Volume 1 (1), July 2018, Pages 3-19

Ehsan Mousavi Khaneghah1, Araz R. Aliev2, Ulphat Bakhishoff3, Elham Adibi1

1Department of Computer Engineering, Faculty of Engineering, Shahed University, Tehran, Iran, This email address is being protected from spambots. You need JavaScript enabled to view it., This email address is being protected from spambots. You need JavaScript enabled to view it.
2High Performance Computing Research Advance Center, Department of General and Applied Mathematics, Azerbaijan State Oil and Industry University, Baku, Azerbaijan, This email address is being protected from spambots. You need JavaScript enabled to view it.
3 Department of General and Applied Mathematics, Azerbaijan State Oil and Industry University, Baku, Azerbaijan, ulfat.baxıThis email address is being protected from spambots. You need JavaScript enabled to view it.


Resource discovery in distributed Exascale computing systems, in addition to managing events resulting in failures due to not finding the resource, as well as failure to perform resource discovery activities at the acceptable time, needs to be able to manage events resulting in failures due to dynamic and interactive nature as well. While investigating the concept of dynamic and interactive nature and its impact on RD functionality, this paper introduces a mathematical model of events resulting in RD failure in this type of computing systems based on descriptive spaces of RD activities. This mathematical model helps to analyze this issue that in what situations the dynamic and interactive nature would lead to the failure of RD and what capabilities RD should have to prevent the failure.


Distributed Exascale computing systems, Resource Discovery, Resource discovery failure, Resource discovery indicator.



[1]. Qureshi, M. B., Dehnavi, M. M., Min-Allah, N., Qureshi, M. S., Hussain, H., Rentifis, I., & Zomaya, A. Y. (2014). Survey on grid resource allocation mechanisms. Journal of Grid Computing, 12(2), 399-441.

[2]. Black, B., Roersma, J. S., Boelens, J., Dunbar, N., Lange, S., & Swanson, W. (2014). U.S. Patent No. 8,856,329. Washington, DC: U.S. Patent and Trademark Office.

[3]. Souri, A., & Navimipour, N. J. (2014). Behavioral modeling and formal verification of a resource discovery approach in Grid computing. Expert Systems with Applications, 41(8), 3831-3849.

[4]. Samimi, P., Teimouri, Y., & Mukhtar, M. (2016). A combinatorial double auction resource allocation model in cloud computing. Information Sciences, 357, 201-216.

[5]. Messina, F., Pappalardo, G., Rosaci, D., Santoro, C., & Sarné, G. M. (2013). A trust-based approach for a competitive cloud/grid computing scenario. In Intelligent Distributed Computing VI (pp. 129-138). Springer, Berlin, Heidelberg.

[6]. Zhong, H., Tao, K., & Zhang, X. (2010, July). An approach to optimized resource scheduling algorithm for open-source cloud systems. In ChinaGrid Conference (ChinaGrid), 2010 Fifth Annual (pp. 124-129). IEEE.

[7]. Banerjee, S., & Hecker, J. P. (2017). A Multi-agent system approach to load-balancing and resource allocation for distributed computing. In First Complex Systems Digital Campus World E-Conference 2015 (pp. 41-54). Springer, Cham.

[8]. Mahmud, R., Kotagiri, R., & Buyya, R. (2018). Fog computing: A taxonomy, survey and future directions. In Internet of everything (pp. 103-130). Springer, Singapore.

[9]. Navimipour, N. J., & Milani, F. S. (2015). A comprehensive study of the resource discovery techniques in peer-to-peer networks. Peer-to-Peer Networking and Applications, 8(3), 474-492.

[10].Wale, N., Sim, D. G., Jones, M. J., Salathe, R., Day, T., & Read, A. F. (2017). Resource limitation prevents the emergence of drug resistance by intensifying within-host competition. Proceedings of the National Academy of Sciences, 114(52), 13774-13779.

[11].Wang, D., He, D., Wang, P., & Chu, C. H. (2015). Anonymous two-factor authentication in distributed systems: certain goals are beyond attainment. IEEE Transactions on Dependable and Secure Computing, (1), 1-1.

[12].Wu, J. (2017). Distributed system design. CRC press.

[13].Balakrishnan, B., Kothamasu, V. R., & Woods, G. (2015). U.S. Patent No. 9,032,369. Washington, DC: U.S. Patent and Trademark Office. 

[14].Li, K., Tang, X., Veeravalli, B., & Li, K. (2015). Scheduling precedence constrained stochastic tasks on heterogeneous cluster systems. IEEE Transactions on computers, 64(1), 191-204.

[15].Bhalachandra, S., Porterfield, A., & Prins, J. F. (2015, May). Using dynamic duty cycle modulation to improve energy efficiency in high performance computing. In Parallel and Distributed Processing Symposium Workshop (IPDPSW), 2015 IEEE International (pp. 911-918). IEEE.

[16].Khaneghah, E. M., ShowkatAbad, A. R., & Ghahroodi, R. N. (2018, February). Challenges of Process Migration to Support Distributed Exascale Computing Environment. In Proceedings of the 2018 7th International Conference on Software and Computer Applications (pp. 20-24). ACM.

[17].Babuji, Y. N., Chard, K., Gerow, A., & Duede, E. (2016, October). A secure data enclave and analytics platform for social scientists. In e-Science (e-Science), 2016 IEEE 12th International Conference on (pp. 337-342). IEEE.

[18].Totu, L. C., Leth, J., & Wisniewski, R. (2013, June). Control for large scale demand response of thermostatic loads. In ACC (pp. 5023-5028).

[19].Sadeghi, A. R., Wachsmann, C., & Waidner, M. (2015, June). Security and privacy challenges in industrial internet of things. In Design Automation Conference (DAC), 2015 52nd ACM/EDAC/IEEE (pp. 1-6). IEEE.

[20].Kilian, F., & Luik, O. (2013). U.S. Patent No. 8,533,717. Washington, DC: U.S. Patent and Trademark Office.

[21].Xavier, M. G., Neves, M. V., Rossi, F. D., Ferreto, T. C., Lange, T., & De Rose, C. A. (2013, February). Performance evaluation of container-based virtualization for high performance computing environments. In Parallel, Distributed and Network-Based Processing (PDP), 2013 21st Euromicro International Conference on (pp. 233-240). IEEE.

[22].Sakadasariya Achyut, R. Survey of Resource and Job Management for Load Bal-ancing In Grid Computing. Of the IJISME ISSN, 2319-6386.

[23].Khaneghah, E. M. (2017). U.S. Patent No. 9,613,312. Washington, DC: U.S. Patent and Trademark Office.

[24].Mousavi Khaneghah, E., Noorabad Ghahroodi, R., & Reyhani ShowkatAbad, A. (2018). A mathematical multi-dimensional mechanism to improve process migration efficiency in peer-to-peer computing environments. Cogent Engineering, 5(1), 1458434.

[25].Reed, D. A., & Dongarra, J. (2015). Exascale computing and big data. Communications of the ACM, 58(7), 56-68.

[26].Wang, K., Kulkarni, A., Lang, M., Arnold, D., & Raicu, I. (2016). Exploring the design tradeoffs for extreme-scale high-performance computing system software. IEEE Transactions on Parallel and Distributed Systems, 27(4), 1070-1084.

[27].Wang, K., Zhou, X., Li, T., Zhao, D., Lang, M., & Raicu, I. (2014, October). Optimizing load balancing and data-locality with data-aware scheduling. In Big Data (Big Data), 2014 IEEE International Conference on (pp. 119-128). IEEE.

[28].Towns, J., Cockerill, T., Dahan, M., Foster, I., Gaither, K., Grimshaw, A., & Roskies, R. (2014). XSEDE: accelerating scientific discovery. Computing in Science & Engineering, 16(5), 62-74.

[29].Zhu, X., Yang, L. T., Jiang, H., Thulasiraman, P., & Di Martino, B. (2018). Optimization in distributed information systems.

[30].Horelik, N. E. (2015). Domain decomposition for Monte Carlo particle transport simulations of nuclear reactors (Doctoral dissertation, Massachusetts Institute of Technology).

[31].Saurav, S. K., Raghu, H. V., & Bapu, S. B. (2017, September). Self-adaptive power management framework for high performance computing. In Advances in Computing, Communications and Informatics (ICACCI), 2017 International Conference on (pp. 1913-1918). IEEE.

[32].Kominar, J. L., & Adams, N. P. (2017). U.S. Patent Application No. 15/152,926.

[33].Orozco, D., Garcia, E., Pavel, R., Khan, R., & Gao, G. (2011, October). TIDeFlow: The time iterated dependency flow execution model. In 2011 First Workshop on Data-Flow Execution Models for Extreme Scale Computing (pp. 1-9). IEEE.

[34].Gong, Q., Zhang, L., & Ding, L. (2017). U.S. Patent No. 9,559,898. Washington, DC: U.S. Patent and Trademark Office.

[35].Sharifi, M., Mirtaheri, S. L., Khaneghah, E. M., & Khaneghah, Z. M. (2011). Process Management Reviewed.

[36].Navimipour, N. J., Rahmani, A. M., Navin, A. H., & Hosseinzadeh, M. (2014). Resource discovery mechanisms in grid systems: A survey. Journal of Network and Computer Applications, 41, 389-410

[37].Zarrin, J., Aguiar, R. L., & Barraca, J. P. (2016). ElCore: Dynamic elastic resource management and discovery for future large-scale manycore enabled distributed systems. Microprocessors and Microsystems, 46, 221-239.

[38].Sambasivan, R. R., Zheng, A. X., De Rosa, M., Krevat, E., Whitman, S., Stroucken, M., & Ganger, G. R. (2011, March). Diagnosing Performance Changes by Comparing Request Flows. In NSDI (Vol. 5, pp. 1-1).

[39].Gopal, S. V., Rao, N. S., & Naik, S. L. (2016, March). Dynamic sharing of files from disconnected nodes in peer to peer systems. In Electrical, Electronics, and Optimization Techniques (ICEEOT), International Conference on (pp. 767-770). IEEE.

[40].Rodrigues, R., & Druschel, P. (2010). Peer-to-peer systems. Communications of the ACM, 53(10), 72-82.

[41].Selvaraj, C., & Anand, S. (2012). A survey on security issues of reputation management systems for peer-to-peer networks. Computer Science Review, 6(4), 145-160.

[42].Bandara, H. D., & Jayasumana, A. P. (2013). Collaborative applications over peer-to-peer systems–challenges and solutions. Peer-to-Peer Networking and Applications, 6(3), 257-276.

[43].Asghari, S., & Navimipour, N. J. (2018). Resource discovery in the peer to peer networks using an inverted ant colony optimization algorithm. Peer-to-Peer Networking and Applications, 1-14.

[44].Palmieri, F. (2017). Bayesian resource discovery in infrastructure-less networks. Information Sciences, 376, 95-109.

[45]. Jiang, C., Gao, L., Duan, L., & Huang, J. (2018). Scalable mobile crowdsensing via peer-to-peer data sharing. IEEE Transactions on Mobile Computing, 17(4), 898- 912.

[46].Arab, M. N., & Sharifi, M. (2014). A model for communication between resource discovery and load balancing units in computing environments. The Journal of Supercomputing, 68(3), 1538-1555. 

[47].Thomas, D., Baron, J., & Raymond, M. A. (2015). U.S. Patent Application No. 13/930,955.

[48].Hussain, H., Malik, S. U. R., Hameed, A., Khan, S. U., Bickler, G., Min-Allah, N., & Kolodziej, J. (2013). A survey on resource allocation in high performance distributed computing systems. Parallel Computing, 39(11), 709-736.

[49].Yu, W., Liu, D., & Yu, N. (2013). Feeder control error and its application in coordinate control of active distribution network [J]. Proceedings of the CSEE, 33(13), 108-115.