skip to main content
OSTI.GOV title logo U.S. Department of Energy
Office of Scientific and Technical Information

Title: Managing Combinatorial Software Installations with Spack

; ; ;
Publication Date:
Research Org.:
Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States)
Sponsoring Org.:
OSTI Identifier:
Report Number(s):
DOE Contract Number:
Resource Type:
Resource Relation:
Conference: Presented at: HPC User Support Tools Workshop, Salt Lake City, UT, United States, Nov 13 - Nov 13, 2016
Country of Publication:
United States

Citation Formats

Becker, G B, Gamblin, G T, Scheibel, P J, and LeGendre, M P. Managing Combinatorial Software Installations with Spack. United States: N. p., 2016. Web.
Becker, G B, Gamblin, G T, Scheibel, P J, & LeGendre, M P. Managing Combinatorial Software Installations with Spack. United States.
Becker, G B, Gamblin, G T, Scheibel, P J, and LeGendre, M P. 2016. "Managing Combinatorial Software Installations with Spack". United States. doi:.
title = {Managing Combinatorial Software Installations with Spack},
author = {Becker, G B and Gamblin, G T and Scheibel, P J and LeGendre, M P},
abstractNote = {},
doi = {},
journal = {},
number = ,
volume = ,
place = {United States},
year = 2016,
month = 8

Other availability
Please see Document Availability for additional information on obtaining the full-text document. Library patrons may search WorldCat to identify libraries that hold this conference proceeding.

Save / Share:
  • No abstract prepared.
  • Virtually all software is out of intellectual control in that no one knows its full behavior. Software Behavior Computation (SBC) is a new technology for understanding everything software does. SBC applies the mathematics of denotational semantics implemented by function composition in Functional Trace Tables (FTTs) to compute the behavior of programs, expressed as disjoint cases of conditional concurrent assignments. In some circumstances, combinatorial explosions in the number of cases can occur when calculating the behavior of sequences of multiple branching structures. This paper describes computational methods that avoid combinatorial explosions. The predicates that control branching structures such as ifthenelses canmore » be organized into three categories: 1) Independent, resulting in no behavior case explosion, 2) Coordinated, resulting in two behavior cases, or 3) Goaloriented, with potential exponential growth in the number of cases. Traditional FTT-based behavior computation can be augmented by two additional computational methods, namely, Single-Value Function Abstractions (SVFAs) and, introduced in this paper, Relational Trace Tables (RTTs). These methods can be applied to the three predicate categories to avoid combinatorial growth in behavior cases while maintaining mathematical correctness.« less
  • The fastbus systems manager software that was designed and implemented on an LS-11 system using Pascal is described. Particular attention is given to the file structures, file access mechanisms, and basic routing algorithms. Portability to other machines and languages is described. 8 references.
  • A methodology for risk management in the design of software systems is presented. It spans security, safety, and correct operation of software within the context of its environment, and produces a risk analysis and documented risk management strategy. It is designed to be iteratively applied, to attain appropriate levels of detail throughout the analysis. The methodology and supporting tools are discussed. The methodology is critiqued relative to other research in the field. Some sample applications of the methodology are presented.
  • When software is used in safety-critical, security-critical, or mission-critical situations, it is imperative to understand and manage the risks involved. A risk assessment methodology and toolset have been developed which are specific to software systems. This paper describes the concepts of the methodology, with emphasis on the experience of designing a toolset to support the methodology. Also presented are results of applying the methodology to two real software-based products: the software toolset itself, and a network firewall.