Power Signatures of

Workload-aware power management and schedul- ing techniques have the potential to save energy while minimizing negative impact on performance. The effectiveness of these techniques depends on the stability of a workload's power con- sumption pattern across different input data, resource allocations (e.g. number of cores), and hardware platforms. In this paper, we show that the power consumption behavior of HPC workloads can be accurately captured by concise signa- tures built from their power traces. We validate this approach using 255 traces collected from 13 high-performance computing workloads on 4 different hardware platforms. First, we use both feature-based and time-series-based distance metrics to cluster our traces, and we quantitatively show that feature-based clusterings segregate traces by workload just as effectively as the more compute- and space-intensive time-series-based clusterings. Second, we demonstrate that unlabeled traces can be classified by workload with over 85% accuracy, based only on these concise statistical signatures.

[1]  Stephen W. Poole,et al.  Application Power Signature Analysis , 2014, 2014 IEEE International Parallel & Distributed Processing Symposium Workshops.

[2]  Xiaozhe Wang,et al.  Characteristic-Based Clustering for Time Series Data , 2006, Data Mining and Knowledge Discovery.

[3]  A. Raftery,et al.  Space-time modeling with long-memory dependence: assessing Ireland's wind-power resource. Technical report , 1987 .

[4]  H. Kantz A robust method to estimate the maximal Lyapunov exponent of a time series , 1994 .

[5]  Torsten Wilde,et al.  A power-measurement methodology for large-scale, high-performance computing , 2014, ICPE.

[6]  David Eklov,et al.  Efficient software-based online phase classification , 2011, 2011 IEEE International Symposium on Workload Characterization (IISWC).

[7]  Kushagra Vaid,et al.  ACE: abstracting, characterizing and exploiting peaks and valleys in datacenter power consumption , 2013, SIGMETRICS '13.

[8]  J. A. Hartigan,et al.  A k-means clustering algorithm , 1979 .

[9]  S. Chiba,et al.  Dynamic programming algorithm optimization for spoken word recognition , 1978 .

[10]  Josh Lothian,et al.  SystemBurn: Principles of Design and Operation Release 3.1 , 2013 .

[11]  Scott Pakin,et al.  Exploring power behaviors and trade-offs of in-situ data analytics , 2013, 2013 SC - International Conference for High Performance Computing, Networking, Storage and Analysis (SC).

[12]  William M. Rand,et al.  Objective Criteria for the Evaluation of Clustering Methods , 1971 .

[13]  Margaret Martonosi,et al.  Live, Runtime Phase Monitoring and Prediction on Real Systems with Application to Dynamic Power Management , 2006, 2006 39th Annual IEEE/ACM International Symposium on Microarchitecture (MICRO'06).

[14]  Kushagra Vaid,et al.  ACE: Abstracting, characterizing and exploiting datacenter power demands , 2013, 2013 IEEE International Symposium on Workload Characterization (IISWC).

[15]  Stephen W. Poole,et al.  Power signature analysis of the SPECpower_ssj2008 benchmark , 2011, (IEEE ISPASS) IEEE INTERNATIONAL SYMPOSIUM ON PERFORMANCE ANALYSIS OF SYSTEMS AND SOFTWARE.

[16]  Stephen W. Poole,et al.  Power measurement for high performance computing: State of the art , 2011, 2011 International Green Computing Conference and Workshops.

[17]  D. Defays,et al.  An Efficient Algorithm for a Complete Link Method , 1977, Comput. J..

[18]  John Shalf,et al.  Power efficiency in high performance computing , 2008, 2008 IEEE International Symposium on Parallel and Distributed Processing.

[19]  Margaret Martonosi,et al.  Phase characterization for power: evaluating control-flow-based and event-counter-based techniques , 2006, The Twelfth International Symposium on High-Performance Computer Architecture, 2006..

[20]  Kang G. Shin,et al.  Detecting energy-greedy anomalies and mobile malware variants , 2008, MobiSys '08.

[21]  Christoforos E. Kozyrakis,et al.  A Comparison of High-Level Full-System Power Models , 2008, HotPower.

[22]  Courtenay T. Vaughan,et al.  Topics on measuring real power usage on high performance computing platforms , 2009, 2009 IEEE International Conference on Cluster Computing and Workshops.

[23]  Pangfeng Liu,et al.  Sampling-Based Phase Classification and Prediction for Multi-threaded Program Execution on Multi-core Architectures , 2013, 2013 42nd International Conference on Parallel Processing.

[24]  Leo Breiman,et al.  Random Forests , 2001, Machine Learning.

[25]  Wu-chun Feng,et al.  Trends in energy-efficient computing: A perspective from the Green500 , 2013, 2013 International Green Computing Conference Proceedings.

[26]  Jesús Labarta,et al.  Tools for Power-Energy Modelling and Analysis of Parallel Scientific Applications , 2012, 2012 41st International Conference on Parallel Processing.

[27]  Zhenhuan Gong,et al.  PAC: Pattern-driven Application Consolidation for Efficient Cloud Computing , 2010, 2010 IEEE International Symposium on Modeling, Analysis and Simulation of Computer and Telecommunication Systems.

[28]  Karl S. Hemmert Green HPC: From Nice to Necessity , 2010, Comput. Sci. Eng..

[29]  Shuaiwen Song,et al.  Energy Profiling and Analysis of the HPC Challenge Benchmarks , 2009, Int. J. High Perform. Comput. Appl..

[30]  Samuel Kounev,et al.  Self‐adaptive workload classification and forecasting for proactive resource provisioning , 2013, ICPE '13.

[31]  Hans-Peter Kriegel,et al.  A Density-Based Algorithm for Discovering Clusters in Large Spatial Databases with Noise , 1996, KDD.

[32]  Kevin Fu,et al.  Potentia Est Scientia: Security and Privacy Implications of Energy-Proportional Computing , 2012, HotSec.

[33]  Mitesh R. Meswani,et al.  Reducing Energy Usage with Memory and Computation-Aware Dynamic Frequency Scaling , 2011, Euro-Par.

[34]  Luiz André Barroso,et al.  The Case for Energy-Proportional Computing , 2007, Computer.

[35]  James Bailey,et al.  Information Theoretic Measures for Clusterings Comparison: Variants, Properties, Normalization and Correction for Chance , 2010, J. Mach. Learn. Res..

[36]  Elaine J. Weyuker,et al.  Monitoring for security intrusion using performance signatures , 2010, WOSP/SIPEW '10.