|
|
• Содержание выпуска • • Mathematical Foundations of Programming • • Methods for Optimal Control and Control Theory • • Software and Hardware for Distributed Systems and Supercomputers • • Artificial Intelligence, Intelligence Systems, Neural Networks • • Supercomputing Software and Hardware •
Software and Hardware for Distributed Systems and Supercomputers
Responsible for the Section: Sergei Abramov, Dr. Phys.-Math.Sci.,
corresponding member of RAS
On the left: assigned number of the paper, submission date, the number
of A5 pages contained in the paper,
and the reference to the full-text PDF
.
Article # 4_2015
11
p.
PDF |
submitted on 24th
Dec 2014 displayed on
website on 24th Feb
2015 Mishchenko P., Gubarev V.
The distributed computer system for training specialists of high
performance computing
The paper presents a software system aimed at finding
best (in some sense) parameters of an algorithm. The system handles
both discrete and continuous parameters and employs massive
parallelism offered by public clouds. The paper presents an overview
of the system, a method to measure algorithm’s performance in the
cloud and numerical results of system’s use on several problem sets.
(in Russian).
Key words: algorithmic parameter optimization, parameter
tuning, cloud computing. |
article citation |
http://psta.psiras.ru/read/psta2015_1_39-49.pdf |
DOI |
https://doi.org/10.25209/2079-3316-2015-6-1-39-49 |
Article # 5_2015
10
p.
PDF |
submitted on 26th
Dec 2014 displayed on
website on 24th Feb
2015 Smirnov S.
Cloud system for program parameters fine tuning
The article is dedicated to questions of appliance
high-performance tools for training specialists of parallel
computing. Different methods of educational process organization is
considered, strengths and weaknesses of this methods are discussed.
After that the proposed approach of creating computing system based
on personal computers connected into local or global network is
described in detail. (In Russian).
Key words: high-performance computing systems, parallel
algorithm, coarse-grain parallelism. |
article citation |
http://psta.psiras.ru/read/psta2015_1_51-60.pdf |
DOI |
https://doi.org/10.25209/2079-3316-2015-6-1-51-60 |
Article # 6_2015
11
p.
PDF |
submitted on 26th
Dec 2014 displayed on
website on 24th Feb
2015 Vorobiev V, Ryzhkov S.R,,
Fatkieva R.R.
Cloud computing security perimeter
Abstract concept of cloud data sealing by means of
determinable policies is proposed. Use of TPM crypto modules for
creation of trusted server platforms within the cloud is described.
Generalized geo tagging scheme is presented. (In Russian).
Key words: cloud, cloud computing, security perimeter, geo
tagging. |
article citation |
http://psta.psiras.ru/read/psta2015_1_61-71.pdf |
DOI |
https://doi.org/10.25209/2079-3316-2015-6-1-61-71 |
Article # 8_2015
15
p.
PDF |
submitted on 26th
Dec 2014 displayed on
website on 24th Feb
2015 Tsvetkov A.
Multiagent approach to the controlling of the operational
environment containing extremely large databases
A possible architecture of VLDB is considered based
on co-operation of a system of the rational agents in the sense of
[3], monitoring how VLDB works and providing adaptive control. (In
Russian).
Key words: very large database, intelltcnual agent, rational
agent, adaptive control, VLDB. |
article citation |
http://psta.psiras.ru/read/psta2015_1_83-97.pdf |
DOI |
https://doi.org/10.25209/2079-3316-2015-6-1-83-97 |
Article # 9_2015
10
p.
PDF |
submitted on 26th
Dec 2014 displayed on
website on 24th Feb
2015 Nepejvoda N., Khatkevich M.,
Tsvetkov A.
Rational agents as probabilistic automata
A notion of intellectual or rational agent is poorly
defined. Its precise specialization is defined here to deal with
very large data bases (VLDB). A rational agent is considered as a
probabilistic automate inside of system of such automates. The
notion of feeling is introduced to affect probabilities and to grant
adaptive behavior. Centralized and collectivist control methods are
considered. (In Russian).
Key words: VLDB, database, probabilistic automata, rational
agents, multi-agent environment. |
article citation |
http://psta.psiras.ru/read/psta2015_1_99-108.pdf |
DOI |
https://doi.org/10.25209/2079-3316-2015-6-1-99-108 |
Article # 10_2015
12
p.
PDF |
submitted on 26th
Dec 2014 displayed on
website on 24th Feb
2015 Klimov Yu., Shvorin A., Khrenov
A., Adamovich I, Orlov A., Abramov S., Shevchuk Yu., Ponomarev A.
Pautina: the High Performance Interconnect
This article presents new high performance
interconnect based on active optic cables (AOC) and
field-programmable gate arrays (FPGA). A prototype of the
interconnect is currently under development in the Program systems
institute of RAS. The interconnect is aimed to be used as the main
communication network in supercomputers. Performance of the
interconnect is about 56 Gbit/s of bandwidth per cable. (in
Russian).
Key words: interconnect, network, active optic cable, HPC,
supercomputer, FPGA. |
article citation |
http://psta.psiras.ru/read/psta2015_1_109-120.pdf |
DOI |
https://doi.org/10.25209/2079-3316-2015-6-1-109-120 |
Article # 12_2015
11
p.
PDF |
submitted on 26th
Dec 2014 displayed on
website on 24th Feb
2015 Kuznetsov A.
On the cryptographic security of the “BotikKey” authentication
protocol against attacks on MD5 hash function
In this paper vulnerabilities of the BotikKey network
protocol are described. It is being used in the “Botik”
telecommunication system of Pereslavl-Zalesskiy for secure
subscribers’ authentication. Protocol was developed as part of Botik-technologies
initiative, according to which all software and hardware is based on
open source, or on the inhouse developments. We outline the purpose
and implementation details of the protocol and its pros and cons. It
is pointed out that majority of the protocol’s vulnerabilities arise
from the weaknesses of MD5 cryptographic hash function being used.
With a number of assumptions, the BotikKey protocol can be
compromised by committing an APOP-attack on a subscriber. It is
noted that “Botik” network service provider should use contemporary
cryptographic methods for subscribers’ authentication or avoid using
the BotikKey system at all. (In Russian).
Key words: BotikKey protocol, secure authentication,
cryptography, MD5 hash function, APOP attack. |
article citation |
http://psta.psiras.ru/read/psta2015_1_135-145.pdf |
DOI |
https://doi.org/10.25209/2079-3316-2015-6-1-135-145 |
Article # 13_2015
10
p.
PDF |
submitted on 26th
Dec 2014 displayed on
website on 24th Feb
2015 Kuznetsov A.
Research into the issue of BotikKey protocol resistance to the
brute force attack
In this paper vulnerabilities of the BotikKey network
protocol are described. The protocol is being used in the “Botik”
telecommunication system of PereslavlZalessky for secure subscriber
authentication. Protocol was developed as part of Botik-technologies
initiative, according to which all software and hardware is based on
open source, or on the inhouse developments. We outline the purpose
and implementation details of the protocol. It is pointed out that
majority of protocol vulnerabilities arise from weaknesses of MD5
cryptographic hash function being used. BotikKey protocol can be
compromised in several ways: brute force attack for recovering plain
network password using specific software on high-performance
computing devices and cloud services, password attack using rainbow
tables for MD5 hash function, and the password theft. It is noted
that “Botik” network service provider should use more contemporary
cryptographic methods for subscriber authentication, or even avoid
using the BotikKey system. (In Russian).
Key words: BotikKey protocol, network access, subscribers
secure authentication, rainbow tables, brute force, password search. |
article citation |
http://psta.psiras.ru/read/psta2015_1_147-156.pdf |
DOI |
https://doi.org/10.25209/2079-3316-2015-6-1-147-156 |
Article # 14_2015
18
p.
PDF |
submitted on 26th
Dec 2014 displayed on
website on 24th Feb
2015 Spitsina A., Orlov Yu.,
Podkolodnaya N., Svichkarev A., Dergilev A., Ming Chen, Kuchin N.,
Chernykh I., Glinskij B.
Supercomputer analysis of genomics and transcriptomics data
revealed by high-throughput DNA sequencing
Development of high-throughput DNA sequencing
technologies lead to new classes of bulk genomic data and consequent
development of specialized algorithms and software. Supercomputing
is necessary tool to deal with modern genetics data.
We present technical problems related to gene expression analysis,
genomics and transcriptomics data, as well as sequencing
technologies related to gene expression. Approaches for automatic
genome data annotation are discussed. (In Russian).
Key words: Bioinformatics, DNA sequencing, Microarrays, Gene
expression regulation, Transcription, Databases. |
article citation |
http://psta.psiras.ru/read/psta2015_1_157-174.pdf |
DOI |
https://doi.org/10.25209/2079-3316-2015-6-1-157-174 |
• Содержание выпуска • • Mathematical Foundations of Programming • • Methods for Optimal Control and Control Theory • • Software and Hardware for Distributed Systems and Supercomputers • • Artificial Intelligence, Intelligence Systems, Neural Networks • • Supercomputing Software and Hardware •
|