Storage Binding in RTL synthesis

Size: px
Start display at page:

Download "Storage Binding in RTL synthesis"

Transcription

1 Storage Bndng n RTL synthess Pe Zhang Danel D. Gajsk Techncal Report ICS-0-37 August 0th, 200 Center for Embedded Computer Systems Department of Informaton and Computer Scence Unersty of Calforna, Irne Irne, CA , USA (949) {pzhang, gajsk}@cs.uc.edu Abstract In ths report, we present the mplementaton of storage bndng whch s one key process n hgh-leel (RTL) synthess. In preous related works, storage bndng s based on solated regster, or use 0- nteger lnear programmng (ILP) for multple port memores to get optmal result. In ths report, we ntroduce two new approaches that use graph-parttonng algorthm and groupng method to map arables nto regster fles and memory that are normally used n ndustry.

2 Contents Introducton 2 Target archtecture and fe styles n RTL model 2 2. Target archtecture Fe styles n RTL model 2 3 Project goal 3 4 Implementaton of regster bndng 3 4. Data structure of our mplementaton Approach one Get arable nformaton Bnd arrays to memores Clque-parttonng Group clques to regster fles Adjustment Example Approach two Splt all arables nto small groups Clque-Parttonng n small groups Adjustment Example 0 5 Experments 0 6 Summary 2 7 Future works 2 Reference 3

3 Lst of Fgures Target archtecture 2 Synthess tasks n RTL synthess CDFG data structure 4 4 The procedure of storage bndng approach 4 5 Get arable nformaton 4 6 Graph-parttonng algorthm 6 7 CDFG of the example 7 8 Lfetmes of arables 8 9 Clque-parttonng result Bndng result usng approach 8 The procedure of storage bndng approach Result of sorted lfetme arables 0 3 Result of clque-parttonng n each L 0 4 Bndng result usng approach 2 5 Square-root approxmaton 6 Process of graph-parttonng 2 7 Experment results (Approach ) Experment results (Approach 2).. 2 Lst of Tables Smple example of 3 clques 8 2 Varables Lfetme Table. 3 Prorty weght Table 4 Comparson of dfferent approaches () 2 5 Comparson of dfferent approaches (2) 2 Lst of Algorthm. Approach of Storage Bndng Usng Multple Port Regster Fles 5 2. Approach 2 of Storage Bndng Usng Multple Port Regster Fles 9

4 Storage Bndng n RTL Synthess Pe Zhang, Danel D. Gajsk Center for Embedded Computer Systems Unersty of Calforna, Irne Irne, CA , USA Abstract In ths report, we present the mplementaton of storage bndng whch s one key task n hghleel (RTL) synthess. In preous related works, storage bndng s based on solated regster, or uses 0- nteger lnear programmng (ILP) for multple port memores to get optmal result. In ths report, we ntroduce two new approaches that use clque-parttonng algorthm and groupng method to map arables nto regster fles and memores that are normally used n ndustry. Introducton Hgh-leel (RTL) synthess s normally dded nto four separate tasks: schedulng, storage bndng, functonal unt bndng and nterconnecton bndng. The storage bndng bnds the arables to the storage unts, such as regsters, regster fles and memores. Recently, there s a trend for desgner to use regster fles other than solated regsters n the storage bndng. There are seeral approaches for the storage bndng usng regster fles. But all of them are too complcated, tme-consumng and not feasble for the large scale desgns. In ths report, we descrbe some news approaches of storage bndng usng regster fles n hgh-leel (RTL) synthess. The rest of the report s organzed as follows: secton 2 shows the 5 leels n RTL descrpton; Secton 3 ges the goal of ths project; Secton 4 descrbes mplementaton, algorthm, data structure and of the RTL storage bndng. Fnally, experment results for our algorthms are gen n secton 5. Secton 6 makes a concluson and secton 7 ges some drectons of future Datapath Input mux control sgnals from control unt Regster Fle Regster Fle 2 Memory Bus Bus 2 Bus 3 mux Regster Regster Regster Regster ALU * / Regster Regster Datapath Output Fgure : Target archtecture Bus 4

5 works. 2 Target archtecture and fe styles n RTL model 2. Target archtecture Our archtecture s shown n fgure. Snce the RTL synthess s focus on data-path, we only show the data-path part of a general desgn, whch wll be controlled by the control sgnals from control unt. It s composed wth regster fles, memores, busses, functonal unts and multplexers. Regster fles and memores get data from nputs and nternal busses, send data to other nternal busses. Then the data from busses s the nput of functonal unts. After functonal unts fnsh ther tasks, they send data to busses for Regster fles and memores' nput, or for data-path outputs. Here, nstead of solated regster, our desgn s based on regster fles and memores as storage unts because regster fles and memores can be more structured, modular and dense, and requres less chp area because of ts regular layout structure. The regsters aboe and below the functonal unts, as well as latch between the functonal unts, are for the purpose of ppelne. 2.2 Fe styles n RTL model We use Fnte State Machne wth Data (FSMD) to descrbe the RTL model. FSMD s an FSM wth assgnment statement added to each state. The RTL model has two ews: a behaoral RTL ew and a structural RTL ew. The behaoral RTL ew specfes the operatons performed n each clock cycle wth explctly modelng the unts n the component's data-path and s obtaned by schedulng the operatons n the C code nto clock cycles. The structural RTL ew explctly models the schedulng of regster transfers nto clock cycles the allocaton and bndng of operatons, arables and nterconnectons to functonal unts, regster fles/memores and nternal busses respectely. From behaor RTL ew to structural RTL ew, t ncludes the three tasks of hgh-leel synthess: storage bndng, functonal unt bndng and nterconnecton bndng. In [GAJS00], the RTL model s dded nto 5 well-defned styles to represent the refnement steps lke schedulng, storage bndng, functonal unt bndng and nterconnecton bndng from behaoral RTL ew (style ) to structural RTL ew (style 5) Style : Behaoral RTL (unmapped RTL). Behaoral RTL only specfes the change of alues for some arables n each state. States, transtons and assgnment statements are n no way related to any mplementaton. Schedulng task focuses on ths style. Style 2: Storage-mapped RTL. The arables n style can be of two types. One type s arables whose alue s used n the same state n whch that alue s assgned. These arables wll be mplemented as wres or busses n the fnal mplementaton. The other type s arables whose alues are assgned n one state and used n other state. The states between the alue assgnment and ts last usage defne the lfetme of each arable. These arables must be mapped to storage unts such as regster, regster fles, and memores n the fnal mplementaton. Thus style 2 represents RTL descrpton n whch the second type of arables wth nonoerlappng lfetmes are grouped and assgned to storage unts. Storage bndng task wll mplement the transfer from style to style 2. Style 3: Functon-mapped RTL. In style 3, the operators and/or functons wth nonoerlappng lfetmes are grouped nto functonal unts, and a control encodng s assgned to each operaton n the functonal unt. Functonal unt bndng task wll mplement the transfer from style 2 to style 3. Style 4: Connecton-mapped RTL. Smlarly to style 2, the arables, wth nonoerlappng lfe tmes, that represent wres as well as nputs and outputs to storage elements and functonal unts are grouped and assgned to busses. Syntactcally, there s no dfference between wres and buses. Interconnecton bndng task wll mplement the transfer from style 3 to style 4. Style 5: Exposed-control (structural) RTL. In style 5, the FSMD mplementaton s 2

6 descrbed n two parts: netlst of data-path components and a control unt that control the data-path components usng control sgnals n each state. 3 Project goal Due to the 5 styles n RTL, we dde the hghleel (RTL) synthess nto seeral separate tasks, whch nclude schedulng, storage bndng, functonal unt bndng and nterconnecton bndng (as shown n fgure 2). The sequences of storage bndng, functonal unt bndng and nterconnecton bndng can be any order of these three tasks to make the whole synthess task more freely. From RTL style to RTL Style 2, arables wth non-oerlappng lfetmes need to be grouped and assgned to storage unts, such as regster, regster fles and memory. Snce the storage unts usually occupy a substantal slcon area n a mcrochp, we generally try to reduce the number of storage unts by mergng seeral arables nto a storage unt, whch wll lead to smaller area. RTL Descrpton (style ~4) number of regster n each regster fle, as well as the mnmum cost of nterconnecton. [AHCH92] uses 0- nteger lnear programmng (ILP) to group arables nto mult-port memores, whch s ery dffcult and tmeconsumng when the desgn sze s n large scale. Here we ntroduce another two approaches, whch use clque-parttonng and groupng to make the whole task much easer and to get the smlar results. In our mplementaton, the number of regster fles and memory s fxed before the storage bndng task, that s so-called resource constrant storage bndng. So the qualty metrcs s not the mnmum number of regster fles. We can use the followng metrcs to compare the results:. The number of regsters n each regster fles and the total number of regsters n all regster fles; 2. The ports usage n eery regster fles; After the storage bndng, we can ge users the feedback of bndng results. Users then can add/remoe the number of regster fles or change the sze of regster fles to hae hgher usage of resources. FSMD/ CDFG C++/HDL Compler Schedulng Storage Bndng Functon Bndng Connecton Bndng RTL Code Generator Lbrary In our mplementatons, we hae the followng assumptons:. All arables hae the same type; 2. All gen regster fles are the same; 3. The number of gen regster fles are suffcent for storage bndng, so we don't consder to mnmze the number of the regster fles. 4 Implementaton of storage bndng RTL Descrpton (style ~5) Fgure 2: Synthess tasks n RTL synthess Tradtonal storage bndngs use solated regsters, whch s not effcent. Here we use mult-port regster fles and memores as storage unts. Generally, the goal of storage bndng when usng regster fles s to desgn procedures to enable fast automatc arables to storage unts bndng. After storage bndng, each arable wth non-oerlappng lfetmes wll assgn to the mnmum regster fle modules and mnmum Instead of ILP, we hae two approaches for the storage bndng usng regster fles. The two approaches are all based on clque-parttonng and groupng method. They are smlar except that they hae dfference orders of step n each procedure. 4. Data structure of our mplementatons In order to perform our works, we use CDFG as our basc data structure, whch s also used n 3

7 other parts n hgh-leel synthess. Fgure 3 ge the class data structure of our CDFG. There are fe major steps n ths approach:. Get arables nformaton whch wll be used n the followng steps; 2. Bnd arrays to memory; 3. Clque-parttonng the arables; 4. Group the clques to the regster fles; 5. Adjustment; 4.2. Get arable nformaton Fgure 3: CDFG data structure The detal of the CDFG data structure can be found n [DOGA0]. 4.2 Approach one - Groupng after clque-parttonng The procedure of the storage bndng approach one s descrbed by the fgure 4. The algorthm related to regster fles s shown n algorthm. Frst, we wll get all arables nformaton from class HLS_FSMD The procedure of gettng arable nformaton s explan n fgure 5. Start last state? No get suggraph n current state/node last node n subgraph? Yes Input:.The scheduled states; 2.Bnded or unbnded functon nodes Yes No nodetype = control Get Storage Info from HLS_FSMD No No nodetype = storage Fnd arrays and map them to MEM Yes add node nfo. nto VAR_LIST next node Clque-parttonng on left arables next state Group clques to the number of gen regster fles End Fgure 5: Get arable nformaton Are ports and regsters n all regster fle's aalable? Y Output: The bnded storage nodes N Adjust the clques n regster fles Fgure 4: The procedure of storage bndng approach Bnd arrays to memores Snce the structure of memores s ery sutable for the arrays, we fnd the arrays n all arables and assgn them to the gen me mores Clque-parttonng 4

8 The followng steps are for the left arables that wll be assgned to regster fles. Let L be the set of all arables needed to be bnded: L={ 2... m } m: the number of arables The procedure of clque-parttonng algorthm [GAJS97] s descrbed as fgure 6. Here we hae to ge the defnton of the lfetme of a arable. It s defned as the set of states n whch that arable s ale. The ale states ncludes the state followng that state n whch t s assgned a new alue (wrte state ), eery state n whch t s used on the rght-hand sde of a assgnment statement (read state), and all states on each path between the wrte state and a read state. for all L do Start(); End(); endfor C = ClqueParttonng(L); // Get lfetmes of arables // Clque-Parttonng frst for all arables for all r C do Start(r); End (r); endfor SORT(C); ther n = NumofRF(RF); Set NumofRnRF() = number of regsters n each Set Aalableport() = number of ports n each // Get lfetmes of clques (regsters) // sort the clques (regsters) n C n ascendng order wth // start tmes, Start(r), as the prmary key and end tmes, // End(r), as the secondary key RF ; // =,2..n RF ; // =,2..n C... reg_ndex()=0; whle C Φ do //Dde C nto C, C... C, n= Number of Regster Fles 2 n for =; ++; <=n do temp_reg = frst r n C; ADD( C,temp_reg); reg_ndex()++; C=DELETE(C, temp_reg); f C =Φ then break; endf, C C 2 n = Φ ; endfor endwhle // Check Regster number and port number Whle any NumofRnRF() reg_ndex() or Aalableport() port() do f NumofRnRF() reg_ndex() or Aalableport() port() then MOVE( C, C,oneRegn j C ); // C has the least number of clques (regsters) j endf endwhle Algorthm : Approach of Storage Bndng Usng Multple Port Regster Fles 5

9 Then the compatblty graph wll be generated. The compatblty graph conssts of nodes and edges, n whch each node represents a arable and each edge between two nodes represents compatblty (prorty edge) or ncompatblty (ncompatblty edge) n mergng arables represented by these two nodes. The ncompatblty edge ndcates arables wth oerlappng lfetmes, whle the prorty edge ndcates arables wth non-oerlappng lfetmes. Each prorty has a weght w that can be represented as: w= s+d () s: The number of dfferent functonal unts that use both nodes as left or rght operands; d: The number of dfferent functonal unts that generate results for both nodes. No Start Create compatblty graph Merge hghest prorty nodes Upgrade compatblty graph All nodes ncompatble? Yes Stop Fgure 6: Clque-parttonng algorthm Here we should consder two condtons when we calculate w: before functonal unts bndng and after functonal unts bndng. If before functonal unts bndng, we can thnk the eery operaton as dfferent functonal unts f they hae dfferent symbolc descrpton, for examples, + and /. But f after functonal unts bndng, the same symbolc operaton descrptons may be mapped to dfferent functonal unts, so they can also be thought as dfferent functonal unts. Usng clque-parttonng algorthm, we can get the mnmum number of requred number of regsters. After graph parttonng, the arables are grouped nto dfferent clques, whch form the set C. Eery clque has ts own lfetme that s equal the total of the lfetmes of the arables n the clque. The lfetme n the clque may be not contnuous states. For examples, clque hae two arables whose lfetme are state ~3 and state 5~7 respectely, then the lfetme of ths clque s the state ~3 and 5~7. The lfetme of clques wll be used n the followng step Group clques to regster fles Regster fle ncludes seeral regster and multples n/out port. Snce the number of regster fles s user-gen and fxed, we should fnd a method to assgn the clques to the regster fles and make all regster fles do not hae regsters and ports conflcts. Suppose the number of ge regster fles s n. Here we use sorted clques lfetme to dstrbute the clques. We hae the followng steps to dstrbute the clques:. We sort the clques (regsters) n C n ascendng order wth ther start tmes, Start(r), as the prmary key and end tmes, End(r), as the secondary key; 2. We use n as the module, splt C nto small groups, C, C... C. The frst clque n C s 2 n assgn to C, the second one goes to C... 2 then the n+th clque to C agan. Repeat ths process untl all clques n C are used. C..., C C 2 n wll correspond to regster fle, regster fle2...regster fle n respectely Adjustment We should consder not only number of regsters n each regster fle, but also the ports of each regster fle. The clques number n each C maybe more than the number of regsters n regster fles. The ports of regster fles also could hae conflcts. When we assgn the dfferent clques to the regsters n regster fles, these clques can hae oerlappng lfetmes. It wll work fne f n eery state, the number of lfetme oerlappng clques whch 6

10 2 S = + 2 S 2 S x + 7 / = = 3 * 6 = 0 / 5 8 = = + 7 S 4 & 2 = 8 & 3 = Fgure 7: CDFG of the example nclude ths state do not exceed the number of ports n the target regster fles. The lfetmes of each arable are gen n fgure For examples, f there are three clques whose lfe tmes are showed n table. S S2 S3 S4 S5 Clque X X X Clque 2 X X Clque 3 X X X Table : Smple example of 3 clques 8. Here L={ S } In state 3, we can see all 3 clques hae oerlappng lfetmes. So f gen a regster fle hang two ports, only two of these three can be assgned to ths regster fle. Besdes lfetme, we also should consder n ports of the regster fle that s correspondng to the wrte state of the arables. So n ths step, we wll make some adjustment of the clques n each regster fle.. Fnd the C that hae regsters or ports conflcts; 2. Fnd the C whch has the least number of j regster and least number of ports usage; 3. Moe clque that cause conflct n C to C, j check f any conflct n both C and C ; If j so, go to agan Example Here we use an example to explan the approach. Fgure 7 ges the CDFG of the example. S 2 S 3 S 4 Fgure 8: Lfetmes of arables Then we do clque-partton and get the results shown n fgure 9. We group all arables nto 5 clques. We let C={ r r2 r3 r4 r 5 }. 7

11 r r 2 r 3 r 4 r5 Input:.The scheduled states; 2.Bnded or unbnded functon nodes 2 S Get Storage Info from HLS_FSMD 3 S 2 Fnd arrays and map them to MEM S Group arables to small groups. The number of small groups equal to gennumber of gen regster fles S clque-partton n each small group 2 3 Fgure 9: Clque-parttonng result Are ports and regsters n all regster fle's aalable? Y N Adjust the arables n small groups Three regster fles wth one nport, two outports and four regsters are ge as storage unts. So we should dde C nto C, C, C usng the 2 3 method n We get C ={ r r 4 }, C ={ r 2 2 r 5 } C ={ r 3 3 } Snce there are no conflcts n all regster fles, the fnal bndng result s shown n fgure Approach two - Clqueparttonng after groupng Besdes approach one, we hae another approach for the storage bndng. The procedure s shown n fgure. The algorthm related to regster fles s shown n algorthm 2. Output: The bnded storage nodes Fgure : The procedure of storage bndng approach 2 There are also fe major steps n ths approach:. Get arables nformaton whch wll be used n the followng steps; 2. Bnd arrays to memory; 3. Splt all arables nto small groups. The Number of small groups equals to the number of gen regster fles; 4. Clque-parttonng the arables n each groups; 5. Adjustment; The frst two steps are the same as approach one RF RF2 RF3 Fgure 0: Bndng results usng approach 8

12 4.3. Splt all arables nto small groups Instead of dong clque-parttonng frst n approach one, we splt arables frst. We let L be the set of all arables needed to be bnded: L={ 2... m } m: the number of arables Suppose the number of ge regster fles s n. Then we wll splt L nto L L... L,. 2 n We also use sorted arables lfe to dstrbute arables.. We sort the clques (regsters) n L n ascendng order wth ther start tmes, Start(), as the prmary key and end tmes, End(), as the secondary key; 2. We use n as the module, splt C nto small groups, L..., L L. The frst clque n C s 2 n assgn to L, the second one goes to L... 2 then the n+th clque to L agan. Repeat ths process untl all clques n C are used. L..., L L 2 n wll correspond to regster fle, regster fle2...regster fle n respectely. Usng ths method, we can spread the arables by ther lfetmes, whch wll be helpful n the followng steps Clque-Parttonng n small groups Then n each small group, we do clquefor all L do Start(); End (); endfor // Get lfetmes of arables SORT(L); n = NumofRF(RF); Set NumofRnRF() = number of regsters n each, L2 L n = Φ ; // sort the arables n L n ascendng order wth ther start // tmes, Start(), as the prmary key and end tmes, End(), as // the secondary key RF ; // =,2..n L... whle L Φ do //Dde L nto L, L... L, n= Number of Regster Fles 2 n for =; ++; <=n do temp_ar = frst n L; ADD( L,temp_ar); L=DELETE(L, temp_ar); f C = Φ then break; endf endfor endwhle for =; ++; n do endfor // Clque Parttonng n eery L Clque() = ClqueParttonng( L );// Get number of cluqes n each Whle any NumofRnRF() Clque() do f NumofRnRF() Clque() then MOVE( L, L,oneVarn j L ); // L has the least number of clques (regsters) j Clque() = ClqueParttonng( L ); Clque(j) = ClqueParttonng( L ); endf endwhle j L Algorthm 2: Approach 2 of Storage Bndng Usng Multple Port Regster Fles 9

13 parttonng algorthm that s descrbed n Adjustment We also need some adjustments, whch s smlar as 4.2.5, n ths approach to deal wth regsters and ports conflcts. The dfferences between them are that here we moe arable other than clque and we need to do clque-parttonng agan after arable moement. S r r 2 r 2 r 22 r 3 r Example We also use the same example as approach one and gen three regster fles wth one nport, two outports and four regsters. S 2 S Frst we get the lfetme of all arables L and sort them. The result s shown n fgure S S S 2 RF RF2 RF3 Fgure 3:Results of clque-parttonng n L Last, We get the bndng result n fgure 4 5 Experment S 3 S 4 Fgure 2: Result of sorted lfetme arables To test our mplementaton, we use square-root approxmaton (SRA) as our example. 2 2 a + b max((0.875x + 0.5y), x) (2) where x=max( a, b ) and y=mn( a, b ) The procedure of SRA s descrbed n fgure 5 that has 8 states. Then usng 4.3. method, we get: L ={ } L ={ } L ={ } The results of clque-parttonng n each shown n fgure 3. L are 0

14 s0 s s2 s3 a = In b = In2 Start t = a t2 = b x = max(t,t2) y = mn(t,t2) t3 = x >> 3 t4 = y >> 0 t3 = 0.25x t4 = 0.5x a b t t2 x y t4 t3 t5 t6 t7 a - b - t - t2 - x - y - t4 - t3 - t5 - t6 - t7 - Table 3: Prorty weght Table s4 s5 t5 = x - t3 t5 = 0.875x For the approach one, fgure 6 ge the clqueparttonng of the SRA. s6 s7 t6 = t4 + t5 t7 = max(t6, x) Done = Out = t7 Fgure 5: Square-root approxmaton Table 2 and table 3 ge the arables lfetme and prorty weght respectely. S0 S S2 S3 S4 S5 S6 S7 a X b X t X t2 X x X X X X y X t4 X X t3 X t5 X t6 X t7 X After clque-parttonng, we got three clques: Clque (t4), lfetme:s4~s5 Clque 2(b,t,x,t7), lfetme: s~s7 Clque 3 (a,t2,t3,t5,t6,y), lfetme:s~s6. Then we sort the lfetmes of these clques, we got a squence of Clque 2, Clque 3, Clque. The gen resources are two regster fles wth two out ports and one n port. So we group Clque 2 and Clque to regster fle, and Clque 3 to regster fle 2. After checkng the regsters and ports conflcts, we found they are all feasble. From another angle of ews, we can see, all clques' lfetmes nclude state s4 and s5. That s the s4 and s5 hae oerlappng 3 tmes. So, these three clques can not assgn to the same regster fle. Also, clque and clque 3, clque 2 and clque 3 can not be assgned nto the same regster fle snce there wrte state are oerlapped. Table 2: Varables Lfetme Table RF RF2 RF3 Fgure 4: Bndng results usng approach 2

15 a t y t4 a, t, x, t4, t7 b, t2, y, t3, t6 t3 t5 t6 t5 b t2 x t7 a t y t4 t3 t5 t6 Fgure 8: Experment Results (Approach 2) b t2 x t7 a y t4 Table 4 and 5 ge the comparson of dfferent approaches. a b t2 t x t7 t4 t3 t5 t6 Total number of regsters Regster usage n RF Regster usage n RF2 Approach 3 50% 25% Approach % 25% Table 4: Comparson of dfferent approaches () b t x t7 t4 t3 t5 t6 y t2 Inport usage n RF Outport usage n RF Inport usage n RF2 Outport usage n RF2 Approach 62.5% 43.75% 75% 37.5% Approach 2 75% 43.75% 62.5% 37.5% Table 5: Comparson of dfferent approaches (2) a t3 t5 t6 y t2 b t x t7 Fgure 6: Process of clque-parttonng After consder these ssues, the fnal bndng results s showed n fgure 7. t4 b,t,x,t7 a,t2,t3,t5,t6,y Fgure 7: Experment Results (Approach ) If we use approach 2, we can get the followng results (fgure 8): 6 Summary In ths report, we use regster fles n the storage bndng n the hgh-leel (RTL) synthess. In the mplementaton, the clque-parttonng algorthm and groupng method are used to get the mnmum number of regster and assgn these regsters n dfferent regster fles. Dfferent approaches hae smlar results. Results show that usng our mplementaton, we can get decent results. 7 Future works Here, we also ge some drectons on the future works. Frst, we can use dfferent types of arables and regster fles to do storage bndng, whch s general n real desgns. Second, we can consder the nterconnecton cost when do storage bndng. Thrd, We should decde whch ports of regster fle should be used for whch regster n each state (port bndng). These works should be combned wth schedulng and nterconnecton bndng works. 2

16 References [GAJS00] D. Gajsk: RTL Desgn and Methodology, Unersty of Calforna, Irne, Techncal Report ICS-00-35, Noember 2000 [GWDL92]D. Gajsk et al. : Hgh leel synthess: Introducton to Chp and System Desgn, Kluwer Academc Publshers, 992 [AHCH92] I. Ahmad, C. Y. R. Chen: Groupng Varables nto Multport memores for ASIC Data Path Synthess, ASIC Conference and Exhbt, 992. [DOGA0] Dongwan Shn et al.: CDFG Representaton for SpecC RTL, Unersty of Calforna, Irne, Techncal Report ICS-0-50, June, 200 [GAJS97] D. Gajsk: Prncples of Dgtal Desgn, Prentce-Hall, Inc, 997 3

Compiler Design. Spring Register Allocation. Sample Exercises and Solutions. Prof. Pedro C. Diniz

Compiler Design. Spring Register Allocation. Sample Exercises and Solutions. Prof. Pedro C. Diniz Compler Desgn Sprng 2014 Regster Allocaton Sample Exercses and Solutons Prof. Pedro C. Dnz USC / Informaton Scences Insttute 4676 Admralty Way, Sute 1001 Marna del Rey, Calforna 90292 pedro@s.edu Regster

More information

The Codesign Challenge

The Codesign Challenge ECE 4530 Codesgn Challenge Fall 2007 Hardware/Software Codesgn The Codesgn Challenge Objectves In the codesgn challenge, your task s to accelerate a gven software reference mplementaton as fast as possble.

More information

AADL : about scheduling analysis

AADL : about scheduling analysis AADL : about schedulng analyss Schedulng analyss, what s t? Embedded real-tme crtcal systems have temporal constrants to meet (e.g. deadlne). Many systems are bult wth operatng systems provdng multtaskng

More information

Load Balancing for Hex-Cell Interconnection Network

Load Balancing for Hex-Cell Interconnection Network Int. J. Communcatons, Network and System Scences,,, - Publshed Onlne Aprl n ScRes. http://www.scrp.org/journal/jcns http://dx.do.org/./jcns.. Load Balancng for Hex-Cell Interconnecton Network Saher Manaseer,

More information

The Greedy Method. Outline and Reading. Change Money Problem. Greedy Algorithms. Applications of the Greedy Strategy. The Greedy Method Technique

The Greedy Method. Outline and Reading. Change Money Problem. Greedy Algorithms. Applications of the Greedy Strategy. The Greedy Method Technique //00 :0 AM Outlne and Readng The Greedy Method The Greedy Method Technque (secton.) Fractonal Knapsack Problem (secton..) Task Schedulng (secton..) Mnmum Spannng Trees (secton.) Change Money Problem Greedy

More information

An Optimal Algorithm for Prufer Codes *

An Optimal Algorithm for Prufer Codes * J. Software Engneerng & Applcatons, 2009, 2: 111-115 do:10.4236/jsea.2009.22016 Publshed Onlne July 2009 (www.scrp.org/journal/jsea) An Optmal Algorthm for Prufer Codes * Xaodong Wang 1, 2, Le Wang 3,

More information

ELEC 377 Operating Systems. Week 6 Class 3

ELEC 377 Operating Systems. Week 6 Class 3 ELEC 377 Operatng Systems Week 6 Class 3 Last Class Memory Management Memory Pagng Pagng Structure ELEC 377 Operatng Systems Today Pagng Szes Vrtual Memory Concept Demand Pagng ELEC 377 Operatng Systems

More information

Programming in Fortran 90 : 2017/2018

Programming in Fortran 90 : 2017/2018 Programmng n Fortran 90 : 2017/2018 Programmng n Fortran 90 : 2017/2018 Exercse 1 : Evaluaton of functon dependng on nput Wrte a program who evaluate the functon f (x,y) for any two user specfed values

More information

A Binarization Algorithm specialized on Document Images and Photos

A Binarization Algorithm specialized on Document Images and Photos A Bnarzaton Algorthm specalzed on Document mages and Photos Ergna Kavalleratou Dept. of nformaton and Communcaton Systems Engneerng Unversty of the Aegean kavalleratou@aegean.gr Abstract n ths paper, a

More information

Circuit Analysis I (ENGR 2405) Chapter 3 Method of Analysis Nodal(KCL) and Mesh(KVL)

Circuit Analysis I (ENGR 2405) Chapter 3 Method of Analysis Nodal(KCL) and Mesh(KVL) Crcut Analyss I (ENG 405) Chapter Method of Analyss Nodal(KCL) and Mesh(KVL) Nodal Analyss If nstead of focusng on the oltages of the crcut elements, one looks at the oltages at the nodes of the crcut,

More information

Parallelism for Nested Loops with Non-uniform and Flow Dependences

Parallelism for Nested Loops with Non-uniform and Flow Dependences Parallelsm for Nested Loops wth Non-unform and Flow Dependences Sam-Jn Jeong Dept. of Informaton & Communcaton Engneerng, Cheonan Unversty, 5, Anseo-dong, Cheonan, Chungnam, 330-80, Korea. seong@cheonan.ac.kr

More information

6.854 Advanced Algorithms Petar Maymounkov Problem Set 11 (November 23, 2005) With: Benjamin Rossman, Oren Weimann, and Pouya Kheradpour

6.854 Advanced Algorithms Petar Maymounkov Problem Set 11 (November 23, 2005) With: Benjamin Rossman, Oren Weimann, and Pouya Kheradpour 6.854 Advanced Algorthms Petar Maymounkov Problem Set 11 (November 23, 2005) Wth: Benjamn Rossman, Oren Wemann, and Pouya Kheradpour Problem 1. We reduce vertex cover to MAX-SAT wth weghts, such that the

More information

Memory Modeling in ESL-RTL Equivalence Checking

Memory Modeling in ESL-RTL Equivalence Checking 11.4 Memory Modelng n ESL-RTL Equvalence Checkng Alfred Koelbl 2025 NW Cornelus Pass Rd. Hllsboro, OR 97124 koelbl@synopsys.com Jerry R. Burch 2025 NW Cornelus Pass Rd. Hllsboro, OR 97124 burch@synopsys.com

More information

Complex Numbers. Now we also saw that if a and b were both positive then ab = a b. For a second let s forget that restriction and do the following.

Complex Numbers. Now we also saw that if a and b were both positive then ab = a b. For a second let s forget that restriction and do the following. Complex Numbers The last topc n ths secton s not really related to most of what we ve done n ths chapter, although t s somewhat related to the radcals secton as we wll see. We also won t need the materal

More information

Virtual Memory. Background. No. 10. Virtual Memory: concept. Logical Memory Space (review) Demand Paging(1) Virtual Memory

Virtual Memory. Background. No. 10. Virtual Memory: concept. Logical Memory Space (review) Demand Paging(1) Virtual Memory Background EECS. Operatng System Fundamentals No. Vrtual Memory Prof. Hu Jang Department of Electrcal Engneerng and Computer Scence, York Unversty Memory-management methods normally requres the entre process

More information

Tsinghua University at TAC 2009: Summarizing Multi-documents by Information Distance

Tsinghua University at TAC 2009: Summarizing Multi-documents by Information Distance Tsnghua Unversty at TAC 2009: Summarzng Mult-documents by Informaton Dstance Chong Long, Mnle Huang, Xaoyan Zhu State Key Laboratory of Intellgent Technology and Systems, Tsnghua Natonal Laboratory for

More information

Behavior-Level Observability Analysis for Operation Gating in Low-Power Behavioral Synthesis

Behavior-Level Observability Analysis for Operation Gating in Low-Power Behavioral Synthesis Behavor-Level Observablty Analyss for Operaton Gatng n Low-Power Behavoral Synthess JASON CONG, BIN LIU, RUPAK MAJUMDAR Unversty of Calforna, Los Angeles and ZHIRU ZHANG AutoESL Desgn Technologes, Inc.

More information

Specifications in 2001

Specifications in 2001 Specfcatons n 200 MISTY (updated : May 3, 2002) September 27, 200 Mtsubsh Electrc Corporaton Block Cpher Algorthm MISTY Ths document shows a complete descrpton of encrypton algorthm MISTY, whch are secret-key

More information

Efficient Distributed File System (EDFS)

Efficient Distributed File System (EDFS) Effcent Dstrbuted Fle System (EDFS) (Sem-Centralzed) Debessay(Debsh) Fesehaye, Rahul Malk & Klara Naherstedt Unversty of Illnos-Urbana Champagn Contents Problem Statement, Related Work, EDFS Desgn Rate

More information

Type-2 Fuzzy Non-uniform Rational B-spline Model with Type-2 Fuzzy Data

Type-2 Fuzzy Non-uniform Rational B-spline Model with Type-2 Fuzzy Data Malaysan Journal of Mathematcal Scences 11(S) Aprl : 35 46 (2017) Specal Issue: The 2nd Internatonal Conference and Workshop on Mathematcal Analyss (ICWOMA 2016) MALAYSIAN JOURNAL OF MATHEMATICAL SCIENCES

More information

Parallel matrix-vector multiplication

Parallel matrix-vector multiplication Appendx A Parallel matrx-vector multplcaton The reduced transton matrx of the three-dmensonal cage model for gel electrophoress, descrbed n secton 3.2, becomes excessvely large for polymer lengths more

More information

Course Introduction. Algorithm 8/31/2017. COSC 320 Advanced Data Structures and Algorithms. COSC 320 Advanced Data Structures and Algorithms

Course Introduction. Algorithm 8/31/2017. COSC 320 Advanced Data Structures and Algorithms. COSC 320 Advanced Data Structures and Algorithms Course Introducton Course Topcs Exams, abs, Proects A quc loo at a few algorthms 1 Advanced Data Structures and Algorthms Descrpton: We are gong to dscuss algorthm complexty analyss, algorthm desgn technques

More information

Assembler. Building a Modern Computer From First Principles.

Assembler. Building a Modern Computer From First Principles. Assembler Buldng a Modern Computer From Frst Prncples www.nand2tetrs.org Elements of Computng Systems, Nsan & Schocken, MIT Press, www.nand2tetrs.org, Chapter 6: Assembler slde Where we are at: Human Thought

More information

A fast algorithm for color image segmentation

A fast algorithm for color image segmentation Unersty of Wollongong Research Onlne Faculty of Informatcs - Papers (Arche) Faculty of Engneerng and Informaton Scences 006 A fast algorthm for color mage segmentaton L. Dong Unersty of Wollongong, lju@uow.edu.au

More information

GSLM Operations Research II Fall 13/14

GSLM Operations Research II Fall 13/14 GSLM 58 Operatons Research II Fall /4 6. Separable Programmng Consder a general NLP mn f(x) s.t. g j (x) b j j =. m. Defnton 6.. The NLP s a separable program f ts objectve functon and all constrants are

More information

An Iterative Solution Approach to Process Plant Layout using Mixed Integer Optimisation

An Iterative Solution Approach to Process Plant Layout using Mixed Integer Optimisation 17 th European Symposum on Computer Aded Process Engneerng ESCAPE17 V. Plesu and P.S. Agach (Edtors) 2007 Elsever B.V. All rghts reserved. 1 An Iteratve Soluton Approach to Process Plant Layout usng Mxed

More information

A Fast Content-Based Multimedia Retrieval Technique Using Compressed Data

A Fast Content-Based Multimedia Retrieval Technique Using Compressed Data A Fast Content-Based Multmeda Retreval Technque Usng Compressed Data Borko Furht and Pornvt Saksobhavvat NSF Multmeda Laboratory Florda Atlantc Unversty, Boca Raton, Florda 3343 ABSTRACT In ths paper,

More information

Parallel Inverse Halftoning by Look-Up Table (LUT) Partitioning

Parallel Inverse Halftoning by Look-Up Table (LUT) Partitioning Parallel Inverse Halftonng by Look-Up Table (LUT) Parttonng Umar F. Sddq and Sadq M. Sat umar@ccse.kfupm.edu.sa, sadq@kfupm.edu.sa KFUPM Box: Department of Computer Engneerng, Kng Fahd Unversty of Petroleum

More information

For instance, ; the five basic number-sets are increasingly more n A B & B A A = B (1)

For instance, ; the five basic number-sets are increasingly more n A B & B A A = B (1) Secton 1.2 Subsets and the Boolean operatons on sets If every element of the set A s an element of the set B, we say that A s a subset of B, or that A s contaned n B, or that B contans A, and we wrte A

More information

Module Management Tool in Software Development Organizations

Module Management Tool in Software Development Organizations Journal of Computer Scence (5): 8-, 7 ISSN 59-66 7 Scence Publcatons Management Tool n Software Development Organzatons Ahmad A. Al-Rababah and Mohammad A. Al-Rababah Faculty of IT, Al-Ahlyyah Amman Unversty,

More information

Meta-heuristics for Multidimensional Knapsack Problems

Meta-heuristics for Multidimensional Knapsack Problems 2012 4th Internatonal Conference on Computer Research and Development IPCSIT vol.39 (2012) (2012) IACSIT Press, Sngapore Meta-heurstcs for Multdmensonal Knapsack Problems Zhbao Man + Computer Scence Department,

More information

A New Approach For the Ranking of Fuzzy Sets With Different Heights

A New Approach For the Ranking of Fuzzy Sets With Different Heights New pproach For the ankng of Fuzzy Sets Wth Dfferent Heghts Pushpnder Sngh School of Mathematcs Computer pplcatons Thapar Unversty, Patala-7 00 Inda pushpndersnl@gmalcom STCT ankng of fuzzy sets plays

More information

Simulation Based Analysis of FAST TCP using OMNET++

Simulation Based Analysis of FAST TCP using OMNET++ Smulaton Based Analyss of FAST TCP usng OMNET++ Umar ul Hassan 04030038@lums.edu.pk Md Term Report CS678 Topcs n Internet Research Sprng, 2006 Introducton Internet traffc s doublng roughly every 3 months

More information

Data Representation in Digital Design, a Single Conversion Equation and a Formal Languages Approach

Data Representation in Digital Design, a Single Conversion Equation and a Formal Languages Approach Data Representaton n Dgtal Desgn, a Sngle Converson Equaton and a Formal Languages Approach Hassan Farhat Unversty of Nebraska at Omaha Abstract- In the study of data representaton n dgtal desgn and computer

More information

NUMERICAL SOLVING OPTIMAL CONTROL PROBLEMS BY THE METHOD OF VARIATIONS

NUMERICAL SOLVING OPTIMAL CONTROL PROBLEMS BY THE METHOD OF VARIATIONS ARPN Journal of Engneerng and Appled Scences 006-017 Asan Research Publshng Network (ARPN). All rghts reserved. NUMERICAL SOLVING OPTIMAL CONTROL PROBLEMS BY THE METHOD OF VARIATIONS Igor Grgoryev, Svetlana

More information

Mathematics 256 a course in differential equations for engineering students

Mathematics 256 a course in differential equations for engineering students Mathematcs 56 a course n dfferental equatons for engneerng students Chapter 5. More effcent methods of numercal soluton Euler s method s qute neffcent. Because the error s essentally proportonal to the

More information

CSCI 104 Sorting Algorithms. Mark Redekopp David Kempe

CSCI 104 Sorting Algorithms. Mark Redekopp David Kempe CSCI 104 Sortng Algorthms Mark Redekopp Davd Kempe Algorthm Effcency SORTING 2 Sortng If we have an unordered lst, sequental search becomes our only choce If we wll perform a lot of searches t may be benefcal

More information

Multiblock method for database generation in finite element programs

Multiblock method for database generation in finite element programs Proc. of the 9th WSEAS Int. Conf. on Mathematcal Methods and Computatonal Technques n Electrcal Engneerng, Arcachon, October 13-15, 2007 53 Multblock method for database generaton n fnte element programs

More information

Learning the Kernel Parameters in Kernel Minimum Distance Classifier

Learning the Kernel Parameters in Kernel Minimum Distance Classifier Learnng the Kernel Parameters n Kernel Mnmum Dstance Classfer Daoqang Zhang 1,, Songcan Chen and Zh-Hua Zhou 1* 1 Natonal Laboratory for Novel Software Technology Nanjng Unversty, Nanjng 193, Chna Department

More information

Intro. Iterators. 1. Access

Intro. Iterators. 1. Access Intro Ths mornng I d lke to talk a lttle bt about s and s. We wll start out wth smlartes and dfferences, then we wll see how to draw them n envronment dagrams, and we wll fnsh wth some examples. Happy

More information

CMPS 10 Introduction to Computer Science Lecture Notes

CMPS 10 Introduction to Computer Science Lecture Notes CPS 0 Introducton to Computer Scence Lecture Notes Chapter : Algorthm Desgn How should we present algorthms? Natural languages lke Englsh, Spansh, or French whch are rch n nterpretaton and meanng are not

More information

Brave New World Pseudocode Reference

Brave New World Pseudocode Reference Brave New World Pseudocode Reference Pseudocode s a way to descrbe how to accomplsh tasks usng basc steps lke those a computer mght perform. In ths week s lab, you'll see how a form of pseudocode can be

More information

CHAPTER 2 DECOMPOSITION OF GRAPHS

CHAPTER 2 DECOMPOSITION OF GRAPHS CHAPTER DECOMPOSITION OF GRAPHS. INTRODUCTION A graph H s called a Supersubdvson of a graph G f H s obtaned from G by replacng every edge uv of G by a bpartte graph,m (m may vary for each edge by dentfyng

More information

VRT012 User s guide V0.1. Address: Žirmūnų g. 27, Vilnius LT-09105, Phone: (370-5) , Fax: (370-5) ,

VRT012 User s guide V0.1. Address: Žirmūnų g. 27, Vilnius LT-09105, Phone: (370-5) , Fax: (370-5) , VRT012 User s gude V0.1 Thank you for purchasng our product. We hope ths user-frendly devce wll be helpful n realsng your deas and brngng comfort to your lfe. Please take few mnutes to read ths manual

More information

Sequential search. Building Java Programs Chapter 13. Sequential search. Sequential search

Sequential search. Building Java Programs Chapter 13. Sequential search. Sequential search Sequental search Buldng Java Programs Chapter 13 Searchng and Sortng sequental search: Locates a target value n an array/lst by examnng each element from start to fnsh. How many elements wll t need to

More information

Edge Detection in Noisy Images Using the Support Vector Machines

Edge Detection in Noisy Images Using the Support Vector Machines Edge Detecton n Nosy Images Usng the Support Vector Machnes Hlaro Gómez-Moreno, Saturnno Maldonado-Bascón, Francsco López-Ferreras Sgnal Theory and Communcatons Department. Unversty of Alcalá Crta. Madrd-Barcelona

More information

TPL-Aware Displacement-driven Detailed Placement Refinement with Coloring Constraints

TPL-Aware Displacement-driven Detailed Placement Refinement with Coloring Constraints TPL-ware Dsplacement-drven Detaled Placement Refnement wth Colorng Constrants Tao Ln Iowa State Unversty tln@astate.edu Chrs Chu Iowa State Unversty cnchu@astate.edu BSTRCT To mnmze the effect of process

More information

Problem Set 3 Solutions

Problem Set 3 Solutions Introducton to Algorthms October 4, 2002 Massachusetts Insttute of Technology 6046J/18410J Professors Erk Demane and Shaf Goldwasser Handout 14 Problem Set 3 Solutons (Exercses were not to be turned n,

More information

Sum of Linear and Fractional Multiobjective Programming Problem under Fuzzy Rules Constraints

Sum of Linear and Fractional Multiobjective Programming Problem under Fuzzy Rules Constraints Australan Journal of Basc and Appled Scences, 2(4): 1204-1208, 2008 ISSN 1991-8178 Sum of Lnear and Fractonal Multobjectve Programmng Problem under Fuzzy Rules Constrants 1 2 Sanjay Jan and Kalash Lachhwan

More information

ON SOME ENTERTAINING APPLICATIONS OF THE CONCEPT OF SET IN COMPUTER SCIENCE COURSE

ON SOME ENTERTAINING APPLICATIONS OF THE CONCEPT OF SET IN COMPUTER SCIENCE COURSE Yordzhev K., Kostadnova H. Інформаційні технології в освіті ON SOME ENTERTAINING APPLICATIONS OF THE CONCEPT OF SET IN COMPUTER SCIENCE COURSE Yordzhev K., Kostadnova H. Some aspects of programmng educaton

More information

Today s Outline. Sorting: The Big Picture. Why Sort? Selection Sort: Idea. Insertion Sort: Idea. Sorting Chapter 7 in Weiss.

Today s Outline. Sorting: The Big Picture. Why Sort? Selection Sort: Idea. Insertion Sort: Idea. Sorting Chapter 7 in Weiss. Today s Outlne Sortng Chapter 7 n Wess CSE 26 Data Structures Ruth Anderson Announcements Wrtten Homework #6 due Frday 2/26 at the begnnng of lecture Proect Code due Mon March 1 by 11pm Today s Topcs:

More information

A SYSTOLIC APPROACH TO LOOP PARTITIONING AND MAPPING INTO FIXED SIZE DISTRIBUTED MEMORY ARCHITECTURES

A SYSTOLIC APPROACH TO LOOP PARTITIONING AND MAPPING INTO FIXED SIZE DISTRIBUTED MEMORY ARCHITECTURES A SYSOLIC APPROACH O LOOP PARIIONING AND MAPPING INO FIXED SIZE DISRIBUED MEMORY ARCHIECURES Ioanns Drosts, Nektaros Kozrs, George Papakonstantnou and Panayots sanakas Natonal echncal Unversty of Athens

More information

Solving two-person zero-sum game by Matlab

Solving two-person zero-sum game by Matlab Appled Mechancs and Materals Onlne: 2011-02-02 ISSN: 1662-7482, Vols. 50-51, pp 262-265 do:10.4028/www.scentfc.net/amm.50-51.262 2011 Trans Tech Publcatons, Swtzerland Solvng two-person zero-sum game by

More information

On Some Entertaining Applications of the Concept of Set in Computer Science Course

On Some Entertaining Applications of the Concept of Set in Computer Science Course On Some Entertanng Applcatons of the Concept of Set n Computer Scence Course Krasmr Yordzhev *, Hrstna Kostadnova ** * Assocate Professor Krasmr Yordzhev, Ph.D., Faculty of Mathematcs and Natural Scences,

More information

Smoothing Spline ANOVA for variable screening

Smoothing Spline ANOVA for variable screening Smoothng Splne ANOVA for varable screenng a useful tool for metamodels tranng and mult-objectve optmzaton L. Rcco, E. Rgon, A. Turco Outlne RSM Introducton Possble couplng Test case MOO MOO wth Game Theory

More information

RADIX-10 PARALLEL DECIMAL MULTIPLIER

RADIX-10 PARALLEL DECIMAL MULTIPLIER RADIX-10 PARALLEL DECIMAL MULTIPLIER 1 MRUNALINI E. INGLE & 2 TEJASWINI PANSE 1&2 Electroncs Engneerng, Yeshwantrao Chavan College of Engneerng, Nagpur, Inda E-mal : mrunalngle@gmal.com, tejaswn.deshmukh@gmal.com

More information

High level vs Low Level. What is a Computer Program? What does gcc do for you? Program = Instructions + Data. Basic Computer Organization

High level vs Low Level. What is a Computer Program? What does gcc do for you? Program = Instructions + Data. Basic Computer Organization What s a Computer Program? Descrpton of algorthms and data structures to acheve a specfc ojectve Could e done n any language, even a natural language lke Englsh Programmng language: A Standard notaton

More information

Chapter 1. Introduction

Chapter 1. Introduction Chapter 1 Introducton 1.1 Parallel Processng There s a contnual demand for greater computatonal speed from a computer system than s currently possble (.e. sequental systems). Areas need great computatonal

More information

A Deflected Grid-based Algorithm for Clustering Analysis

A Deflected Grid-based Algorithm for Clustering Analysis A Deflected Grd-based Algorthm for Clusterng Analyss NANCY P. LIN, CHUNG-I CHANG, HAO-EN CHUEH, HUNG-JEN CHEN, WEI-HUA HAO Department of Computer Scence and Informaton Engneerng Tamkang Unversty 5 Yng-chuan

More information

Video Proxy System for a Large-scale VOD System (DINA)

Video Proxy System for a Large-scale VOD System (DINA) Vdeo Proxy System for a Large-scale VOD System (DINA) KWUN-CHUNG CHAN #, KWOK-WAI CHEUNG *# #Department of Informaton Engneerng *Centre of Innovaton and Technology The Chnese Unversty of Hong Kong SHATIN,

More information

Support Vector Machines

Support Vector Machines /9/207 MIST.6060 Busness Intellgence and Data Mnng What are Support Vector Machnes? Support Vector Machnes Support Vector Machnes (SVMs) are supervsed learnng technques that analyze data and recognze patterns.

More information

Scheduling with Integer Time Budgeting for Low-Power Optimization

Scheduling with Integer Time Budgeting for Low-Power Optimization Schedlng wth Integer Tme Bdgetng for Low-Power Optmzaton We Jang, Zhr Zhang, Modrag Potkonjak and Jason Cong Compter Scence Department Unversty of Calforna, Los Angeles Spported by NSF, SRC. Otlne Introdcton

More information

High-Boost Mesh Filtering for 3-D Shape Enhancement

High-Boost Mesh Filtering for 3-D Shape Enhancement Hgh-Boost Mesh Flterng for 3-D Shape Enhancement Hrokazu Yagou Λ Alexander Belyaev y Damng We z Λ y z ; ; Shape Modelng Laboratory, Unversty of Azu, Azu-Wakamatsu 965-8580 Japan y Computer Graphcs Group,

More information

Greedy Technique - Definition

Greedy Technique - Definition Greedy Technque Greedy Technque - Defnton The greedy method s a general algorthm desgn paradgm, bult on the follong elements: confguratons: dfferent choces, collectons, or values to fnd objectve functon:

More information

Assembler. Shimon Schocken. Spring Elements of Computing Systems 1 Assembler (Ch. 6) Compiler. abstract interface.

Assembler. Shimon Schocken. Spring Elements of Computing Systems 1 Assembler (Ch. 6) Compiler. abstract interface. IDC Herzlya Shmon Schocken Assembler Shmon Schocken Sprng 2005 Elements of Computng Systems 1 Assembler (Ch. 6) Where we are at: Human Thought Abstract desgn Chapters 9, 12 abstract nterface H.L. Language

More information

A Fast Visual Tracking Algorithm Based on Circle Pixels Matching

A Fast Visual Tracking Algorithm Based on Circle Pixels Matching A Fast Vsual Trackng Algorthm Based on Crcle Pxels Matchng Zhqang Hou hou_zhq@sohu.com Chongzhao Han czhan@mal.xjtu.edu.cn Ln Zheng Abstract: A fast vsual trackng algorthm based on crcle pxels matchng

More information

Assignment # 2. Farrukh Jabeen Algorithms 510 Assignment #2 Due Date: June 15, 2009.

Assignment # 2. Farrukh Jabeen Algorithms 510 Assignment #2 Due Date: June 15, 2009. Farrukh Jabeen Algorthms 51 Assgnment #2 Due Date: June 15, 29. Assgnment # 2 Chapter 3 Dscrete Fourer Transforms Implement the FFT for the DFT. Descrbed n sectons 3.1 and 3.2. Delverables: 1. Concse descrpton

More information

Maintaining temporal validity of real-time data on non-continuously executing resources

Maintaining temporal validity of real-time data on non-continuously executing resources Mantanng temporal valdty of real-tme data on non-contnuously executng resources Tan Ba, Hong Lu and Juan Yang Hunan Insttute of Scence and Technology, College of Computer Scence, 44, Yueyang, Chna Wuhan

More information

Classifier Selection Based on Data Complexity Measures *

Classifier Selection Based on Data Complexity Measures * Classfer Selecton Based on Data Complexty Measures * Edth Hernández-Reyes, J.A. Carrasco-Ochoa, and J.Fco. Martínez-Trndad Natonal Insttute for Astrophyscs, Optcs and Electroncs, Lus Enrque Erro No.1 Sta.

More information

Lossless Compression of Map Contours by Context Tree Modeling of Chain Codes

Lossless Compression of Map Contours by Context Tree Modeling of Chain Codes Lossless Compresson of Map Contours by Context Tree Modelng of Chan Codes Alexander Akmo, Alexander Kolesnko, and Pas Fränt Department of Computer Scence, Unersty of Joensuu, P.O. Box 111, 80110 Joensuu,

More information

Load-Balanced Anycast Routing

Load-Balanced Anycast Routing Load-Balanced Anycast Routng Chng-Yu Ln, Jung-Hua Lo, and Sy-Yen Kuo Department of Electrcal Engneerng atonal Tawan Unversty, Tape, Tawan sykuo@cc.ee.ntu.edu.tw Abstract For fault-tolerance and load-balance

More information

Application of VCG in Replica Placement Strategy of Cloud Storage

Application of VCG in Replica Placement Strategy of Cloud Storage Internatonal Journal of Grd and Dstrbuted Computng, pp.27-40 http://dx.do.org/10.14257/jgdc.2016.9.4.03 Applcaton of VCG n Replca Placement Strategy of Cloud Storage Wang Hongxa Computer Department, Bejng

More information

Outline. Type of Machine Learning. Examples of Application. Unsupervised Learning

Outline. Type of Machine Learning. Examples of Application. Unsupervised Learning Outlne Artfcal Intellgence and ts applcatons Lecture 8 Unsupervsed Learnng Professor Danel Yeung danyeung@eee.org Dr. Patrck Chan patrckchan@eee.org South Chna Unversty of Technology, Chna Introducton

More information

Oracle Database: SQL and PL/SQL Fundamentals Certification Course

Oracle Database: SQL and PL/SQL Fundamentals Certification Course Oracle Database: SQL and PL/SQL Fundamentals Certfcaton Course 1 Duraton: 5 Days (30 hours) What you wll learn: Ths Oracle Database: SQL and PL/SQL Fundamentals tranng delvers the fundamentals of SQL and

More information

Steps for Computing the Dissimilarity, Entropy, Herfindahl-Hirschman and. Accessibility (Gravity with Competition) Indices

Steps for Computing the Dissimilarity, Entropy, Herfindahl-Hirschman and. Accessibility (Gravity with Competition) Indices Steps for Computng the Dssmlarty, Entropy, Herfndahl-Hrschman and Accessblty (Gravty wth Competton) Indces I. Dssmlarty Index Measurement: The followng formula can be used to measure the evenness between

More information

Sorting Review. Sorting. Comparison Sorting. CSE 680 Prof. Roger Crawfis. Assumptions

Sorting Review. Sorting. Comparison Sorting. CSE 680 Prof. Roger Crawfis. Assumptions Sortng Revew Introducton to Algorthms Qucksort CSE 680 Prof. Roger Crawfs Inserton Sort T(n) = Θ(n 2 ) In-place Merge Sort T(n) = Θ(n lg(n)) Not n-place Selecton Sort (from homework) T(n) = Θ(n 2 ) In-place

More information

Insertion Sort. Divide and Conquer Sorting. Divide and Conquer. Mergesort. Mergesort Example. Auxiliary Array

Insertion Sort. Divide and Conquer Sorting. Divide and Conquer. Mergesort. Mergesort Example. Auxiliary Array Inserton Sort Dvde and Conquer Sortng CSE 6 Data Structures Lecture 18 What f frst k elements of array are already sorted? 4, 7, 1, 5, 1, 16 We can shft the tal of the sorted elements lst down and then

More information

Some material adapted from Mohamed Younis, UMBC CMSC 611 Spr 2003 course slides Some material adapted from Hennessy & Patterson / 2003 Elsevier

Some material adapted from Mohamed Younis, UMBC CMSC 611 Spr 2003 course slides Some material adapted from Hennessy & Patterson / 2003 Elsevier Some materal adapted from Mohamed Youns, UMBC CMSC 611 Spr 2003 course sldes Some materal adapted from Hennessy & Patterson / 2003 Elsever Scence Performance = 1 Executon tme Speedup = Performance (B)

More information

Interconnect Optimization for High-Level Synthesis of SSA Form Programs

Interconnect Optimization for High-Level Synthesis of SSA Form Programs Interconnect Optmzaton for Hgh-Level Synthess of SSA Form Programs Phlp Brsk Aay K. Verma Paolo Ienne Processor Archtecture Laboratory Swss Federal Insttute of Technology (EPFL) Lausanne, Swtzerland {phlp.brsk,

More information

ASSERTION SUPPORT IN HIGH-LEVEL SYNTHESIS DESIGN FLOW. 351 crs de la Libération, Talence, France

ASSERTION SUPPORT IN HIGH-LEVEL SYNTHESIS DESIGN FLOW. 351 crs de la Libération, Talence, France SSERTION SUPPORT IN HIGH-LEVEL SYNTHESIS DESIGN FLOW urélen Rbon, Bertrand Le Gal, Chrstophe Jégo and Domnque Dallet Unversté de Bordeaux, Laboratore IMS, CNRS UMR 528, IPB, 35 crs de la Lbératon, 33405

More information

Array transposition in CUDA shared memory

Array transposition in CUDA shared memory Array transposton n CUDA shared memory Mke Gles February 19, 2014 Abstract Ths short note s nspred by some code wrtten by Jeremy Appleyard for the transposton of data through shared memory. I had some

More information

A mathematical programming approach to the analysis, design and scheduling of offshore oilfields

A mathematical programming approach to the analysis, design and scheduling of offshore oilfields 17 th European Symposum on Computer Aded Process Engneerng ESCAPE17 V. Plesu and P.S. Agach (Edtors) 2007 Elsever B.V. All rghts reserved. 1 A mathematcal programmng approach to the analyss, desgn and

More information

Repeater Insertion for Two-Terminal Nets in Three-Dimensional Integrated Circuits

Repeater Insertion for Two-Terminal Nets in Three-Dimensional Integrated Circuits Repeater Inserton for Two-Termnal Nets n Three-Dmensonal Integrated Crcuts Hu Xu, Vasls F. Pavlds, and Govann De Mchel LSI - EPFL, CH-5, Swtzerland, {hu.xu,vasleos.pavlds,govann.demchel}@epfl.ch Abstract.

More information

Ontology Generator from Relational Database Based on Jena

Ontology Generator from Relational Database Based on Jena Computer and Informaton Scence Vol. 3, No. 2; May 2010 Ontology Generator from Relatonal Database Based on Jena Shufeng Zhou (Correspondng author) College of Mathematcs Scence, Laocheng Unversty No.34

More information

Flexible ASIC: Shared Masking for Multiple Media Processors

Flexible ASIC: Shared Masking for Multiple Media Processors 54.1 Flexble ASIC: Shared Maskng for Multple Meda Processors Jennfer L. Wong Unv. of Calf., Los Angeles Los Angeles, Calforna jwong@cs.ucla.edu Farnaz Kourshanfar Unv. of Calf., Berkeley Berkeley, Calforna

More information

Problem Definitions and Evaluation Criteria for Computational Expensive Optimization

Problem Definitions and Evaluation Criteria for Computational Expensive Optimization Problem efntons and Evaluaton Crtera for Computatonal Expensve Optmzaton B. Lu 1, Q. Chen and Q. Zhang 3, J. J. Lang 4, P. N. Suganthan, B. Y. Qu 6 1 epartment of Computng, Glyndwr Unversty, UK Faclty

More information

IP Camera Configuration Software Instruction Manual

IP Camera Configuration Software Instruction Manual IP Camera 9483 - Confguraton Software Instructon Manual VBD 612-4 (10.14) Dear Customer, Wth your purchase of ths IP Camera, you have chosen a qualty product manufactured by RADEMACHER. Thank you for the

More information

Hermite Splines in Lie Groups as Products of Geodesics

Hermite Splines in Lie Groups as Products of Geodesics Hermte Splnes n Le Groups as Products of Geodescs Ethan Eade Updated May 28, 2017 1 Introducton 1.1 Goal Ths document defnes a curve n the Le group G parametrzed by tme and by structural parameters n the

More information

A Topology-aware Random Walk

A Topology-aware Random Walk A Topology-aware Random Walk Inkwan Yu, Rchard Newman Dept. of CISE, Unversty of Florda, Ganesvlle, Florda, USA Abstract When a graph can be decomposed nto clusters of well connected subgraphs, t s possble

More information

ETAtouch RESTful Webservices

ETAtouch RESTful Webservices ETAtouch RESTful Webservces Verson 1.1 November 8, 2012 Contents 1 Introducton 3 2 The resource /user/ap 6 2.1 HTTP GET................................... 6 2.2 HTTP POST..................................

More information

Conditional Speculative Decimal Addition*

Conditional Speculative Decimal Addition* Condtonal Speculatve Decmal Addton Alvaro Vazquez and Elsardo Antelo Dep. of Electronc and Computer Engneerng Unv. of Santago de Compostela, Span Ths work was supported n part by Xunta de Galca under grant

More information

Report on On-line Graph Coloring

Report on On-line Graph Coloring 2003 Fall Semester Comp 670K Onlne Algorthm Report on LO Yuet Me (00086365) cndylo@ust.hk Abstract Onlne algorthm deals wth data that has no future nformaton. Lots of examples demonstrate that onlne algorthm

More information

Term Weighting Classification System Using the Chi-square Statistic for the Classification Subtask at NTCIR-6 Patent Retrieval Task

Term Weighting Classification System Using the Chi-square Statistic for the Classification Subtask at NTCIR-6 Patent Retrieval Task Proceedngs of NTCIR-6 Workshop Meetng, May 15-18, 2007, Tokyo, Japan Term Weghtng Classfcaton System Usng the Ch-square Statstc for the Classfcaton Subtask at NTCIR-6 Patent Retreval Task Kotaro Hashmoto

More information

Support Vector Machines

Support Vector Machines Support Vector Machnes Decson surface s a hyperplane (lne n 2D) n feature space (smlar to the Perceptron) Arguably, the most mportant recent dscovery n machne learnng In a nutshell: map the data to a predetermned

More information

Wavefront Reconstructor

Wavefront Reconstructor A Dstrbuted Smplex B-Splne Based Wavefront Reconstructor Coen de Vsser and Mchel Verhaegen 14-12-201212 2012 Delft Unversty of Technology Contents Introducton Wavefront reconstructon usng Smplex B-Splnes

More information

Improved Symoblic Simulation By Dynamic Funtional Space Partitioning

Improved Symoblic Simulation By Dynamic Funtional Space Partitioning Improved Symoblc Smulaton By Dynamc Funtonal Space Parttonng Tao Feng, L-.Wang, Kwang-Tng heng Department of EE, U-Santa Barbara, U.S.A tfeng,lcwang, tmcheng @ece.ucsb.edu Andy -. Ln adence Desgn Systems,

More information

Machine Learning 9. week

Machine Learning 9. week Machne Learnng 9. week Mappng Concept Radal Bass Functons (RBF) RBF Networks 1 Mappng It s probably the best scenaro for the classfcaton of two dataset s to separate them lnearly. As you see n the below

More information

Design and Analysis of Algorithms

Design and Analysis of Algorithms Desgn and Analyss of Algorthms Heaps and Heapsort Reference: CLRS Chapter 6 Topcs: Heaps Heapsort Prorty queue Huo Hongwe Recap and overvew The story so far... Inserton sort runnng tme of Θ(n 2 ); sorts

More information

Life Tables (Times) Summary. Sample StatFolio: lifetable times.sgp

Life Tables (Times) Summary. Sample StatFolio: lifetable times.sgp Lfe Tables (Tmes) Summary... 1 Data Input... 2 Analyss Summary... 3 Survval Functon... 5 Log Survval Functon... 6 Cumulatve Hazard Functon... 7 Percentles... 7 Group Comparsons... 8 Summary The Lfe Tables

More information

The stream cipher MICKEY-128 (version 1) Algorithm specification issue 1.0

The stream cipher MICKEY-128 (version 1) Algorithm specification issue 1.0 The stream cpher MICKEY-128 (verson 1 Algorthm specfcaton ssue 1. Steve Babbage Vodafone Group R&D, Newbury, UK steve.babbage@vodafone.com Matthew Dodd Independent consultant matthew@mdodd.net www.mdodd.net

More information