Note section numbers such as 2.1syr refer to text in original document and are hyperlinked to it
We are considering scenarios involving medical emergencies associated with armed combat, terrorist actions, inadvertent releases of toxic chemicals, or major industrial plant explosions. In such scenarios, the goal is to rapidly acquire and analyze medical data as the crisis unfolds in order to determine how best to allocate scarce medical resources. This scenario involves the discovery and integration of multiple sources of data that might be in different geographical locations. We would For instance, one may need to determine the best diagnosis and treatment for patients exposed to combinations of chemicals whose effects have not been well characterized. This class of scenarios is motivated by the recent ARPA-sponsored National Research Council workshop on crisis management.
This involves discovering and Exploiting Clinical Patterns in Patient Populations. These scenarios involve study of health records to determine risk factors associated with morbidity and mortality for specific subpopulations (e.g. various substrata of armed forces personnel serving in a particular region). In such scenarios, the goal is to provide high quality, lower cost care by exploring diverse clinical data sources for patterns and correlations and by ensuring that significant data for individual patients is not overlooked. For instance, a system of this type could rapidly track the spread of serious infectious diseases such as Hepatitis B or HIV. It could also be used to identify specific soldiers whose demographic profile or past medical history might place them at particularly high risk of contracting the disease.
The systems software required for these medical scenarios should be very similar to the requirements motivated by the sensor data fusion scenario.
With large volumes of routine data having been collected, many organizations are increasingly turning to the extraction of useful information from such databases. Such high-level inference processes may provide information on patterns from large databases of particular interest to defense analysis.
Data mining is an emerging research area, whose goal is to extract significant patterns or interesting rules from such large databases. Data mining is in fact a broad area which combines research in machine learning, statistics and databases. It can be broadly classified into three main categories: Classification -- finding rules that partition the database into disjoint classes; Sequences -- extracting commonly occurring sequences in temporal data; and Associations -- find the set of most commonly occurring groupings of items.
At Rochester, we have worked on the problem of mining association rules in parallel over basket data on both distributed shared-memory multiprocessors and a network of machines. Basket data usually consists of a record per customer with a transaction date, along with items bought by the customer. Many real-world applications can be formulated in such a manner. Our preliminary experimental results on a SGI Power Challenge shared-memory multiprocessor machine and a DEC Memory Channel cluster are very encouraging.
The next step is to consider scenarios where the database server is accessible via the Internet. The machine independent nature of Java makes it ideally suited to writing both the server and client code. The server could be a collection of machines, i.e., it could be a single tightly-coupled multi-processor shared or distributed memory machine, it could be a network of workstations, or any combination of these with heterogeneous processing elements, and heterogeneous interconnection network. The client side could be a heterogeneous collection of machines as well. We need compiler and run-time support to manage both the client and the server. The compiler should be able to insert code to exploit the local network configurations on both ends, while the run-time system monitors dynamic behavior and executes different actions according to the transient information. We have implemented a client-server data mining algorithm in Java. The preliminary results will be discussed in more detail in Section 8.5.
Data mining algorithms tend to have program behaviors quite different from traditional Grand Challenge problems in terms of both data access patterns and control flow. Unlike simple array structures used in scientific code, the data structures used in mining algorithms include hash trees, hash tables, and linked lists. Consider mining for associations: the first step consists of finding all the sets of items (called itemsets), that occur in the database with a certain user-specified frequency (called minimum support). Such itemsets are called large itemsets. An itemset of k items is called a k-itemset. The general structure of algorithms for mining associations are as follows. The initial pass over the database counts the support for all 1-itemsets. The large 1-itemsets are used to generate candidate 2-itemsets. The database is scanned again to obtain occurrence counts for the candidates, and the large 2-itemsets are selected for the next pass. This iterative process is repeated for k = 3,4, ... till there are no more large k-itemsets to be found. Effective parallelization and networked computing require new research in algorithms, compilers and runtime systems.
Following the exact semantics of Fortran-M channels might be a challenge in java because of the limited synchronization features of java
[My impression is that the synchronisation facilities in Java are reasonably complete--once you track them down. DBC]
The current Java compiler takes the hybrid approach of compilation and interpretation. At Rochester, we would like to exploit more options to generate efficient code for High Performance Java applications. We consider three scenarios:
At Rochester, we are implementing compiler infrastructure with multiple front- and back-ends which will uniformly treat all scenarios mentioned above (cf. Section 8.4). We expect to include traditional optimizations like cache optimizations, register allocations etc.
We consider using Java to also provide low-level runtime support for the Meta-Challenges and distributed Interactive Simulations (DIS) discussed above as well as the traditional Grand and National Challenges: coding the high-performance runtime system in Java (i.e., traditional PCRC-like, including Parti/Chaos). There are two basic sets of issues that a runtime system designer must consider for traditional HPC challenges:
The Syracuse University Fortran 90D runtime consists of about 300 routines/functions. We expect that number to reduce to less than 150 in the newer PCRC implementation by for handling regular computations and communications. We add to this the estimate about 60 functions from the Maryland CHAOS runtime for handling the irregular case. At present our Fortran 90D runtime (including its use of Parti/Chaos) requires only 23 different MPI functions. The same will hold for the newer PCRC version. We claim the following:
As we re-implement the PCRC runtime system for regular and irregular distributed arrays, we must address the following design issues:
[original text:8.2.1roc) How to implement the thread packages on which Java is based across a range of architectures]
[original text:8.2.2roc) How to unifiy shared-memory and message-passing portions of web-spanning applications.]
[new text from ROCHESTER:]
Threads in Java are supported for concurrency. This is useful as perceived
by a user, when response time is important, e.g. the HotJava browser where
you can scroll a page while down-loading an image. It currently does not
support threads running on separate processors. Our main objective in this
section is to support parallel threads, at no expense to the Java programmer.
We would prefer not to change, modify or limit the language as perceived
by the user.
There seem to be two possible scenarios:
At Rochester, we are particularly interested in implementing a parallel thread package for Java with special compiler support on distributed shared-memory (DSM) machines. On scalable multiprocessors, communication is much more expensive than computation. Many different protocols have been proposed for behavior-driven locality management. None of them work best for all types of data sharing. Performance would be increased if the system could adapt to the program's memory access patterns. An example could be the use of multithreading to alleviate memory latency (especially on remote accesses) aggravated by delays introduced by the memory coherency protocol. We propose to analyze programs at compile time and annotate them with data access summary information. Exploiting this information will require the ability to switch among multiple data coherence protocols at run time.
[original text:8.2.3ind) Performance of Current Java Threads]
The intent is to provide a single unified framework for remote access and remote execution in the form of itinerant programs. Itinerant programs can execute on and move between the user's machine, the servers providing the datasets to be processed or third-party compute servers available on the network. The motion is not just client-server; it can also be between servers. Programs move either because the current platform does not have adequate resources or because the cost of computation on the current platform or at the current location in the network is too high. Various parts of a single program can be executed at different locations, depending upon cost and availability of resources as well as user direction. The architecture would also provide support for plaza servers. Plaza servers provide facilities for (1) execution of itinerant programs, (2) storage of intermediate data, (3) monitoring cost, usage and availability of local and remote resources on behalf of itinerant programs and alerting them if these quantities cross user-specified bounds, (4) routing messages to and from itinerant programs, and (5) value-added access to other servers available on the network. Examples of value-added functionality include conversions to and from standard formats and operations on data in its native format. In addition to allowing cost and performance optimization, itinerant programs and plaza servers also provide a flexible framework for extending the interface of servers, in particular legacy servers with large volumes of data as well as servers that are not under the control of the user.
MPI should be bound to Java so that Java programs can communicate by message passing. We believe that applications will require an ability to process periodically generated data. Programming to carry this out could be written in MPI, however, a higher level library might prove to be useful.
Consider long-running itinerant programs that process periodically generated data; each program processes sequences of data from multiple sources with possibly different periodicity. An itinerant program can either visit each of the data sources in order or it can install a surrogate at each data source, which is activated every time the dataset is updated. A surrogate acts as a filter for the sequence of data generated by the data source and communicates appropriate updates to the parent itinerant program (possibly after preliminary processing). For complex processing on a number of datasets, a hierarchy of surrogates and result combining programs can be created. The result of such itinerant programs can either be a single accumulated result or a sequence of results. What we have in mind is a scheme that is an extension of our existing scheme for mapping and synchronizing multiple update sequences, which has been used in our program coupling effort. This scheme has been used to dynamically link multiple physical simulations being performed concurrently.
We consider the problem of efficiently coupling multiple data-parallel programs at runtime. We propose an approach that establishes mappings between data structures in different data-parallel programs and implements a user-specified consistency model. Mappings are established at runtime and can be added and deleted while the programs being coupled are in execution. Mappings, or the identity of the processors involved, do not have to be known at compile-time or even link-time. Programs can be made to interact with different granularities of interaction without requiring any re-coding. A-priori knowledge of consistency requirements allows buffering of data as well as concurrent execution of the coupled applications. Efficient data movement is achieved by pre-computing an optimized schedule. (This actually is already PCRC work and will appear in a paper at the ICS conference in May).
is our joint work with Boston University and Cooperating systems with paper written before implications of Java as clear as they are now!
updates some of the ideas in WebWork
[new text from ROCHESTER:]
As part of our effort to better understand the compilation issues, at Rochester we are developing a Java compiler which could be used to optimize Java programs.
The compiler would use a common intermediate representation and a collection
of front- and back-ends to facilitate re-use of components and independence
of optimization passes.
There are two possible front-ends: one would read Java source, the other
one would read bytecode.
A set of back-ends would include Java source generation, bytecode generation, and "native" code generation (either in form of some target HLL like C, or actual native code for some architectures).
/=====> Java Java ----\ / ======> IR =====-------> bytecode bytecode ====/ \ \-----> C (or other "native")
Our current development concentrates on a bytecode front-end and Java back-end
(shown above with double lines). The choice was made, because using bytecode
as an input is more general (if we have access to source, we also have access
to its bytecode form -- the converse is not true). Using Java as output
has a big advantage in the development phase.
The implementation is not complete: only a subset of legal bytecode constructs
is implemented and the definition of our IR is not stable. However, preliminary
results are promising. We are able to identify implicit high level constructs
such as loops with good success. Also our high level IR makes implementation
of code transformation relatively simple.
Code instrumentation is our first application of the compiler framework. We are developing a pass which inserts instrumentation calls. Currently we are instrumenting loops, if-then-else statements, and methods. We are planning to look into the performance of a range of Java applications. The objective is to determine if there are any performance issues that are unique to Java the language (the fact that it is interpreted), and/or applications written in Java (it could be the case that only certain kinds of applications are worth writing in Java).
An Example.
We are given a bytecode representation of a method corresponding to the following disassembled code. Method void paintAll(java.awt.Graphics) 0 iconst_0 1 istore_2 2 goto 19 5 aload_0 6 aload_0 7 getfield #7 <Field PCRCexample.CellList [I> 10 iload_2 11 iaload 12 aload_1 13 invokevirtual #6 <Method PCRCexample.plotCell(ILjava/awt/Graphics;)V> 16 iinc 2 1 19 iload_2 20 aload_0 21 getfield #4 <Field PCRCexample.n I> 24 if_icmplt 5 27 aload_0 28 aload_1 29 invokevirtual #3 <Method PCRCexample.updateStatusLine(Ljava/awt/Graphics;)V > 32 return
We can parse the class file and recover a high-level intermediate representation which corresponds to the following source (this was generated automatically by our Java-source back-end).
public void paintAll ( java.awt.Graphics a1 ) { int v0; v0 = 0; while((v0 < this.n)) { this.plotCell(this.CellList[v0], a1); v0 = (v0 + 1); } //while this.updateStatusLine(a1); return; } // paintAll
Since our IR explicitly identifies high-level constructs (e.g.,loops), it is easy to instrument the code and/or perform optimizing transformations.
We have implemented a preliminary version of network-based data mining at
Rochester. Currently, the server is a passive entity in terms of the data
mining computation. It's only job is to accept client connections and ship
off requested data. The mining process is carried out at the client end.
Both the client and server are currently sequential.
We now present some timing results vis-a-vis a C++ implementation of the algorithm which doesn't transmit any data over the network. Below we show two synthetic databases from IBM we looked at:
Database Num_Trans Avg_Trans_Size Total_Size ----------------------------------------------------------- T5.I2.D100K 100,000 5 2.615 Mbytes T10.I4.D100K 100,000 10 4.31 Mbytes These database are accessible only to the server through a file-server. We now present the total execution time for the algorithm. The Java_Time includes the server disk-read time, transmission time and client computation time. C++_Time only gives the disk-read time and computation time. Database Total_Size Java_Time C++_Time -------------------------------------------------- T5.I2.D100K 2.615 Mbytes 367.7s 15.3s T10.I4.D100K 4.31 Mbytes 1847.2s 78.9s The break-up of the execution time is as follows: Database Total_Size Java:Reading Computation C++:Reading Computation ------------------------------------------------------------------------ T5.I2.D100K 2.615 Mbytes 292.6s 75.1s 8.8s 6.5s T10.I4.D100K 4.31 Mbytes 478.4s 1368.8s 13.8s 65.1s In Java the net disk-read time and shipping time for data is at the rate of 9Kb/sec vs. 0.31Mb/sec disc read time in C++.
From the experiments, we make two observations:
We will address these issues in our future research.