ASSERTION SUPPORT IN HIGH-LEVEL SYNTHESIS DESIGN FLOW. 351 crs de la Libération, Talence, France

Size: px
Start display at page:

Download "ASSERTION SUPPORT IN HIGH-LEVEL SYNTHESIS DESIGN FLOW. 351 crs de la Libération, Talence, France"

Transcription

1 SSERTION SUPPORT IN HIGH-LEVEL SYNTHESIS DESIGN FLOW urélen Rbon, Bertrand Le Gal, Chrstophe Jégo and Domnque Dallet Unversté de Bordeaux, Laboratore IMS, CNRS UMR 528, IPB, 35 crs de la Lbératon, Talence, France BSTRCT The ncreasng complexty of System-On-Chp applcatons ncreases the challenge of the desgn task, and specfcally the verfcaton process. sserton-based Verfcaton s one of the key nnovatons to smplfy RTL verfcaton and facltate desgn reuse. However, current desgn automaton tools do not take nto account assertons found n behavoral source codes durng the Hgh-Level Synthess (HLS) process. Ths work focuses on a methodology for automatc detecton and transformaton of behavoral untmed assertons from a transacton-level descrpton nto temporal RTL assertons. Ths process s ntroduced as a partcular task of a HLS desgn flow. RTL montors are generated ether n PSL or VHDL language, for smulaton purpose. Therefore, ths approach contrbutes to IP-reuse methodologes as nput transacton assertons (checkng the correctness of data provded by the system) can be exploted n automatcally generated IPs. Index Terms BV, archtecture, asserton, desgn, HLS, IP, montor. INTRODUCTION The recent fast Integrated Crcut (IC) capacty growth affects not only the scale of current desgns, but also ther complexty. Whle t enables effcent archtectures to solve today s computaton and communcaton problems, the cost of relablty has never been so hgh. Latest studes evaluate that up to 70% of desgn tme s spent n testng and debuggng processes []. Therefore, a number of verfcaton methodologes have been developed and adopted at the Regster Transfer Level (RTL) durng the last decades [2]. One of these technques s called sserton-based Verfcaton (BV) [3]. ssertons are the formal translaton of desgn specfcatons. BV conssts n desgnng archtectures by embeddng asserton statements nto the RTL source code. s a consequence, they ncrease the productvty of system debug and the effcency of desgns. Ths approach speeds up the debug process by allowng smulators and formal verfcaton tools to dentfy errors at ther source, or close to ther source. Ths greatly reduces the tedous task of back tracng errors to ther root cause. Thus, bugs that could have gone undetected can be exposed. Moreover, embeddng assertons wthn the RTL code facltates the reuse of soft Intellectual Property (IP) blocks by ensurng ther proper use n the archtecture durng smulatons. The debug of the ntegraton task s made easer thanks to the dentfcaton of errors close to ther source. However, to our knowledge, current Electronc Desgn utomaton (ED [4,5,6]) tools that automatcally generate RTL archtectures from behavoral descrpton do not support assertons durng ther synthess process. s a consequence, there s no propagaton of behavoral assertons to the generated RTL descrptons. Ths dsables any possblty of later asserton-based verfcaton. In ths paper, we explan why we consder that the propagaton of Boolean assertons from untmed behavoral descrptons to RTL temporal assertons s of utmost mportance. We also propose a methodology that takes nto account assertons durng the HLS synthess process. It ams at generatng RTL montors, for smulaton purpose only, from two knds of assertons:. The Boolean assertons found n the behavoral untmed descrpton, 2. The temporal assertons mpled by some synthess constrants gven by the desgner. Generated montors are descrbed ether as Property Specfcaton Language (PSL, a dedcated RTL verfcaton language) statements or as ndependent non-syntheszable VHDL processes that act as wrappers around VHDL asserton statements. Ths way, there s no penalty on the crcut behavor and ts performances. Generated montors are used to enable easer desgn reuse through the valdaton of transactons. Ths methodology s bult around the Synthess-for-Verfcaton [7] paradgm Ths paper s organzed as follows: secton 2 explans the motvaton of ths work. Secton 3 detals the dfferent types of assertons supported by ths work. The proposed methodology s descrbed n secton 4 and theoretcally developed n secton 5. Fnally, expermental results are related n secton 6. Last secton draws a concluson and provdes some perspectves.

2 2. MOTIVTION OF THIS WORK 2.. ssertons and desgn reuse ssertons-based verfcaton s an effcent technque when t comes to check component transacton durng smulatons. Indeed, assertons can be used as formal contracts to ensure that the data sent to or receved by a component follow the specfcatons. Ths programmng pattern s referred as Desgn-By-Contract (DbC) [8]. Whle t has been n use for many years now wth success n the software development world, ts consderaton for hardware desgn s just emergng. Desgn-By-Contract approach defnes three man asserton constructons, as llustrated n Fgure : Precondtons, whch check data sent to the component, Postcondtons, whch valdate output data, Invarants, whch have to be verfed at any tme. By followng the Desgn-By-Contract paradgm, a desgner can facltate easly mplement ts IP nto a foregn system. Frstly, precondtons make sure that the foregn system follows the nput specfcatons of the IP. Secondly, the ntegrator can rely on the postcondtons to valdate the behavor of the IP. ll ncorrect data sent to or receved by the component s caught by the smulator thanks to asserton ponts. Ths behavor heavly facltates the reuse of IPs n complex systems, by means of more effcent debug task. Snce ntegrators have to make sure that every ntegrated IPs are correctly used by the system, well placed assertons defned n the IPs mmedately report any bad transacton data durng functonal smulaton. It s smlar to software development: functon calls can check ther passed parameters through assertons, and drectly stop the applcaton executon f somethng wrong s detected Hgh-Level Synthess and asserton transformaton Hgh-Level Synthess (HLS) tools provde a hgher level of nt lnearze(nt x) { } // nvarant () assert ( current_mode == LINER ); // precondton assert ( X_MIN <= x && x <= X_MX ); nt k = x * CONST_ + CONST_B; // nternal asserton assert ( k > 0 ); nt y = k >> ; // postcondton assert ( y > 0 ); // nvarant (2) assert ( current_mode == LINER ); return y; Fg.. Desgn-By-Contract constructons desgn abstracton [6,7]. Thus, a desgner can adapt ts desgn to a wde range of targeted devces and applcaton contexts. Indeed, through the defnton of hardware-related constrants such as targeted platform, clock frequency or avalable hardware resources, a same behavoral descrpton can be used to synthesze dfferent dedcated RTL archtectures. Such desgn flow s llustrated n Fgure 2. We thnk that sserton-based Verfcaton can greatly help HLS processes to generate more robust archtectures. It can also facltate archtecture ntegraton nto dfferent system hosts. ctually, ths methodology s a handshake between a system ntegrator and a desgner: Precondtons let the desgner be sure that the syntheszed archtecture s correctly used by the system, Fg. 2. Hgh-Level Synthess desgn flow

3 Postcondtons and nvarants would assure the ntegrator that the archtecture behavor, and ndrectly the algorthm specfcaton, s correct and does not suffer any cornercase msconcepton. In a theoretcal pont of vew, an asserton defned n the behavoral model could be manually hand-coded nto the HLS-generated RTL archtecture. But n practce, t s far from beng so straght-forward. Indeed, HLS tools usually apply many optmzaton technques such hardware resource sharng mergng regsters and operators to be as much as possble resource-effcent. ctually, f a behavoral asserton has to be manually transformed nto ts RTL counterpart, resource-constraned nformaton s necessary. Such nformaton would nclude regsters where varables are stored, fnte-state-machne states when asserted operatons are executed and the executon cycle when the asserton statement must be trggered. Fgure 3 llustrates the transformaton of an asserton from a behavoral descrpton to ts RTL counter-part. More nformaton has to be added durng the synthess process, such as regster names and tmng data. Ths nformaton can only be found by reverseengneerng the (few hundreds of thousands) lnes of code of the generated archtecture or thanks to the HLS tool. For all these reasons, t s necessary that HLS tools handle the assertons present n the nput behavoral models, and automatcally transform them n temporal assertons at the RTL level to enable asserton-based verfcaton Related works To our knowledge, only a few recent works dealng wth asserton preservaton across multple abstracton layers have been publshed. Guarehbagh et al. [9] propose a system-level asserton language and a methodology to automatcally convert them nto software or hardware montors durng the synthess of pplcaton Specfc Instructon-set Processors (SIP). Currer et al. [0] transform behavoral assertons nto syntheszable montors through a translaton from a behavoral assert statement nto an f-then block understandable by the Impulse-C HLS compler. Therefore, ths work dffers from exstng ones because t s applcable to vrtually every HLS tool and behavoral applcaton, and allows a complete control over the asserton treatments before RTL generaton. C++ PSL t[34] = sqrt(2 * x b); assert (t[34] < a); assert always (state = s85) -> prev(reg36, 63) < prev(nput, 85) Fg. 3. Untmed C++ asserton and ts temporal PSL transformaton 3. SUPPORTED SSERTION TYPES The presented methodology supports two types of assertons: those stated n behavoral descrptons and HLS mplct assertons. Indeed, assertons stated n behavoral descrptons are not suffcent to montor the correct behavor of the archtecture. In a HLS process, a desgner has to make some choces durng the defnton of the constrant set. Some of them may lead to ssues n the behavor of the generated archtecture, especally n the case of desgn-reuse. For nstance, archtectures processng 8 bt data may have to be connected to a 32 bt system bus. In ths case, the consequences of such decsons have to be verfed. nother example would be the montorng of system hangs or throughput breaks. Ths verfcaton can be done through the automatc generaton of specfc assertons n the RTL archtecture descrpton. We refer to these assertons as mplct assertons. Therefore, ths work also targets the automatc analyss and generaton of some useful mplct assertons. 3.. Behavoral assertons No preprocess task s necessary n ths case. However, the only requrement s that the HLS compler let them be part of ts nternal abstract representaton of the behavoral descrpton Implct checkng of nput ranges Some archtecture nput ports may be lmted to specfc data value ranges that do not drectly map on the port bt-wdths. These ranges are typcally used to reduce the resource szes n the datapath []. Therefore, t s mpled that nput ports never receve data that overflow these ranges. To ensure ths constrant, nput ranges are retreved from suppled constrants. Then, an asserton s bult for each operaton assgned on the constraned nput port. These assertons ensure the port magntude lmtaton Implct montorng of unsafe operators When constranng any applcaton resource consumpton, two cases can be dstngushed for nternal resource btwdth selecton: Worst case scenaro: regster bt-wdths grow wth the requred computatons, doublng for each multplcaton operaton. Truncated bt-wdths scenaro: ntermedate results are truncated accordng to ther range estmates. They may also take nto account probablty densty functons for computatons that are not relablty crtcal []. Sometmes, they are just set to a same pre-defned arbtrary bt-wdth.

4 In a desgn and reuse context, constrant hypotheses are not always acheved. s a result, truncatng ntermedate results bt-wdths may lead to some unwanted behavor appearng wth overflowng operators. Thus, for each operator that may overflow (accordng to the computed nput data ranges), an asserton s generated. Ths asserton performs the computaton mpled by the montored operator and checks f the result s bound to the specfed range Implct constrant of archtecture throughput The throughput of the generated archtecture s often constraned by the desgner. Ths constrant s used durng allocaton and schedulng steps. However, even f the syntheszed archtecture meets the requred throughput, some nterfaced components may ntroduce unexpected latences. For nstance, f the archtecture nput part contans references to FIFOs, then channel behavors can be unpredctable. s a result, a specfc pre-processng s necessary f a throughput s specfed. It conssts of two dfferent approaches: If the generated archtecture does not embed nterface channels (.e. FIFOs nstantatons are not part of the archtecture), an asserton s generated to count clock cycles between frst and last states of the state machne. If FIFOs are drectly part of the archtecture, one asserton per FIFO s generated. These assertons check that the s_empty flag of each FIFO component s not rased more than a specfc number of tmes durng runtme. 4. PROPOSED METHODOLOGY FOR SSERTION SUPPORT The methodology descrbed n ths secton ams at handlng the assertons specfed n the prevous secton. Note that the desgner can choose to nsert all the mplct assertons, part, or none of them. Ths methodology s composed of heght tasks; each one can be seen as an extenson of the conventonal HLS tool that modfes the nternal abstract representaton. Most Hgh-Level Synthess tools part ther synthess process nto many actvtes, at least ncludng: Complaton: a lexcal analyss of the behavoral descrpton. n abstract representaton, usually an bstract Syntax Tree (ST) [2], s generated from the orgnal specfcaton. Varous transformatons can be appled on t. From ths representaton, a Control-Data- Flow Graph (CDFG) [3] s bult. Ths graph represents the model data propagaton and the operatons that have to be performed. Resource selecton and allocaton: resources for the RTL mplementaton are chosen from avalable hardware lbrares. Moreover, the number of regsters and operators are computed wthout takng nto account hardware reusng. Schedulng and bndng: operatons and data are scheduled accordng to the allocated resources and tme constrants (latency and throughput). Then, CDFG elements are lnked to hardware resources. However, to authors knowledge, asserton support s not part of academc and ndustral tools. For ths reason, asserton support s undefned and they are ether skpped, or are treated as common functons and mplemented usng hardware resources n an unpredctable way. The proposed methodology s a way to get around ths lmtaton. It ams at removng all the asserton branches from the HLS tool nternal model but also at mplementng them as temporal RTL montors dedcated to smulaton or formal verfcaton. If assertons were not removed from the nternal graph, they would be mplemented usng hardware resources, and would degrade crcut performances. The steps nvolved, shown n Fgure 4, are as follows:. Pre-processng: system mplct assertons are dentfed accordng to the supported types descrbed n secton 5.. Correspondng asserton branches for nput range checkng, operator overflow montorng and throughput valdaton are added to the CDFG representaton. 2. sserton branch dscovery: the CDFG s analyzed and asserton branches are dentfed. 3. sserton branch adaptaton: overlappng asserton branches are separated to buld a set of ndependent branches. 4. sserton branch removal: asserton branches are removed from the graph, and then the HLS process syntheszes the RTL archtecture over an asserton-free graph. 5. Bndng: hardware nformaton comng from the HLS process after the schedule-and-bnd task s used to bnd asserton branches to hardware resources. 6. sserton sortng: asserton executon dates are computed n order to follow the behavoral model defned sequences. 7. Montor generaton: montors at the RTL level are fnally generated from the asserton branches. The montor descrpton can be ether n PSL or VHDL (asserton statements are wrapped nto ndependent VHDL processes). 8. RTL embeddng: generated montors are embedded nto the RTL descrpton of the syntheszed archtecture. 5. THEORETICL DEVELOPMENT s prevously explaned, most HLS tools manpulate abstract representatons of applcaton source codes as a drected acyclc graph (DG). Frstly, a graph s a par G = (V, ) where V s a set of vertces (also called nodes) and

5 P C n: n V : n, n n: n V : n, n 2 2 (2) Fnally, we defne a set comprsng the applcaton prmary outputs, referred as V out. The followng sectons detal some of the proposed methodology steps. 5.. sserton branch dscovery The set of nodes that are part of at least one asserton branch s defned as V, wth V V. Ths set s llustrated n Fgure 5. Smlarly, V pure, descrbed n eq. 3, refers to the set of nodes that are only part of asserton branches, wth V pure V V. V pure : n V : C n V (3) Fg. 4. Proposed methodology n a HLS flow s a set of ordered pars of vertces, called arcs or drected edges. n arc a = (x, y) s composed of a head x and a tal y. Secondly, as the graph s acyclc, we can defne a set of entry nodes E and a set of snk nodes S (see eq. ). E : S : n V : n V, n n V : n V, n n, n, n, n n, n Thrdly, for every node n V, we defne P(n) as the set of every parent of n and C(n) the set of every chld of n. These defntons are formally descrbed n eq. 2. () Furthermore, as the Boolean result of every asserton statements s an output, we defne a subset of S that contans the nodes correspondng to asserton snks. Ths set s referred as S. The dentfcaton of an asserton branch starts from an asserton output node n 0 S. The branch dentfcaton algorthm s repeated for every asserton output. Ths algorthm scans the graph by gong from a node to ts parents recursvely. It adds the encountered nodes to the current asserton branch untl a border node s found. Those border nodes, defned n eq. 4, consst of nputs (Border ), nternals (Border 2 ) and outputs (Border 3 ). Border : V out n n, Border : n V : P Border : n V : c C 2 3 Border c V E (4) Example algorthm assert(a!= 0); assert(a - b > 2); y = (a + b) >> ; Fg. 5. Illustraton of the V and V pure sets from an example algorthm.

6 Border 2 values depend on the set V, but V also depends on Border 2. Ths leads to a dead-end. workaround for testng f a node n s n Border 2 reles n retrevng a set of nodes S(n) S, as defned n eq. 5 (Paths(n, n j ) s the set of all paths from n to n j ). Nodes from S(n) are graph outputs that are reachable from n. For each n V, S(n) snce G s a drected acyclc graph. n: n S : Paths n n S (5), Therefore, Border 2 can be obtaned thanks to the followng expresson: Border n nv n S n : (6) 2, s a consequence, for each checked node n, the algorthm retreves the set S(n) and verfes that n s part of Border 2 wth the equalty stated n eq. 6. The recursve algorthm s gven n Fgure 6. ddtonally, B s defned as the set of all nodes that are part of the asserton wth d. n asserton d s a number assgned to an asserton branch from the poston of the asserton statement n the behavoral descrpton. Once an asserton branch (wth d ) s found, the sets B, V and V pure s totally or partally populated by the nodes of ths branch. Ths populaton pattern s expressed as follows: ll nodes from the branch are added to B and V, Nodes verfyng eq. 7b are added to V pure. In ths getssertonbranch(node n) () (2) (3) (4) (5) (6) (7) (8) (9) (0) () (2) (3) (4) (5) (6) (7) branch = new lst of nodes add n to branch f P(n) = or n Vout then return branch end f S compute S(n) := {n S : Paths(n, n) } for n S(n) do f n S then return branch end f end for for p P(n) do f p branch then branch = branch getssertonbranch(p) end f end for return branch Fg. 6. lgorthm of the research of asserton branches equaton, Csts refers to all nodes that represent a constant. more formal defnton of ths set s gven n eq. 7a. n B, Csts : E (7a) V n Pn B n Csts n Vpure 5.2. sserton branch adaptaton (7b) sserton branches can overlap wth each other. Ths behavor comes from the codng style of the applcaton behavoral model. For nstance, some asserton statements may share a varable that s created explctly for these statements. Therefore, the lfetme of ths varable does not exceed the asserton computatons. For ths reason, t s canddate for beng part of V pure. If ths overlap greatly reduces the number of nodes n the whole graph, n counterpart t makes further perasserton optmzatons much harder to perform. It also reduces the flexblty of a potental selecton of mportant assertons to be kept whle others are dscarded for the archtecture generaton. s a consequence, ths step s meant to suppress any asserton overlap. node verfyng eq. 8 s part of multple asserton branches, and has to be duplcated. pure N n V n B (8) Two asserton branches B and B j overlap f and only f they verfy eq. 9. B B V (9) 5.3. sserton branch removal j pure Once branches have been solated, they can be safely broken up from the rest of the man graph. For each asserton branch B, a new graph G = (V, ) s defned. Nodes from B V pure are drectly removed from V and put nto V whle nodes from B V \V pure are duplcated and left n V. The relaton between a node n V and ts clone n V s kept n an assocaton table. We defne the functons Clone and Clone - (see eq. 0) to retreve a clone n V from a node n V and vce-versa. Clone : V V Clone : V Clones ( S) V n V : Clone n S (0)

7 Smlarly, Clones (S) s a set composed by clones of S elements. G s defned n eq.. G : V : V, B V Clones B V V x, y : x, y : x V pure V : y V Clone y x, pure 2 () 5.4. Bndng asserton graphs to hardware resources Ths step does not requre any computaton. It only conssts n retrevng nformaton assgned durng the archtectural synthess. Indeed, the latter properly works on the assertonfree graph after the prevous step. Schedulng and allocaton tasks, as well as any optmzaton, s safely trggered. Then, hardware resources assgned to the graph nodes are assocated (bnded) to the correspondng nodes n the multple asserton graphs sets (V ). Requred nformaton s: RTL regster names: t corresponds to the names that hold an asserton nput data durng each tme. Data avalablty date: the date (clock cycles) when prevously mentoned regsters hold the data correspondng to a gven asserton nput varable. By ths way, asserton graphs (G ) contan enough nformaton to generate the montors. However, ths generaton needs one more step sserton graphs sortng sserton graphs need to be sorted. Desgners usually defne sets of assertons n a specfc and relevant order. For nstance, before assertng that a dvson s bound to a partcular range, the dvson result has to be checked to ensure that t s not equal to zero. Therefore, the latter would be asserted frst and the former secondly. s a consequence, asserton branches have to respect ther defnton order, whch s sequental n the applcaton behavoral model. For ths purpose, an executon date s added to each asserton branch. The default executon date s the date when every asserton nput varable has been read. Ths date s stored n a table. fter every default executon date s determned, the table s sorted by asserton executon order as defned by the behavoral model. Ths process s as follows: the table s browsed lnearly and f an executon date s found to be lesser than the prevous one, t s changed to ths prevous date Montor generaton Montors are generated ether as VHDL processes or as PSL assertons, from the nformaton backed by asserton graphs. These montors are passve and resource-free. They do not modfy the archtecture characterstcs. VHDL montor descrptons are useful for smulators whch are not PSLready. Consderng ether PSL or VHDL montor generaton, regster or nput data are read as defned durng the bndng step, and asserton checks are trggered at a specfc clock cycle. On the one hand, PSL generaton makes heavy use of the bult-n prev(arg [,N]) functon to retreve data stored n regsters at defned clock cycles. On the other hand, VHDL montors are bult n two dfferent ways: usng mult-process or sngle-process descrpton. Mult-process approach wraps each montor nto a dedcated process whle the other approach bulds a sngle process that contans all the montor statements. Wth the latter approach, mantanablty s harder, but the smulaton tme overhead ntroduced by the montors s much lower. 6. EXPERIMENTL RESULTS The proposed methodology has been mplemented n the GraphLab HLS tool [4]. Expermentatons have been done to evaluate the correctness of the generated montors as well as the smulaton runtme mpact of montors. The cost of generated PSL/VHDL lnes has been also consdered. pplcatons are: an 8x8 2D Dscrete Cosne Transform (DCT) wth two dfferent latency constrant sets, a standard 8x8 D DCT and a JPEG compresson standard. The number of behavoral assertons ranges from 6 for the D DCT, up to 896 for the JPEG transformaton, n order to reflect some real-case uses. VHDL archtecture smulatons were performed usng ModelSm SE rev 6.6. Tmng results (see Table ) are provded for 300 teratons of each applcaton. The dfferent tests were dvded n two categores: Frst, randomzed stmul were appled both on the behavoral model and the generated RTL descrpton to valdate the correctness of the generated montors. Such valdaton s only possble f every asserton falure happens n both cases. Then, stmul were constraned to fulfll the algorthm precondtons n order to measure the smulaton runtme overhead. Indeed, snce an asserton falure would stop the smulaton, no falure should happen durng a complete measure pass. Results show that the smulaton runtme overhead s lmted (< 5%), and that embeddng every montor nto a sngle VHDL process has vrtually no mpact on the smulaton. Nevertheless, usng one process per asserton

8 pplcaton TBLE. Expermental results (smulaton tmes are for 300 teratons) # behavoral # PSL montor # VHDL Smulaton # assertons Smulaton mode asserton lnes lnes montor lnes tme 8x8 D DCT 6 8 (usng loops) x8 2D DCT (Low Latency) 8x8 2D DCT (Hgh Latency) JPEG Transformaton (Low Latency) JPEG Transformaton (Hgh Latency) (usng loops) (usng loops) (usng loops) (usng loops) Normal 0.28s Overhead VHDL Sngle-process 0.285s +.49% VHDL Mult-process 0.289s +2.85% Normal s VHDL Sngle-process s +0.46% VHDL Mult-process s +2.30% Normal 25.56s VHDL Sngle-process s +0.58% VHDL Mult-process s +4.20% Normal 83.89s VHDL Sngle-process s +0.40% VHDL Mult-process s +.35% Normal 3.25s VHDL Sngle-process 32.09s +0.74% VHDL Mult-process s +2.76% checker ncreases the overhead sgnfcantly. s expected, hgher montor mantanablty goes wth lower smulaton performances. 7. CONCLUSION ssertons-based Verfcaton can greatly speed up the debug process of the ntegraton or the reuse of an IP. Therefore, the automatc propagaton of behavoral assertons to the RTL level durng an HLS synthess leverages the debug possbltes wth a mnmal effort. The methodology defned n ths paper enables HLS generaton of archtectures that are more sutable for drect functonal verfcaton and n-crcut transacton verfcaton. Future works wll target drect behavoral asserton transformaton nto fully syntheszable montors n a sngle archtecture (computaton data path and montors), n order to enhance verfcaton durng the mplementaton steps for emulaton or slcon-debuggng purposes. 8. REFERENCES [] Bortolam J., Leveragng system models for RTL functonal verfcaton. (2007). [2] Bhadra J., badr MS., Wang L-C., Ray S., Survey of Hybrd Technques for Functonal Verfcaton. IEEE Desgn and Test of Computers, vol. 24, pp (2007) [3] Foster H., Lacey D., Krolnk., sserton-based Desgn. 2nd ed. Norwell, M, US. Kluwer cademc Publshers (2003) [4] Lavagno L., Martn G., Scheffer L., Electronc Desgn utomaton for Integrated Crcuts Handbook - 2 Volume Set. Boca Raton, FL, US. CRC Press, Inc. (2006) [5] Coussy P., Takach., Specal Issue on Hgh-Level Synthess. IEEE Desgn and Test of Computers, vol. 26 (2009) [6] Martn G., Smth G., Hgh-Level Synthess: Past, Present, and Future. IEEE Desgn and Test of Computers, vol. 26, pp (2009) [7] Kundu S., Lerner S., Gupta R., Hgh-Level Verfcaton. IPSJ Transactons on System LSI Desgn Methodology, vol. 2, pp (2009) [8] Meyer B., pplyng Desgn by Contract. Computer IEEE, vol. 25, pp (992) [9] Gharehbagh a, Yaran B, Hessab S, Goudarz M, n asserton-based verfcaton methodology for system-level desgn. Computers & Electrcal Engneerng, vol. 33, pp (2007) [0] Currer J., Sttt G., George D., Hgh-level synthess technques for n-crcut asserton-based verfcaton. In: Parallel & Dstrbuted Processng, Workshops and Phd Forum (IPDPSW), pp. --8 (200) [] Carreras C., López J., Neto-Taladrz O., Bt-Wdth Selecton for Data-Path Implementatons. In: Proc. 2th ntl. symposum on System synthess, pp 4--9 (999) [2] ho V., Lam MS., Seth R., Ullman JD., Complers - Prncples, Technques, and Tools (2nd Edton). ddson Wesley (2006) [3] Kav KM., Buckles BP., Bhat U., formal defnton of data flow graph models. IEEE Transactons on Computers vol. 00, pp (2006) [4] Le Gal B., Casseau E., Word-Length ware DSP Hardware Desgn Flow Based on Hgh-Level Synthess. Journal of Sgnal Processng Systems, Sprnger. Onlne, pp --7 (200)

An Optimal Algorithm for Prufer Codes *

An Optimal Algorithm for Prufer Codes * J. Software Engneerng & Applcatons, 2009, 2: 111-115 do:10.4236/jsea.2009.22016 Publshed Onlne July 2009 (www.scrp.org/journal/jsea) An Optmal Algorthm for Prufer Codes * Xaodong Wang 1, 2, Le Wang 3,

More information

Compiler Design. Spring Register Allocation. Sample Exercises and Solutions. Prof. Pedro C. Diniz

Compiler Design. Spring Register Allocation. Sample Exercises and Solutions. Prof. Pedro C. Diniz Compler Desgn Sprng 2014 Regster Allocaton Sample Exercses and Solutons Prof. Pedro C. Dnz USC / Informaton Scences Insttute 4676 Admralty Way, Sute 1001 Marna del Rey, Calforna 90292 pedro@s.edu Regster

More information

A Fast Content-Based Multimedia Retrieval Technique Using Compressed Data

A Fast Content-Based Multimedia Retrieval Technique Using Compressed Data A Fast Content-Based Multmeda Retreval Technque Usng Compressed Data Borko Furht and Pornvt Saksobhavvat NSF Multmeda Laboratory Florda Atlantc Unversty, Boca Raton, Florda 3343 ABSTRACT In ths paper,

More information

Parallelism for Nested Loops with Non-uniform and Flow Dependences

Parallelism for Nested Loops with Non-uniform and Flow Dependences Parallelsm for Nested Loops wth Non-unform and Flow Dependences Sam-Jn Jeong Dept. of Informaton & Communcaton Engneerng, Cheonan Unversty, 5, Anseo-dong, Cheonan, Chungnam, 330-80, Korea. seong@cheonan.ac.kr

More information

Assembler. Building a Modern Computer From First Principles.

Assembler. Building a Modern Computer From First Principles. Assembler Buldng a Modern Computer From Frst Prncples www.nand2tetrs.org Elements of Computng Systems, Nsan & Schocken, MIT Press, www.nand2tetrs.org, Chapter 6: Assembler slde Where we are at: Human Thought

More information

Cluster Analysis of Electrical Behavior

Cluster Analysis of Electrical Behavior Journal of Computer and Communcatons, 205, 3, 88-93 Publshed Onlne May 205 n ScRes. http://www.scrp.org/ournal/cc http://dx.do.org/0.4236/cc.205.350 Cluster Analyss of Electrcal Behavor Ln Lu Ln Lu, School

More information

The Codesign Challenge

The Codesign Challenge ECE 4530 Codesgn Challenge Fall 2007 Hardware/Software Codesgn The Codesgn Challenge Objectves In the codesgn challenge, your task s to accelerate a gven software reference mplementaton as fast as possble.

More information

AADL : about scheduling analysis

AADL : about scheduling analysis AADL : about schedulng analyss Schedulng analyss, what s t? Embedded real-tme crtcal systems have temporal constrants to meet (e.g. deadlne). Many systems are bult wth operatng systems provdng multtaskng

More information

A Binarization Algorithm specialized on Document Images and Photos

A Binarization Algorithm specialized on Document Images and Photos A Bnarzaton Algorthm specalzed on Document mages and Photos Ergna Kavalleratou Dept. of nformaton and Communcaton Systems Engneerng Unversty of the Aegean kavalleratou@aegean.gr Abstract n ths paper, a

More information

The Greedy Method. Outline and Reading. Change Money Problem. Greedy Algorithms. Applications of the Greedy Strategy. The Greedy Method Technique

The Greedy Method. Outline and Reading. Change Money Problem. Greedy Algorithms. Applications of the Greedy Strategy. The Greedy Method Technique //00 :0 AM Outlne and Readng The Greedy Method The Greedy Method Technque (secton.) Fractonal Knapsack Problem (secton..) Task Schedulng (secton..) Mnmum Spannng Trees (secton.) Change Money Problem Greedy

More information

Storage Binding in RTL synthesis

Storage Binding in RTL synthesis Storage Bndng n RTL synthess Pe Zhang Danel D. Gajsk Techncal Report ICS-0-37 August 0th, 200 Center for Embedded Computer Systems Department of Informaton and Computer Scence Unersty of Calforna, Irne

More information

SLAM Summer School 2006 Practical 2: SLAM using Monocular Vision

SLAM Summer School 2006 Practical 2: SLAM using Monocular Vision SLAM Summer School 2006 Practcal 2: SLAM usng Monocular Vson Javer Cvera, Unversty of Zaragoza Andrew J. Davson, Imperal College London J.M.M Montel, Unversty of Zaragoza. josemar@unzar.es, jcvera@unzar.es,

More information

Petri Net Based Software Dependability Engineering

Petri Net Based Software Dependability Engineering Proc. RELECTRONIC 95, Budapest, pp. 181-186; October 1995 Petr Net Based Software Dependablty Engneerng Monka Hener Brandenburg Unversty of Technology Cottbus Computer Scence Insttute Postbox 101344 D-03013

More information

An Entropy-Based Approach to Integrated Information Needs Assessment

An Entropy-Based Approach to Integrated Information Needs Assessment Dstrbuton Statement A: Approved for publc release; dstrbuton s unlmted. An Entropy-Based Approach to ntegrated nformaton Needs Assessment June 8, 2004 Wllam J. Farrell Lockheed Martn Advanced Technology

More information

Multigranular Simulation of Heterogeneous Embedded Systems

Multigranular Simulation of Heterogeneous Embedded Systems Multgranular Smulaton of Heterogeneous Embedded Systems Adtya Agrawal Insttute for Software Integrated Systems Vanderblt Unversty Nashvlle, TN - 37235 1 615 343 7567 adtya.agrawal@vanderblt.edu Akos Ledecz

More information

Parallel matrix-vector multiplication

Parallel matrix-vector multiplication Appendx A Parallel matrx-vector multplcaton The reduced transton matrx of the three-dmensonal cage model for gel electrophoress, descrbed n secton 3.2, becomes excessvely large for polymer lengths more

More information

Outline. Digital Systems. C.2: Gates, Truth Tables and Logic Equations. Truth Tables. Logic Gates 9/8/2011

Outline. Digital Systems. C.2: Gates, Truth Tables and Logic Equations. Truth Tables. Logic Gates 9/8/2011 9/8/2 2 Outlne Appendx C: The Bascs of Logc Desgn TDT4255 Computer Desgn Case Study: TDT4255 Communcaton Module Lecture 2 Magnus Jahre 3 4 Dgtal Systems C.2: Gates, Truth Tables and Logc Equatons All sgnals

More information

CPE 628 Chapter 2 Design for Testability. Dr. Rhonda Kay Gaede UAH. UAH Chapter Introduction

CPE 628 Chapter 2 Design for Testability. Dr. Rhonda Kay Gaede UAH. UAH Chapter Introduction Chapter 2 Desgn for Testablty Dr Rhonda Kay Gaede UAH 2 Introducton Dffcultes n and the states of sequental crcuts led to provdng drect access for storage elements, whereby selected storage elements are

More information

A mathematical programming approach to the analysis, design and scheduling of offshore oilfields

A mathematical programming approach to the analysis, design and scheduling of offshore oilfields 17 th European Symposum on Computer Aded Process Engneerng ESCAPE17 V. Plesu and P.S. Agach (Edtors) 2007 Elsever B.V. All rghts reserved. 1 A mathematcal programmng approach to the analyss, desgn and

More information

Load Balancing for Hex-Cell Interconnection Network

Load Balancing for Hex-Cell Interconnection Network Int. J. Communcatons, Network and System Scences,,, - Publshed Onlne Aprl n ScRes. http://www.scrp.org/journal/jcns http://dx.do.org/./jcns.. Load Balancng for Hex-Cell Interconnecton Network Saher Manaseer,

More information

Repeater Insertion for Two-Terminal Nets in Three-Dimensional Integrated Circuits

Repeater Insertion for Two-Terminal Nets in Three-Dimensional Integrated Circuits Repeater Inserton for Two-Termnal Nets n Three-Dmensonal Integrated Crcuts Hu Xu, Vasls F. Pavlds, and Govann De Mchel LSI - EPFL, CH-5, Swtzerland, {hu.xu,vasleos.pavlds,govann.demchel}@epfl.ch Abstract.

More information

Using the Multiple-Clue approach for system testing on AIRBUS FAL (Final Assembly Line)

Using the Multiple-Clue approach for system testing on AIRBUS FAL (Final Assembly Line) Usng the Multple-Clue approach for system testng on AIRBUS FAL (Fnal Assembly Lne) Fassely Doumba, Odle Laurent, Dder Atger AIRBUS France 316 route de Bayonne 31060 Toulouse Cedex 09 {Frstname.Name}@arbus.com

More information

Configuration Management in Multi-Context Reconfigurable Systems for Simultaneous Performance and Power Optimizations*

Configuration Management in Multi-Context Reconfigurable Systems for Simultaneous Performance and Power Optimizations* Confguraton Management n Mult-Context Reconfgurable Systems for Smultaneous Performance and Power Optmzatons* Rafael Maestre, Mlagros Fernandez Departamento de Arqutectura de Computadores y Automátca Unversdad

More information

Virtual Memory. Background. No. 10. Virtual Memory: concept. Logical Memory Space (review) Demand Paging(1) Virtual Memory

Virtual Memory. Background. No. 10. Virtual Memory: concept. Logical Memory Space (review) Demand Paging(1) Virtual Memory Background EECS. Operatng System Fundamentals No. Vrtual Memory Prof. Hu Jang Department of Electrcal Engneerng and Computer Scence, York Unversty Memory-management methods normally requres the entre process

More information

Module Management Tool in Software Development Organizations

Module Management Tool in Software Development Organizations Journal of Computer Scence (5): 8-, 7 ISSN 59-66 7 Scence Publcatons Management Tool n Software Development Organzatons Ahmad A. Al-Rababah and Mohammad A. Al-Rababah Faculty of IT, Al-Ahlyyah Amman Unversty,

More information

Virtual Machine Migration based on Trust Measurement of Computer Node

Virtual Machine Migration based on Trust Measurement of Computer Node Appled Mechancs and Materals Onlne: 2014-04-04 ISSN: 1662-7482, Vols. 536-537, pp 678-682 do:10.4028/www.scentfc.net/amm.536-537.678 2014 Trans Tech Publcatons, Swtzerland Vrtual Machne Mgraton based on

More information

Problem Definitions and Evaluation Criteria for Computational Expensive Optimization

Problem Definitions and Evaluation Criteria for Computational Expensive Optimization Problem efntons and Evaluaton Crtera for Computatonal Expensve Optmzaton B. Lu 1, Q. Chen and Q. Zhang 3, J. J. Lang 4, P. N. Suganthan, B. Y. Qu 6 1 epartment of Computng, Glyndwr Unversty, UK Faclty

More information

Hierarchical clustering for gene expression data analysis

Hierarchical clustering for gene expression data analysis Herarchcal clusterng for gene expresson data analyss Gorgo Valentn e-mal: valentn@ds.unm.t Clusterng of Mcroarray Data. Clusterng of gene expresson profles (rows) => dscovery of co-regulated and functonally

More information

Concurrent Apriori Data Mining Algorithms

Concurrent Apriori Data Mining Algorithms Concurrent Apror Data Mnng Algorthms Vassl Halatchev Department of Electrcal Engneerng and Computer Scence York Unversty, Toronto October 8, 2015 Outlne Why t s mportant Introducton to Assocaton Rule Mnng

More information

Assignment # 2. Farrukh Jabeen Algorithms 510 Assignment #2 Due Date: June 15, 2009.

Assignment # 2. Farrukh Jabeen Algorithms 510 Assignment #2 Due Date: June 15, 2009. Farrukh Jabeen Algorthms 51 Assgnment #2 Due Date: June 15, 29. Assgnment # 2 Chapter 3 Dscrete Fourer Transforms Implement the FFT for the DFT. Descrbed n sectons 3.1 and 3.2. Delverables: 1. Concse descrpton

More information

Course Introduction. Algorithm 8/31/2017. COSC 320 Advanced Data Structures and Algorithms. COSC 320 Advanced Data Structures and Algorithms

Course Introduction. Algorithm 8/31/2017. COSC 320 Advanced Data Structures and Algorithms. COSC 320 Advanced Data Structures and Algorithms Course Introducton Course Topcs Exams, abs, Proects A quc loo at a few algorthms 1 Advanced Data Structures and Algorthms Descrpton: We are gong to dscuss algorthm complexty analyss, algorthm desgn technques

More information

Mallathahally, Bangalore, India 1 2

Mallathahally, Bangalore, India 1 2 7 IMPLEMENTATION OF HIGH PERFORMANCE BINARY SQUARER PRADEEP M C, RAMESH S, Department of Electroncs and Communcaton Engneerng, Dr. Ambedkar Insttute of Technology, Mallathahally, Bangalore, Inda pradeepmc@gmal.com,

More information

Support Vector Machines

Support Vector Machines /9/207 MIST.6060 Busness Intellgence and Data Mnng What are Support Vector Machnes? Support Vector Machnes Support Vector Machnes (SVMs) are supervsed learnng technques that analyze data and recognze patterns.

More information

X- Chart Using ANOM Approach

X- Chart Using ANOM Approach ISSN 1684-8403 Journal of Statstcs Volume 17, 010, pp. 3-3 Abstract X- Chart Usng ANOM Approach Gullapall Chakravarth 1 and Chaluvad Venkateswara Rao Control lmts for ndvdual measurements (X) chart are

More information

an assocated logc allows the proof of safety and lveness propertes. The Unty model nvolves on the one hand a programmng language and, on the other han

an assocated logc allows the proof of safety and lveness propertes. The Unty model nvolves on the one hand a programmng language and, on the other han UNITY as a Tool for Desgn and Valdaton of a Data Replcaton System Phlppe Quennec Gerard Padou CENA IRIT-ENSEEIHT y Nnth Internatonal Conference on Systems Engneerng Unversty of Nevada, Las Vegas { 14-16

More information

Run-Time Operator State Spilling for Memory Intensive Long-Running Queries

Run-Time Operator State Spilling for Memory Intensive Long-Running Queries Run-Tme Operator State Spllng for Memory Intensve Long-Runnng Queres Bn Lu, Yal Zhu, and lke A. Rundenstener epartment of Computer Scence, Worcester Polytechnc Insttute Worcester, Massachusetts, USA {bnlu,

More information

Simulation Based Analysis of FAST TCP using OMNET++

Simulation Based Analysis of FAST TCP using OMNET++ Smulaton Based Analyss of FAST TCP usng OMNET++ Umar ul Hassan 04030038@lums.edu.pk Md Term Report CS678 Topcs n Internet Research Sprng, 2006 Introducton Internet traffc s doublng roughly every 3 months

More information

Private Information Retrieval (PIR)

Private Information Retrieval (PIR) 2 Levente Buttyán Problem formulaton Alce wants to obtan nformaton from a database, but she does not want the database to learn whch nformaton she wanted e.g., Alce s an nvestor queryng a stock-market

More information

S1 Note. Basis functions.

S1 Note. Basis functions. S1 Note. Bass functons. Contents Types of bass functons...1 The Fourer bass...2 B-splne bass...3 Power and type I error rates wth dfferent numbers of bass functons...4 Table S1. Smulaton results of type

More information

Conditional Speculative Decimal Addition*

Conditional Speculative Decimal Addition* Condtonal Speculatve Decmal Addton Alvaro Vazquez and Elsardo Antelo Dep. of Electronc and Computer Engneerng Unv. of Santago de Compostela, Span Ths work was supported n part by Xunta de Galca under grant

More information

For instance, ; the five basic number-sets are increasingly more n A B & B A A = B (1)

For instance, ; the five basic number-sets are increasingly more n A B & B A A = B (1) Secton 1.2 Subsets and the Boolean operatons on sets If every element of the set A s an element of the set B, we say that A s a subset of B, or that A s contaned n B, or that B contans A, and we wrte A

More information

6.854 Advanced Algorithms Petar Maymounkov Problem Set 11 (November 23, 2005) With: Benjamin Rossman, Oren Weimann, and Pouya Kheradpour

6.854 Advanced Algorithms Petar Maymounkov Problem Set 11 (November 23, 2005) With: Benjamin Rossman, Oren Weimann, and Pouya Kheradpour 6.854 Advanced Algorthms Petar Maymounkov Problem Set 11 (November 23, 2005) Wth: Benjamn Rossman, Oren Wemann, and Pouya Kheradpour Problem 1. We reduce vertex cover to MAX-SAT wth weghts, such that the

More information

A Fast Visual Tracking Algorithm Based on Circle Pixels Matching

A Fast Visual Tracking Algorithm Based on Circle Pixels Matching A Fast Vsual Trackng Algorthm Based on Crcle Pxels Matchng Zhqang Hou hou_zhq@sohu.com Chongzhao Han czhan@mal.xjtu.edu.cn Ln Zheng Abstract: A fast vsual trackng algorthm based on crcle pxels matchng

More information

FPGA Based Fixed Width 4 4, 6 6, 8 8 and Bit Multipliers using Spartan-3AN

FPGA Based Fixed Width 4 4, 6 6, 8 8 and Bit Multipliers using Spartan-3AN IJCSNS Internatonal Journal of Computer Scence and Network Securty, VOL.11 No.2, February 211 61 FPGA Based Fxed Wdth 4 4, 6 6, 8 8 and 12 12-Bt Multplers usng Spartan-3AN Muhammad H. Ras and Mohamed H.

More information

11. HARMS How To: CSV Import

11. HARMS How To: CSV Import and Rsk System 11. How To: CSV Import Preparng the spreadsheet for CSV Import Refer to the spreadsheet template to ad algnng spreadsheet columns wth Data Felds. The spreadsheet s shown n the Appendx, an

More information

Improvement of Spatial Resolution Using BlockMatching Based Motion Estimation and Frame. Integration

Improvement of Spatial Resolution Using BlockMatching Based Motion Estimation and Frame. Integration Improvement of Spatal Resoluton Usng BlockMatchng Based Moton Estmaton and Frame Integraton Danya Suga and Takayuk Hamamoto Graduate School of Engneerng, Tokyo Unversty of Scence, 6-3-1, Nuku, Katsuska-ku,

More information

The stream cipher MICKEY-128 (version 1) Algorithm specification issue 1.0

The stream cipher MICKEY-128 (version 1) Algorithm specification issue 1.0 The stream cpher MICKEY-128 (verson 1 Algorthm specfcaton ssue 1. Steve Babbage Vodafone Group R&D, Newbury, UK steve.babbage@vodafone.com Matthew Dodd Independent consultant matthew@mdodd.net www.mdodd.net

More information

Related-Mode Attacks on CTR Encryption Mode

Related-Mode Attacks on CTR Encryption Mode Internatonal Journal of Network Securty, Vol.4, No.3, PP.282 287, May 2007 282 Related-Mode Attacks on CTR Encrypton Mode Dayn Wang, Dongda Ln, and Wenlng Wu (Correspondng author: Dayn Wang) Key Laboratory

More information

Circuit Analysis I (ENGR 2405) Chapter 3 Method of Analysis Nodal(KCL) and Mesh(KVL)

Circuit Analysis I (ENGR 2405) Chapter 3 Method of Analysis Nodal(KCL) and Mesh(KVL) Crcut Analyss I (ENG 405) Chapter Method of Analyss Nodal(KCL) and Mesh(KVL) Nodal Analyss If nstead of focusng on the oltages of the crcut elements, one looks at the oltages at the nodes of the crcut,

More information

Sum of Linear and Fractional Multiobjective Programming Problem under Fuzzy Rules Constraints

Sum of Linear and Fractional Multiobjective Programming Problem under Fuzzy Rules Constraints Australan Journal of Basc and Appled Scences, 2(4): 1204-1208, 2008 ISSN 1991-8178 Sum of Lnear and Fractonal Multobjectve Programmng Problem under Fuzzy Rules Constrants 1 2 Sanjay Jan and Kalash Lachhwan

More information

Memory Modeling in ESL-RTL Equivalence Checking

Memory Modeling in ESL-RTL Equivalence Checking 11.4 Memory Modelng n ESL-RTL Equvalence Checkng Alfred Koelbl 2025 NW Cornelus Pass Rd. Hllsboro, OR 97124 koelbl@synopsys.com Jerry R. Burch 2025 NW Cornelus Pass Rd. Hllsboro, OR 97124 burch@synopsys.com

More information

Programming in Fortran 90 : 2017/2018

Programming in Fortran 90 : 2017/2018 Programmng n Fortran 90 : 2017/2018 Programmng n Fortran 90 : 2017/2018 Exercse 1 : Evaluaton of functon dependng on nput Wrte a program who evaluate the functon f (x,y) for any two user specfed values

More information

Real-time Fault-tolerant Scheduling Algorithm for Distributed Computing Systems

Real-time Fault-tolerant Scheduling Algorithm for Distributed Computing Systems Real-tme Fault-tolerant Schedulng Algorthm for Dstrbuted Computng Systems Yun Lng, Y Ouyang College of Computer Scence and Informaton Engneerng Zheang Gongshang Unversty Postal code: 310018 P.R.CHINA {ylng,

More information

Lobachevsky State University of Nizhni Novgorod. Polyhedron. Quick Start Guide

Lobachevsky State University of Nizhni Novgorod. Polyhedron. Quick Start Guide Lobachevsky State Unversty of Nzhn Novgorod Polyhedron Quck Start Gude Nzhn Novgorod 2016 Contents Specfcaton of Polyhedron software... 3 Theoretcal background... 4 1. Interface of Polyhedron... 6 1.1.

More information

Verification by testing

Verification by testing Real-Tme Systems Specfcaton Implementaton System models Executon-tme analyss Verfcaton Verfcaton by testng Dad? How do they know how much weght a brdge can handle? They drve bgger and bgger trucks over

More information

Security Enhanced Dynamic ID based Remote User Authentication Scheme for Multi-Server Environments

Security Enhanced Dynamic ID based Remote User Authentication Scheme for Multi-Server Environments Internatonal Journal of u- and e- ervce, cence and Technology Vol8, o 7 0), pp7-6 http://dxdoorg/07/unesst087 ecurty Enhanced Dynamc ID based Remote ser Authentcaton cheme for ult-erver Envronments Jun-ub

More information

Analysis of Continuous Beams in General

Analysis of Continuous Beams in General Analyss of Contnuous Beams n General Contnuous beams consdered here are prsmatc, rgdly connected to each beam segment and supported at varous ponts along the beam. onts are selected at ponts of support,

More information

Meta-heuristics for Multidimensional Knapsack Problems

Meta-heuristics for Multidimensional Knapsack Problems 2012 4th Internatonal Conference on Computer Research and Development IPCSIT vol.39 (2012) (2012) IACSIT Press, Sngapore Meta-heurstcs for Multdmensonal Knapsack Problems Zhbao Man + Computer Scence Department,

More information

Mathematics 256 a course in differential equations for engineering students

Mathematics 256 a course in differential equations for engineering students Mathematcs 56 a course n dfferental equatons for engneerng students Chapter 5. More effcent methods of numercal soluton Euler s method s qute neffcent. Because the error s essentally proportonal to the

More information

Functional Testing of Digital Systems

Functional Testing of Digital Systems Functonal Testng of Dgtal Systems Kwok- Woon La Bell Laboratores Murray Hll, New Jersey 07974 Danel P. Seworek Carnege-Mellon Unversty Pttsburgh, Pennsylvana 15213 ABSTRACT Functonal testng s testng amed

More information

A RECONFIGURABLE ARCHITECTURE FOR MULTI-GIGABIT SPEED CONTENT-BASED ROUTING. James Moscola, Young H. Cho, John W. Lockwood

A RECONFIGURABLE ARCHITECTURE FOR MULTI-GIGABIT SPEED CONTENT-BASED ROUTING. James Moscola, Young H. Cho, John W. Lockwood A RECONFIGURABLE ARCHITECTURE FOR MULTI-GIGABIT SPEED CONTENT-BASED ROUTING James Moscola, Young H. Cho, John W. Lockwood Dept. of Computer Scence and Engneerng Washngton Unversty, St. Lous, MO {jmm5,

More information

CMPS 10 Introduction to Computer Science Lecture Notes

CMPS 10 Introduction to Computer Science Lecture Notes CPS 0 Introducton to Computer Scence Lecture Notes Chapter : Algorthm Desgn How should we present algorthms? Natural languages lke Englsh, Spansh, or French whch are rch n nterpretaton and meanng are not

More information

RADIX-10 PARALLEL DECIMAL MULTIPLIER

RADIX-10 PARALLEL DECIMAL MULTIPLIER RADIX-10 PARALLEL DECIMAL MULTIPLIER 1 MRUNALINI E. INGLE & 2 TEJASWINI PANSE 1&2 Electroncs Engneerng, Yeshwantrao Chavan College of Engneerng, Nagpur, Inda E-mal : mrunalngle@gmal.com, tejaswn.deshmukh@gmal.com

More information

An Efficient Garbage Collection for Flash Memory-Based Virtual Memory Systems

An Efficient Garbage Collection for Flash Memory-Based Virtual Memory Systems S. J and D. Shn: An Effcent Garbage Collecton for Flash Memory-Based Vrtual Memory Systems 2355 An Effcent Garbage Collecton for Flash Memory-Based Vrtual Memory Systems Seunggu J and Dongkun Shn, Member,

More information

VISUAL SELECTION OF SURFACE FEATURES DURING THEIR GEOMETRIC SIMULATION WITH THE HELP OF COMPUTER TECHNOLOGIES

VISUAL SELECTION OF SURFACE FEATURES DURING THEIR GEOMETRIC SIMULATION WITH THE HELP OF COMPUTER TECHNOLOGIES UbCC 2011, Volume 6, 5002981-x manuscrpts OPEN ACCES UbCC Journal ISSN 1992-8424 www.ubcc.org VISUAL SELECTION OF SURFACE FEATURES DURING THEIR GEOMETRIC SIMULATION WITH THE HELP OF COMPUTER TECHNOLOGIES

More information

Model Integrated Computing: A Framework for Creating Domain Specific Design Environments

Model Integrated Computing: A Framework for Creating Domain Specific Design Environments Model Integrated Computng: A Framework for Creatng Doman Specfc Desgn Envronments James R. DAVIS Vanderblt Unversty, Insttute for Software Integrated Systems Nashvlle, TN 37203, USA ABSTRACT Model Integrated

More information

Available online at Available online at Advanced in Control Engineering and Information Science

Available online at   Available online at   Advanced in Control Engineering and Information Science Avalable onlne at wwwscencedrectcom Avalable onlne at wwwscencedrectcom Proceda Proceda Engneerng Engneerng 00 (2011) 15000 000 (2011) 1642 1646 Proceda Engneerng wwwelsevercom/locate/proceda Advanced

More information

Specifications in 2001

Specifications in 2001 Specfcatons n 200 MISTY (updated : May 3, 2002) September 27, 200 Mtsubsh Electrc Corporaton Block Cpher Algorthm MISTY Ths document shows a complete descrpton of encrypton algorthm MISTY, whch are secret-key

More information

Maintaining temporal validity of real-time data on non-continuously executing resources

Maintaining temporal validity of real-time data on non-continuously executing resources Mantanng temporal valdty of real-tme data on non-contnuously executng resources Tan Ba, Hong Lu and Juan Yang Hunan Insttute of Scence and Technology, College of Computer Scence, 44, Yueyang, Chna Wuhan

More information

EFFICIENT SYNCHRONOUS PARALLEL DISCRETE EVENT SIMULATION

EFFICIENT SYNCHRONOUS PARALLEL DISCRETE EVENT SIMULATION EFFICIENT SYNCHRONOUS PARALLEL DISCRETE EVENT SIMULATION WITH THE ARMEN ARCHITECTURE C. Beaumont, B. Potter J.M. Flloque LIBr I.U.T. de Brest and LIBr Unversté de Bretagne Occdentale Télécom Bretagne BP

More information

Overview. Basic Setup [9] Motivation and Tasks. Modularization 2008/2/20 IMPROVED COVERAGE CONTROL USING ONLY LOCAL INFORMATION

Overview. Basic Setup [9] Motivation and Tasks. Modularization 2008/2/20 IMPROVED COVERAGE CONTROL USING ONLY LOCAL INFORMATION Overvew 2 IMPROVED COVERAGE CONTROL USING ONLY LOCAL INFORMATION Introducton Mult- Smulator MASIM Theoretcal Work and Smulaton Results Concluson Jay Wagenpfel, Adran Trachte Motvaton and Tasks Basc Setup

More information

Algorithmic Transformation Techniques for Efficient Exploration of Alternative Application Instances

Algorithmic Transformation Techniques for Efficient Exploration of Alternative Application Instances In: Proc. 0th Int. Symposum on Hardware/Software Codesgn (CODES 02), Estes Park, Colorado, USA, May 6 8, 2002 Algorthmc Transformaton Technques for Effcent Exploraton of Alternatve Applcaton Instances

More information

Assembler. Shimon Schocken. Spring Elements of Computing Systems 1 Assembler (Ch. 6) Compiler. abstract interface.

Assembler. Shimon Schocken. Spring Elements of Computing Systems 1 Assembler (Ch. 6) Compiler. abstract interface. IDC Herzlya Shmon Schocken Assembler Shmon Schocken Sprng 2005 Elements of Computng Systems 1 Assembler (Ch. 6) Where we are at: Human Thought Abstract desgn Chapters 9, 12 abstract nterface H.L. Language

More information

FEATURE EXTRACTION. Dr. K.Vijayarekha. Associate Dean School of Electrical and Electronics Engineering SASTRA University, Thanjavur

FEATURE EXTRACTION. Dr. K.Vijayarekha. Associate Dean School of Electrical and Electronics Engineering SASTRA University, Thanjavur FEATURE EXTRACTION Dr. K.Vjayarekha Assocate Dean School of Electrcal and Electroncs Engneerng SASTRA Unversty, Thanjavur613 41 Jont Intatve of IITs and IISc Funded by MHRD Page 1 of 8 Table of Contents

More information

VRT012 User s guide V0.1. Address: Žirmūnų g. 27, Vilnius LT-09105, Phone: (370-5) , Fax: (370-5) ,

VRT012 User s guide V0.1. Address: Žirmūnų g. 27, Vilnius LT-09105, Phone: (370-5) , Fax: (370-5) , VRT012 User s gude V0.1 Thank you for purchasng our product. We hope ths user-frendly devce wll be helpful n realsng your deas and brngng comfort to your lfe. Please take few mnutes to read ths manual

More information

Content Based Image Retrieval Using 2-D Discrete Wavelet with Texture Feature with Different Classifiers

Content Based Image Retrieval Using 2-D Discrete Wavelet with Texture Feature with Different Classifiers IOSR Journal of Electroncs and Communcaton Engneerng (IOSR-JECE) e-issn: 78-834,p- ISSN: 78-8735.Volume 9, Issue, Ver. IV (Mar - Apr. 04), PP 0-07 Content Based Image Retreval Usng -D Dscrete Wavelet wth

More information

Multiblock method for database generation in finite element programs

Multiblock method for database generation in finite element programs Proc. of the 9th WSEAS Int. Conf. on Mathematcal Methods and Computatonal Technques n Electrcal Engneerng, Arcachon, October 13-15, 2007 53 Multblock method for database generaton n fnte element programs

More information

TECHNIQUE OF FORMATION HOMOGENEOUS SAMPLE SAME OBJECTS. Muradaliyev A.Z.

TECHNIQUE OF FORMATION HOMOGENEOUS SAMPLE SAME OBJECTS. Muradaliyev A.Z. TECHNIQUE OF FORMATION HOMOGENEOUS SAMPLE SAME OBJECTS Muradalyev AZ Azerbajan Scentfc-Research and Desgn-Prospectng Insttute of Energetc AZ1012, Ave HZardab-94 E-mal:aydn_murad@yahoocom Importance of

More information

An Application of the Dulmage-Mendelsohn Decomposition to Sparse Null Space Bases of Full Row Rank Matrices

An Application of the Dulmage-Mendelsohn Decomposition to Sparse Null Space Bases of Full Row Rank Matrices Internatonal Mathematcal Forum, Vol 7, 2012, no 52, 2549-2554 An Applcaton of the Dulmage-Mendelsohn Decomposton to Sparse Null Space Bases of Full Row Rank Matrces Mostafa Khorramzadeh Department of Mathematcal

More information

Explicit Formulas and Efficient Algorithm for Moment Computation of Coupled RC Trees with Lumped and Distributed Elements

Explicit Formulas and Efficient Algorithm for Moment Computation of Coupled RC Trees with Lumped and Distributed Elements Explct Formulas and Effcent Algorthm for Moment Computaton of Coupled RC Trees wth Lumped and Dstrbuted Elements Qngan Yu and Ernest S.Kuh Electroncs Research Lab. Unv. of Calforna at Berkeley Berkeley

More information

Helsinki University Of Technology, Systems Analysis Laboratory Mat Independent research projects in applied mathematics (3 cr)

Helsinki University Of Technology, Systems Analysis Laboratory Mat Independent research projects in applied mathematics (3 cr) Helsnk Unversty Of Technology, Systems Analyss Laboratory Mat-2.08 Independent research projects n appled mathematcs (3 cr) "! #$&% Antt Laukkanen 506 R ajlaukka@cc.hut.f 2 Introducton...3 2 Multattrbute

More information

Design and Analysis of Algorithms

Design and Analysis of Algorithms Desgn and Analyss of Algorthms Heaps and Heapsort Reference: CLRS Chapter 6 Topcs: Heaps Heapsort Prorty queue Huo Hongwe Recap and overvew The story so far... Inserton sort runnng tme of Θ(n 2 ); sorts

More information

DLK Pro the all-rounder for mobile data downloading. Tailor-made for various requirements.

DLK Pro the all-rounder for mobile data downloading. Tailor-made for various requirements. DLK Pro the all-rounder for moble data downloadng Talor-made for varous requrements www.dtco.vdo.com Smply brllant, brllantly smple Always the rght soluton The DLK Pro s the VDO product famly, whch sets

More information

Complex Numbers. Now we also saw that if a and b were both positive then ab = a b. For a second let s forget that restriction and do the following.

Complex Numbers. Now we also saw that if a and b were both positive then ab = a b. For a second let s forget that restriction and do the following. Complex Numbers The last topc n ths secton s not really related to most of what we ve done n ths chapter, although t s somewhat related to the radcals secton as we wll see. We also won t need the materal

More information

ELEC 377 Operating Systems. Week 6 Class 3

ELEC 377 Operating Systems. Week 6 Class 3 ELEC 377 Operatng Systems Week 6 Class 3 Last Class Memory Management Memory Pagng Pagng Structure ELEC 377 Operatng Systems Today Pagng Szes Vrtual Memory Concept Demand Pagng ELEC 377 Operatng Systems

More information

Evaluation of an Enhanced Scheme for High-level Nested Network Mobility

Evaluation of an Enhanced Scheme for High-level Nested Network Mobility IJCSNS Internatonal Journal of Computer Scence and Network Securty, VOL.15 No.10, October 2015 1 Evaluaton of an Enhanced Scheme for Hgh-level Nested Network Moblty Mohammed Babker Al Mohammed, Asha Hassan.

More information

Efficient Distributed File System (EDFS)

Efficient Distributed File System (EDFS) Effcent Dstrbuted Fle System (EDFS) (Sem-Centralzed) Debessay(Debsh) Fesehaye, Rahul Malk & Klara Naherstedt Unversty of Illnos-Urbana Champagn Contents Problem Statement, Related Work, EDFS Desgn Rate

More information

ARTICLE IN PRESS. Signal Processing: Image Communication

ARTICLE IN PRESS. Signal Processing: Image Communication Sgnal Processng: Image Communcaton 23 (2008) 754 768 Contents lsts avalable at ScenceDrect Sgnal Processng: Image Communcaton journal homepage: www.elsever.com/locate/mage Dstrbuted meda rate allocaton

More information

TN348: Openlab Module - Colocalization

TN348: Openlab Module - Colocalization TN348: Openlab Module - Colocalzaton Topc The Colocalzaton module provdes the faclty to vsualze and quantfy colocalzaton between pars of mages. The Colocalzaton wndow contans a prevew of the two mages

More information

A HIERARCHICAL SIMULATION FRAMEWORK FOR APPLICATION DEVELOPMENT ON SYSTEM-ON-CHIP ARCHITECTURES. Vaibhav Mathur and Viktor K.

A HIERARCHICAL SIMULATION FRAMEWORK FOR APPLICATION DEVELOPMENT ON SYSTEM-ON-CHIP ARCHITECTURES. Vaibhav Mathur and Viktor K. A HIERARCHICAL SIMULATION FRAMEWORK FOR APPLICATION DEVELOPMENT ON SYSTEM-ON-CHIP ARCHITECTURES Vabhav Mathur and Vktor K. Prasanna Department of EE-Systems Unversty of Southern Calforna Los Angeles, CA

More information

CSCI 104 Sorting Algorithms. Mark Redekopp David Kempe

CSCI 104 Sorting Algorithms. Mark Redekopp David Kempe CSCI 104 Sortng Algorthms Mark Redekopp Davd Kempe Algorthm Effcency SORTING 2 Sortng If we have an unordered lst, sequental search becomes our only choce If we wll perform a lot of searches t may be benefcal

More information

Sequential search. Building Java Programs Chapter 13. Sequential search. Sequential search

Sequential search. Building Java Programs Chapter 13. Sequential search. Sequential search Sequental search Buldng Java Programs Chapter 13 Searchng and Sortng sequental search: Locates a target value n an array/lst by examnng each element from start to fnsh. How many elements wll t need to

More information

Research Article. ISSN (Print) s k and. d k rate of k -th flow, source node and

Research Article. ISSN (Print) s k and. d k rate of k -th flow, source node and Scholars Journal of Engneerng and Technology (SJET) Sch. J. Eng. Tech., 2015; 3(4A):343-350 Scholars Academc and Scentfc Publsher (An Internatonal Publsher for Academc and Scentfc Resources) www.saspublsher.com

More information

Run-Time Energy Estimation in System-On-a-Chip Designs *

Run-Time Energy Estimation in System-On-a-Chip Designs * Run-Tme Energy Estmaton n System-On-a-Chp Desgns * J. Had, G. Kaefer, Ch. Steger, R. Wess Insttute for Techncal Informatcs Graz Unversty of Technology Graz, Austra Abstract - In ths paper, a co-processor

More information

Real-Time Systems. Real-Time Systems. Verification by testing. Verification by testing

Real-Time Systems. Real-Time Systems. Verification by testing. Verification by testing EDA222/DIT161 Real-Tme Systems, Chalmers/GU, 2014/2015 Lecture #8 Real-Tme Systems Real-Tme Systems Lecture #8 Specfcaton Professor Jan Jonsson Implementaton System models Executon-tme analyss Department

More information

ETAtouch RESTful Webservices

ETAtouch RESTful Webservices ETAtouch RESTful Webservces Verson 1.1 November 8, 2012 Contents 1 Introducton 3 2 The resource /user/ap 6 2.1 HTTP GET................................... 6 2.2 HTTP POST..................................

More information

Parallel Inverse Halftoning by Look-Up Table (LUT) Partitioning

Parallel Inverse Halftoning by Look-Up Table (LUT) Partitioning Parallel Inverse Halftonng by Look-Up Table (LUT) Parttonng Umar F. Sddq and Sadq M. Sat umar@ccse.kfupm.edu.sa, sadq@kfupm.edu.sa KFUPM Box: Department of Computer Engneerng, Kng Fahd Unversty of Petroleum

More information

Reliability and Performance Models for Grid Computing

Reliability and Performance Models for Grid Computing Relablty and Performance Models for Grd Computng Yuan-Shun Da,2, Jack Dongarra,3,4 Department of Electrcal Engneerng and Computer Scence, Unversty of Tennessee, Knoxvlle 2 Department of Industral and Informaton

More information

MODULE DESIGN BASED ON INTERFACE INTEGRATION TO MAXIMIZE PRODUCT VARIETY AND MINIMIZE FAMILY COST

MODULE DESIGN BASED ON INTERFACE INTEGRATION TO MAXIMIZE PRODUCT VARIETY AND MINIMIZE FAMILY COST INTERNATIONAL CONFERENCE ON ENGINEERING DESIGN, ICED 07 28-31 AUGUST 2007, CITE DES SCIENCES ET DE L'INDUSTRIE, PARIS, FRANCE MODULE DESIGN BASED ON INTERFACE INTEGRATION TO MAIMIZE PRODUCT VARIETY AND

More information

Functional and Timing Validation of Partially Bypassed Processor Pipelines

Functional and Timing Validation of Partially Bypassed Processor Pipelines Functonal and Tmng Valdaton of Partally Bypassed Processor Ppelnes Qang Zhu shyu@labs.fujtsu.com Avral Shrvastava Avral.Shrvastava@asu.edu Nl Dutt dutt@cs.uc.edu Fujtsu Laboratores LTD., Japan 1-1, Kamodanaa

More information