Improving Memory Energy Using Access Pattern Classification

Size: px
Start display at page:

Download "Improving Memory Energy Using Access Pattern Classification"

Transcription

1 Iproving Meory Energy Using Access Pattern Cassification Mahut Kandeir Microsystes Design Lab Pennsyvania State University University Par, PA Ugur Sezer ECE Departent University of Wisconsin Madison, WI Victor Deauz Microsystes Design Lab Pennsyvania State University University Par, PA ABSTRACT In this paper, we propose a data-driven strategy to optiize the eory energy consuption in a baned eory syste. Our copier-based strategy odies the origina execution order of oop iterations in array-doinated appications to increase the ength of the tie period(s) in which eory bans are ide (i.e., not accessed by any oop iteration). To achieve this, it rst cassies oop iterations according to their ban access patterns and then, with the hep of a poyhedra too, tries to bring the iterations with siiar ban access patterns cose together. Increasing the ide periods of eory bans brings two aor benets; rst, it aows us to pace ore eory bans into ow-power operating odes, and second, it enabes us to use a ore aggressive (i.e., ore energy saving) operating ode for a given ban. Our strategy has been evauated using seven array-doinated appications on both a cacheess syste and a syste with cache eory. Our resuts indicate that the strategy is very successfu in reducing the eory syste energy, and iproves the eory energy by as uch as 34% on the average. 1. Introduction and Motivation Energy consuption is an iportant consideration in ebedded syste design as reducing it heps axiize battery ife and reduce heat dissipation [9]. The increasing roe of energy consuption deands that the energy constraints shoud be taen into account eary in the syste design process, aong with other etrics such as perforance and for factor. Meory coponents of an ebedded syste are nown to consue a arge percentage of the overa syste energy [2, 6]. This is particuary true for systes designed to run iage and video processing appications in which arge uti-diensiona arrays of signas are anipuated using nested oops. These data-intensive appications ight put a great pressure on the eory subsyste and ae the eory perforance the priary factor shaping the runtie energy behavior of the syste. For a given eory syste, size (capacity) has a arge ipact on the energy consuption. Typicay, arge eory coponents (e.g., bans) consue ore energy per access than sa eory coponents, ainy due to onger bitines and wordines. Consequenty, epoying severa sa eory bans instead of a singe arge eory ban ight reduce the per access energy cost. Moreover, unused eory bans can be turned o to further increase energy savings. Turning o a eory ban in this context eans pacing it into a ow-power This wor is supported by the NSF Career Award operating ode (an energy-saving ode) in which the ban consues uch ess energy than it woud have if it reained in the fuy-active ode. Whie such a strategy can, in genera, iprove the eory energy consuption, it is possibe to obtain even arger savings by re-ordering data eeents and/or oop iteration accesses to tae better advantage of the uti-ban nature of the eory subsyste. This paper presents a copier-based strategy that odi- es the origina execution order of oop iterations in arraydoinated appications to increase the ength of the tie period(s) in which eory bans are ide (i.e., not accessed by any oop iteration). Such an optiization can bring two ain benets. First, as a resut of onger ide period, we can put a ban into a ow-power operating ode (whie, in the origina case, it ay not be possibe to do so). Second, even in the origina case it was possibe to use a ow-power ode, after the transforation we ight be abe to use a ore aggressive (i.e., ore energy-saving) operating ode, and thus obtain arger savings. Maor contributions of this paper can be suarized as foows: We present a data-centric access pattern cassication technique using which an optiizing copier can cassify oop iterations based on their eory ban access patterns. We discuss a transforation technique that odies the origina oop accesses to ipeent the cassication deterined by the copier. The transforation technique operates with both fuy-parae oops and oops with data dependences. Our experienta resuts indicate that our approach isvery successfu in optiizing the eory syste energy, and reduces the eory energy by asuch as 34% on the average. We proceed with a brief review of uti-ban eory syste and ow-power operating odes. Next, in Section 3, we present a oop iteration cassication strategy based on ban access patterns. We discuss an access pattern optiization strategy in Section 4. Preiinary experienta resuts are given in Section 5. Finay, we suarize the ain points of this wor in Section Energy Consuption in Meory Bans We can thin of a eory syste as a group of bans each of which can be controed individuay and be put in a owpower operating ode (energy-saving ode) when it is not in active use. Typicay, a nuber of ow-power operating odes

2 exist, and seection of a specic ode (for a given duration of ideness) invoves a tradeo between perforance and energy consuption. More specicay, each operating ode can be characterized using two paraeters: per cyce energy consuption and re-activation (re-synchronization) cost, the atter of which is the tie (in cyces) it taes to bring the ban bac to the active (fuy-operationa ode). Typicay, the ore aggressive the operating ode (in saving energy), the higher the re-activation cost. Therefore, the ow-power ode to be used shoud be chosen with care. An iportant paraeter in choosing the ost suitabe ode is the estiated duration of ideness. If the ideness duration is too short, it ay not be a good idea to pace a ban into an aggressive energy-saving ode. It is iportant to note that any array-doinated codes fro iage and video processing appications aow accurate estiation of ban ideness, thans to frequent occurrence of nested oop structures and copie-tie deterinabe appings of array eeents to eory bans. In Active (nora operation) ode, the eory ban is ready to iediatey service a eory request without any deay. In the ow-power odes (Standby, Nap, and PowerDown), energy consuption can be reduced by shutting-o increasingy arger parts of the ban. The aor parts of a eory ban are the coc generation circuitry, row address/contro decode circuitry, coun address/contro decode circuitry, contro registers and power ode contro circuitry, together with the eory (DRAM) core consisting of the precharge ogic, eory ces, and sense apiers. The operating odes used in this study are very siiar to those proposed in the Direct Rabus architecture for obie PCs [1]. Whie in a ow-power operating ode, a eory request (read or write) causes the ban to transition to the Active ode to service the request. Note that at a given tie dierent eory bans can be in dierent ow-power operating odes. One of the obectives of the ow-power operating ode anageent is seecting the ost suitabe operating ode for a given duration of ideness. The copier needs to detect ide periods for each ban and transition each ide ban into aow- power ode. A naive way ofdoing this is to seect an operating ode arbitrariy and eep the ban in this ode unti it needs to be accessed. Obviousy, such astrategy pays the re-activation (re-synchronization) cost which wewant toavoid. Instead, we use a ban pre-activation strategy that eiinates the potentia perforance penaty associated with epoying ow-power operating odes. Given that we have a enu of ow-power odes to transition into, the copier can evauate a possibe choices (ow-power odes) based on the operating ode energy, corresponding re-activation costs, and the ength of the ide period to seect the best choice. A discussion of copier-directed operating ode seection can be found in [3]. Note that axiizing the duration in which a eory ban is ide is benecia (fro an energy ange) as the ban in question can be paced into a ore energy-saving (ost aggressive) operating ode. This can be achieved using sart array ayout strategies that pace array eeents with siiar ife-patterns into the sae bans, or by re-ordering the coputation to isoate the data accessed (within a tie frae) into a sa nuber of bans. This paper taes the atter approach and presents an autoatic (copier-based) technique that rst cassies the iterations of a given oop according to their ban access characteristics, and then expoits this cassication to restructure the execution order of oop iterations. 3. Data-Centric Access Pattern Cassification In this section, we present our coputation ode and discuss the reationship between oop iterations and eory ban accesses. We assue that the copier is in fu contro of physica address anageent and there exists no virtua eory support. Consequenty, it is possibe to cacuate at copietie the physica eory ocation accessed for a given array reference and oop iteration. Each execution of oop body is represented using an iteration vector I =[i1;i 2; :::; i n] T, where n is the nuber of oops. The oop bounds can be described using a syste of ane inequaities of the for H I h, where H is a n atrix and h a -diensiona vector. Both H and h have constant entries and together they dene a poyhedron (iteration space) which contains a oop iterations [11]. The storage for of an array can aso be viewed as a (rectiinear) poyhedron. Each array eeent can be identied by its index J =[1; 2; :::; ] T ; where is the diensionaity of the array. Then, the poyhedron (index space) which denes the possibe indices for a given array can be written as S J s, where S and s area2 atrix and a 2-diensiona vector, respectivey. The subscript expressions of a given reference to an - diensiona array dene an ane access function (F ) fro iteration space to index space; that is, F ( I)=L I +. In this foruation, L is an n atrix (caed access or reference atrix [11]) and is a -diensiona constant vector (caed oset vector). Assuing a row-aor storage for for uti-diensiona arrays, the address of the array eeent U[ 1; 2; :::; ] can be coputed as addr(u[ 1; 2; :::; ]) = B u + 1(S 2S 3:::S )+ 2(S 3:::S )+::: +,1S + under the assuptions that the ower bound for a index positions (subscript positions) is 1 and that S p is the extent (the nuber of eeents) in the p th diension and that B u is the base address for array U. Without oss of generaity, et us assue the existence of K eory bans of equa sizes (size). Under this assuption, a ban apping function (BMF) G aps a given address into a eory ban and can be written as G(addr(U[ 1; 2; :::; ])) = addr(u[ 1; 2; :::; ])=size (where the sybo = denotes integer division). Consequenty, given an array eeent U[F ( I)] (accessed by iteration vector I), G(addr(U[F ( I)])) gives the ban that it is apped to. An iteration vector I is said to access ban i (1 i K) if at east one of the array eeents it touches is apped into ban i. In atheatica ters, we say ban(i; I)istrue if and ony if there exists at east one array U and an access function F ( I) in the nest such that G(addr(U[F ( I)])) = i; otherwise, we say that ban(i; I)isfase. Note that we can cassify the iterations of a given nested oop according to the (subset of the) bans they access (i.e., their ban access patterns). As an exape, et us focus on a scenario where a nested oop (possiby iperfecty nested) accesses arrays stored in a eory syste that consists of two bans. We can divide the iterations in this nest into three groups: fig 1 2 = f I ban(1; I)=true and ban(2; I)=faseg; fig12 = f I ban(1; I)=fase and ban(2; I)=trueg;

3 and, fig 12 = f I ban(1; I)=true and ban(2; I)=trueg: Inforay, the rst group (fig 1 2) corresponds to the iterations that access ony the rst ban whist the second group (fig12) corresponds to iterations that access ony the second ban. The third group (fig 12), on the other hand, consists of the iterations that access both the bans. Note that the origina iteration space, fig a,isfig 1 2 [fig12 [fig 12 (assuing that each oop iteration accesses at east one ban). A subscript notation such as 12 indicates that the iterations in the cass subscripted using this access ony the rst ban. Other subscript notations can be interpreted in a siiar fashion. In genera, assuing K eory bans, a given iteration space fig a can be divided into 2 K, 1 disoint groups (caed casses in the rest of this paper): fig 1 23::: K, fig123::: K,..., fig123:::k, fig 12 3::: K, fig 1 23::: K,..., fig 123::: K,..., fig 123:::K. This grouping is caed access pattern cassication (for a given, possiby iperfecty-nested, oop nest) and fors the basis of our optiization ethod presented in the next section. 4. Access Pattern Optiization In this section, we show how to optiize the eory accesses based on the cassication given above. The ain idea is to reorder the oop iterations such that a the iterations that beong to the sae cass are executed one after another (successivey). 4.1 Optiizing Dependence-Free Accesses Let us rst assue that the nested oop we want to optiize is fuy-parae (i.e., does not have any oop-carried data dependence). In this case, the iterations can be executed in any order. Consider, for exape, the foowing abstract nested oop assuing two bans: for each I 2fIga U 1, U 2,..., and U r in this oop are dierent arrays, and F u is the access function (access atrix pus oset vector) for U (it is straightforward to extend the idea to the case where there exist utipe references to the sae array). Let fig 1 2, fig12, and fig 12 be the casses dened as above. Then, we can transfor this oop nest into: for each I 2fIg1 2 for each I 2fIg 12 for each I 2fIg12 Each nested oop in this code executes the iterations fro a singe cass and such a division of the iteration space (into casses) is caed cassication. Note that it is not necessary that these three nested oops shoud be executed in this order. In fact, as copared to the origina code above, any execution order of these new nests (as ong as the iterations in a cass are executed successivey) wi usuay bring an iproveent. To see this ipact in a concrete exape, consider the foowing C- ie code that consists of a two-diensiona iperfecty-nested oop nest: for(t =1;t T ; t ++) f for(i =1;i 10; i ++) 1+ = W [30, i], 1; for( =1; 10; ++) 2+ = (U[]+V [])=2; for( =1; 10; ++) 3+ = V [ + 10] + 1; for( =1; 10; ++) 4+ = W []+V [16]; for( =1; 10; ++) 5+ = V [15, ]+1;... g assuing the foowing array apping (to a eory syste of two bans each hoding, for iustrative purposes, 45 array eeents): Ban 1:fU[a]1 a 30g + fv [a]1 a 15g; Ban 2:fV [a]16 a 30g + fw [a]1 a 30g: We aso assue here that the scaar variabes 1 through 5 are stored in registers. Figure 1(a) shows the ban access pattern for this code. We ceary identify ve dierent regions corresponding to ve inner oops and see that four opportunities exist for putting a eory ban into ow-power ode: one in the rst region (for ban 1), one in the second region (for ban 2), one in the fourth region (for ban 1), and one in the ast region (for ban 2). Let us now consider the foowing equivaent code where iterations of the nested oop are cassied according to their ban access patterns: for(t =1;t T ; t ++) f fig12 : for(i =1;i 10; i ++) 1+ = W [30, i], 1; for( =1; 10; ++) 4+ = W []+V [16] fig 12 : for( =1; 10; ++) 3+ = V [ + 10] + 1; fig 1 2 : for( =1; 10; ++) 2+ = (U[]+V [])=2; for( =1; 10; ++) 5+ = V [15, ]+1;... g The new ban access pattern is iustrated in Figure 1(b). We can abe this access pattern as [fig12; fig 12; fig 1 2]. Figures 1(c-d), on the other hand, depict two aternate (optiized) ban access patterns corresponding to [fig12; fig 1 2; fig 12] and [fig 1 2; fig12;fig 12], respectivey. It shoud be noted that iteration re-ordering custers the ide regions in both the bans. Note aso that these three optiized access patterns (shown in Figures 1(b), (c), and (d)) are ony representative and that there are other access patterns (for this exape) which custer the ide regions. Note that whie our approach to custering array accesses is siiar to the data-centric tiing technique proposed by Koduua et a. [8], there are three iportant dierences. First, our approach deas with physica addresses rather than virtua

4 i (a) Ban 1 Ban 2 Ban 1 Ban 2 i (c) C1 C2 C3 C4 C5 C6 C7 (a) C1 C3 C2 C4 C5 C6 C7 (b) i Ban 1 Ban 2 (b) i (d) Ban 1 Ban 2 Figure 1: Dierent access patterns to a eory syste of two bans. A `' indicates that the corresponding region is in use. addresses which aes expected runtie benets ore reaizabe. Second, instead of custering the accesses to array bocs, we custer accesses to eory bans. Third, our strategy custers oop iterations for ow power and is not concerned whether the iterations executed together (within a boc) wi have cache ocaity. 4.2 Optiizing Accesses with Dependences So far, we have assued that once the casses are deterined, they can be executed in any order. This assuption hods true as ong as there are no data dependences between iterations beonging to dierent casses. In this section, we address the probe when the oop nest to be optiized exhibits oop-carried dependences. A cass fig is said to be dependent on another cass fi 0 g if there exists two iterations, I 2fIg and I 0 2fI 0 g, such that there is a dependence fro I0 to I. We express this reationship saying dep(fi 0 g!fig) istrue (or, fig is cass-dependent on fi 0 g). Otherwise, we say that dep(fi 0 g! fig) is fase. Then, given a cassication, we can dene the cass-eve dependence graph, CLDG(V; E), as a directed-graph where each node v 2 V denotes a cass and each edge e 2 E indicates a data dependence fro one cass to another. That is, there is a directed edge fro fi 0 g to fig i dep(fi 0 g!fig) hods true. Note that cass dependences prevent the copier fro executing the casses in any order; instead, these dependences shoud be satised when seecting an execution order for casses. Let us assue that fig 1, fig 2, fig 3,..., fig 2 K,2, fig 2 K,1 is the cassication that we woud ie to optiize. As a rst step, we re-nuber each cass using a K-bit binary nuber as foows. Each ban is assigned a bit position (in the binary nuber) starting fro the rst ban. If a given cass accesses ban i, then the i th bit of the nuber associated with the cass is set to 1; otherwise, it is set to 0. For exape, in a four ban eory syste, if a cass accesses ony the rst and the fourth bans, it wi have `1001' as its nuber. We express this fact by writing this cass as fig The binary nuber associated with a cass (e.g., 1001 in this exape) is tered as the cass nuber. The probe of optiizing ban accesses can be dened as one of deterining a suitabe traversa order of the nodes in the CLDG. When a node is visited, a nested oop which enuerates ony the iterations in that cass is constructed and inserted in the code. A traversa order is vaid (or ega) ifit respects a the data dependences. Note that the intra-cass Figure 2: Two dierent cass-eve dependence graphs (CLDG). dependences are satised if we execute the iterations in a given cass in their origina order with respect to each other. Intercass dependences (cass-eve dependences), on the other hand, are satised by visiting a node in the CLDG ony after a the nodes that it is dependent on have been visited. Note that a given CLDG can have severa vaid traversas, and seecting the ost suitabe one is the priary factor that deterines the eory syste energy consuption (through ow-power ode seection). The foowing observation guides us in seecting a suitabe order: If fig a and fig b are the two casses that are successivey visited, the variation in ban access (activation) and ban ideness (deactivation) patterns in going fro fig a to fig b is a function of the Haing distance between a and b. For instance, if we traverse fig 1001 and fig 1010 one after another, the rst two bans preserve their states (between these traversas), whereas the reaining two bans change their states (ore specicay, the third ban is activated {corresponding to a 0 to 1 transition in the associated bit{ in going fro the rst cass to the second, and the fourth ban is deactivated {corresponding to a 1 to 0 transition). We cai that iniizing the Haing distance between the nubers of casses that are visited successivey is usefu in reducing the energy consuption. In other words, for a given eory ban, in going fro one cass to another, it is better to eep its state the sae (active or ide) as uch as possibe. This is because if the rst state is 0 and the second is aso 0, the ban wi have a ong ide period (which is good fro an energy viewpoint); and siiary, if the both states in question are 1, this eans that the active periods are custered together, so hopefuy, we wi aso have custered ide periods for the ban in question (ater when we visit the reaining casses). Note that then the probe of optiizing eory energy consuption becoes one of scheduing a group of nodes taing into account soe constraints (inter-cass dependences) to iniize (optiize) soe obective function (iniizing the Haing distance between the nubers of successivey visited casses). This probe is a constrained scheduing probe and is nown to be NP-hard [4]. Consequenty, we propose a greedy heuristic siiar to the ist scheduing agorith used in ow-eve (bacend) copiation to schedue the instructions in a basic boc. Inforay, in each step, our agorith seects a cass to schedue (visit) such that the Haing distance between the (cass) nuber of this cass and that of the ost recenty schedued one is iniu (aong a aternatives). After scheduing a cass, it deterines a casses that can be schedued in the next step, and evauates their Haing distance with respect to the schedued cass. We can evauate a given traversa order using two dierent etrics, both of which are directy reated to the ban energy consuptions. The rst etric is the su of the nuber of bit

5 C1 C2 C3 C4 C5 C6 C8 C9 C10 C7 C11 C1,C5 C2 C3 C4,C9 C6 C7 C8,C13 C10 C11 Operating Mode Energy Consuption (nj) Resynchronization Cost (cyces) Active Standby Nap PowerDown ,000 C12 C13 C14 C15 C12,C14,C15 (a) Figure 3: (a) A cycic CLDG. (b) Transfored version of (a). transitions between successive cass nubers (i.e, the cuuative Haing distance). Let a i, a represent the Haing distance between the cass nubers a i and a. Assuing a traversa order of fig a1, fig a2, fig a3,..., fig a2, the cuuative Haing distance is dened K,1 as 2 K,2 =1 a, a +1: Note that the scheduing technique discussed above tries to reduce this cuuative su. The second etric is the axiu nuber of consecutive 0s in the bit positions of each ban. Note that, in a K-ban eory syste, there ight be, at the ost, 2 (K,1) consecutive 0s. For an exape, et us consider the CLDG in Figure 2(a) for a three-ban syste, assuing that the cass nubers for C1, C2, C3, C4, C5, C6, and C7 are 100, 010, 011, 101, 111, 001, and 110, respectivey. An unoptiized schee can traverse the casses in the order C1, C2, C3, C4, C5, C6, and C7, eading to a cuuative Haing distance of eeven. We aso see that the axiu nuber of consecutive 0s (as a resut of this cass traversa pattern) in this case is 2, 1, and 2, for ban 1, ban 2, and ban 3, respectivey. However, if we use our approach, we obtain the traversa order of C1, C4, C5, C3, C6, C2, and C7. This new order resuts in a cuuative Haing distance of 7. Aso, it achieves the axiu possibe consecutive 0s for the rst ban (for the other bans, it achieves two consecutive 0s), a denite iproveent over the unoptiized traversa. As another exape, consider the CLDG given in Figure 2(b). Assuing the sae cass nubers used in Figure 2(a) and the sae eory ban architecture, our approach seects the order of C3, C5, C4, C6, C1, C7, and C2, achieving a cuuative Haing distance of seven (which is ony one ore fro the optia which is six) and obtaining the axiu nuber of consecutive 0s for two out of three bans. In soe cases, the CLDG ay contain cyces which prevent a ega traversa. We ca these types of graphs cycic CLDGs. In order to schedue the, we need to appy soe node transforations and eiinate the cyces. An exape cycic CLDG is iustrated in Figure 3(a) for a four-ban eory syste. We use two types of transforations to hande these graphs, naey, node erging and node spitting, detais of which are oitted due to ac of space. Figure 3(b) shows the transfored version of Figure 3(a) using node erging. 5. Experienta Resuts We used the Oega ibrary [7] to transfor the progras' access patterns into ban-ecient ones. The Oega ibrary is a poyhedra too that aows enueration of bounded poyhedrons and heps us to deterine the iteration casses and create the oops that enuerate the. (b) Figure 4: Energy consuptions and resynchronizations costs for our operating odes. During transitions fro a ow-power ode to the active ode, a fu active ode energy is assued to be spent. Benchar Input Size (MB) Base1 (J) Base2 (J) phods ,492 36,007 seq ,525 39,237 ft ,078 43,521 tocatv ,221 30,012 swi ,660 33,964 efux ,719 71,900 u ,868 60,384 Figure 5: Benchar codes used in the experients and their iportant characteristics. Figure 4 shows the energy consuptions (per access) and resynchronization costs for the operating odes used in our experients. We used seven array-doinated codes to easure the benets of our approach. The iportant characteristics of these codes are given in Figure 5. phods and seq are two dierent otion estiation codes; ft is a digita tering routine; tocatv and swi are two array-based benchars fro the Spec suite; efux is an array-based benchar fro the Perfect Cub suite; and u is an LU decoposition code. Base1 and Base2 refers to base (origina) eory syste energy consuptions (data accesses ony) for a cacheess syste and a syste with a 16KB, 2-way set-associative cache with a ine size of 32 bytes, respectivey. Note that the energy gures in the Base2 coun incude the energy expended in cache as we as ain eory. In both the cases, the defaut eory con- guration consists of eight 8MB eory bans (denoted 8 8MB). The reaining gures given in this section are percentage iproveents (reductions) over these base gures. In a experients, we epoyed a powerfu bac-end copier which perfors severa iportant optiizations such as goba register aocation and instruction scheduing. The use of node erging was necessary in ony one case (efux) to eiinate a cyce in the CLDG; we did not use node erging to reduce the oop overhead. The increase in execution ties due to our optiizations was aways ess than 1%. Aso, there was no opportunity to use node spitting. The second coun in Figure 6 (Iprv1) gives the percentage reductions over Base1 (in a cacheess syste) when our approach is used. We see that our strategy based on the iteration cass concept brings a 26.3% iproveent on the average. The third coun in the sae gure reports the energy iproveents (again, over Base1) when cassica cache ocaity optiizations are used. 1 The ocaity optiizations used incude inear oop transforations and iteration space tiing 1 Note that in this case, these ocaity optiizations shoud noray not be appied as the syste does not contain cache. Our purpose here is to see whether ocaity-oriented optiizations are as successfu as our strategy in optiizing o-chip eory energy.

6 Benchar Iprv1 Iprv2 Iprv3 Iprv4 Iprv5 phods seq ft tocatv swi efux u Figure 6: Percentage energy iproveents. Figure 7: Ipact of eory ban conguration. (bocing) [11]. We experiented with dierent tie sizes and (for each benchar) seected the one which gave the best resut. In coparing the second and third couns of Figure 6, we observe that our approach, in genera, perfors uch better than a pure ocaity-oriented approach. The fourth coun of the gure (Iprv3) gives the percentage iproveents due to our approach over Base2 (with cache). We see that the average energy iproveent is about 23.4%. Using cache ocaity optiizations instead brings an iproveent of 9.4% (see the fth coun). The ast coun (Iprv5), on the other hand, shows the percentage energy iproveents if our current strategy is sighty odied to tae cache considerations into account (and if doing so does not conict with our iteration cass based optiizations). Note that this ast strategy has not been fuy ipeented yet and obtained here through hand optiizations. The resuts show that by incorporating ocaity based techniques into our fraewor, we can achieve (on average) a 27.4% iproveent (over Base2). This ast resut otivates us to integrate our strategy with ocaity optiizations in the future. So far, we have used ony a singe eory conguration: 8 8MB. Figure 7 gives noraized energy consuptions (with respect to Base1) for two representative codes, u and tocatv, when dierent eory congurations are used (in a cacheess syste). We observe fro this gure that increasing the nuber of bans (by eeping the tota eory size constant) generay increases energy savings (as it gives ore contro to the copier in pacing arger sections of the address space into ow-power odes). In any codes, however, beyond a certain point (depending on the access pattern), a ner-granuar eory syste does not bring ore benets. This happens for exape with the u code beyond sixteen bans (see Figure 7). is to increase the duration of ide periods of eory bans, thereby saving energy using ow-power operating odes ore aggressivey. Our experienta evauation indicates that arge energy savings are possibe using this technique. 7. REFERENCES [1] 128/144-MBit Direct RDRAM Data Sheet, Rabus Inc., May [2] F. Catthoor, S. Wuytac, E. D. Greef, F. Baasa, L. Nachtergaee, and A. Vandecappee. Custo Meory Manageent Methodoogy { Exporation of Meory Organization for Ebedded Mutiedia Syste Design. Kuwer Acadeic Pubishers, [3] V. Deauz, M. Kandeir, N. Viayrishnan, A. Sivasubraania, and M. J. Irwin. DRAM energy anageent using software and hardware directed power ode contro. In Proc. the 7th Internationa Conference on High Perforance Coputer Architecture, Monterrey, Mexico, January [4] G. De Michei. Synthesis and Optiization of Digita Circuits. McGraw-Hi, Inc., [5] C. Eis. The case for higher eve power anageent. In Proceedings of HotOS, March [6] M. Kandeir, N. Viayrishnan, M. J. Irwin, and W. Ye. Inuence of copier optiizations on syste power. In Proc. the 37th Design Autoation Conference, Los Angees, Caifornia USA, June 5-9, [7] W. Key, V. Masov, W. Pugh, E. Rosser, T. Shpeisan, and David Wonnacott. The Oega Library interface guide. Technica Report CS-TR-3445, CS Dept., University of Maryand, Coege Par, MD, March [8] I. Koduua, N. Ahed, and K. Pingai. Data-centric uti-eve bocing. In Proc. SIGPLAN Conf. Prograing Language Design and Ipeentation, June [9] J. R. Lorch and A. J. Sith. Software strategies for portabe coputer energy anageent. IEEE Persona Counications, pp. 60{73, June [10] V. Tiwari, S. Mai, A. Wofe, and T. C. Lee. Instruction eve power anaysis and optiization of software, Journa of VLSI Signa Processing Systes, Vo. 13, No. 2, August [11] M. Wofe. High Perforance Copiers for Parae Coputing, Addison-Wesey Pubishing Copany, Concusions In this paper, we have presented a copier-oriented eory energy optiization technique based on a concept caed (oop) iteration cassication. The obective of this technique

Running Tite: Conict-Free Access of Paths Address for Correspondence: M.C. Pinotti IEI-CNR Via S. Maria, Pisa ITALY E-ai:

Running Tite: Conict-Free Access of Paths Address for Correspondence: M.C. Pinotti IEI-CNR Via S. Maria, Pisa ITALY E-ai: Mappings for Conict-Free Access of Paths in Bidiensiona Arrays, Circuar Lists, and Copete Trees Aan A. Bertossi y and M. Cristina Pinotti Istituto di Eaborazione de' Inforazione Nationa Counci of Research

More information

Concise Papers. Main Memory Indexing: The Case for BD-Tree 1 INTRODUCTION 3 COST ANALYSIS 2 THE MEMORY-BASED BD-TREE

Concise Papers. Main Memory Indexing: The Case for BD-Tree 1 INTRODUCTION 3 COST ANALYSIS 2 THE MEMORY-BASED BD-TREE 870 IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, VOL. 16, NO. 7, JULY 2004 Concise Papers Main Meory Indexing: The Case for BD-Tree BinCui,BengChinOoi,Meber, IEEE, Jianwen Su, Senior Meber, IEEE,

More information

A Fast Recovery Technique for Multi-Point to Multi-Point MPLS tunnels

A Fast Recovery Technique for Multi-Point to Multi-Point MPLS tunnels M. Chaitou and J. L. Roux / IJECCT 01, Vo. (3) 34 A Fast Recovery Technique for Muti-Point to Muti-Point MPLS tunnes Mohaad Chaitou and Jean-Louis Le RouxOrange Labs avenue Pierre Marzin, 300 Lannion France

More information

Performance Modeling of Database Servers in a Telecommunication Service Management System

Performance Modeling of Database Servers in a Telecommunication Service Management System ICDT : The Seventh Internationa Conference on Digita Teecounications Perforance Modeing of Database Servers in a Teecounication Service Manageent Syste Maria Kih, Paya Aani, Anders Robertsson, Gabriea

More information

A NEW METHOD FOR OPTIMAL LOCATION OF FACTS CONTROLLERS USING GENETIC ALGORITHM

A NEW METHOD FOR OPTIMAL LOCATION OF FACTS CONTROLLERS USING GENETIC ALGORITHM Journa of heoretica and Appied Inforation echnoogy 200-2007 JAI. A rights reserved. www.atit.org A NEW MEHOD FOR OPIMAL LOCAION OF FACS CONROLLERS USING GENEIC ALGORIHM 1 K. Vayakuar, 2 Dr. R. P. Kuudinidevi

More information

A Memory Grouping Method for Sharing Memory BIST Logic

A Memory Grouping Method for Sharing Memory BIST Logic A Memory Grouping Method for Sharing Memory BIST Logic Masahide Miyazai, Tomoazu Yoneda, and Hideo Fuiwara Graduate Schoo of Information Science, Nara Institute of Science and Technoogy (NAIST), 8916-5

More information

Further Optimization of the Decoding Method for Shortened Binary Cyclic Fire Code

Further Optimization of the Decoding Method for Shortened Binary Cyclic Fire Code Further Optimization of the Decoding Method for Shortened Binary Cycic Fire Code Ch. Nanda Kishore Heosoft (India) Private Limited 8-2-703, Road No-12 Banjara His, Hyderabad, INDIA Phone: +91-040-3378222

More information

Game Theory-Based Nonlinear Bandwidth Pricing for Congestion Control in Cloud Networks

Game Theory-Based Nonlinear Bandwidth Pricing for Congestion Control in Cloud Networks 216 IEEE 8th Internationa Conference on Coud Coputing Technoogy and Science Gae Theory-ased Noninear andwidth Pricing for Congestion Contro in Coud Networs Abouzar Ghavai, Zhuozhao Li and Haiying Shen

More information

METAMORPHOSIS OF PERIODIC SURFACE MODELS

METAMORPHOSIS OF PERIODIC SURFACE MODELS Proceedings of ASE 2009 Internationa Design Engineering echnica Conferences & Coputers and Inforation in Engineering Conference IDEC/CIE 2009 August 0 Septeber 2, 2009, San Diego, Caifornia, USA DEC2009/DAC-870

More information

Language Identification for Texts Written in Transliteration

Language Identification for Texts Written in Transliteration Language Identification for Texts Written in Transiteration Andrey Chepovskiy, Sergey Gusev, Margarita Kurbatova Higher Schoo of Economics, Data Anaysis and Artificia Inteigence Department, Pokrovskiy

More information

DETERMINING INTUITIONISTIC FUZZY DEGREE OF OVERLAPPING OF COMPUTATION AND COMMUNICATION IN PARALLEL APPLICATIONS USING GENERALIZED NETS

DETERMINING INTUITIONISTIC FUZZY DEGREE OF OVERLAPPING OF COMPUTATION AND COMMUNICATION IN PARALLEL APPLICATIONS USING GENERALIZED NETS DETERMINING INTUITIONISTIC FUZZY DEGREE OF OVERLAPPING OF COMPUTATION AND COMMUNICATION IN PARALLEL APPLICATIONS USING GENERALIZED NETS Pave Tchesmedjiev, Peter Vassiev Centre for Biomedica Engineering,

More information

Database Replication Algorithm Performance in High Speed Networks Under Load Balancing

Database Replication Algorithm Performance in High Speed Networks Under Load Balancing Database Repication Agorith Perforance in High Speed Networks Under Load Baancing Rekh Nath Singh 1, Raghura Singh 2 1 Research Schoar, A. P. J. Abdu Kaa Technica University, Lucknow, India. 2 Director,

More information

Lines and Angles. introduction

Lines and Angles. introduction 9 Lines and nges intrductin In cass VI, you have earnt soe basic concepts and ters of geoetry point, ine, pane, ine segent, ray, ange and types of anges. In this chapter, we sha earn about soe pairs of

More information

Real-Time Image Generation with Simultaneous Video Memory Read/Write Access and Fast Physical Addressing

Real-Time Image Generation with Simultaneous Video Memory Read/Write Access and Fast Physical Addressing Rea-Time Image Generation with Simutaneous Video Memory Read/rite Access and Fast Physica Addressing Mountassar Maamoun 1, Bouaem Laichi 2, Abdehaim Benbekacem 3, Daoud Berkani 4 1 Department of Eectronic,

More information

Hiding secrete data in compressed images using histogram analysis

Hiding secrete data in compressed images using histogram analysis University of Woongong Research Onine University of Woongong in Dubai - Papers University of Woongong in Dubai 2 iding secrete data in compressed images using histogram anaysis Farhad Keissarian University

More information

TRANSFORMATIONS AND SYMMETRY

TRANSFORMATIONS AND SYMMETRY TRNSFORMTIONS ND SYMMETRY 1.2.1 1.2.5 Studing transforations of geoetric shapes buids a foundation for a ke idea in geoetr: congruence. In this introduction to transforations, the students epore three

More information

Extending Graph Rewriting for Refactoring

Extending Graph Rewriting for Refactoring Extending Graph Rewriting for Refactoring Nies Van Eetvede, Dirk Janssens University of Antwerp Departent of oputer science Middeheiaan 1 2020 Antwerpen {nies.vaneetvede dirk.janssens@ua.ac.be Abstract.

More information

Origami Axioms. O2 Given two marked points P and Q, we can fold a marked line that places P on top of Q.

Origami Axioms. O2 Given two marked points P and Q, we can fold a marked line that places P on top of Q. Origai Axios Given a piece of paper, it is possibe to fod ots of different ines on it. However, ony soe of those ines are constructibe ines, eaning that we can give precise rues for foding the without

More information

MosaicShape: Stochastic Region Grouping with Shape Prior

MosaicShape: Stochastic Region Grouping with Shape Prior Boston University Coputer Science Technica Report No. 2005-008, Feb. 2005. To appear in Proc. CVPR, 2005. MosaicShape: Stochastic Region Grouping with Shape Prior Jingbin Wang Erdan Gu Margrit Bete Coputer

More information

TRANSFORMATIONS AND SYMMETRY

TRANSFORMATIONS AND SYMMETRY 2 Transforations Defense Practice TRNSFORMTIONS ND SYMMETRY 1.2.1 1.2.5 Studing transforations of geoetric shapes buids a foundation for a ke idea in geoetr: congruence. In this introduction to transforations,

More information

A Comparison of a Second-Order versus a Fourth- Order Laplacian Operator in the Multigrid Algorithm

A Comparison of a Second-Order versus a Fourth- Order Laplacian Operator in the Multigrid Algorithm A Comparison of a Second-Order versus a Fourth- Order Lapacian Operator in the Mutigrid Agorithm Kaushik Datta (kdatta@cs.berkeey.edu Math Project May 9, 003 Abstract In this paper, the mutigrid agorithm

More information

Energy-Efficient Disk Replacement and File Placement Techniques for Mobile Systems with Hard Disks

Energy-Efficient Disk Replacement and File Placement Techniques for Mobile Systems with Hard Disks Energy-Efficient Disk Replaceent and File Placeent Techniques for Mobile Systes with Hard Disks Young-Jin Ki School of Coputer Science & Engineering Seoul National University Seoul 151-742, KOREA youngjk@davinci.snu.ac.kr

More information

Nearest Neighbor Learning

Nearest Neighbor Learning Nearest Neighbor Learning Cassify based on oca simiarity Ranges from simpe nearest neighbor to case-based and anaogica reasoning Use oca information near the current query instance to decide the cassification

More information

RECONFIGURABLE AND MODULAR BASED SYNTHESIS OF CYCLIC DSP DATA FLOW GRAPHS

RECONFIGURABLE AND MODULAR BASED SYNTHESIS OF CYCLIC DSP DATA FLOW GRAPHS RECONFIGURABLE AND MODULAR BASED SYNTHESIS OF CYCLIC DSP DATA FLOW GRAPHS AWNI ITRADAT Assistant Professor, Departent of Coputer Engineering, Faculty of Engineering, Hasheite University, P.O. Box 15459,

More information

Area Efficient Implementation of Elliptic Curve Point Multiplication Algorithm

Area Efficient Implementation of Elliptic Curve Point Multiplication Algorithm (IJACSA) Internationa Journa of Advanced Coputer Science and Appications, Vo. 6, No., 5 Area Efficient Ipeentation of Eiptic Curve Point Mutipication Agorith Suni Devidas Bobade Research Schoar S.G.B.Aravati

More information

Mobile App Recommendation: Maximize the Total App Downloads

Mobile App Recommendation: Maximize the Total App Downloads Mobie App Recommendation: Maximize the Tota App Downoads Zhuohua Chen Schoo of Economics and Management Tsinghua University chenzhh3.12@sem.tsinghua.edu.cn Yinghui (Catherine) Yang Graduate Schoo of Management

More information

A Secure Approach for Caching Contents in Wireless Ad Hoc Networks

A Secure Approach for Caching Contents in Wireless Ad Hoc Networks A Secure Approach for Caching Contents in Wireess Ad Hoc Networks Mohsen Karizadeh Kiskani and Haid R. Sadjadpour Abstract Caching ais to store data ocay in soe nodes within the network to be abe to retrieve

More information

A comparative study of colortexture

A comparative study of colortexture 12th Int. Worshop on Systes, Signas & Iage Processing, 22-24 Septeber 2005, haida, Greece 205 A coparative study of coortexture iage features Diitris Iaovidis* Departent of Inforatics and Teecounications,

More information

Alpha labelings of straight simple polyominal caterpillars

Alpha labelings of straight simple polyominal caterpillars Apha abeings of straight simpe poyomina caterpiars Daibor Froncek, O Nei Kingston, Kye Vezina Department of Mathematics and Statistics University of Minnesota Duuth University Drive Duuth, MN 82-3, U.S.A.

More information

Extended Node-Arc Formulation for the K-Edge-Disjoint Hop-Constrained Network Design Problem

Extended Node-Arc Formulation for the K-Edge-Disjoint Hop-Constrained Network Design Problem Extended Node-Arc Formuation for the K-Edge-Disjoint Hop-Constrained Network Design Probem Quentin Botton Université cathoique de Louvain, Louvain Schoo of Management, (Begique) botton@poms.uc.ac.be Bernard

More information

Load Balancing by MPLS in Differentiated Services Networks

Load Balancing by MPLS in Differentiated Services Networks Load Baancing by MPLS in Differentiated Services Networks Riikka Susitaiva, Jorma Virtamo, and Samui Aato Networking Laboratory, Hesinki University of Technoogy P.O.Box 3000, FIN-02015 HUT, Finand {riikka.susitaiva,

More information

Straight-line code (or IPO: Input-Process-Output) If/else & switch. Relational Expressions. Decisions. Sections 4.1-6, , 4.

Straight-line code (or IPO: Input-Process-Output) If/else & switch. Relational Expressions. Decisions. Sections 4.1-6, , 4. If/ese & switch Unit 3 Sections 4.1-6, 4.8-12, 4.14-15 CS 1428 Spring 2018 Ji Seaman Straight-ine code (or IPO: Input-Process-Output) So far a of our programs have foowed this basic format: Input some

More information

EE 364B Convex Optimization An ADMM Solution to the Sparse Coding Problem. Sonia Bhaskar, Will Zou Final Project Spring 2011

EE 364B Convex Optimization An ADMM Solution to the Sparse Coding Problem. Sonia Bhaskar, Will Zou Final Project Spring 2011 EE 364B Convex Optiization An ADMM Solution to the Sparse Coding Proble Sonia Bhaskar, Will Zou Final Project Spring 20 I. INTRODUCTION For our project, we apply the ethod of the alternating direction

More information

Automatic Conversion Software for the Safety Verification of Goal-Based Control Programs

Automatic Conversion Software for the Safety Verification of Goal-Based Control Programs Subitted, 2009 Internationa Conference on Software Engineering (ICSE) http://www.cds.catech.edu/~urray/papers/2008t_h09-icse.ht Autoatic Conversion Software for the Safety Verification of Goa-Based Contro

More information

ACTIVE LEARNING ON WEIGHTED GRAPHS USING ADAPTIVE AND NON-ADAPTIVE APPROACHES. Eyal En Gad, Akshay Gadde, A. Salman Avestimehr and Antonio Ortega

ACTIVE LEARNING ON WEIGHTED GRAPHS USING ADAPTIVE AND NON-ADAPTIVE APPROACHES. Eyal En Gad, Akshay Gadde, A. Salman Avestimehr and Antonio Ortega ACTIVE LEARNING ON WEIGHTED GRAPHS USING ADAPTIVE AND NON-ADAPTIVE APPROACHES Eya En Gad, Akshay Gadde, A. Saman Avestimehr and Antonio Ortega Department of Eectrica Engineering University of Southern

More information

A METHOD FOR GRIDLESS ROUTING OF PRINTED CIRCUIT BOARDS. A. C. Finch, K. J. Mackenzie, G. J. Balsdon, G. Symonds

A METHOD FOR GRIDLESS ROUTING OF PRINTED CIRCUIT BOARDS. A. C. Finch, K. J. Mackenzie, G. J. Balsdon, G. Symonds A METHOD FOR GRIDLESS ROUTING OF PRINTED CIRCUIT BOARDS A C Finch K J Mackenzie G J Basdon G Symonds Raca-Redac Ltd Newtown Tewkesbury Gos Engand ABSTRACT The introduction of fine-ine technoogies to printed

More information

A Design Method for Optimal Truss Structures with Certain Redundancy Based on Combinatorial Rigidity Theory

A Design Method for Optimal Truss Structures with Certain Redundancy Based on Combinatorial Rigidity Theory 0 th Word Congress on Structura and Mutidiscipinary Optimization May 9 -, 03, Orando, Forida, USA A Design Method for Optima Truss Structures with Certain Redundancy Based on Combinatoria Rigidity Theory

More information

A HIGH PERFORMANCE, LOW LATENCY, LOW POWER AUDIO PROCESSING SYSTEM FOR WIDEBAND SPEECH OVER WIRELESS LINKS

A HIGH PERFORMANCE, LOW LATENCY, LOW POWER AUDIO PROCESSING SYSTEM FOR WIDEBAND SPEECH OVER WIRELESS LINKS A HIGH PERFORMANCE, LOW LATENCY, LOW POWER AUDIO PROCESSING SYSTEM FOR WIDEBAND SPEECH OVER WIRELESS LINKS Etienne Cornu 1, Aain Dufaux 2, and David Hermann 1 1 AMI Semiconductor Canada, 611 Kumpf Drive,

More information

file://j:\macmillancomputerpublishing\chapters\in073.html 3/22/01

file://j:\macmillancomputerpublishing\chapters\in073.html 3/22/01 Page 1 of 15 Chapter 9 Chapter 9: Deveoping the Logica Data Mode The information requirements and business rues provide the information to produce the entities, attributes, and reationships in ogica mode.

More information

PARALLEL database systems are essential to important

PARALLEL database systems are essential to important IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL. 13, NO. 12, DECEMBER 2002 1211 Load Baanced and Optia Disk Aocation Strategy for Partia Match Queries on Mutidiensiona Fies Saja K. Das, Meber,

More information

Special Edition Using Microsoft Excel Selecting and Naming Cells and Ranges

Special Edition Using Microsoft Excel Selecting and Naming Cells and Ranges Specia Edition Using Microsoft Exce 2000 - Lesson 3 - Seecting and Naming Ces and.. Page 1 of 8 [Figures are not incuded in this sampe chapter] Specia Edition Using Microsoft Exce 2000-3 - Seecting and

More information

TSR: Topology Reduction from Tree to Star Data Grids

TSR: Topology Reduction from Tree to Star Data Grids 03 Seventh Internationa Conference on Innovative Mobie and Internet Services in biquitous Computing TSR: Topoogy Reduction from Tree to Star Data Grids Ming-Chang Lee #, Fang-Yie Leu *, Ying-ping Chen

More information

Outline. Parallel Numerical Algorithms. Forward Substitution. Triangular Matrices. Solving Triangular Systems. Back Substitution. Parallel Algorithm

Outline. Parallel Numerical Algorithms. Forward Substitution. Triangular Matrices. Solving Triangular Systems. Back Substitution. Parallel Algorithm Outine Parae Numerica Agorithms Chapter 8 Prof. Michae T. Heath Department of Computer Science University of Iinois at Urbana-Champaign CS 554 / CSE 512 1 2 3 4 Trianguar Matrices Michae T. Heath Parae

More information

The optimization design of microphone array layout for wideband noise sources

The optimization design of microphone array layout for wideband noise sources PROCEEDINGS of the 22 nd International Congress on Acoustics Acoustic Array Systes: Paper ICA2016-903 The optiization design of icrophone array layout for wideband noise sources Pengxiao Teng (a), Jun

More information

MCSE Training Guide: Windows Architecture and Memory

MCSE Training Guide: Windows Architecture and Memory MCSE Training Guide: Windows 95 -- Ch 2 -- Architecture and Memory Page 1 of 13 MCSE Training Guide: Windows 95-2 - Architecture and Memory This chapter wi hep you prepare for the exam by covering the

More information

Advances in Crystallographic Image Processing for Scanning Probe Microscopy

Advances in Crystallographic Image Processing for Scanning Probe Microscopy Advances in Crystaographic Iage Processing for Scanning Probe Microscopy P. Moeck Nano-Crystaography Group, Departent of Physics, Portand State University, 1719 SW 10 th Avenue (SRTC), Portand, OR 97201,

More information

Performance Analysis of RAID in Different Workload

Performance Analysis of RAID in Different Workload Send Orders for Reprints to reprints@benthascience.ae 324 The Open Cybernetics & Systeics Journal, 2015, 9, 324-328 Perforance Analysis of RAID in Different Workload Open Access Zhang Dule *, Ji Xiaoyun,

More information

Dynamic Symbolic Execution of Distributed Concurrent Objects

Dynamic Symbolic Execution of Distributed Concurrent Objects Dynamic Symboic Execution of Distributed Concurrent Objects Andreas Griesmayer 1, Bernhard Aichernig 1,2, Einar Broch Johnsen 3, and Rudof Schatte 1,2 1 Internationa Institute for Software Technoogy, United

More information

Gromov-Hausdorff Distance Between Metric Graphs

Gromov-Hausdorff Distance Between Metric Graphs Groov-Hausdorff Distance Between Metric Graphs Jiwon Choi St Mark s School January, 019 Abstract In this paper we study the Groov-Hausdorff distance between two etric graphs We copute the precise value

More information

A Fast Block Matching Algorithm Based on the Winner-Update Strategy

A Fast Block Matching Algorithm Based on the Winner-Update Strategy In Proceedings of the Fourth Asian Conference on Computer Vision, Taipei, Taiwan, Jan. 000, Voume, pages 977 98 A Fast Bock Matching Agorithm Based on the Winner-Update Strategy Yong-Sheng Chenyz Yi-Ping

More information

Bridge Talk Release Notes for Meeting Exchange 5.0

Bridge Talk Release Notes for Meeting Exchange 5.0 Bridge Tak Reease Notes for Meeting Exchange 5.0 This document ists new product features, issues resoved since the previous reease, and current operationa issues. New Features This section provides a brief

More information

Self-Control Cyclic Access with Time Division - A MAC Proposal for The HFC System

Self-Control Cyclic Access with Time Division - A MAC Proposal for The HFC System Sef-Contro Cycic Access with Time Division - A MAC Proposa for The HFC System S.M. Jiang, Danny H.K. Tsang, Samue T. Chanson Hong Kong University of Science & Technoogy Cear Water Bay, Kowoon, Hong Kong

More information

Formalising Refactorings with Graph Transformations

Formalising Refactorings with Graph Transformations Fundaenta Inforaticae XXI (200) 00 022 00 IOS Press Foraising Refactorings with Graph Transforations To Mens C Prograing Technoogy Lab Vrije Universiteit Brusse Peinaan 2, 050 Brusse, Begiu to.ens@vub.ac.be

More information

Fastest-Path Computation

Fastest-Path Computation Fastest-Path Computation DONGHUI ZHANG Coege of Computer & Information Science Northeastern University Synonyms fastest route; driving direction Definition In the United states, ony 9.% of the househods

More information

OPTIMAL COMPLEX SERVICES COMPOSITION IN SOA SYSTEMS

OPTIMAL COMPLEX SERVICES COMPOSITION IN SOA SYSTEMS Key words SOA, optial, coplex service, coposition, Quality of Service Piotr RYGIELSKI*, Paweł ŚWIĄTEK* OPTIMAL COMPLEX SERVICES COMPOSITION IN SOA SYSTEMS One of the ost iportant tasks in service oriented

More information

Sect 8.1 Lines and Angles

Sect 8.1 Lines and Angles 7 Sect 8. Lines and nges Objective a: asic efinitions. efinition Iustration Notation point is a ocation in space. It is indicated by aking a dot. Points are typicay abeed with capita etters next to the

More information

INTEGRATION OF A TERRESTRIAL LASER SCANNER WITH GPS/IMU ORIENTATION SENSORS

INTEGRATION OF A TERRESTRIAL LASER SCANNER WITH GPS/IMU ORIENTATION SENSORS INTEGRATION OF A TERRESTRIAL LASER SCANNER WITH GPS/IMU ORIENTATION SENSORS J.Taaya, R.Aaus, E.Bosch, A.Serra, W.Kornus, A.Baron Institut Cartogràfic de Cataunya (ICC), Parc de Montjuïc, E-08038 Barceona

More information

A Beam Search Method to Solve the Problem of Assignment Cells to Switches in a Cellular Mobile Network

A Beam Search Method to Solve the Problem of Assignment Cells to Switches in a Cellular Mobile Network A Bea Search Method to Solve the Proble of Assignent Cells to Switches in a Cellular Mobile Networ Cassilda Maria Ribeiro Faculdade de Engenharia de Guaratinguetá - DMA UNESP - São Paulo State University

More information

Sensitivity Analysis of Hopfield Neural Network in Classifying Natural RGB Color Space

Sensitivity Analysis of Hopfield Neural Network in Classifying Natural RGB Color Space Sensitivity Anaysis of Hopfied Neura Network in Cassifying Natura RGB Coor Space Department of Computer Science University of Sharjah UAE rsammouda@sharjah.ac.ae Abstract: - This paper presents a study

More information

A Low-cost Memory Architecture with NAND XIP for Mobile Embedded Systems

A Low-cost Memory Architecture with NAND XIP for Mobile Embedded Systems A Low-cost Meory Architecture with XIP for Mobile Ebedded Systes Chanik Park, Jaeyu Seo, Sunghwan Bae, Hyojun Ki, Shinhan Ki and Busoo Ki Software Center, SAMSUNG Electronics, Co., Ltd. Seoul 135-893,

More information

THE PERCENTAGE OCCUPANCY HIT OR MISS TRANSFORM

THE PERCENTAGE OCCUPANCY HIT OR MISS TRANSFORM 17th European Signa Processing Conference (EUSIPCO 2009) Gasgow, Scotand, August 24-28, 2009 THE PERCENTAGE OCCUPANCY HIT OR MISS TRANSFORM P. Murray 1, S. Marsha 1, and E.Buinger 2 1 Dept. of Eectronic

More information

Utility-Based Resource Allocation for Mixed Traffic in Wireless Networks

Utility-Based Resource Allocation for Mixed Traffic in Wireless Networks IEEE IFOCO 2 International Workshop on Future edia etworks and IP-based TV Utility-Based Resource Allocation for ixed Traffic in Wireless etworks Li Chen, Bin Wang, Xiaohang Chen, Xin Zhang, and Dacheng

More information

Modelling and Performance Evaluation of Router Transparent Web cache Mode

Modelling and Performance Evaluation of Router Transparent Web cache Mode Emad Hassan A-Hemiary IJCSET Juy 2012 Vo 2, Issue 7,1316-1320 Modeing and Performance Evauation of Transparent cache Mode Emad Hassan A-Hemiary Network Engineering Department, Coege of Information Engineering,

More information

Proceedings of the International Conference on Systolic Arrays, San Diego, California, U.S.A., May 25-27, 1988 AN EFFICIENT ASYNCHRONOUS MULTIPLIER!

Proceedings of the International Conference on Systolic Arrays, San Diego, California, U.S.A., May 25-27, 1988 AN EFFICIENT ASYNCHRONOUS MULTIPLIER! [1,2] have, in theory, revoutionized cryptography. Unfortunatey, athough offer many advantages over conventiona and authentication), such cock synchronization in this appication due to the arge operand

More information

A Fast Multi-Objective Genetic Algorithm for Hardware-Software Partitioning In Embedded System Design

A Fast Multi-Objective Genetic Algorithm for Hardware-Software Partitioning In Embedded System Design A Fast Multi-Obective Genetic Algorith for Hardware-Software Partitioning In Ebedded Syste Design 1 M.Jagadeeswari, 2 M.C.Bhuvaneswari 1 Research Scholar, P.S.G College of Technology, Coibatore, India

More information

Collaborative Web Caching Based on Proxy Affinities

Collaborative Web Caching Based on Proxy Affinities Collaborative Web Caching Based on Proxy Affinities Jiong Yang T J Watson Research Center IBM jiyang@usibco Wei Wang T J Watson Research Center IBM ww1@usibco Richard Muntz Coputer Science Departent UCLA

More information

Neural Network Enhancement of the Los Alamos Force Deployment Estimator

Neural Network Enhancement of the Los Alamos Force Deployment Estimator Missouri University of Science and Technoogy Schoars' Mine Eectrica and Computer Engineering Facuty Research & Creative Works Eectrica and Computer Engineering 1-1-1994 Neura Network Enhancement of the

More information

Geo-activity Recommendations by using Improved Feature Combination

Geo-activity Recommendations by using Improved Feature Combination Geo-activity Recoendations by using Iproved Feature Cobination Masoud Sattari Middle East Technical University Ankara, Turkey e76326@ceng.etu.edu.tr Murat Manguoglu Middle East Technical University Ankara,

More information

An Adaptive Two-Copy Delayed SR-ARQ for Satellite Channels with Shadowing

An Adaptive Two-Copy Delayed SR-ARQ for Satellite Channels with Shadowing An Adaptive Two-Copy Deayed SR-ARQ for Sateite Channes with Shadowing Jing Zhu, Sumit Roy zhuj@ee.washington.edu Department of Eectrica Engineering, University of Washington Abstract- The paper focuses

More information

Joint disparity and motion eld estimation in. stereoscopic image sequences. Ioannis Patras, Nikos Alvertos and Georgios Tziritas y.

Joint disparity and motion eld estimation in. stereoscopic image sequences. Ioannis Patras, Nikos Alvertos and Georgios Tziritas y. FORTH-ICS / TR-157 December 1995 Joint disparity and motion ed estimation in stereoscopic image sequences Ioannis Patras, Nikos Avertos and Georgios Tziritas y Abstract This work aims at determining four

More information

Layout Conscious Approach and Bus Architecture Synthesis for Hardware-Software Co-Design of Systems on Chip Optimized for Speed

Layout Conscious Approach and Bus Architecture Synthesis for Hardware-Software Co-Design of Systems on Chip Optimized for Speed Layout Conscious Approach and Bus Architecture Synthesis for Hardware-Software Co-Design of Systems on Chip Optimized for Speed Nattawut Thepayasuwan, Member, IEEE and Aex Doboi, Member, IEEE Abstract

More information

Space-Time Trade-offs.

Space-Time Trade-offs. Space-Time Trade-offs. Chethan Kamath 03.07.2017 1 Motivation An important question in the study of computation is how to best use the registers in a CPU. In most cases, the amount of registers avaiabe

More information

NON-RIGID OBJECT TRACKING: A PREDICTIVE VECTORIAL MODEL APPROACH

NON-RIGID OBJECT TRACKING: A PREDICTIVE VECTORIAL MODEL APPROACH NON-RIGID OBJECT TRACKING: A PREDICTIVE VECTORIAL MODEL APPROACH V. Atienza; J.M. Valiente and G. Andreu Departaento de Ingeniería de Sisteas, Coputadores y Autoática Universidad Politécnica de Valencia.

More information

Image Filter Using with Gaussian Curvature and Total Variation Model

Image Filter Using with Gaussian Curvature and Total Variation Model IJECT Vo l. 7, Is s u e 3, Ju l y - Se p t 016 ISSN : 30-7109 (Online) ISSN : 30-9543 (Print) Iage Using with Gaussian Curvature and Total Variation Model 1 Deepak Kuar Gour, Sanjay Kuar Shara 1, Dept.

More information

Replication of Virtual Network Functions: Optimizing Link Utilization and Resource Costs

Replication of Virtual Network Functions: Optimizing Link Utilization and Resource Costs Repication of Virtua Network Functions: Optimizing Link Utiization and Resource Costs Francisco Carpio, Wogang Bziuk and Admea Jukan Technische Universität Braunschweig, Germany Emai:{f.carpio, w.bziuk,

More information

AN EVOLUTIONARY APPROACH TO OPTIMIZATION OF A LAYOUT CHART

AN EVOLUTIONARY APPROACH TO OPTIMIZATION OF A LAYOUT CHART 13 AN EVOLUTIONARY APPROACH TO OPTIMIZATION OF A LAYOUT CHART Eva Vona University of Ostrava, 30th dubna st. 22, Ostrava, Czech Repubic e-mai: Eva.Vona@osu.cz Abstract: This artice presents the use of

More information

Multi-level Shape Recognition based on Wavelet-Transform. Modulus Maxima

Multi-level Shape Recognition based on Wavelet-Transform. Modulus Maxima uti-eve Shape Recognition based on Waveet-Transform oduus axima Faouzi Aaya Cheikh, Azhar Quddus and oncef Gabbouj Tampere University of Technoogy (TUT), Signa Processing aboratory, P.O. Box 553, FIN-33101

More information

Fuzzy Equivalence Relation Based Clustering and Its Use to Restructuring Websites Hyperlinks and Web Pages

Fuzzy Equivalence Relation Based Clustering and Its Use to Restructuring Websites Hyperlinks and Web Pages Fuzzy Equivaence Reation Based Custering and Its Use to Restructuring Websites Hyperinks and Web Pages Dimitris K. Kardaras,*, Xenia J. Mamakou, and Bi Karakostas 2 Business Informatics Laboratory, Dept.

More information

Evaluation of a multi-frame blind deconvolution algorithm using Cramér-Rao bounds

Evaluation of a multi-frame blind deconvolution algorithm using Cramér-Rao bounds Evaluation of a ulti-frae blind deconvolution algorith using Craér-Rao bounds Charles C. Beckner, Jr. Air Force Research Laboratory, 3550 Aberdeen Ave SE, Kirtland AFB, New Mexico, USA 87117-5776 Charles

More information

FOR SERVICE TECHNICIAN S USE ONLY

FOR SERVICE TECHNICIAN S USE ONLY W10600683C Assemby: W10611974 FOR SERVICE TECHNICIAN S USE ONLY NOTE: This sheet contains important Technica Service Data. Tech Sheet Do Not Remove Or Destroy DANGER Eectrica Shock Hazard Ony authorized

More information

Priority Queueing for Packets with Two Characteristics

Priority Queueing for Packets with Two Characteristics 1 Priority Queueing for Packets with Two Characteristics Pave Chuprikov, Sergey I. Nikoenko, Aex Davydow, Kiri Kogan Abstract Modern network eements are increasingy required to dea with heterogeneous traffic.

More information

Trees. Linear vs. Branching CSE 143. Branching Structures in CS. What s in a Node? A Tree. [Chapter 10]

Trees. Linear vs. Branching CSE 143. Branching Structures in CS. What s in a Node? A Tree. [Chapter 10] CSE 143 Trees [Chapter 10] Linear vs. Branching Our data structures so far are linear Have a beginning and an end Everything falls in order between the ends Arrays, lined lists, queues, stacs, priority

More information

Data Management Updates

Data Management Updates Data Management Updates Jenny Darcy Data Management Aiance CRP Meeting, Thursday, November 1st, 2018 Presentation Objectives New staff Update on Ingres (JCCS) conversion project Fina IRB cosure at study

More information

As Michi Henning and Steve Vinoski showed 1, calling a remote

As Michi Henning and Steve Vinoski showed 1, calling a remote Reducing CORBA Ca Latency by Caching and Prefetching Bernd Brügge and Christoph Vismeier Technische Universität München Method ca atency is a major probem in approaches based on object-oriented middeware

More information

Image Segmentation Using Semi-Supervised k-means

Image Segmentation Using Semi-Supervised k-means I J C T A, 9(34) 2016, pp. 595-601 Internationa Science Press Image Segmentation Using Semi-Supervised k-means Reza Monsefi * and Saeed Zahedi * ABSTRACT Extracting the region of interest is a very chaenging

More information

Detection of Outliers and Reduction of their Undesirable Effects for Improving the Accuracy of K-means Clustering Algorithm

Detection of Outliers and Reduction of their Undesirable Effects for Improving the Accuracy of K-means Clustering Algorithm Detection of Outliers and Reduction of their Undesirable Effects for Iproving the Accuracy of K-eans Clustering Algorith Bahan Askari Departent of Coputer Science and Research Branch, Islaic Azad University,

More information

LARGE SCALE MARS MAPPING AND ROVER LOCALIZATION USING DESCENT AND ROVER IMAGERY

LARGE SCALE MARS MAPPING AND ROVER LOCALIZATION USING DESCENT AND ROVER IMAGERY LRGE SCLE MRS MIG D ROVER LOCLIZIO USIG DESCE D ROVER IMGERY Rongxing LI *, Fei M *, Fengiang U *, Larry MHIES **, Cark OLSO **, Yaing IOG ** * Departent of Civi and Environenta Engineering and Geodetic

More information

Lecture outline Graphics and Interaction Scan Converting Polygons and Lines. Inside or outside a polygon? Scan conversion.

Lecture outline Graphics and Interaction Scan Converting Polygons and Lines. Inside or outside a polygon? Scan conversion. Lecture outine 433-324 Graphics and Interaction Scan Converting Poygons and Lines Department of Computer Science and Software Engineering The Introduction Scan conversion Scan-ine agorithm Edge coherence

More information

Topology-aware Key Management Schemes for Wireless Multicast

Topology-aware Key Management Schemes for Wireless Multicast Topoogy-aware Key Management Schemes for Wireess Muticast Yan Sun, Wade Trappe,andK.J.RayLiu Department of Eectrica and Computer Engineering, University of Maryand, Coege Park Emai: ysun, kjriu@gue.umd.edu

More information

UnixWare 7 System Administration UnixWare 7 System Configuration

UnixWare 7 System Administration UnixWare 7 System Configuration UnixWare 7 System Administration - CH 3 - UnixWare 7 System Configuration Page 1 of 8 [Figures are not incuded in this sampe chapter] UnixWare 7 System Administration - 3 - UnixWare 7 System Configuration

More information

understood as processors that match AST patterns of the source language and translate them into patterns in the target language.

understood as processors that match AST patterns of the source language and translate them into patterns in the target language. A Basic Compier At a fundamenta eve compiers can be understood as processors that match AST patterns of the source anguage and transate them into patterns in the target anguage. Here we wi ook at a basic

More information

An Efficient Approach for Content Delivery in Overlay Networks

An Efficient Approach for Content Delivery in Overlay Networks An Efficient Approach for Content Delivery in Overlay Networks Mohaad Malli, Chadi Barakat, Walid Dabbous Projet Planète, INRIA-Sophia Antipolis, France E-ail:{alli, cbarakat, dabbous}@sophia.inria.fr

More information

Backing-up Fuzzy Control of a Truck-trailer Equipped with a Kingpin Sliding Mechanism

Backing-up Fuzzy Control of a Truck-trailer Equipped with a Kingpin Sliding Mechanism Backing-up Fuzzy Contro of a Truck-traier Equipped with a Kingpin Siding Mechanism G. Siamantas and S. Manesis Eectrica & Computer Engineering Dept., University of Patras, Patras, Greece gsiama@upatras.gr;stam.manesis@ece.upatras.gr

More information

POSITION-PATCH BASED FACE HALLUCINATION VIA LOCALITY-CONSTRAINED REPRESENTATION. Junjun Jiang, Ruimin Hu, Zhen Han, Tao Lu, and Kebin Huang

POSITION-PATCH BASED FACE HALLUCINATION VIA LOCALITY-CONSTRAINED REPRESENTATION. Junjun Jiang, Ruimin Hu, Zhen Han, Tao Lu, and Kebin Huang IEEE International Conference on ultiedia and Expo POSITION-PATCH BASED FACE HALLUCINATION VIA LOCALITY-CONSTRAINED REPRESENTATION Junjun Jiang, Ruiin Hu, Zhen Han, Tao Lu, and Kebin Huang National Engineering

More information

Automatic Grouping for Social Networks CS229 Project Report

Automatic Grouping for Social Networks CS229 Project Report Automatic Grouping for Socia Networks CS229 Project Report Xiaoying Tian Ya Le Yangru Fang Abstract Socia networking sites aow users to manuay categorize their friends, but it is aborious to construct

More information

Crossing Minimization Problems of Drawing Bipartite Graphs in Two Clusters

Crossing Minimization Problems of Drawing Bipartite Graphs in Two Clusters Crossing Minimiation Probems o Drawing Bipartite Graphs in Two Custers Lanbo Zheng, Le Song, and Peter Eades Nationa ICT Austraia, and Schoo o Inormation Technoogies, University o Sydney,Austraia Emai:

More information

Resource Optimization to Provision a Virtual Private Network Using the Hose Model

Resource Optimization to Provision a Virtual Private Network Using the Hose Model Resource Optimization to Provision a Virtua Private Network Using the Hose Mode Monia Ghobadi, Sudhakar Ganti, Ghoamai C. Shoja University of Victoria, Victoria C, Canada V8W 3P6 e-mai: {monia, sganti,

More information

Further Concepts in Geometry

Further Concepts in Geometry ppendix F Further oncepts in Geometry F. Exporing ongruence and Simiarity Identifying ongruent Figures Identifying Simiar Figures Reading and Using Definitions ongruent Trianges assifying Trianges Identifying

More information

NOWDAYS, our ways of living are under gradual but

NOWDAYS, our ways of living are under gradual but Transmission Management of Deay-Sensitive Medica Packets in Beyond Wireess Body Area Networks: A Queueing Game Approach Changyan Yi, Student Member, IEEE, and Jun Cai, Senior Member, IEEE Abstract In this

More information

CSE120 Principles of Operating Systems. Prof Yuanyuan (YY) Zhou Lecture 4: Threads

CSE120 Principles of Operating Systems. Prof Yuanyuan (YY) Zhou Lecture 4: Threads CSE120 Principes of Operating Systems Prof Yuanyuan (YY) Zhou Lecture 4: Threads Announcement Project 0 Due Project 1 out Homework 1 due on Thursday Submit it to Gradescope onine 2 Processes Reca that

More information