFF HXOR functions (using 128 bits). I MMDP (using 24 six-bit blocks). 25 runs @ 50,000 evaluations are performed for each problem, algorithm, churn scenario, network topology and λ ∈ {µ, 10µ, 100µ}. Analysis of Checkpointing for MMAs on Unstable Complex Networks Universidad de Málaga 10 / 16
  • 11. Introduction Model Description Experimental Analysis Conclusions Numerical Results Approximation to the Optimum Deviation from the optimum as a function of the churn rate. 0 0.2 0.4 0.6 0.8 1 0 10 20 30 40 50 60 70 80 90 100 1/k deviation from optimum (%) rand λ=16 λ=160 λ=1600 0 0.2 0.4 0.6 0.8 1 0 10 20 30 40 50 60 70 80 90 100 1/k deviation from optimum (%) rand λ=16 λ=160 λ=1600 Performance degrades with increasing churn rates but not in the same way for the different λ values (degradation according to λ increases). Analysis of Checkpointing for MMAs on Unstable Complex Networks Universidad de Málaga 11 / 16
  • 12. Introduction Model Description Experimental Analysis Conclusions Numerical Results Statistical Analysis i strategy z-statistic p-value α/i 1 λ = 160 2.598e+00 4.687e–03 5.000e–02 2 λ = 1600 7.015e+00 1.151e–12 2.500e–02 3 rand 8.747e+00 1.097e–18 1.667e–02 I Degradation is statistically significant according to Quade test (p-value ≈ 0). I The use of checkpoint with λ = µ is statistically superior according to Holm test at α = 0.05 level. I Strategies with less frequent snapshots are not capable of dealing with churn. Analysis of Checkpointing for MMAs on Unstable Complex Networks Universidad de Málaga 12 / 16
  • 13. Introduction Model Description Experimental Analysis Conclusions Numerical Results Evolution of Best Fitness Evolution of best fitness on the TRAP function for different churn rates with SF topology. (Left) k = 20 (Center) k = 5 and (Right) k = 1. 1 2 3 4 5 x 10 4 14 16 18 20 22 24 26 28 30 32 evaluations best fitness λ = 16 λ = 160 λ = 1600 1 2 3 4 5 x 10 4 14 16 18 20 22 24 26 28 30 32 evaluations best fitness λ = 16 λ = 160 λ = 1600 1 2 3 4 5 x 10 4 14 16 18 20 22 24 26 28 30 32 evaluations best fitness λ = 16 λ = 160 λ = 1600 As churn increases the difference in fitness is favourable to λ = µ. Low λ values support better the degradation as churn increases. Analysis of Checkpointing for MMAs on Unstable Complex Networks Universidad de Málaga 13 / 16
  • 14. Introduction Model Description Experimental Analysis Conclusions Numerical Results Evolution of Genetic Diversity Evolution of genetic diversity on the TRAP function for different churn rates with SF topology. (Left) k = 20 (Center) k = 5 and (Right) k = 1. 1 2 3 4 5 x 10 4 0 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 1 evaluations entropy λ = 16 λ = 160 λ = 1600 1 2 3 4 5 x 10 4 0 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 1 evaluations entropy λ = 16 λ = 160 λ = 1600 1 2 3 4 5 x 10 4 0 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 1 evaluations entropy λ = 16 λ = 160 λ = 1600 MMA has convergence problems as churn increases when λ is high. Analysis of Checkpointing for MMAs on Unstable Complex Networks Universidad de Málaga 14 / 16
  • 15. Introduction Model Description Experimental Analysis Conclusions Conclusions Resilience is a key feature on unstable computational environments. Policies in order to cope with the loss of information must be introduced. A possibility is the creation of periodical backups of the state of the nodes to recover from failures. Large churn rates require frequent backups to cope with node volatility. Ongoing work: I Autonomous or self-adaptive approaches to react to churn. I Use of purely local strategies. Analysis of Checkpointing for MMAs on Unstable Complex Networks Universidad de Málaga 15 / 16
  • 16. Introduction Model Description Experimental Analysis Conclusions Thank You! AnySelf Project Please find us in Facebook http://facebook.com/AnySelfProject and in Twitter @anyselfproject Analysis of Checkpointing for MMAs on Unstable Complex Networks Universidad de Málaga 16 / 16