Issues and Approaches to Coarse-Grain Reconfigurable Architecture Development
|
|
- Charlotte Janice Reeves
- 5 years ago
- Views:
Transcription
1 Issues and Approaches to Coarse-Grain Reconfigurable Architecture Development Ken Eguro and Scott Hauck Department of Electrical Engineering University of Washington Seattle, WA USA Proceedings of the 11th Annual IEEE Symposium on Field-Programmable Custom Computing Machines (FCCM 03) Presented by Marko Neitola, Electronics Lab, Dept. of Electrical and Information Engineering, University of Oulu, Finland
2 Contents Introduction Implications of Domain specialized Devices Difficulties of Functional Unit allocation Functional Unit allocation Functional Unit allocation Results Conclusions
3 1. Introduction The effects that fundamental architecture decisions have on specialized reconfigurable devices are largely unknown and difficult to quantify. How to simultaneously consider all applications in a domain and determine the most appropriate overall number and ratio of the different functional units? This paper attempts to study how this problem manifests itself during the development of an encryption-specialized FPGA architecture. This paper focuses on the problem of functional unit allocation i.e determining the most appropriate quantity and ratio of functional units across the domain. Three algorithms for the functional unit allocation are presented Concerns brought up by this paper need to be addressed by future CAD tools
4 2. Implications of Domain-Specialized Devices Fine-grained logical resources replaced with a set of coarse-grained function units. This improves the system performance, BUT developers need to closely consider how a given implementation would use the provided resources. The logical elements are no longer universally flexible so it is not obvious: what is the most appropriate set of functional units what is routing architecture what implications are there on necessary CAD tools how many of these factors might affect each other. This paper will primarily focus on the problem of functional unit allocation and overlooks other possible issues of optimization such as operator identification and optimization.
5 3. Difficulties of Functional Unit Allocation Determining the best way to allocate additional resources Performance versus area curves do not offer enough information Complicated relationships between functional unit demands across a domain Case studies for implementation: 15 candidate algorithms of the Advanced Encryption Standard (AES) competition are analyzed to illustrate the issues that make component allocation difficult. Various resource requirements to implement each of the algorithms at natural unrolling points, from relatively small, time multiplexed elements to completely unrolled implementations. Four main factors obscure the relationship between hardware resources and performance.
6 Fully rolled implementations Ratio Complications
7 Factor 1 of 4: Equalization Difficulties
8 Factor 2 of 4: Complexity Disparity (Unevenness)
9 Factor 3 of 4: Scaling Behavior
10 Factor 4 of 4: Availability of Functional Units The last problem of estimating performance from available resources is that if a particular implementation requires more functional units of a certain type than is available, the needed functionality can often be emulated with combinations of the other, under-utilized units. For example, a regular bit permutation could be accomplished with a mixture of shifting and masking. Although this flexibility may improve resource utilization, it also dramatically increases the number of designs to be evaluated.
11 4. Function Unit Allocation Solving the allocation problem: Simultaneously address hardware requirements while maximizing usability and maintaining hard or soft area and performance constraints. Presenting three function unit allocation algorithms to solve this problem. The first algorithm addresses hard performance constraints. The second and third algorithms attempt to maximize the overall performance given softer constraints. i = 0 Cost = N 1 CC i i = 0 N 1 { CC i i = 0 Cost = N 1 PC A otherwise i = 0 N 1 Cost = CC i + Area Penalty if algorithm i fits on the architecture (1) (2) (3)
12 4.1 Performance-Constrained Algorithm, starting point Functional unit requirements of three encryption algorithms in a range of performance levels. A hard throughput constraint is given - 4 clock cycles / block
13 4.1 Performance-Constrained Algorithm, determine slowest implementation Now we determine the slowest implementation for each algorithm that still satisfies the minimum throughput requirement. Then, eliminate implementations below the performance treshold.
14 4.1 Performance-Constrained Algorithm - Minimum Number of Each Resource type unroll Based on this subset of implementations, determine the minimum number of each resource type. If possible, further unroll the algorithms to better utilize available resources
15 4.2 Area-Constrained Algorithm Cost = { CC i i = 0 N 1 PC A if algorithm i fits on the architecture otherwise
16 4.3 Improved Area-Constrained Algorithm - starting point Eliminate any implementations below the given performance treshold, then randomly choose a throughput level for each algorithm and determine the minimum hardware requirements Unroll the algorithms further, if possible
17 4.3 Improved Area-Constrained Algorithm - Evaluation Cost = = 106 Evaluate the throughput and penalize for any excessive area required by the resulting architecture. Cost N 1 N 1 = CC i + Area Penalty = CC i + PC CA MA i = 0 i = 0
18 4.3 Improved Area-Constrained Algorithm - Choose The Implementation Randomly choose a new implementation for one algorithm (here Z), and determine the hardware requirements for the new configuration.
19 4.3 Improved Area-Constrained Algorithm - Accept the New State According to Cost Function Cost = = 106 Cost = = 34 Despite the lower performance, the new state will be accepted. Cost N 1 N 1 = CC i + Area Penalty = CC i + PC CA MA i = 0 i = 0
20 5. Function Unit Allocation Results Minimum Throughput Results of Functional Unit Selection Max. # of clock cycles per block vs. area
21 Performance Results of Functional Unit Selection Across the Domain Total # of clock cycles required by all algorithms vs. area
22 Minimum Throughput Results of Functional Unit Selection on a Limited Domain
23 Performance Results of Functional Unit Selection Across a Limited Domain
24 Conclusions The development of a coarse-grained reconfigurable architecture raises several unique and un-addressed design problems. Three techniques to allocate functional units that attempt to balance performance and area constraints on domains that have vastly different hardware requirements. 1st: Architectures under a guaranteed hard performance requirement 2nd: Allows to trade versatility for better average throughput. 3rd: Produces efficient structures that take advantage of softer area constraints Future development Increased specialization of function units, growing domain size Need for resource utilization optimization techniques CAD tools that are aware of these issues
Tuning Coarse-Grained Reconfigurable Architectures towards an Application Domain
Tuning Coarse-Grained Reconfigurable Architectures towards an Application Domain Julio Oliveira Filho, Thomas Schweizer, Tobias Oppold, Tommy Kuhn, Wolfgang Rosenstiel Department of Computing Engineering
More informationFPGAs: Instant Access
FPGAs: Instant Access Clive"Max"Maxfield AMSTERDAM BOSTON HEIDELBERG LONDON NEW YORK OXFORD PARIS SAN DIEGO SAN FRANCISCO SINGAPORE SYDNEY TOKYO % ELSEVIER Newnes is an imprint of Elsevier Newnes Contents
More informationUnderstanding the Routing Requirements for FPGA Array Computing Platform. Hayden So EE228a Project Presentation Dec 2 nd, 2003
Understanding the Routing Requirements for FPGA Array Computing Platform Hayden So EE228a Project Presentation Dec 2 nd, 2003 What is FPGA Array Computing? Aka: Reconfigurable Computing Aka: Spatial computing,
More informationSDSoC: Session 1
SDSoC: Session 1 ADAM@ADIUVOENGINEERING.COM What is SDSoC SDSoC is a system optimising compiler which allows us to optimise Zynq PS / PL Zynq MPSoC PS / PL MicroBlaze What does this mean? Following the
More informationINTRODUCTION TO FPGA ARCHITECTURE
3/3/25 INTRODUCTION TO FPGA ARCHITECTURE DIGITAL LOGIC DESIGN (BASIC TECHNIQUES) a b a y 2input Black Box y b Functional Schematic a b y a b y a b y 2 Truth Table (AND) Truth Table (OR) Truth Table (XOR)
More informationArchitecture Support for Disciplined Approximate Programming
Architecture Support for Disciplined Approximate Programming Hadi Esmaeilzadeh, Adrian Sampson, Luis Ceze, Doug Burger University of Washington, Microsoft Research Presented by: Lucy Jiang, Cristina Garbacea
More informationSide channel attack: Power Analysis. Chujiao Ma, Z. Jerry Shi CSE, University of Connecticut
Side channel attack: Power Analysis Chujiao Ma, Z. Jerry Shi CSE, University of Connecticut Conventional Cryptanalysis Conventional cryptanalysis considers crypto systems as mathematical objects Assumptions:
More informationΠαράλληλη Επεξεργασία
Παράλληλη Επεξεργασία Μέτρηση και σύγκριση Παράλληλης Απόδοσης Γιάννος Σαζεϊδης Εαρινό Εξάμηνο 2013 HW 1. Homework #3 due on cuda (summary of Tesla paper on web page) Slides based on Lin and Snyder textbook
More informationA CAD Framework for MALIBU: An FPGA with Time-multiplexed Coarse-Grained Elements. David Grant
A CAD Framework for MALIBU: An FPGA with Time-multiplexed Coarse-Grained Elements David Grant Supervisor: Dr. Guy Lemieux FPGA 2011 -- Feb 28, 2011 Motivation Growing Industry Trend: Large FPGA Circuits
More informationNetwork Control and Signalling
Network Control and Signalling 1. Introduction 2. Fundamentals and design principles 3. Network architecture and topology 4. Network control and signalling 5. Network components 5.1 links 5.2 switches
More informationSelf-adaptability in Secure Embedded Systems: an Energy-Performance Trade-off
Self-adaptability in Secure Embedded Systems: an Energy-Performance Trade-off N. Botezatu V. Manta and A. Stan Abstract Securing embedded systems is a challenging and important research topic due to limited
More informationImproving Reconfiguration Speed for Dynamic Circuit Specialization using Placement Constraints
Improving Reconfiguration Speed for Dynamic Circuit Specialization using Placement Constraints Amit Kulkarni, Tom Davidson, Karel Heyse, and Dirk Stroobandt ELIS department, Computer Systems Lab, Ghent
More informationSDACCEL DEVELOPMENT ENVIRONMENT. The Xilinx SDAccel Development Environment. Bringing The Best Performance/Watt to the Data Center
SDAccel Environment The Xilinx SDAccel Development Environment Bringing The Best Performance/Watt to the Data Center Introduction Data center operators constantly seek more server performance. Currently
More informationECE 5775 (Fall 17) High-Level Digital Design Automation. More Binding Pipelining
ECE 5775 (Fall 17) High-Level Digital Design Automation More Binding Pipelining Logistics Lab 3 due Friday 10/6 No late penalty for this assignment (up to 3 days late) HW 2 will be posted tomorrow 1 Agenda
More informationPerformance/Cost trade-off evaluation for the DCT implementation on the Dynamically Reconfigurable Processor
Performance/Cost trade-off evaluation for the DCT implementation on the Dynamically Reconfigurable Processor Vu Manh Tuan, Yohei Hasegawa, Naohiro Katsura and Hideharu Amano Graduate School of Science
More informationLow Power System-on-Chip Design Chapters 3-4
1 Low Power System-on-Chip Design Chapters 3-4 Tomasz Patyk 2 Chapter 3: Multi-Voltage Design Challenges in Multi-Voltage Designs Voltage Scaling Interfaces Timing Issues in Multi-Voltage Designs Power
More informationSharing Resources Between AES and the SHA-3 Second Round Candidates Fugue and Grøstl
Sharing Resources Between AES and the SHA-3 Second Round Candidates Fugue and Grøstl Kimmo Järvinen Department of Information and Computer Science Aalto University, School of Science and Technology Espoo,
More informationA Configurable Multi-Ported Register File Architecture for Soft Processor Cores
A Configurable Multi-Ported Register File Architecture for Soft Processor Cores Mazen A. R. Saghir and Rawan Naous Department of Electrical and Computer Engineering American University of Beirut P.O. Box
More informationFPGAs: High Assurance through Model Based Design
FPGAs: High Assurance through Based Design AADL Workshop 24 January 2007 9:30 10:00 Yves LaCerte Rockwell Collins Advanced Technology Center 400 Collins Road N.E. Cedar Rapids, IA 52498 ylacerte@rockwellcollins.cm
More informationThe Need for Speed: Understanding design factors that make multicore parallel simulations efficient
The Need for Speed: Understanding design factors that make multicore parallel simulations efficient Shobana Sudhakar Design & Verification Technology Mentor Graphics Wilsonville, OR shobana_sudhakar@mentor.com
More informationHardware Software Codesign of Embedded Systems
Hardware Software Codesign of Embedded Systems Rabi Mahapatra Texas A&M University Today s topics Course Organization Introduction to HS-CODES Codesign Motivation Some Issues on Codesign of Embedded System
More informationPublic Cloud Leverage For IT/Business Alignment Business Goals Agility to speed time to market, adapt to market demands Elasticity to meet demand whil
LHC2386BU True Costs Savings Modeling and Costing A Migration to VMware Cloud on AWS Chris Grossmeier chrisg@cloudphysics.com John Blumenthal john@cloudphysics.com #VMworld Public Cloud Leverage For IT/Business
More informationStereo Video Processing for Depth Map
Stereo Video Processing for Depth Map Harlan Hile and Colin Zheng University of Washington Abstract This paper describes the implementation of a stereo depth measurement algorithm in hardware on Field-Programmable
More informationComputer and Information Sciences College / Computer Science Department CS 207 D. Computer Architecture. Lecture 9: Multiprocessors
Computer and Information Sciences College / Computer Science Department CS 207 D Computer Architecture Lecture 9: Multiprocessors Challenges of Parallel Processing First challenge is % of program inherently
More informationDistributed File Systems Issues. NFS (Network File System) AFS: Namespace. The Andrew File System (AFS) Operating Systems 11/19/2012 CSC 256/456 1
Distributed File Systems Issues NFS (Network File System) Naming and transparency (location transparency versus location independence) Host:local-name Attach remote directories (mount) Single global name
More informationHigh Level Synthesis with Stream Query to C Parser:
R5-4 SASIMI 2013 Proceedings High Level Synthesis with Stream Query to C Parser: Eliminating Hardware Development Difficulties for Software Developers Eric Shun Fukuda Takashi Takenaka Hiroaki Inoue Hideyuki
More information- Modeling, Phase Transitions, Constraint and Complexity Analyses
Flexible Methods for Multi-agent distributed resource Allocation by Exploiting Phase Transitions - Modeling, Phase Transitions, Constraint and Complexity Analyses Weixiong Zhang (PI) Washington University
More informationCSE 548 Computer Architecture. Clock Rate vs IPC. V. Agarwal, M. S. Hrishikesh, S. W. Kechler. D. Burger. Presented by: Ning Chen
CSE 548 Computer Architecture Clock Rate vs IPC V. Agarwal, M. S. Hrishikesh, S. W. Kechler. D. Burger Presented by: Ning Chen Transistor Changes Development of silicon fabrication technology caused transistor
More informationEECS150 - Digital Design Lecture 09 - Parallelism
EECS150 - Digital Design Lecture 09 - Parallelism Feb 19, 2013 John Wawrzynek Spring 2013 EECS150 - Lec09-parallel Page 1 Parallelism Parallelism is the act of doing more than one thing at a time. Optimization
More informationTCEP: Traffic Consolidation for Energy-Proportional High-Radix Networks
TCEP: Traffic Consolidation for Energy-Proportional High-Radix Networks Gwangsun Kim Arm Research Hayoung Choi, John Kim KAIST High-radix Networks Dragonfly network in Cray XC30 system 1D Flattened butterfly
More informationHOST Differential Power Attacks ECE 525
Side-Channel Attacks Cryptographic algorithms assume that secret keys are utilized by implementations of the algorithm in a secure fashion, with access only allowed through the I/Os Unfortunately, cryptographic
More informationConstraint Handling. Fernando Lobo. University of Algarve
Constraint Handling Fernando Lobo University of Algarve Outline Introduction Penalty methods Approach based on tournament selection Decoders Repair algorithms Constraint-preserving operators Introduction
More informationLecture 17 Introduction to Memory Hierarchies" Why it s important " Fundamental lesson(s)" Suggested reading:" (HP Chapter
Processor components" Multicore processors and programming" Processor comparison" vs." Lecture 17 Introduction to Memory Hierarchies" CSE 30321" Suggested reading:" (HP Chapter 5.1-5.2)" Writing more "
More informationProgrammable Memory Blocks Supporting Content-Addressable Memory
Programmable Memory Blocks Supporting Content-Addressable Memory Frank Heile, Andrew Leaver, Kerry Veenstra Altera 0 Innovation Dr San Jose, CA 95 USA (408) 544-7000 {frank, aleaver, kerry}@altera.com
More informationAGGREGATE SIZING AND SHAPE DETERMINATION USING DIGITAL IMAGE PROCESSING
Maerz, N. H., 1998. Aggregate sizing and shape determination using digital image processing. Center For Aggregates Research (ICAR) Sixth Annual Symposium Proceedings, St. Louis, Missouri, April 19-20,
More informationEffects of FPGA Architecture on FPGA Routing
Effects of FPGA Architecture on FPGA Routing Stephen Trimberger Xilinx, Inc. 2100 Logic Drive San Jose, CA 95124 USA steve@xilinx.com Abstract Although many traditional Mask Programmed Gate Array (MPGA)
More informationTeradata Analyst Pack More Power to Analyze and Tune Your Data Warehouse for Optimal Performance
Data Warehousing > Tools & Utilities Teradata Analyst Pack More Power to Analyze and Tune Your Data Warehouse for Optimal Performance By: Rod Vandervort, Jeff Shelton, and Louis Burger Table of Contents
More informationFile and filesystem fragmentation in Lustre
File and filesystem fragmentation in Lustre Ashley Pittman apittman@ What is fragmentation File fragmentation Contents of individual file is dispersed over different locations on the device Filesystem
More informationParallel Processing SIMD, Vector and GPU s cont.
Parallel Processing SIMD, Vector and GPU s cont. EECS4201 Fall 2016 York University 1 Multithreading First, we start with multithreading Multithreading is used in GPU s 2 1 Thread Level Parallelism ILP
More informationVirtual Circuit Blocking Probabilities in an ATM Banyan Network with b b Switching Elements
Proceedings of the Applied Telecommunication Symposium (part of Advanced Simulation Technologies Conference) Seattle, Washington, USA, April 22 26, 21 Virtual Circuit Blocking Probabilities in an ATM Banyan
More informationPerformance Study of a Compiler/Hardware Approach to Embedded Systems Security
Performance Study of a Compiler/Hardware Approach to Embedded Systems Security Kripashankar Mohan, Bhagi Narahari, Rahul Simha, Paul Ott 1, Alok Choudhary, and Joe Zambreno 2 1 The George Washington University,
More informationAdapting Mixed Workloads to Meet SLOs in Autonomic DBMSs
Adapting Mixed Workloads to Meet SLOs in Autonomic DBMSs Baoning Niu, Patrick Martin, Wendy Powley School of Computing, Queen s University Kingston, Ontario, Canada, K7L 3N6 {niu martin wendy}@cs.queensu.ca
More informationAn Enhanced Dynamic Packet Buffer Management
An Enhanced Dynamic Packet Buffer Management Vinod Rajan Cypress Southeast Design Center Cypress Semiconductor Cooperation vur@cypress.com Abstract A packet buffer for a protocol processor is a large shared
More informationReconfigurable Cell Array for DSP Applications
Outline econfigurable Cell Array for DSP Applications Chenxin Zhang Department of Electrical and Information Technology Lund University, Sweden econfigurable computing Coarse-grained reconfigurable cell
More informationKanban Size and its Effect on JIT Production Systems
Kanban Size and its Effect on JIT Production Systems Ing. Olga MAŘÍKOVÁ 1. INTRODUCTION Integrated planning, formation, carrying out and controlling of tangible and with them connected information flows
More informationNetworking Recap Storage Intro. CSE-291 (Cloud Computing), Fall 2016 Gregory Kesden
Networking Recap Storage Intro CSE-291 (Cloud Computing), Fall 2016 Gregory Kesden Networking Recap Storage Intro Long Haul/Global Networking Speed of light is limiting; Latency has a lower bound (.) Throughput
More informationCS250 VLSI Systems Design Lecture 8: Introduction to Hardware Design Patterns
CS250 VLSI Systems Design Lecture 8: Introduction to Hardware Design Patterns John Wawrzynek, Jonathan Bachrach, with Krste Asanovic, John Lazzaro and Rimas Avizienis (TA) UC Berkeley Fall 2012 Lecture
More informationCost-Driven Hybrid Configuration Prefetching for Partial Reconfigurable Coprocessor
Cost-Driven Hybrid Configuration Prefetching for Partial Reconfigurable Coprocessor Ying Chen, Simon Y. Chen 2 School of Engineering San Francisco State University 600 Holloway Ave San Francisco, CA 9432
More informationHardware/Software Codesign
Hardware/Software Codesign SS 2016 Prof. Dr. Christian Plessl High-Performance IT Systems group University of Paderborn Version 2.2.0 2016-04-08 how to design a "digital TV set top box" Motivating Example
More informationThe Nios II Family of Configurable Soft-core Processors
The Nios II Family of Configurable Soft-core Processors James Ball August 16, 2005 2005 Altera Corporation Agenda Nios II Introduction Configuring your CPU FPGA vs. ASIC CPU Design Instruction Set Architecture
More informationThe Future of Telecom Regulation
The Future of Telecom Regulation 1 40 th Annual National Conference of Regulatory Attorneys Portland, Oregon May 8, 2017 Dave Conn Vice President, State Government Affairs T-Mobile Dave.conn@T-Mobile.com
More informationService Mesh and Microservices Networking
Service Mesh and Microservices Networking WHITEPAPER Service mesh and microservice networking As organizations adopt cloud infrastructure, there is a concurrent change in application architectures towards
More informationA comparison of stereo image processing hardware platforms
A comparison of stereo image processing hardware platforms Matthew Linder Valde Systems, Inc. Abstract This white paper compares two different hardware platforms for stereo image processing systems. It
More informationManaging Dynamic Reconfiguration Overhead in Systems-on-a-Chip Design Using Reconfigurable Datapaths and Optimized Interconnection Networks
Managing Dynamic Reconfiguration Overhead in Systems-on-a-Chip Design Using Reconfigurable Datapaths and Optimized Interconnection Networks Zhining Huang, Sharad Malik Electrical Engineering Department
More informationA Lost Cycles Analysis for Performance Prediction using High-Level Synthesis
A Lost Cycles Analysis for Performance Prediction using High-Level Synthesis Bruno da Silva, Jan Lemeire, An Braeken, and Abdellah Touhafi Vrije Universiteit Brussel (VUB), INDI and ETRO department, Brussels,
More informationPOLYMORPHIC ON-CHIP NETWORKS
POLYMORPHIC ON-CHIP NETWORKS Martha Mercaldi Kim, John D. Davis*, Mark Oskin, Todd Austin** University of Washington *Microsoft Research, Silicon Valley ** University of Michigan On-Chip Network Selection
More informationA Hardware Task-Graph Scheduler for Reconfigurable Multi-tasking Systems
A Hardware Task-Graph Scheduler for Reconfigurable Multi-tasking Systems Abstract Reconfigurable hardware can be used to build a multitasking system where tasks are assigned to HW resources at run-time
More informationRule partitioning versus task sharing in parallel processing of universal production systems
Rule partitioning versus task sharing in parallel processing of universal production systems byhee WON SUNY at Buffalo Amherst, New York ABSTRACT Most research efforts in parallel processing of production
More informationDO-254 Testing of High Speed FPGA Interfaces by Nir Weintroub, CEO, and Sani Jabsheh, Verisense
DO-254 Testing of High Speed FPGA Interfaces by Nir Weintroub, CEO, and Sani Jabsheh, Verisense As the complexity of electronics for airborne applications continues to rise, an increasing number of applications
More informationScale-out Data Deduplication Architecture
Scale-out Data Deduplication Architecture Gideon Senderov Product Management & Technical Marketing NEC Corporation of America Outline Data Growth and Retention Deduplication Methods Legacy Architecture
More informationVISUAL QUALITY ASSESSMENT CHALLENGES FOR ARCHITECTURE DESIGN EXPLORATIONS. Wen-Fu Kao and Durgaprasad Bilagi. Intel Corporation Folsom, CA 95630
Proceedings of Seventh International Workshop on Video Processing and Quality Metrics for Consumer Electronics January 30-February 1, 2013, Scottsdale, Arizona VISUAL QUALITY ASSESSMENT CHALLENGES FOR
More informationMigrating to IPv6 The Role of Basic Coordination
Migrating to IPv6 The Role of Basic Coordination M. Nikkhah Dept. Elec. & Sys. Eng. University of Pennsylvania R. Guérin Dept. Comp. Sci. & Eng. Washington U. in St. Louis Outline Background and Motivations
More informationDigital Systems Design. System on a Programmable Chip
Digital Systems Design Introduction to System on a Programmable Chip Dr. D. J. Jackson Lecture 11-1 System on a Programmable Chip Generally involves utilization of a large FPGA Large number of logic elements
More informationSparse Linear Solver for Power System Analyis using FPGA
Sparse Linear Solver for Power System Analyis using FPGA J. R. Johnson P. Nagvajara C. Nwankpa 1 Extended Abstract Load flow computation and contingency analysis is the foundation of power system analysis.
More informationComputer Architecture A Quantitative Approach, Fifth Edition. Chapter 2. Memory Hierarchy Design. Copyright 2012, Elsevier Inc. All rights reserved.
Computer Architecture A Quantitative Approach, Fifth Edition Chapter 2 Memory Hierarchy Design 1 Introduction Programmers want unlimited amounts of memory with low latency Fast memory technology is more
More information6. Parallel Volume Rendering Algorithms
6. Parallel Volume Algorithms This chapter introduces a taxonomy of parallel volume rendering algorithms. In the thesis statement we claim that parallel algorithms may be described by "... how the tasks
More informationThe S6000 Family of Processors
The S6000 Family of Processors Today s Design Challenges The advent of software configurable processors In recent years, the widespread adoption of digital technologies has revolutionized the way in which
More informationSampling Frequency & Bit Depth
Sampling Frequency & Bit Depth Computer Audio Design (CAD) November 2017 Computer Audio Design 2017 Definitions The first thing to realise is that these two parameters, sampling rate and bit depth, are
More informationAutomatic Tuning of Scientific Applications. Apan Qasem Ken Kennedy Rice University Houston, TX
Automatic Tuning of Scientific Applications Apan Qasem Ken Kennedy Rice University Houston, TX Recap from Last Year A framework for automatic tuning of applications Fine grain control of transformations
More informationTotem: Domain-Specific Reconfigurable Logic
Totem: Domain-Specific Reconfigurable Logic Scott Hauck 1, Katherine Compton 2, Ken Eguro 1, Mark Holland 1, Shawn Phillips 3, Akshay Sharma 4 1 University of Washington, Dept. of EE, Seattle, WA, {hauck,
More informationTest Vector Leakage Assessment (TVLA) Derived Test Requirements (DTR) with AES
Test Vector Leakage Assessment (TVLA) Derived Test Requirements (DTR) with AES 1 Document Scope This document describes requirements and test procedures for qualifying DPA-resistant implementations of
More informationEnhancing Resource Utilization with Design Alternatives in Runtime Reconfigurable Systems
Enhancing Resource Utilization with Design Alternatives in Runtime Reconfigurable Systems Alexander Wold, Dirk Koch, Jim Torresen Department of Informatics, University of Oslo, Norway Email: {alexawo,koch,jimtoer}@ifi.uio.no
More informationA Novel Design Framework for the Design of Reconfigurable Systems based on NoCs
Politecnico di Milano & EPFL A Novel Design Framework for the Design of Reconfigurable Systems based on NoCs Vincenzo Rana, Ivan Beretta, Donatella Sciuto Donatella Sciuto sciuto@elet.polimi.it Introduction
More informationCS24: INTRODUCTION TO COMPUTING SYSTEMS. Spring 2015 Lecture 15
CS24: INTRODUCTION TO COMPUTING SYSTEMS Spring 2015 Lecture 15 LAST TIME! Discussed concepts of locality and stride Spatial locality: programs tend to access values near values they have already accessed
More informationLow energy and High-performance Embedded Systems Design and Reconfigurable Architectures
Low energy and High-performance Embedded Systems Design and Reconfigurable Architectures Ass. Professor Dimitrios Soudris School of Electrical and Computer Eng., National Technical Univ. of Athens, Greece
More informationOutline EEL 5764 Graduate Computer Architecture. Chapter 3 Limits to ILP and Simultaneous Multithreading. Overcoming Limits - What do we need??
Outline EEL 7 Graduate Computer Architecture Chapter 3 Limits to ILP and Simultaneous Multithreading! Limits to ILP! Thread Level Parallelism! Multithreading! Simultaneous Multithreading Ann Gordon-Ross
More informationPerformance and Overhead in a Hybrid Reconfigurable Computer
Performance and Overhead in a Hybrid Reconfigurable Computer Osman Devrim Fidanci 1, Dan Poznanovic 2, Kris Gaj 3, Tarek El-Ghazawi 1, Nikitas Alexandridis 1 1 George Washington University, 2 SRC Computers
More informationExhaustive Generation and Visual Browsing for Radiation Patterns of Linear Array Antennas
MITSUBISHI ELECTRIC RESEARCH LABORATORIES http://www.merl.com Exhaustive Generation and Visual Browsing for Radiation Patterns of Linear Array Antennas Darren Leigh, Tom Lanning, Neal Lesh, Kathy Ryall
More informationModeling Arbitrator Delay-Area Dependencies in Customizable Instruction Set Processors
Modeling Arbitrator Delay-Area Dependencies in Customizable Instruction Set Processors Siew-Kei Lam Centre for High Performance Embedded Systems, Nanyang Technological University, Singapore (assklam@ntu.edu.sg)
More informationEncryption / decryption system. Fig.1. Block diagram of Hummingbird
801 Lightweight VLSI Design of Hybrid Hummingbird Cryptographic Algorithm NIKITA ARORA 1, YOGITA GIGRAS 2 12 Department of Computer Science, ITM University, Gurgaon, INDIA 1 nikita.0012@gmail.com, 2 gigras.yogita@gmail.com
More informationQLE10000 Series Adapter Provides Application Benefits Through I/O Caching
QLE10000 Series Adapter Provides Application Benefits Through I/O Caching QLogic Caching Technology Delivers Scalable Performance to Enterprise Applications Key Findings The QLogic 10000 Series 8Gb Fibre
More informationA QoS Load Balancing Scheduling Algorithm in Cloud Environment
A QoS Load Balancing Scheduling Algorithm in Cloud Environment Sana J. Shaikh *1, Prof. S.B.Rathod #2 * Master in Computer Engineering, Computer Department, SAE, Pune University, Pune, India # Master in
More informationTechnical White Paper. Cube Engine Version 1.0
Technical White Paper Cube Engine Version 1.0 Last Updated: Feb 06. 2018 1 Contents 1. Summary 1) Introduction 2) Overview 2. Features of Cube Chain 1) Cubing 2) Indexing Block 3) Statistics Block 4) Escrow
More informationHigh performance, power-efficient DSPs based on the TI C64x
High performance, power-efficient DSPs based on the TI C64x Sridhar Rajagopal, Joseph R. Cavallaro, Scott Rixner Rice University {sridhar,cavallar,rixner}@rice.edu RICE UNIVERSITY Recent (2003) Research
More informationDynamically Provisioning Distributed Systems to Meet Target Levels of Performance, Availability, and Data Quality
Dynamically Provisioning Distributed Systems to Meet Target Levels of Performance, Availability, and Data Quality Amin Vahdat Department of Computer Science Duke University 1 Introduction Increasingly,
More informationIX: A Protected Dataplane Operating System for High Throughput and Low Latency
IX: A Protected Dataplane Operating System for High Throughput and Low Latency Belay, A. et al. Proc. of the 11th USENIX Symp. on OSDI, pp. 49-65, 2014. Reviewed by Chun-Yu and Xinghao Li Summary In this
More informationMUD: Send me your top 1 3 questions on this lecture
Administrivia Review 1 due tomorrow Email your reviews to me Office hours on Thursdays 10 12 MUD: Send me your top 1 3 questions on this lecture Guest lectures next week by Prof. Richard Martin Class slides
More informationHardware Software Codesign of Embedded System
Hardware Software Codesign of Embedded System CPSC489-501 Rabi Mahapatra Mahapatra - Texas A&M - Fall 00 1 Today s topics Course Organization Introduction to HS-CODES Codesign Motivation Some Issues on
More informationStreaming Encryption for a Secure Wavelength and Time Domain Hopped Optical Network
treaming Encryption for a ecure Wavelength and Time Domain Hopped Optical Network Herwin Chan, Alireza Hodjat, Jun hi, Richard Wesel, Ingrid Verbauwhede {herwin, ahodjat, junshi, wesel, ingrid} @ ee.ucla.edu
More informationFlash Drive Emulation
Flash Drive Emulation Eric Aderhold & Blayne Field aderhold@cs.wisc.edu & bfield@cs.wisc.edu Computer Sciences Department University of Wisconsin, Madison Abstract Flash drives are becoming increasingly
More informationMcRT-STM: A High Performance Software Transactional Memory System for a Multi- Core Runtime
McRT-STM: A High Performance Software Transactional Memory System for a Multi- Core Runtime B. Saha, A-R. Adl- Tabatabai, R. Hudson, C.C. Minh, B. Hertzberg PPoPP 2006 Introductory TM Sales Pitch Two legs
More informationSeven Techniques For Finding FEA Errors
Seven Techniques For Finding FEA Errors by Hanson Chang, Engineering Manager, MSC.Software Corporation Design engineers today routinely perform preliminary first-pass finite element analysis (FEA) on new
More informationAn Enhanced Dynamic Framed Slotted ALOHA Algorithm for RFID Tag Identification
An Enhanced Dynamic Framed Slotted ALOHA Algorithm for RFID Tag Identification Su-Ryun Lee Ajou University Department of Electrical and Computer Engineering Suwon, Korea srlee@ajouackr Sung-Don Joo LG
More informationPrinciples of Parallel Algorithm Design: Concurrency and Decomposition
Principles of Parallel Algorithm Design: Concurrency and Decomposition John Mellor-Crummey Department of Computer Science Rice University johnmc@rice.edu COMP 422/534 Lecture 2 12 January 2017 Parallel
More informationSecure Enhanced Authenticated Routing Protocol for Mobile Ad Hoc Networks
Journal of Computer Science 7 (12): 1813-1818, 2011 ISSN 1549-3636 2011 Science Publications Secure Enhanced Authenticated Routing Protocol for Mobile Ad Hoc Networks 1 M.Rajesh Babu and 2 S.Selvan 1 Department
More informationTEFS: A Flash File System for Use on Memory Constrained Devices
2016 IEEE Canadian Conference on Electrical and Computer Engineering (CCECE) TEFS: A Flash File for Use on Memory Constrained Devices Wade Penson wpenson@alumni.ubc.ca Scott Fazackerley scott.fazackerley@alumni.ubc.ca
More informationDETECTION OF SMOOTH TEXTURE IN FACIAL IMAGES FOR THE EVALUATION OF UNNATURAL CONTRAST ENHANCEMENT
DETECTION OF SMOOTH TEXTURE IN FACIAL IMAGES FOR THE EVALUATION OF UNNATURAL CONTRAST ENHANCEMENT 1 NUR HALILAH BINTI ISMAIL, 2 SOONG-DER CHEN 1, 2 Department of Graphics and Multimedia, College of Information
More informationConfiguration Caching Techniques for FPGA
Submitted to IEEE Symposium on FPGAs for Custom Computing Machines, 2000. Configuration Caching Techniques for FPGA Zhiyuan Li, Katherine Compton Department of Electrical and Computer Engineering Northwestern
More informationCS24: INTRODUCTION TO COMPUTING SYSTEMS. Spring 2017 Lecture 15
CS24: INTRODUCTION TO COMPUTING SYSTEMS Spring 2017 Lecture 15 LAST TIME: CACHE ORGANIZATION Caches have several important parameters B = 2 b bytes to store the block in each cache line S = 2 s cache sets
More informationMultiprocessor scheduling
Chapter 10 Multiprocessor scheduling When a computer system contains multiple processors, a few new issues arise. Multiprocessor systems can be categorized into the following: Loosely coupled or distributed.
More information