Understanding the Backward Slices of Performance Degrading Instructions

Size: px
Start display at page:

Download "Understanding the Backward Slices of Performance Degrading Instructions"

Transcription

1 Understanding the Backward Slices of Performance Degrading Instructions Craig Zilles and Guri Sohi University of Wisconsin - Madison International Symposium on Computer Architecture June, 2000

2 Motivation PRCESSRS ACHIEVE NLY A FRACTIN F PEAK PERFRMANCE N MANY PRGRAMS Performance Degrading Events (PDE) branch mispredictions cache misses RETIREMENT STREAM BRANCH branch mispredict TIME LARGER CACHES AND PREDICTRS handle easy cases concentrates PDE s to a fraction of problem static instructions UNCRRELATED (DATA-DEPENDENT) BRANCHES HASH TABLE LKUPS AND PINTER CHASING cache miss LAD International Symposium on Computer Architecture (ISCA-2000), June

3 Motivation, cont. PRGRAM BEHAVIR IS DETERMINISTIC build predictors which use the program! Pre-execution FRK Pre-executed sub-program feeds prediction for branch fetched by the main thread sub program Pre-fetch memory similarly BRANCH BRANCH UTCME BRANCH TIME nly pre-execute instructions which defy normal predictors AVID MISPREDICTIN International Symposium on Computer Architecture (ISCA-2000), June

4 Motivation, cont. THE EFFECTIVENESS F PRE-EXECUTIN IS DETERMINED BY THE SUB-PRGRAM sub program BRANCH Sub-program must enable faster execution of the problem instruction Sub-program size determines overhead BRANCH How can we build sub-programs to minimize their size while maintaining accuracy International Symposium on Computer Architecture (ISCA-2000), June

5 verview MTIVATIN PRGRAM SLICING EXPERIMENT VERVIEW METHDLGY CNSERVATIVE SLICES EXAMPLE SPECULATIVE PTIMIZATINS ADDITINAL BSERVATINS CNCLUSINS International Symposium on Computer Architecture (ISCA-2000), June

6 Program Slicing THE SUB-PRGRAM INCLUDES NLY THE SUBSET F INSTRUCTINS WHICH CAN INFLUENCE THE PRBLEM INSTRUCTIN. lda cmoveq ldl s4addq stl and sll ldq ldl addl addq bis stl ldq r8,-8432(r29) r18,r1,r0 r1,-19952(r29) r16,r8,r8 r31,0(r8) r4,r5,r5 r5,4,r5 r23,-19408(r29) r27,-19944(r29) r1,1,r1 r0,r5,r5 r31,r31,r0 r1,-19952(r29) r7,8(r5) BACKWARD SLICE cmoveq and sll addq ldq r18,r1,r0 r4,r5,r5 r5,4,r5 r0,r5,r5 r7,8(r5) follow dependences backward from criterion instruction both data and control Criterion Instruction International Symposium on Computer Architecture (ISCA-2000), June

7 Experiment verview INITIAL CHARACTERIZATIN F SLICES Categorization of instructions in the slice largest contributors: control and memory dependence resolution NT dataflow Exploiting well-known phenomena to reduce slice size highly-biased branches stability of memory dependences International Symposium on Computer Architecture (ISCA-2000), June

8 Methodology SPEC95 integer benchmarks Alpha architecture, optimized -4 Profiled to identified problem static instructions Frequently caused mispredictions or cache misses cum. slice size Generated ASSEMBLY-LEVEL slices Looked at the 512 dynamic instructions leading to the criterion Removed NPS, and SP/GP computation dependences all instructions cumulative slice size distance (in dynamic instructions) International Symposium on Computer Architecture (ISCA-2000), June

9 Conservative Slices PRGRAMS HAVE AMBIGUUS MEMRY DEPENDENCES AND CMPLEX CNTRL FLW CNSERVATIVELY CNSTRUCTED SLICES CAN BE LARGE 50% of program necessary to compute all store addresses 80% of program necessary to resolve all branches SLUTIN: EXPLIT THE FACT THAT SLICES NLY PRVIDE HINTS construct speculative slices assume common-case behavior profiling is required to detect the common-case TW EXAMPLE PTIMIZATINS: both targeting ambiguous memory dependences International Symposium on Computer Architecture (ISCA-2000), June

10 Speculative ptimizations A CNSERVATIVE SLICE MUST CMPUTE THE ADDRESS FR EVERY STRE WHICH CULD ALIAS WITH A LAD IN THE SLICE THE SET F MEMRY DEPENDENCES ACTUALLY REALIZED IS A SUB-SET F THSE WHICH ARE PSSIBLE cum. slice size Profile to identify the store sets nly compute store addresses for these stores conservative (all aliasable stores) all instructions store set oracle distance (in dynamic instructions) Slices built using store sets approximate size of oracle slices International Symposium on Computer Architecture (ISCA-2000), June

11 Speculative ptimizations, cont. WHEN MEMRY DEPENDENCES EXIST, FTEN THE LAD CMMUNICATES WITH THE MST RECENT STRE FRM ITS STRE SET. much like communication through registers EXPLIT T REDUCE SLICE SIZE: 1. Assume a communication pattern (imprecise transformation) 2. Remove load and store from the slice STRE R9 -> 0(R17) ADD R10, R11 -> R12 STRE R12 -> 0(R18) LAD 0(R19) -> R13 ADD R13, R14 -> R15... STRE R9 -> 0(R17) ADD R10, R11 -> R12 STRE R12 -> 0(R18) LAD 0(R19) -> R13 ADD R12, R14 -> R15... International Symposium on Computer Architecture (ISCA-2000), June

12 Speculative ptimizations, cont. STATIC LADS ARE HIGHLY BIASED WITH RESPECT T THIS BEHAVIR Mis-speculation can be avoided Easily profiled to classify the dependences cum. slice size all instructions all aliasable stores store set oracle optimized distance (in dynamic instructions) Removing such load-store pairs can further reduce slice size with little affect on accuracy Reduced address sub-slice to 1/4 of conservative size International Symposium on Computer Architecture (ISCA-2000), June

13 Additional bservations FTEN DATA DEPENDENCES ARE CLUSTERED NEAR CRITERIN possibly influences pre-execution mechanisms NT UNCMMN FR SLICES T VERLAP create a single multi-slice SLICES ARE BURSTY due to program structure cum. slice size Regions with no contribution distance (in dynamic instructions) International Symposium on Computer Architecture (ISCA-2000), June

14 Additional bservations FALSE CNTRL DEPENDENCES: control dependent regions are part of slice, but all paths from the branch contribute to the slice equivalently. CMMN CASE: CNDITINAL FUNCTIN CALL CRITERIN INT A =...; IF (B) { FUNCTIN(); } IF (A) FUNCTIN() { SAVE A;... RESTRE A; } THER CASE: CDE REPLICATIN Currently refining infrastructure to handle these cases International Symposium on Computer Architecture (ISCA-2000), June

15 Summary PRE-EXECUTIN: GENERAL TECHNIQUE FR HANDLING PRBLEM INSTRUCTINS Use the program to predict the program Requires small, accurate slices SPECULATIVE SLICES: Exploit common-case behavior to reduce slice size while maintaining accuracy Some slices can be reduced to less than 10% of the 512 instructions preceding the criterion while maintaining greater than 95% accuracy Much future work to be done Requires sophisticated profile information International Symposium on Computer Architecture (ISCA-2000), June

Speculative Multithreaded Processors

Speculative Multithreaded Processors Guri Sohi and Amir Roth Computer Sciences Department University of Wisconsin-Madison utline Trends and their implications Workloads for future processors Program parallelization and speculative threads

More information

Dynamic Instruction Reuse

Dynamic Instruction Reuse Dynamic Instructin Reuse Guri Shi Cmputer Sciences Department University f Wiscnsin Madisn 1 Mtivatin Prgrams cnsist f static instructins Executin sees static instructin many times - ften with same inputs

More information

Speculative Multithreaded Processors

Speculative Multithreaded Processors Guri Sohi and Amir Roth Computer Sciences Department University of Wisconsin-Madison utline Trends and their implications Workloads for future processors Program parallelization and speculative threads

More information

Execution-based Prediction Using Speculative Slices

Execution-based Prediction Using Speculative Slices Execution-based Prediction Using Speculative Slices Craig Zilles and Guri Sohi University of Wisconsin - Madison International Symposium on Computer Architecture July, 2001 The Problem Two major barriers

More information

Computer Organization and Architecture

Computer Organization and Architecture Campus de Gualtar 4710-057 Braga UNIVERSIDADE DO MINHO ESCOLA DE ENGENHARIA Departament de Infrmática Cmputer Organizatin and Architecture 5th Editin, 2000 by William Stallings Table f Cntents I. OVERVIEW.

More information

It has hardware. It has application software.

It has hardware. It has application software. Q.1 What is System? Explain with an example A system is an arrangement in which all its unit assemble wrk tgether accrding t a set f rules. It can als be defined as a way f wrking, rganizing r ding ne

More information

NVIDIA S KEPLER ARCHITECTURE. Tony Chen 2015

NVIDIA S KEPLER ARCHITECTURE. Tony Chen 2015 NVIDIA S KEPLER ARCHITECTURE Tny Chen 2015 Overview 1. Fermi 2. Kepler a. SMX Architecture b. Memry Hierarchy c. Features 3. Imprvements 4. Cnclusin 5. Brief verlk int Maxwell Fermi ~2010 40 nm TSMC (sme

More information

Computer Organization and Architecture

Computer Organization and Architecture Campus de Gualtar 4710-057 Braga UNIVERSIDADE DO MINHO ESCOLA DE ENGENHARIA Departament de Infrmática Cmputer Organizatin and Architecture 5th Editin, 2000 by William Stallings Table f Cntents I. OVERVIEW.

More information

Low-level Software Security: Attacks and Countermeasures

Low-level Software Security: Attacks and Countermeasures Lw-level Sftware Security: Attacks and Cuntermeasures Prf Frank PIESSENS These slides are based n the paper: Lw-level Sftware Security by Example by Erlingssn, Yunan and Piessens Overview Intrductin Example

More information

ECE404 Term Project Sentinel Thread

ECE404 Term Project Sentinel Thread ECE404 Term Project Sentinel Thread Alok Garg Department of Electrical and Computer Engineering, University of Rochester 1 Introduction Performance degrading events like branch mispredictions and cache

More information

Greg Dias, Alex Wilson. Fermi

Greg Dias, Alex Wilson. Fermi Greg Dias, Alex Wilsn Fermi Agenda Cmputer Graphics and Parallelism Basic GPU structure NVIDIA Fermi and CUDA Graphics Rendering Methds Plygn Rendering Ray Tracing Plygn Rendering Apprximatin f cmplex

More information

Parallel error-correcting output codes classification in volume visualization: parallelism for AI and AI for parallelism

Parallel error-correcting output codes classification in volume visualization: parallelism for AI and AI for parallelism Parallel errr-crrecting utput cdes classificatin in vlume visualizatin: parallelism fr AI and AI fr parallelism Oscar Amrós Huguet Advisrs: Sergi Escalera, Anna Puig UPC-UB-URV Intrductin Main Gal: explre

More information

NVIDIA Tesla K20X GPU Accelerator. Breton Minnehan, Beau Sattora

NVIDIA Tesla K20X GPU Accelerator. Breton Minnehan, Beau Sattora NVIDIA Tesla K20X GPU Acceleratr Bretn Minnehan, Beau Sattra Overview Jb f the GPU Histry What is the K20X GK110 Benchmark Perfrmance Jb f the GPU Vertex Shader Applies transfrms n each vertex Applies

More information

DECISION CONTROL CONSTRUCTS IN JAVA

DECISION CONTROL CONSTRUCTS IN JAVA DECISION CONTROL CONSTRUCTS IN JAVA Decisin cntrl statements can change the executin flw f a prgram. Decisin cntrl statements in Java are: if statement Cnditinal peratr switch statement If statement The

More information

Composition class is responsible for maintaining and updating the linebreaks of text displayed in a text viewer.

Composition class is responsible for maintaining and updating the linebreaks of text displayed in a text viewer. Strategy 1 Intent Define a family f algrithms, encapsulate each ne, and make them interchangeable. Strategy lets the algrithm vary independently frm clients that use it. Als Knwn As Plicy Mtivatin The

More information

Illusionist: Transforming Lightweight Cores into Aggressive Cores on Demand

Illusionist: Transforming Lightweight Cores into Aggressive Cores on Demand Illusinist: Transfrming s int Aggressive s n Demand Amin Ansari 1, Shuguang Feng 2, Shantanu Gupta 3, Jsep Trrellas 1, and Sctt Mahlke 4 1 University f Illinis, Urbana-Champaign 2 Nrthrp Grumman Crp. 3

More information

2. When logging is used, which severity level indicates that a device is unusable?

2. When logging is used, which severity level indicates that a device is unusable? CCNA 4 Chapter 8 v5.0 Exam Answers 2015 (100%) 1. What are the mst cmmn syslg messages? thse that ccur when a packet matches a parameter cnditin in an access cntrl list link up and link dwn messages utput

More information

Priority-aware Coflow Placement and scheduling in Datacenters

Priority-aware Coflow Placement and scheduling in Datacenters Pririty-aware Cflw Placement and scheduling in Datacenters Speaker: Lin Wang Research Advisr: Biswanath Mukherjee Intrductin Cflw Represents a cllectin f independent flws that share a cmmn perfrmance gal.

More information

Operating systems. Module 15 kernel I/O subsystem. Tami Sorgente 1

Operating systems. Module 15 kernel I/O subsystem. Tami Sorgente 1 Operating systems Mdule 15 kernel I/O subsystem Tami Srgente 1 SWAP SPACE MANAGEMENT Swap space can be defined as a temprary strage lcatin that is used when system s memry requirements exceed the size

More information

Execution-based Prediction Using Speculative Slices

Execution-based Prediction Using Speculative Slices Appearing in the 28th Annual International Symposium on Computer Architecture (ISCA 2001), July, 2001. Execution-based Prediction Using Speculative Slices Craig Zilles and Gurindar Sohi Computer Sciences

More information

A Characterization of Data Mining Algorithms on a Modern Processor

A Characterization of Data Mining Algorithms on a Modern Processor A Characterizatin f Data Mining Algrithms n a Mdern Prcessr Aml Ghting, Gregry Buehrer, and Srinivasan Parthasarathy Data Mining Research Labratry, The Ohi State University Daehyun Kim, Anthny Nguyen,

More information

Parallel Processing in NCAR Command Language for Performance Improvement

Parallel Processing in NCAR Command Language for Performance Improvement Parallel Prcessing in NCAR Cmmand Language fr Perfrmance Imprvement Ping Gu, University f Wyming Mentr: Wei Huang, NCAR C- Mentr: Dave Brwn, NCAR August 1, 2013 Intrductin and Mtivatin ² The NCAR Cmmand

More information

Virtual Memory and Address Translation

Virtual Memory and Address Translation Virtual Memry and Address Translatin Review Prgram addresses are virtual addresses. Relative ffset f rgram regins can nt change during rgram executin. E.g., hea can nt mve further frm cde. Virtual addresses

More information

An Introduction to Crescendo s Maestro Application Delivery Platform

An Introduction to Crescendo s Maestro Application Delivery Platform An Intrductin t Crescend s Maestr Applicatin Delivery Platfrm Intrductin This dcument is intended t serve as a shrt intrductin t Crescend s Maestr Platfrm and its cre features/benefits. The dcument will

More information

NQueens Problem with CUDA

NQueens Problem with CUDA NQueens Prblem with CUDA Shuqing Chen (21760448) [MAP] [S.Chen] [NQueens Prblem with CUDA] Table f Cntents Backgrund Apprach Evaluatin Discussin Cnclusin [MAP] [S.Chen] [NQueens Prblem with CUDA] Backgrund

More information

B Tech Project First Stage Report on

B Tech Project First Stage Report on B Tech Prject First Stage Reprt n GPU Based Image Prcessing Submitted by Sumit Shekhar (05007028) Under the guidance f Prf Subhasis Chaudhari 1. Intrductin 1.1 Graphic Prcessr Units A graphic prcessr unit

More information

Infrastructure Series

Infrastructure Series Infrastructure Series TechDc WebSphere Message Brker / IBM Integratin Bus Parallel Prcessing (Aggregatin) (Message Flw Develpment) February 2015 Authr(s): - IBM Message Brker - Develpment Parallel Prcessing

More information

History of Java. VM (Java Virtual Machine) What is JVM. What it does. 1. Brief history of Java 2. Java Version History

History of Java. VM (Java Virtual Machine) What is JVM. What it does. 1. Brief history of Java 2. Java Version History Histry f Java 1. Brief histry f Java 2. Java Versin Histry The histry f Java is very interesting. Java was riginally designed fr interactive televisin, but it was t advanced technlgy fr the digital cable

More information

CS510 Concurrent Systems Class 2. A Lock-Free Multiprocessor OS Kernel

CS510 Concurrent Systems Class 2. A Lock-Free Multiprocessor OS Kernel CS510 Cncurrent Systems Class 2 A Lck-Free Multiprcessr OS Kernel The Synthesis kernel A research prject at Clumbia University Synthesis V.0 ( 68020 Uniprcessr (Mtrla N virtual memry 1991 - Synthesis V.1

More information

Computer Organization and Architecture

Computer Organization and Architecture Campus de Gualtar 4710-057 Braga UNIVERSIDADE DO MINHO ESCOLA DE ENGENHARIA Departament de Infrmática Cmputer Organizatin and Architecture 5th Editin, 2000 by William Stallings Table f Cntents I. OVERVIEW.

More information

MICRO Graphicionado. A High-Performance and Energy-Efficient Graph Analytics Accelerator

MICRO Graphicionado. A High-Performance and Energy-Efficient Graph Analytics Accelerator MICRO 2016 Graphicinad A High-Perfrmance and Energy-Efficient Graph Analytics Acceleratr Tae Jun Ham Lisa Wu Narayanan Sundaram Nadathur Satish Margaret Martnsi Slide: http://tiny.cc/graphicinad Graph

More information

MIPS Architecture and Assembly Language Overview

MIPS Architecture and Assembly Language Overview MIPS Architecture and Assembly Language Overview Adapted frm: http://edge.mcs.dre.g.el.edu/gicl/peple/sevy/architecture/mipsref(spim).html [Register Descriptin] [I/O Descriptin] Data Types and Literals

More information

An Assembler for the MSSP Distiller Eric Zimmerman University of Illinois, Urbana Champaign

An Assembler for the MSSP Distiller Eric Zimmerman University of Illinois, Urbana Champaign An Assembler for the MSSP Distiller Eric Zimmerman University of Illinois, Urbana Champaign Abstract It is important to have a means of manually testing a potential optimization before laboring to fully

More information

The Use of Multithreading for Exception Handling

The Use of Multithreading for Exception Handling The Use of Multithreading for Exception Handling Craig Zilles, Joel Emer*, Guri Sohi University of Wisconsin - Madison *Compaq - Alpha Development Group International Symposium on Microarchitecture - 32

More information

Data Speculation. Architecture. Carnegie Mellon School of Computer Science

Data Speculation. Architecture. Carnegie Mellon School of Computer Science Data Speculation Adam Wierman Daniel Neill Lipasti and Shen. Exceeding the dataflow limit, 1996. Sodani and Sohi. Understanding the differences between value prediction and instruction reuse, 1998. 1 A

More information

CSE 3320 Operating Systems Synchronization Jia Rao

CSE 3320 Operating Systems Synchronization Jia Rao CSE 3320 Operating Systems Synchrnizatin Jia Ra Department f Cmputer Science and Engineering http://ranger.uta.edu/~jra Recap f the Last Class Multiprcessr scheduling Tw implementatins f the ready queue

More information

CS4500/5500 Operating Systems Synchronization

CS4500/5500 Operating Systems Synchronization Operating Systems Synchrnizatin Yanyan Zhuang Department f Cmputer Science http://www.cs.uccs.edu/~yzhuang UC. Clrad Springs Recap f the Last Class Multiprcessr scheduling Tw implementatins f the ready

More information

Datacenter Traffic Measurement and Classification

Datacenter Traffic Measurement and Classification Datacenter Traffic Measurement and Classificatin Speaker: Lin Wang Research Advisr: Biswanath Mukherjee Grup meeting 6/15/2017 Datacenter Traffic Measurement and Analysis Data Cllectin Cllect netwrk events

More information

CodeSlice. o Software Requirements. o Features. View CodeSlice Live Documentation

CodeSlice. o Software Requirements. o Features. View CodeSlice Live Documentation CdeSlice View CdeSlice Live Dcumentatin Scripting is ne f the mst pwerful extensibility features in SSIS, allwing develpers the ability t extend the native functinality within SSIS t accmmdate their specific

More information

Eastern Mediterranean University School of Computing and Technology Information Technology Lecture2 Functions

Eastern Mediterranean University School of Computing and Technology Information Technology Lecture2 Functions Eastern Mediterranean University Schl f Cmputing and Technlgy Infrmatin Technlgy Lecture2 Functins User Defined Functins Why d we need functins? T make yur prgram readable and rganized T reduce repeated

More information

Chapter 6: Lgic Based Testing LOGIC BASED TESTING: This unit gives an indepth verview f lgic based testing and its implementatin. At the end f this unit, the student will be able t: Understand the cncept

More information

Use-Based Register Caching with Decoupled Indexing

Use-Based Register Caching with Decoupled Indexing Use-Based Register Caching with Decoupled Indexing J. Adam Butts and Guri Sohi University of Wisconsin Madison {butts,sohi}@cs.wisc.edu ISCA-31 München, Germany June 23, 2004 Motivation Need large register

More information

Overview of Supervised Learning

Overview of Supervised Learning ESL Chap2 Overview f Supervised Learning Overview f Supervised Learning Ntatin X: inputs, feature vectr, predictrs, independent variables. Generally X will be a vectr f p real values. Qualitative features

More information

ARM Programmer s Model

ARM Programmer s Model ARM Prgrammer s Mdel Hsung-Pin Chang Department f Cmputer Science Natinal Chung Hsing University PDF created with FinePrint pdffactry Pr trial versin www.pdffactry.cm Outline ARM Data Types ARM Prcessr

More information

ECE 545 Project Deliverables

ECE 545 Project Deliverables Tp-level flder: _ Secnd-level flders: 1_assumptins 2_blck_diagrams 3_interface 4_ASM_charts 5_surce_cdes 6_verificatin 7_timing_analysis 8_results 9_benchmarking 10_bug_reprts

More information

ALU Design. ENG2410 Digital Design Datapath Design. Parts of CPU. Memory and I/O. Resources. Week #9 Topics. School of Engineering 1

ALU Design. ENG2410 Digital Design Datapath Design. Parts of CPU. Memory and I/O. Resources. Week #9 Topics. School of Engineering 1 ENG2410 Digital Design Datapath Design Datapath cnsists f: Parts f CPU Registers, Multiplexrs, Adders, Subtractrs and lgic t perfrm peratins n data (Cmb Lgic) Cntrl unit Generates signals t cntrl data-path

More information

One reason for controlling access to an object is to defer the full cost of its creation and initialization until we actually need to use it.

One reason for controlling access to an object is to defer the full cost of its creation and initialization until we actually need to use it. Prxy 1 Intent Prvide a surrgate r placehlder fr anther bject t cntrl access t it. Als Knwn As Surrgate Mtivatin One reasn fr cntrlling access t an bject is t defer the full cst f its creatin and initializatin

More information

White paper. Recording and analyzing execution history using ETM/ETB instruction tracing

White paper. Recording and analyzing execution history using ETM/ETB instruction tracing Recrding and analyzing executin histry using ETM/ETB instructin tracing Cpyright Ntice COPYRIGHT NOTICE Cpyright 2016 Atllic AB. All rights reserved. N part f this dcument may be reprduced r distributed

More information

Exploring the Viability of the Cell Broadband Engine for Bioinformatics Applications

Exploring the Viability of the Cell Broadband Engine for Bioinformatics Applications Explring the Viability f the Cell Bradband Engine fr Biinfrmatics Applicatins Authrs: Vipin Sachdeva, Michael Kistler, Evan Speight and Tzy-Hwa Kathy Tzeng Presentatin by: Keyur Malaviya Dept f Cmputer

More information

The UNIVERSITY of NORTH CAROLINA at CHAPEL HILL

The UNIVERSITY of NORTH CAROLINA at CHAPEL HILL Yu will learn the fllwing in this lab: The UNIVERSITY f NORTH CAROLINA at CHAPEL HILL Designing a mdule with multiple memries Designing and using a bitmap fnt Designing a memry-mapped display Cmp 541 Digital

More information

Implementing a SQL Data Warehouse

Implementing a SQL Data Warehouse Implementing a SQL Data Warehuse Implementing a SQL Data Warehuse Curse Cde: 20767 Certificatin Exam: 70-767 Duratin: 5 Days Certificatin Track: MCSA: SQL 2016 BI Develpment Frmat: Classrm Level: 300 Abut

More information

A solution for automating desktop applications with Java skill set

A solution for automating desktop applications with Java skill set A slutin fr autmating desktp applicatins with Java skill set Veerla Shilpa (Senir Sftware Engineer- Testing) Mysre Narasimha Raju, Pratap (Test Autmatin Architect) Abstract LeanFT is a pwerful and lightweight

More information

CAMPBELL COUNTY GILLETTE, WYOMING

CAMPBELL COUNTY GILLETTE, WYOMING CAMPBELL COUNTY GILLETTE, WYOMING System Supprt Analyst I System Supprt Analyst II Senir System Supprt Analyst Class specificatins are intended t present a descriptive list f the range f duties perfrmed

More information

Chapter-10 INHERITANCE

Chapter-10 INHERITANCE Chapter-10 INHERITANCE Intrductin: Inheritance is anther imprtant aspect f bject riented prgramming. C++ allws the user t create a new class (derived class) frm an existing class (base class). Inheritance:

More information

Extensible Query Processing in Starburst

Extensible Query Processing in Starburst Extensible Query Prcessing in Starburst Laura M. Haas, J.C. Freytag, G.M. Lhman, and H.Pirahesh IBM Almaden Research Center CS848 Instructr: David Tman Presented By Yunpeng James Liu Outline Intrductin

More information

$ARCSIGHT_HOME/current/user/agent/map. The files are named in sequential order such as:

$ARCSIGHT_HOME/current/user/agent/map. The files are named in sequential order such as: Lcatin f the map.x.prperties files $ARCSIGHT_HOME/current/user/agent/map File naming cnventin The files are named in sequential rder such as: Sme examples: 1. map.1.prperties 2. map.2.prperties 3. map.3.prperties

More information

Using SPLAY Tree s for state-full packet classification

Using SPLAY Tree s for state-full packet classification Curse Prject Using SPLAY Tree s fr state-full packet classificatin 1- What is a Splay Tree? These ntes discuss the splay tree, a frm f self-adjusting search tree in which the amrtized time fr an access,

More information

CS4500/5500 Operating Systems Page Replacement Algorithms and Segmentation

CS4500/5500 Operating Systems Page Replacement Algorithms and Segmentation Operating Systems Page Replacement Algrithms and Segmentatin Yanyan Zhuang Department f Cmputer Science http://www.cs.uccs.edu/~yzhuang UC. Clrad Springs Ref. MOSE, OS@Austin, Clumbia, Rchester Recap f

More information

CSE 361S Intro to Systems Software Lab #2

CSE 361S Intro to Systems Software Lab #2 Due: Thursday, September 22, 2011 CSE 361S Intr t Systems Sftware Lab #2 Intrductin This lab will intrduce yu t the GNU tls in the Linux prgramming envirnment we will be using fr CSE 361S this semester,

More information

CS 309: Autonomous Intelligent Robotics. Instructor: Jivko Sinapov

CS 309: Autonomous Intelligent Robotics. Instructor: Jivko Sinapov CS 309: Autnmus Intelligent Rbtics Instructr: Jivk Sinapv http://www.cs.uteas.edu/~jsinapv/teaching/cs309_spring2017/ Machine Learning Annuncements Final Prject Presentatins Saturday, May 13, 7:00-10:00

More information

As the amount of ILP to exploit grows, control dependences rapidly become the limiting factor.

As the amount of ILP to exploit grows, control dependences rapidly become the limiting factor. Hiroaki Kobayashi // As the amount of ILP to exploit grows, control dependences rapidly become the limiting factor. Branches will arrive up to n times faster in an n-issue processor, and providing an instruction

More information

Dual-Core Execution: Building A Highly Scalable Single-Thread Instruction Window

Dual-Core Execution: Building A Highly Scalable Single-Thread Instruction Window Dual-Core Execution: Building A Highly Scalable Single-Thread Instruction Window Huiyang Zhou School of Computer Science University of Central Florida New Challenges in Billion-Transistor Processor Era

More information

Experience With Processes and Monitors in Mesa

Experience With Processes and Monitors in Mesa Advanced Tpics in Cmputer Systems, CS262A Prf. Eric Brewer Experience With Prcesses and Mnitrs in Mesa I. Experience With Prcesses and Mnitrs in Mesa Fcus f this paper: light-weight prcesses (threads in

More information

Assignment #5: Rootkit. ECE 650 Fall 2018

Assignment #5: Rootkit. ECE 650 Fall 2018 General Instructins Assignment #5: Rtkit ECE 650 Fall 2018 See curse site fr due date Updated 4/10/2018, changes nted in green 1. Yu will wrk individually n this assignment. 2. The cde fr this assignment

More information

LAB 7 (June 29/July 4) Structures, Stream I/O, Self-referential structures (Linked list) in C

LAB 7 (June 29/July 4) Structures, Stream I/O, Self-referential structures (Linked list) in C LAB 7 (June 29/July 4) Structures, Stream I/O, Self-referential structures (Linked list) in C Due: July 9 (Sun) 11:59 pm 1. Prblem A Subject: Structure declaratin, initializatin and assignment. Structure

More information

Common Language Runtime

Common Language Runtime Intrductin t.net framewrk.net is a general-purpse sftware develpment platfrm, similar t Java. Micrsft intrduced.net with purpse f bridging gap between different applicatins..net framewrk aims at cmbining

More information

- Replacement of a single statement with a sequence of statements(promotes regularity)

- Replacement of a single statement with a sequence of statements(promotes regularity) ALGOL - Java and C built using ALGOL 60 - Simple and cncise and elegance - Universal - Clse as pssible t mathematical ntatin - Language can describe the algrithms - Mechanically translatable t machine

More information

Tekmos. TK68020 Microprocessor. Features. General Description. 9/03/14 1

Tekmos. TK68020 Microprocessor. Features. General Description. 9/03/14   1 Tekms TK68020 Micrprcessr September 3, 2014 Prduct Overview Features Addressing Mde Extensins fr Enhanced Supprt f High-Level Languages Object-Cde Cmpatible with Earlier M68000 Micrprcessrs Addressing

More information

Memory Hierarchy. Goal of a memory hierarchy. Typical numbers. Processor-Memory Performance Gap. Principle of locality. Caches

Memory Hierarchy. Goal of a memory hierarchy. Typical numbers. Processor-Memory Performance Gap. Principle of locality. Caches Memry Hierarchy Gal f a memry hierarchy Memry: hierarchy f cmpnents f varius speeds and capacities Hierarchy driven by cst and perfrmance In early days Primary memry = main memry Secndary memry = disks

More information

Contents: Module. Objectives. Lesson 1: Lesson 2: appropriately. As benefit of good. with almost any planning. it places on the.

Contents: Module. Objectives. Lesson 1: Lesson 2: appropriately. As benefit of good. with almost any planning. it places on the. 1 f 22 26/09/2016 15:58 Mdule Cnsideratins Cntents: Lessn 1: Lessn 2: Mdule Befre yu start with almst any planning. apprpriately. As benefit f gd T appreciate architecture. it places n the understanding

More information

Understanding the Backward Slices of Performance Degrading Instructions

Understanding the Backward Slices of Performance Degrading Instructions ppears in the Proceedings of the 27th nnual International Symposium on omputer rchitecture (IS-2), June 12-14, 2. Understanding the Backward Slices of Performance egrading Instructions raig B. Zilles and

More information

Dynamic Branch Prediction

Dynamic Branch Prediction #1 lec # 6 Fall 2002 9-25-2002 Dynamic Branch Prediction Dynamic branch prediction schemes are different from static mechanisms because they use the run-time behavior of branches to make predictions. Usually

More information

Objectives. Topic 8: Input, Interaction, & Introduction to callbacks. Input Devices. Project Sketchpad. Introduce the basic input devices

Objectives. Topic 8: Input, Interaction, & Introduction to callbacks. Input Devices. Project Sketchpad. Introduce the basic input devices Tpic 8 Input, Interactin, & Intr. t Callbacks Tpic 8: Input, Interactin, & Intrductin t callbacks Tpic 8 Input, Interactin, & Intr. t Callbacks Objectives Intrduce the basic input devices Physical Devices

More information

Design Patterns. Collectional Patterns. Session objectives 11/06/2012. Introduction. Composite pattern. Iterator pattern

Design Patterns. Collectional Patterns. Session objectives 11/06/2012. Introduction. Composite pattern. Iterator pattern Design Patterns By Võ Văn Hải Faculty f Infrmatin Technlgies HUI Cllectinal Patterns Sessin bjectives Intrductin Cmpsite pattern Iteratr pattern 2 1 Intrductin Cllectinal patterns primarily: Deal with

More information

Introduction to InfoSec Recitation 2. Nir Krakowski (nirkrako at post.tau.ac.il) Itamar Gilad (itamargi at post.tau.ac.il)

Introduction to InfoSec Recitation 2. Nir Krakowski (nirkrako at post.tau.ac.il) Itamar Gilad (itamargi at post.tau.ac.il) Intrductin t InfSec Recitatin 2 Nir Krakwski (nirkrak at pst.tau.ac.il) Itamar Gilad (itamargi at pst.tau.ac.il) Mre assembly tips Review f the stack Stack verflws Implementatin Tls Tday Little vs Big

More information

CCNA 3 Chapter 2 v5.0 Exam Answers 2015 (100%)

CCNA 3 Chapter 2 v5.0 Exam Answers 2015 (100%) CCNA 3 Chapter 2 v5.0 Exam Answers 2015 (100%) 1. Which tw netwrk design features require Spanning Tree Prtcl (STP) t ensure crrect netwrk peratin? (Chse tw.) static default rutes implementing VLANs t

More information

The UNIVERSITY of NORTH CAROLINA at CHAPEL HILL

The UNIVERSITY of NORTH CAROLINA at CHAPEL HILL Yu will learn the fllwing in this lab: The UNIVERSITY f NORTH CAROLINA at CHAPEL HILL Cmp 541 Digital Lgic and Cmputer Design Spring 2016 Lab Prject (PART A): A Full Cmputer! Issued Fri 4/8/16; Suggested

More information

TIBCO Statistica Options Configuration

TIBCO Statistica Options Configuration TIBCO Statistica Optins Cnfiguratin Sftware Release 13.3 June 2017 Tw-Secnd Advantage Imprtant Infrmatin SOME TIBCO SOFTWARE EMBEDS OR BUNDLES OTHER TIBCO SOFTWARE. USE OF SUCH EMBEDDED OR BUNDLED TIBCO

More information

Different techniques to handle relationships in DAX. Advanced Relationships in DAX

Different techniques to handle relationships in DAX. Advanced Relationships in DAX www.sqlbi.cm Different techniques t handle relatinships in DAX Advanced Relatinships in DAX Wh We Are BI Experts and Cnsultants Funders f www.sqlbi.cm Prblem Slving Cmplex Prject Assistance Data Warehuse

More information

Linking network nodes

Linking network nodes Linking netwrk ndes The data link layer CS242 Cmputer Netwrks The link layer The transprt layer prvides cmmunicatin between tw prcesses. The netwrk layer prvides cmmunicatin between tw hsts. The link layer

More information

Point-to-Point Encryption (P2PE)

Point-to-Point Encryption (P2PE) Payment Card Industry (PCI) Pint-t-Pint Encryptin (P2PE) Template fr P2PE Applicatin Reprt n Validatin (Applicatin P-ROV) Applicatin P-ROV Template Fr Applicatins used with PCI P2PE Hardware/Hardware Standard

More information

CS4500/5500 Operating Systems Computer and Operating Systems Overview

CS4500/5500 Operating Systems Computer and Operating Systems Overview Operating Systems Cmputer and Operating Systems Overview Yanyan Zhuang Department f Cmputer Science http://www.cs.uccs.edu/~yzhuang UC. Clrad Springs Ref. MOS4E, OS@Austin, Clumbia, UWisc Overview Recap

More information

1 Version Spaces. CS 478 Homework 1 SOLUTION

1 Version Spaces. CS 478 Homework 1 SOLUTION CS 478 Hmewrk SOLUTION This is a pssible slutin t the hmewrk, althugh there may be ther crrect respnses t sme f the questins. The questins are repeated in this fnt, while answers are in a mnspaced fnt.

More information

Implementing a Data Warehouse with Microsoft SQL Server

Implementing a Data Warehouse with Microsoft SQL Server Implementing a Data Warehuse with Micrsft SQL Server Implementing a Data Warehuse with Micrsft SQL Server Curse Cde: 20463 Certificatin Exam: 70-463 Duratin: 5 Days Certificatin Track: MCSA: SQL Server

More information

In-Class Exercise. Hashing Used in: Hashing Algorithm

In-Class Exercise. Hashing Used in: Hashing Algorithm In-Class Exercise Hashing Used in: Encryptin fr authenticatin Hash a digital signature, get the value assciated with the digital signature,and bth are sent separately t receiver. The receiver then uses

More information

CSE 3320 Operating Systems Computer and Operating Systems Overview Jia Rao

CSE 3320 Operating Systems Computer and Operating Systems Overview Jia Rao CSE 3320 Operating Systems Cmputer and Operating Systems Overview Jia Ra Department f Cmputer Science and Engineering http://ranger.uta.edu/~jra Overview Recap f last class What is an perating system?

More information

EView/400i Management Pack for Systems Center Operations Manager (SCOM)

EView/400i Management Pack for Systems Center Operations Manager (SCOM) EView/400i Management Pack fr Systems Center Operatins Manager (SCOM) Cncepts Guide Versin 7.0 July 2015 1 Legal Ntices Warranty EView Technlgy makes n warranty f any kind with regard t this manual, including,

More information

DVS Enterprise Test Results for Microsoft Lync 2013 and Citrix XenDesktop 7. Dell Client Cloud Computing Engineering Revision: 1.

DVS Enterprise Test Results for Microsoft Lync 2013 and Citrix XenDesktop 7. Dell Client Cloud Computing Engineering Revision: 1. DVS Enterprise Test Results fr Micrsft Lync 2013 and Citrix XenDesktp 7 Dell Client Clud Cmputing Engineering Revisin: 1.0 11/6/13 THIS DOCUMENT IS FOR INFORMATIONAL PURPOSES ONLY, AND MAY CONTAIN TYPOGRAPHICAL

More information

Querying Data with Transact SQL

Querying Data with Transact SQL Querying Data with Transact SQL Curse Cde: 20761 Certificatin Exam: 70-761 Duratin: 5 Days Certificatin Track: MCSA: SQL 2016 Database Develpment Frmat: Classrm Level: 200 Abut this curse: This curse is

More information

Multi-Device Basic. Sample User's Guide. Intel SDK for OpenCL* Applications - Samples. Document Number: US

Multi-Device Basic. Sample User's Guide. Intel SDK for OpenCL* Applications - Samples. Document Number: US Sample User's Guide Intel SDK fr OpenCL* Applicatins - Samples Dcument Number: 329763-004US Cntents Legal Infrmatin... 3 Abut Multi-Device Basic Sample... 4 Algrithm... 4 OpenCL* Implementatin... 5 System-Level

More information

DesignScript summary:

DesignScript summary: DesignScript summary: This manual is designed fr thse readers wh have sme experience with prgramming and scripting languages and want t quickly understand hw DesignScript implements typical prgramming

More information

Wrong Path Events and Their Application to Early Misprediction Detection and Recovery

Wrong Path Events and Their Application to Early Misprediction Detection and Recovery Wrong Path Events and Their Application to Early Misprediction Detection and Recovery David N. Armstrong Hyesoon Kim Onur Mutlu Yale N. Patt University of Texas at Austin Motivation Branch predictors are

More information

CSE3320 Operating Systems Processes Jia Rao

CSE3320 Operating Systems Processes Jia Rao CSE3320 Operating Systems Prcesses Jia Ra Department f Cmputer Science and Engineering http://ranger.uta.edu/~jra Recap f the Last Class Cmputer hardware Time-sharing Space-sharing Characteristics } Lcality,

More information

Elasticity : Advanced Cloud Computing. Garth Gibson Greg Ganger Majd Sakr. Feb 6, Adv. Cloud Computing 1

Elasticity : Advanced Cloud Computing. Garth Gibson Greg Ganger Majd Sakr. Feb 6, Adv. Cloud Computing 1 Elasticity 15-719: Advanced Clud Cmputing Garth Gibsn Greg Ganger Majd Sakr Feb 6, 2017 15719 Adv. Clud Cmputing 1 Advanced Clud Cmputing Elasticity Readings Req d Ref 1: Dynamically Scaling Applicatins

More information

Position Statement for Multimodal Workshop

Position Statement for Multimodal Workshop Psitin Statement fr Multimdal Wrkshp Stéphane H. Maes stephane.maes@racle.cm Directr f Architecture Mbile, Vice and Wireless and Advanced Technlgies Oracle Crpratin 1. Persnal Interest Stéphane has several

More information

CSE 3320 Operating Systems Page Replacement Algorithms and Segmentation Jia Rao

CSE 3320 Operating Systems Page Replacement Algorithms and Segmentation Jia Rao CSE 0 Operating Systems Page Replacement Algrithms and Segmentatin Jia Ra Department f Cmputer Science and Engineering http://ranger.uta.edu/~jra Recap f last Class Virtual memry Memry verlad What if the

More information

HP Prime Exam Modes. HP Prime Graphing Calculator

HP Prime Exam Modes. HP Prime Graphing Calculator HP Prime Graphing Calculatr HP Prime Exam Mdes Classrm cntrl during exams is critical t ensuring students are using nly permitted tls t cmplete evaluatins. HP Prime prvides that cntrl. Learn mre abut HP

More information

Profiling & Debugging

Profiling & Debugging Prfiling & Debugging CISC 879 Tristan Vanderbruggen & Jhn Cavazs Dept f Cmputer & Infrmatin Sciences University f Delaware 1 Lecture Overview Prfiling and Debugging Why? Tls Data sets Race Cnditin and

More information

Telecommunication Protocols Laboratory Course

Telecommunication Protocols Laboratory Course Telecmmunicatin Prtcls Labratry Curse Lecture 2 March 11, 2004 http://www.ab.fi/~lpetre/teleprt/teleprt.html 1 Last time We examined sme key terms: prtcl, service, layer, netwrk architecture We examined

More information

Iteration Part 2. Review: Iteration [Part 1] Flow charts for two loop constructs. Review: Syntax of loops. while continuation_condition : statement1

Iteration Part 2. Review: Iteration [Part 1] Flow charts for two loop constructs. Review: Syntax of loops. while continuation_condition : statement1 Review: Iteratin [Part 1] Iteratin Part 2 CS111 Cmputer Prgramming Department f Cmputer Science Wellesley Cllege Iteratin is the repeated executin f a set f statements until a stpping cnditin is reached.

More information