PADded Cache: A New Fault-Tolerance Technique for Cache Memories

Size: px
Start display at page:

Download "PADded Cache: A New Fault-Tolerance Technique for Cache Memories"

Transcription

1 PADded Cache: A New Fault-Tolerance Technique for Cache Memorie Philip P. Shirvani and Edward J. McClukey Center for eliable Computing, Stanford Univerity Abtract Thi paper preent a new fault-tolerance technique for cache memorie. Current fault-tolerance technique for cache are limited either by the number of fault that can be tolerated or by the rapid degradation of performance a the number of fault increae. In thi paper, we preent a new technique that overcome thee two problem. Thi technique ue a pecial Programmable Addre Decoder (PAD) to diable faulty block and to re-map their reference to healthy block. Simulation reult how that the performance degradation of direct-mapped cache with PAD i maller than the previou technique. However, for et-aociative cache, the overhead of PAD i primarily advantageou if a relatively large number of fault i to be tolerated. The area overhead wa etimated at about 10% of the overall cache area for a hypothetical deign and i expected to be le for actual deign. The acce time overhead i negligible. 1. Introduction High level of reliability, availability and erviceability (AS) are key deign goal of high-end computer ytem. High availability i achieved by uing high quality component (fault avoidance) and deign technique that allow on-line detection and recovery from hard and oft failure (fault tolerance). Minimizing the downtime i very important in ytem with high availability. When continuou operation i required, an on-line repair mechanim diable or replace a faulty component without human interaction and thereby eliminate the downtime for ervice. On-line repair i alo required for ytem that are not acceible for repair, a in pace application [1]. In ome fault-tolerance technique, the ytem continue it operation at a poibly lower performance level (graceful degradation) under the preence of fault. In thi paper, we preent a new technique for tolerating permanent fault in cache memorie during their lifetime. All high performance microproceor ue a hierarchy of cache memorie to hide the low acce to the main memory [2]. With each new generation of integrated circuit (IC) technology, feature ize hrink, creating room for more functionality on one chip. We ee a fat growth in the amount of cache that deigner integrate into a microproceor to gain higher performance. Hence, cache occupy a ubtantial area of a microproceor chip and contain a high percentage of the total number of tranitor in the chip. Conequently, the reliability of the cache ha a big impact on the overall chip reliability. The new fault-tolerance technique preented in thi paper addree thi iue by exploiting the architectural feature of cache. We propoe a reconfiguration technique that can keep the cache operational at a high level of performance (low mi rate) even in the preence of a large number of fault. Our technique provide a way to do the reconfiguration to iolate the faulty part; it aume the ytem i equipped with appropriate error detection and error recovery mechanim. In Sec. 2, we review the previou work on faulttolerance technique for memorie and cache. In Sec. 3, we preent the PADded cache Ñ cache with Programmable Addre Decoder. To evaluate the performance of PADded cache, we carried out imulation. The reult are explained in Sec. 4. The hardware overhead of PADded cache i etimated in Sec. 5. We dicu ome implementation iue and the advantage of our technique in Sec. 6 and conclude in Sec Previou Work Cache are ued to bridge the peed gap between microproceor and main memory. Without them, the proceor can till operate correctly but at a ubtantially lower performance. Many architecture are deigned uch that the proceor can operate without a cache under certain circumtance. Therefore, the obviou olution to a faulty cache i to totally diable it. In et-aociative cache, a le extreme olution i to diable one unit (way) of the cache [3]. Mot of the tranitor in a cache are in memory cell. Hence, the probability that a given defect i in a memory cell (a bit in the data or tag field) i higher than the probability of it being in the logic circuitry. If the fault i in a data or tag bit, only the block containing that bit need to be diabled. For marking a cache block a faulty, an extra bit can be added to the et of flag bit aociated with each block [4]. If thi bit i zero, the block i non-faulty and will do it normal function. If the bit i one, it will indicate that the block i faulty. In cae of a direct-mapped cache, if the faulty block i acceed, it will alway caue a cache mi. In cae of a etaociative cache, the aociativity of the et that include that block i reduced by one. In thi paper, we refer to

2 thi extra bit a the FT-bit (fault-tolerance bit). Other name ued in literature are: availability bit [5], purge bit [6], and the econd valid bit [7]. Adding the FT-bit wa initially uggeted for yield enhancement [4]. Yield model have been derived in [8] for proceor with partially good on-chip cacheñchip with up to faulty cache block. It i hown that maximum yield can be achieved with mall. Diabling faulty block i done even when the cache i protected by ingle-error correcting, double-error detecting (SEC-DED) code [9]. For example, Cache Line Delete (CLD) i a elf-diagnotic feature in high-end IBMä proceor cache that automatically detect and delete the cache block with permanent fault [10]. A detailed invetigation of the effect of faulty cache block on mi rate wa firt preented in [5] and then extended in [7]. Cache block were randomly choen and marked a faulty. It wa hown that for direct-mapped cache, the mi rate increae linearly with the fraction of faulty block. For a et-aociative cache, the increae i low for a few fault and become fater a the number of fault increae. eplacement technique, uch a extra row and column, are alo ued in cache for yield enhancement [11] and for tolerating lifetime failure [9] [12]. With replacement technique, there i no performance lo in cache with fault. However, the number of extra reource limit the number of fault that can be tolerated uing thee technique. A replacement cheme called the Memory eliability Enhancement Peripheral (MEP) i preented in [13]. The idea i to have a et of pare word each of which can replace any faulty word in the memory. A technique imilar to MEP i preented for cache in [14]. A very mall fully aociative pare cache i added to a direct-mapped cache that erve a a pare for the diabled faulty block. The difference between thi technique and MEP i that there can be more faulty block than there are pare block. The imulation reult in [14] how that one or two pare block are ufficient to avoid mot of the extra mie caued by a few (le than 5%) faulty block. However, a the number of fault increae, a few pare block i not very effective. Cache memorie have an inherent redundancy that can be exploited to increae thi limit. 3. PADded Cache In thi ection, we preent a new technique that ha much le performance lo in cache a the number of faulty block increae. Figure 3.1 how a imple block diagram of a direct-mapped cache. The mapping of block addree to the block in the cache i done by a decoder which i hown a a dark rectangle in the diagram. We modify thi decoder to make it programmable uch that it can implement different mapping function uitable to our technique. No pare block are added for tolerating fault. Intead, we exploit the exiting non-faulty block a ubtitute for the faulty one. Block Addre Tag Index D E C O D E Block Offet V Tag Data =? Mux Hit / Mi Data Out Figure 3.1 Block diagram of a direct-mapped cache. a 2 a 2 T6 T7 a 1 T4 T5 a 0 a 0 T0 T1 T2 T3 Figure 3.2 Circuit diagram of a imple decoder. Figure 3.2 how part of the lat three tage of a imple decoder. Thi type of decoder may not be ued in peed-critical circuit. However, it i eaier to illutrate our re-mapping procedure uing thi decoder. The ame procedure applie to decoder that ue gate intead of pa tranitor a will be hown later. In Fig. 3.2, each block i output i a word line that elect a block in the cache. For example, when a 2 =000, i elected, when a 2 =001, i elected, and o forth. Now aume that i faulty. We modify the control input of tranitor T0 and T1 uch that, when i marked faulty, T0 i alway off and T1 i alway on. That i, all the reference to are re-mapped to. Therefore, the addree that map to are till cacheable and will only uffer from conflict mie with. Since one addre bit information i lot due to thi re-mapping, one bit i augmented to the tag bit to ditinguih the addree that may be mapped to the ame block when fault are preent. Similarly, if i faulty, T0 will be alway on, T1 will be alway off, and all the reference to are re-mapped to. Figure 3.3 how the modified decoder. Similar to the FT-bit, an extra bit i added to each block to mark it a faulty or non-faulty (the f i Õ in Fig. 3.3). Thee flip-flop can be connected a a hift regiter and loaded uing pecial intruction. The control input of the pa tranitor are modified a hown. For example, the control for T0 i changed from to f 0 + f 1. Therefore, T0 i alway on if i faulty (f 0 =0, f 1 =1) and i alway off if i faulty (f 0 =1, f 1 =0).

3 a 2 a 2 T6 T7 a 1 T4 T5 f 0 a 0 + f 1 T0 f 1 + f 0 T1 f 2 a 0 + f 3 T2 f 3 + f 2 T3 Figure 3.3 A imple Programmable Addre Decoder (PAD). We call two block adjacent if their addree differ only in the addre bit that i decoded lat. For example, in Fig. 3.2, and are adjacent and and are adjacent. Depending on the reliability requirement of the application, the probability of adjacent faulty block may be low enough that the programmability i done only for the lat level a hown in Fig However, the cheme can be applied to multiple level to tolerate adjacent faulty block and to meet the deired level of fault tolerance. For example, the control of tranitor T4 can be changed to g 0 + g 1, where g 0 = f 0 f 1 and g 1 = f 2 f 3. In a cae where both block 2 and are faulty (g 0 =0 and g 1 =1), T4 and T5 will alway be on and off, repectively. Therefore, the reference to and 3 will be re-mapped to and 1, repectively. In thi cae, the tag portion ha two extra bit. There are two point to notice here. In the lat example, tranitor T2 and T3 will be alway on. However, thi will not caue any problem becaue T5 will be off and hence and 3 will never be elected. Second, if one of the or 1 i alo faulty, the correponding f i will be 1 and all the reference to the 3 faulty block will be re-mapped to the one healthy block. The ame procedure can be applied to all level. Thi technique can be imilarly applied to a etaociative cache. Typically, in a phyical deign, there i a eparate memory array for each way of a et-aociative cache. The decoder can be hared between the array, or it may be duplicated due to floor-planning or circuit iue. For example, conider a 4-way et-aociative cache with one decoder for each way. Our technique can be independently applied to each decoder, i.e., re-mapping in one array will not affect mapping of the other array. Figure 3.4(a) illutrate a cae where a et ha a faulty block Ñ we call thi et the faulty et. With a PAD, the faulty block i mapped to a non-faulty block. We call the et that contain thi non-faulty block, the congruent et of the faulty et (in cae of a direct-mapped cache, each et ha only one block). Becaue the re-mapping doe not affect the other block in the et, one healthy block of the congruent et will be hared between the faulty et and the congruent et and the ret of the block are ued a before. If there are two decoder, one for each pair of array, the f 0 f 1 f 2 f 3 healthy block that hare a decoder with the faulty block will alo be marked faulty and two block will be hared between the two et. Thi i illutrated in Fig. 3.4(b). Faulty Shared Unued Faulty Shared Shared Faulty Set Congruent Set Faulty Set Congruent Set (a) (b) Figure 3.4 Block haring between a faulty et and it congruent et in a 4-way et-aociative cache: (a) with 4 decoder, (b) with 2 decoder. The conflict mie that occur between a et and it congruent et can be reduced by pecial ordering of the addre bit in the decoder. Cache exploit the patial locality of the memory accee. If we make a et and it congruent et far apart in the addre pace, there will be le conflict due thi patial locality. Since the order of the input to the decoder i not important in the function of the cache, we ue the index bit in the revere order. That i, the mot ignificant bit (mb) of the array index i connected to the leat ignificant input bit (lb) of the decoder. The imulation reult how that thi deign ha better performance than a direct connection (normal order). A mentioned before, the tag portion of the array i widened by one bit for each level of programmability. Thee bit will have contant value when there i no faulty block and will tart changing when the block become a ubtitute for a faulty block. Notice that thee tag bit will tore the ame bit that are ued for indexing the cache array. For example, if the cache i virtuallyindexed phyically-tagged, the normal tag bit will contain phyical addree and the extra tag bit will contain virtual addree. The tag comparator i alo widened by the ame number of bit. 4. Simulation eult In thi ection, we dicu our imulation etup for evaluating the performance of PADded cache and preent the reult. Trace-driven imulation i the mot popular method for evaluating the performance of cache memorie. We ued thi method to compare the mi rate of cache with two fault-tolerance technique, the imple block deletion uing the FT-bit, and our new PAD technique. In the ret of the paper, we refer to the firt technique a FTB. We modified the Dinero IV cache imulator ([15]) to imulate thee two technique. We ued different value for the following parameter: cache ize (2, 4, 8, 16, and 32KB), block ize (8, 16 and 32 byte) and aociativity (1, 2 and 4). The imulated cache are write-through, allocate-on-write-mi, with no prefetching and no ub-blocking, and ue the LU replacement protocol. We aume that the decoder are replicated for each way of the cache, and they are programmable for all level. The fault are injected at random location and mi rate are calculated for different number of faulty block. Since the location of the fault affect the mi rate, each imulation wa run

4 everal time and the minimum, maximum and average mi rate were recorded. We collected many et of trace for our imulation. Some of them are: the ATUM trace [16], trace from SPEC92 and SPEC95 benchmark, and the IBS trace (alo called the Monter trace) [17]. The total number of reference in each trace vary from about 300,000 for the ATUM trace, up to more than a billion for the IBS trace. The mi rate for one et of trace, e.g., the ATUM trace, i calculated by taking the weighted average of the mi rate of each trace in the et Ñ weighted by the number of reference in each trace. In thi paper, we preent a election of the imulation reult. More reult and detail are preented in [18]. The average mi rate of the ATUM trace i hown in Fig. 4.1(a) for both the FTB and PAD technique. Thi graph how the reult for an 8KB cache with 16-byte block and with aociativitie: direct-mapped (DM), 2- way et-aociative (SA2), and 4-way et-aociative (SA4). The mi rate of PADded cache tay relatively flat and increae lowly toward the end. Simulation of cache with different ize how that when half of the block are faulty, the mi rate of a PADded cache i almot the ame a a healthy cache of half the ize. Thi indicate that in PADded cache, the full capacity of healthy block i utilized and the performance decreae with almot minimum poible degradation. Figure 4.1(b) how the lower left corner of Fig. 4.1(a). Notice that for a mall percentage of faulty block, both technique perform equally well for the etaociative cache. Another advantage of our technique i hown in Fig. 4.1(c). Thi figure how the minimum and maximum mi rate of the ATUM trace for different fault location, in a direct-mapped cache. The mi rate of FTB ha a noticeably big range (a wa hown in [7]) while the mi rate of PAD remain almot unchanged. Thi how that PADded cache are very inenitive to the location of fault. Notice that we did not do an exhautive earch for the minimum and maximum mi rate; thee are the range oberved in our imulation. 5. Hardware Overhead In thi ection, we look at the circuit implementation of PADded cache to etimate the area and delay overhead of our technique. A typical decoder for a cache i implemented uing everal pre-decode tage and logic gate. Let u conider a mall decoder for the ake of implicity. For example, a 4-to-16 bit decoder i hown in Fig To emphaize the importance of uing the mb of the addre bit for the lat tage of decode, the addre bit are ued in the revere order in thi example (a 3 a 2, i the real index addre with a 3 a the mb). Similar to the decoder in Sec. 3, we intercept the addre bit to diable or enable the output of the gate. The modified decoder i hown in Fig The three input gate F i, G i and H i implement function imilar to thoe in Fig. 3.3: M i a t e 100% 90% 80% 70% 60% 50% 40% 30% 20% 10% 20% M i 15% 10% a t e 5% M i a t e Cache Size=8KB, Block Size=16byte FTB, DM FTB, SA2 FTB, SA4 PAD, DM PAD, SA2 PAD, SA4 0% 0.0% 12.5% 25.0% 37.5% 50.0% 62.5% 75.0% 87.5% 100.0% Percentage of Faulty Block 25% (a) Cache Size=8KB, Block Size=16byte FTB, DM FTB, SA2 FTB, SA4 PAD, DM PAD, SA2 PAD, SA4 0% 0.0% 3.1% 6.3% 9.4% 12.5% Percentage of Faulty Block 100% 90% 80% 70% 60% 50% 40% 30% 20% 10% (b) Cache Size=8KB, Block Size=16byte FTB, DM PAD, DM 0% 0.0% 12.5% 25.0% 37.5% 50.0% 62.5% 75.0% 87.5% 100.0% Percentage of Faulty Block (c) Figure 4.1 Average mi rate of the ATUM trace: (a) different aociativitie, (b) lower left corner of Fig. 4.1(a), (c) min. and max. mi rate for a DM cache. F 0 = f 0 a 3 + f 1, F 1 = f 1 a 3 + f 0, F 2 = f 2 a 3 + f 3, F 3 = f 3 a 3 + f 2, G 0 = g 0 a 2 + g 1, G 1 = g 1 a 2 + g 0, H 0 = h 0 + h 1, etc.

5 where g 0 = f 0 f 1, g 1 = f 2 f 3, h 0 = g 0 g 1 and h 1 = g 2 g 3. If only one level of programmability i required, then only the F i function would be required. Notice that the f i, g i, h i and their complement change only during reconfiguration and are contant the ret of the time. Therefore, the correponding gate (NAND and inverter) can ue minimum ize tranitor. Furthermore, thee contant value form two of the three input of the function F i, G i and H i. The gate for F i, G i and H i add one extra logic tage to the decoder and are in the critical path for acceing the cache. To reduce the gate delay of thee AOI (AND-O-Invert) function, the tranitor that are connected to the contant input are made 3 to 4 time the ize of the tranitor connected to the variable input. The delay overhead of adding thee gate can be made negligible by chooing proper ize for the tranitor in the decoding tage. Since the number of tag bit increae in PAD, the width of the tag comparator alo increae. However, the delay of the comparator will increae by at mot one gate delay. Therefore, the delay overhead of adding PAD to a cache i cloe to one gate delay of an inverter driving an identical inverter. a 0 a 2 a 2 a 3 a 3 Predecode a 1 a 0 a a 1 0 a 1 Figure 5.1 A decoder implemented by logic gate. J 1 H 3 H 2 J 0 H 1 H 0 a 2 a 2 a 3 a 3 F 0 G 0 F 1 G 1 F 2 F 3 Figure 5.2 Modified verion of the decoder in Fig. 5.1 for PAD. For example, let u conider 6KB direct-mapped cache with 16 byte block. A typical decoder for thi cache take about 5% of the total cache area. We f 0 f 1 f 2 f 3 etimated that the decoder would grow by 60% after modification for PAD. That i 3% increae in total cache area. With a 32-bit addre, the tag will be 18 bit wide (aume all addree are phyical). Conidering two bit for flag, each block will be =148 bit long. For a PADded cache with full programmability, 10 bit will be added to each block, which i a 7% increae. The FT-bit will roughly take another extr%. Therefore, the total area overhead i 3+7+1=11%. Mot of thi overhead i in the extra tag bit. Therefore, a deigner may decide to make jut a few of the level programmable. Another way to reduce the area overhead, i to make the decoder programmable tarting at the decoding level before the lat. An FT-bit i added for each pair of block, i.e., each two block are diabled together, regardle of whether they are both faulty or only one i faulty. A can be een, our technique i very flexible and the overhead can be adjuted according to the reliability requirement. In a cache with multiple independent port, there are a many decoder a there are port. Thee decoder hould provide the exact ame mapping in the preence of fault. Therefore, the FT-bit and the f i (g i, etc.) function can be hared between the decoder and conequently, the overall area overhead will be le for thi type of cache. 6. Dicuion In thi ection, we dicu ome implementation iue and other advantage of our technique over FTB. The advantage of FTB over PAD i low hardware overhead (we donõt have overhead number for FTB and other technique to do a better comparion). Adding an extra bit to each cache block will impoe a relatively mall area overhead. In ome cache, thi extra phyical bit can be avoided by uing an unued combination of the available flag bit in cache. For example, in a write-back cache, the combination dirty=1 and valid=0 can be ued to mark a block a faulty. The FTB technique relie on the availability of a path to bypa the cache when a faulty et i being acceed. Some cache organization require block to be loaded into the cache before they are read by the CPU [4]. With FTB, a data that reide in an addre that i mapped to a et with all faulty block, doe not have a place to go in the cache and ha to bypa the cache. The ame problem exit for write-back cache where tore intruction write to the data cache and the new data i written into the memory when the block i replaced. For a faulty et, the tore ha to be executed in a write-through fahion. Similar problem exit for cache with allocate-on-writemi policy. Therefore, hardware hould be added to make the reference to the faulty et behave like reference to non-cacheable addree. However, with PAD, the data i alway cacheable a long a there i a non-faulty block in the cache, o there i no need for extra hardware.

6 7. Concluion In thi paper, a novel fault-tolerance technique for cache i introduced. Thi technique ue graceful degradation to tolerate permanent fault in cache block. It can be ued for on-line repair in ytem for high reliability and availability. The main advantage of our technique i it low degradation of performance a the number of fault increae. Thi increae the lifetime of a chip and ubequently, the availability of a ytem, becaue there will be le downtime for component replacement. The PAD technique can alo be ued for yield enhancement. However, a mentioned earlier, the analyi in [8] how that maximum yield can be achieved by accepting a few faulty block. The FTB technique can provide acceptable performance for a few faulty block. Therefore, if yield enhancement i the goal, FTB i probably the better choice. The PAD technique provide a better olution when: the total number of faulty block that have to be tolerated (i.e., the manufacturing fault and the fault that occur during the lifetime of the cache) i more than a mall percentage of total number of block, utaining the peak performance i very critical, or the performance hould be predictable. The lat cae i jutified by the fact that FTB ha a big range for the mi rate depending on the location of the faulty block, but PAD ha a very mall range. In real-time application, the ytem ha to execute a pecified program within a certain amount of time, i.e., the performance ha to be predictable to a pecified level. A fault-tolerant cache that can maintain it etimated mi rate for that pecified program under different condition, will be the better choice. We etimated the area overhead of PAD for a hypothetical deign at about 10%; the acce time overhead wa negligible. However, the area overhead depend on the parameter of the cache, the level of programmability in the decoder, and layout optimization. Therefore, we expect the area overhead to be le for real deign. Our technique provide a ingle olution for all type of cache with different policie. No extra hardware ha to be added for write-back or allocate-on-write-mi cache. Application of PAD for cache that are ued in multi-level cache ytem and in multi-proceor ytem i an area for future reearch. Acknowledgment Thi work wa upported in part by the Ballitic Miile Defene Organization, Innovative Science and Technology (BMDO/IST) Directorate and adminitered through the Department of the Navy, Office of Naval eearch under Grant No. N J-1782 and N The author wih to thank Nirmal Saxena, Samy Makar, Subhaih Mitra, Mehrdad Hehami and David Harri for their review and valuable comment. The author alo thank Timothy Slegel for helpful dicuion. eference [1] Siewiorek, D.P., and.s. Swarz, eliable Computer Sytem: Deign and Evaluation, 2 nd Edition, Digital Pre, Burlington, MA, [2] Henney, J.L., and D.A. Patteron, Computer Architecture, A Quantitative Approach, 2 nd edition, Morgan Kaufmann Pub., Inc., San Mateo, CA, [3] Ooi, Y., M. Kahimura, H. Takeuchi, and E. Kawamura, ÒFault-Tolerant Architecture in a Cache Memory Control LSI,Ó IEEE J. of Solid-State Circuit, Vol. 27, No. 4, pp , April [4] Patteron, D.A., et al., ÒArchitecture of a VLSI Cache for a ISC,Ó Proc. IntÕl Symp. Comp. Architecture, Vol. 11, No. 3, pp , June [5] Sohi, G. S., ÒCache Memory Organization to Enhance the Yield of High-Performance VLSI Proceor,Ó IEEE Tran. Comp., Vol. 38, No. 4, pp , April [6] Luo, X. and J.C. Muzio, ÒA Fault-Tolerant Multiproceor Cache Memory,Ó Proc. IEEE Workhop on Memory Technology, Deign and Teting, pp , Augut [7] Pour, A.F. and M.D. Hill, ÒPerformance Implication of Tolerating Cache Fault,Ó IEEE Tran. Comp., Vol. 42, No. 3, pp , March [8] Nikolo, D. and H.T. Vergo, ÒOn the Yield of VLSI Proceor with On-Chip CPU Cache,Ó Proc. 2 nd European Dependable Computing Conference, pp , October [9] Turgeon, P.., A.. Stell, M.. Charleboi, ÒTwo Approache to Array Fault Tolerance in the IBM Enterprie Sytem/9000 Type 9121 Proceor,Ó IBM J. e. Develop., Vol. 35, No. 3, pp , May [10] OÕLeary, B.J., A.J. Sutton, ÒDynamic Cache Line Delete,Ó IBM Tech. Dicloure Bull., Vol. 32, No. 6A, pp. 439, Nov [11] Young, L., G. Billu, A. Jone, and S. Paramanandam, ÒDeign of the UltraSPACä-I Microproceor for Manufacturing Performance,Ó Proc. of the SPIE, Vol. 2874, pp , [12] Houtt, W.V., et al., ÒProgrammable Computer Sytem Element with Built-In Self-Tet Method and Apparatu for epair During Power-On,Ó U.S. Patent 5,659,551, Aug [13] Lucente, M.A., C.H. Harri and.m. Muir, ÒMemory Sytem eliability Improvement Through Aociative Cache edundancy,ó Proc. IEEE Cutom Integrated Circuit Conf., pp , May [14] Vergo, H.T., and D. Nikolo, ÒPerformance ecovery in Direct-Mapped Faulty Cache via the Ue of a Very Small Fully Aociative Spare Cache,Ó Proc. IntÕl Comp. Performance and Dependability Symp., pp , April [15] ÒDinero IV Trace-Driven Uniproceor Cache SimulatorÓ, el. 7, Feb [16] Agarwal, A.,.L. Site, M. Horowitz, ÒATUM: A New Technique for Capturing Addre Trace Uing Microcode,Ó Proc. 13 th Annu. Symp. Comput. Architecture, pp , June [17] Uhlig,., et al., ÒIntruction Fetching: Coping with Code Bloat,Ó Proc. 22 nd IntÕl Symp. Comp. Architecture, pp , June [18] Shirvani, P.P., and E.J. McClukey, ÒPADded Cache: A New Fault-Tolerance Technique for Cache Memorie,Ó CC- T, Stanford Univ., in preparation.

7 1

Re-evaluation of Fault Tolerant Cache Schemes

Re-evaluation of Fault Tolerant Cache Schemes Re-evaluation of Fault Tolerant Cache Schemes Huan-yu Tu and Sarah Tasneem Eastern Connecticut State University Willimantic, CT 06226 {tuh, tasneems}@easternct.edu ABSTRACT In general, fault tolerant cache

More information

Laboratory Exercise 6

Laboratory Exercise 6 Laboratory Exercie 6 Adder, Subtractor, and Multiplier The purpoe of thi exercie i to examine arithmetic circuit that add, ubtract, and multiply number. Each type of circuit will be implemented in two

More information

Universität Augsburg. Institut für Informatik. Approximating Optimal Visual Sensor Placement. E. Hörster, R. Lienhart.

Universität Augsburg. Institut für Informatik. Approximating Optimal Visual Sensor Placement. E. Hörster, R. Lienhart. Univerität Augburg à ÊÇÅÍÆ ËÀǼ Approximating Optimal Viual Senor Placement E. Hörter, R. Lienhart Report 2006-01 Januar 2006 Intitut für Informatik D-86135 Augburg Copyright c E. Hörter, R. Lienhart Intitut

More information

Analyzing Hydra Historical Statistics Part 2

Analyzing Hydra Historical Statistics Part 2 Analyzing Hydra Hitorical Statitic Part Fabio Maimo Ottaviani EPV Technologie White paper 5 hnode HSM Hitorical Record The hnode i the hierarchical data torage management node and ha to perform all the

More information

Performance of a Robust Filter-based Approach for Contour Detection in Wireless Sensor Networks

Performance of a Robust Filter-based Approach for Contour Detection in Wireless Sensor Networks Performance of a Robut Filter-baed Approach for Contour Detection in Wirele Senor Network Hadi Alati, William A. Armtrong, Jr., and Ai Naipuri Department of Electrical and Computer Engineering The Univerity

More information

The Association of System Performance Professionals

The Association of System Performance Professionals The Aociation of Sytem Performance Profeional The Computer Meaurement Group, commonly called CMG, i a not for profit, worldwide organization of data proceing profeional committed to the meaurement and

More information

Lecture 14: Minimum Spanning Tree I

Lecture 14: Minimum Spanning Tree I COMPSCI 0: Deign and Analyi of Algorithm October 4, 07 Lecture 4: Minimum Spanning Tree I Lecturer: Rong Ge Scribe: Fred Zhang Overview Thi lecture we finih our dicuion of the hortet path problem and introduce

More information

Keywords Cloud Computing, Service Level Agreements (SLA), CloudSim, Monitoring & Controlling SLA Agent, JADE

Keywords Cloud Computing, Service Level Agreements (SLA), CloudSim, Monitoring & Controlling SLA Agent, JADE Volume 5, Iue 8, Augut 2015 ISSN: 2277 128X International Journal of Advanced Reearch in Computer Science and Software Engineering Reearch Paper Available online at: www.ijarce.com Verification of Agent

More information

Distributed Packet Processing Architecture with Reconfigurable Hardware Accelerators for 100Gbps Forwarding Performance on Virtualized Edge Router

Distributed Packet Processing Architecture with Reconfigurable Hardware Accelerators for 100Gbps Forwarding Performance on Virtualized Edge Router Ditributed Packet Proceing Architecture with Reconfigurable Hardware Accelerator for 100Gbp Forwarding Performance on Virtualized Edge Router Satohi Nihiyama, Hitohi Kaneko, and Ichiro Kudo Abtract To

More information

Computer Arithmetic Homework Solutions. 1 An adder for graphics. 2 Partitioned adder. 3 HDL implementation of a partitioned adder

Computer Arithmetic Homework Solutions. 1 An adder for graphics. 2 Partitioned adder. 3 HDL implementation of a partitioned adder Computer Arithmetic Homework 3 2016 2017 Solution 1 An adder for graphic In a normal ripple carry addition of two poitive number, the carry i the ignal for a reult exceeding the maximum. We ue thi ignal

More information

Refining SIRAP with a Dedicated Resource Ceiling for Self-Blocking

Refining SIRAP with a Dedicated Resource Ceiling for Self-Blocking Refining SIRAP with a Dedicated Reource Ceiling for Self-Blocking Mori Behnam, Thoma Nolte Mälardalen Real-Time Reearch Centre P.O. Box 883, SE-721 23 Väterå, Sweden {mori.behnam,thoma.nolte}@mdh.e ABSTRACT

More information

Routing Definition 4.1

Routing Definition 4.1 4 Routing So far, we have only looked at network without dealing with the iue of how to end information in them from one node to another The problem of ending information in a network i known a routing

More information

Advanced Encryption Standard and Modes of Operation

Advanced Encryption Standard and Modes of Operation Advanced Encryption Standard and Mode of Operation G. Bertoni L. Breveglieri Foundation of Cryptography - AES pp. 1 / 50 AES Advanced Encryption Standard (AES) i a ymmetric cryptographic algorithm AES

More information

Key Terms - MinMin, MaxMin, Sufferage, Task Scheduling, Standard Deviation, Load Balancing.

Key Terms - MinMin, MaxMin, Sufferage, Task Scheduling, Standard Deviation, Load Balancing. Volume 3, Iue 11, November 2013 ISSN: 2277 128X International Journal of Advanced Reearch in Computer Science and Software Engineering Reearch Paper Available online at: www.ijarce.com Tak Aignment in

More information

xy-monotone path existence queries in a rectilinear environment

xy-monotone path existence queries in a rectilinear environment CCCG 2012, Charlottetown, P.E.I., Augut 8 10, 2012 xy-monotone path exitence querie in a rectilinear environment Gregory Bint Anil Mahehwari Michiel Smid Abtract Given a planar environment coniting of

More information

Multi-Target Tracking In Clutter

Multi-Target Tracking In Clutter Multi-Target Tracking In Clutter John N. Sander-Reed, Mary Jo Duncan, W.B. Boucher, W. Michael Dimmler, Shawn O Keefe ABSTRACT A high frame rate (0 Hz), multi-target, video tracker ha been developed and

More information

(12) Patent Application Publication (10) Pub. No.: US 2003/ A1

(12) Patent Application Publication (10) Pub. No.: US 2003/ A1 US 2003O196031A1 (19) United State (12) Patent Application Publication (10) Pub. No.: US 2003/0196031 A1 Chen (43) Pub. Date: Oct. 16, 2003 (54) STORAGE CONTROLLER WITH THE DISK Related U.S. Application

More information

DAROS: Distributed User-Server Assignment And Replication For Online Social Networking Applications

DAROS: Distributed User-Server Assignment And Replication For Online Social Networking Applications DAROS: Ditributed Uer-Server Aignment And Replication For Online Social Networking Application Thuan Duong-Ba School of EECS Oregon State Univerity Corvalli, OR 97330, USA Email: duongba@eec.oregontate.edu

More information

Floating Point CORDIC Based Power Operation

Floating Point CORDIC Based Power Operation Floating Point CORDIC Baed Power Operation Kazumi Malhan, Padmaja AVL Electrical and Computer Engineering Department School of Engineering and Computer Science Oakland Univerity, Rocheter, MI e-mail: kmalhan@oakland.edu,

More information

A SIMPLE IMPERATIVE LANGUAGE THE STORE FUNCTION NON-TERMINATING COMMANDS

A SIMPLE IMPERATIVE LANGUAGE THE STORE FUNCTION NON-TERMINATING COMMANDS A SIMPLE IMPERATIVE LANGUAGE Eventually we will preent the emantic of a full-blown language, with declaration, type and looping. However, there are many complication, o we will build up lowly. Our firt

More information

A Practical Model for Minimizing Waiting Time in a Transit Network

A Practical Model for Minimizing Waiting Time in a Transit Network A Practical Model for Minimizing Waiting Time in a Tranit Network Leila Dianat, MASc, Department of Civil Engineering, Sharif Univerity of Technology, Tehran, Iran Youef Shafahi, Ph.D. Aociate Profeor,

More information

Karen L. Collins. Wesleyan University. Middletown, CT and. Mark Hovey MIT. Cambridge, MA Abstract

Karen L. Collins. Wesleyan University. Middletown, CT and. Mark Hovey MIT. Cambridge, MA Abstract Mot Graph are Edge-Cordial Karen L. Collin Dept. of Mathematic Weleyan Univerity Middletown, CT 6457 and Mark Hovey Dept. of Mathematic MIT Cambridge, MA 239 Abtract We extend the definition of edge-cordial

More information

Lecture 8: More Pipelining

Lecture 8: More Pipelining Overview Lecture 8: More Pipelining David Black-Schaffer davidbb@tanford.edu EE8 Spring 00 Getting Started with Lab Jut get a ingle pixel calculating at one time Then look into filling your pipeline Multiplier

More information

A Local Mobility Agent Selection Algorithm for Mobile Networks

A Local Mobility Agent Selection Algorithm for Mobile Networks A Local Mobility Agent Selection Algorithm for Mobile Network Yi Xu Henry C. J. Lee Vrizlynn L. L. Thing Intitute for Infocomm Reearch, 21 Heng Mui Keng Terrace, Singapore 119613 Email: {yxu, hlee, vriz}@i2r.a-tar.edu.g

More information

[N309] Feedforward Active Noise Control Systems with Online Secondary Path Modeling. Muhammad Tahir Akhtar, Masahide Abe, and Masayuki Kawamata

[N309] Feedforward Active Noise Control Systems with Online Secondary Path Modeling. Muhammad Tahir Akhtar, Masahide Abe, and Masayuki Kawamata he 32nd International Congre and Expoition on Noie Control Engineering Jeju International Convention Center, Seogwipo, Korea, Augut 25-28, 2003 [N309] Feedforward Active Noie Control Sytem with Online

More information

A New Approach to Pipeline FFT Processor

A New Approach to Pipeline FFT Processor A ew Approach to Pipeline FFT Proceor Shouheng He and Mat Torkelon Department of Applied Electronic, Lund Univerity S- Lund, SWEDE email: he@tde.lth.e; torkel@tde.lth.e Abtract A new VLSI architecture

More information

Modelling the impact of cyber attacks on the traffic control centre of an urban automobile transport system by means of enhanced cybersecurity

Modelling the impact of cyber attacks on the traffic control centre of an urban automobile transport system by means of enhanced cybersecurity Modelling the impact of cyber attack on the traffic control centre of an urban automobile tranport ytem by mean of enhanced cyberecurity Yoana Ivanova 1,* 1 Bulgarian Academy of Science, Intitute of ICT,

More information

A METHOD OF REAL-TIME NURBS INTERPOLATION WITH CONFINED CHORD ERROR FOR CNC SYSTEMS

A METHOD OF REAL-TIME NURBS INTERPOLATION WITH CONFINED CHORD ERROR FOR CNC SYSTEMS Vietnam Journal of Science and Technology 55 (5) (017) 650-657 DOI: 10.1565/55-518/55/5/906 A METHOD OF REAL-TIME NURBS INTERPOLATION WITH CONFINED CHORD ERROR FOR CNC SYSTEMS Nguyen Huu Quang *, Banh

More information

Hassan Ghaziri AUB, OSB Beirut, Lebanon Key words Competitive self-organizing maps, Meta-heuristics, Vehicle routing problem,

Hassan Ghaziri AUB, OSB Beirut, Lebanon Key words Competitive self-organizing maps, Meta-heuristics, Vehicle routing problem, COMPETITIVE PROBABIISTIC SEF-ORGANIZING MAPS FOR ROUTING PROBEMS Haan Ghaziri AUB, OSB Beirut, ebanon ghaziri@aub.edu.lb Abtract In thi paper, we have applied the concept of the elf-organizing map (SOM)

More information

Laboratory Exercise 2

Laboratory Exercise 2 Laoratory Exercie Numer and Diplay Thi i an exercie in deigning cominational circuit that can perform inary-to-decimal numer converion and inary-coded-decimal (BCD) addition. Part I We wih to diplay on

More information

Comparison of Methods for Horizon Line Detection in Sea Images

Comparison of Methods for Horizon Line Detection in Sea Images Comparion of Method for Horizon Line Detection in Sea Image Tzvika Libe Evgeny Gerhikov and Samuel Koolapov Department of Electrical Engineering Braude Academic College of Engineering Karmiel 2982 Irael

More information

Parameters, UVM, Coverage & Emulation Take Two and Call Me in the Morning

Parameters, UVM, Coverage & Emulation Take Two and Call Me in the Morning Parameter, UVM, Coverage & Emulation Take Two and Call Me in the Morning Michael Horn Mentor Graphic Corporation Colorado, USA Mike_Horn@mentor.com Bryan Ramirez Mentor Graphic Corporation Colorado, USA

More information

Chapter 1. Jin-Fu Li Advanced Reliable Systems (ARES) Lab. Dept. of Electrical Engineering. Jhongli, Taiwan

Chapter 1. Jin-Fu Li Advanced Reliable Systems (ARES) Lab. Dept. of Electrical Engineering. Jhongli, Taiwan Chapter 1 Introduction to Memorie Advanced Reliable Sytem (ARES) Lab. Dept. of Electrical Engineering it Jhongli, Taiwan Outline Importance of Embedded Memorie Overview of Memory Structure 2 Embedded Memory

More information

1 The secretary problem

1 The secretary problem Thi i new material: if you ee error, pleae email jtyu at tanford dot edu 1 The ecretary problem We will tart by analyzing the expected runtime of an algorithm, a you will be expected to do on your homework.

More information

Performance Evaluation of an Advanced Local Search Evolutionary Algorithm

Performance Evaluation of an Advanced Local Search Evolutionary Algorithm Anne Auger and Nikolau Hanen Performance Evaluation of an Advanced Local Search Evolutionary Algorithm Proceeding of the IEEE Congre on Evolutionary Computation, CEC 2005 c IEEE Performance Evaluation

More information

Minimum congestion spanning trees in bipartite and random graphs

Minimum congestion spanning trees in bipartite and random graphs Minimum congetion panning tree in bipartite and random graph M.I. Otrovkii Department of Mathematic and Computer Science St. John Univerity 8000 Utopia Parkway Queen, NY 11439, USA e-mail: otrovm@tjohn.edu

More information

A Linear Interpolation-Based Algorithm for Path Planning and Replanning on Girds *

A Linear Interpolation-Based Algorithm for Path Planning and Replanning on Girds * Advance in Linear Algebra & Matrix Theory, 2012, 2, 20-24 http://dx.doi.org/10.4236/alamt.2012.22003 Publihed Online June 2012 (http://www.scirp.org/journal/alamt) A Linear Interpolation-Baed Algorithm

More information

Dynamically Reconfigurable Neuron Architecture for the Implementation of Self- Organizing Learning Array

Dynamically Reconfigurable Neuron Architecture for the Implementation of Self- Organizing Learning Array Dynamically Reconfigurable Neuron Architecture for the Implementation of Self- Organizing Learning Array Januz A. Starzyk,Yongtao Guo, and Zhineng Zhu School of Electrical Engineering & Computer Science

More information

A Multi-objective Genetic Algorithm for Reliability Optimization Problem

A Multi-objective Genetic Algorithm for Reliability Optimization Problem International Journal of Performability Engineering, Vol. 5, No. 3, April 2009, pp. 227-234. RAMS Conultant Printed in India A Multi-objective Genetic Algorithm for Reliability Optimization Problem AMAR

More information

SLA Adaptation for Service Overlay Networks

SLA Adaptation for Service Overlay Networks SLA Adaptation for Service Overlay Network Con Tran 1, Zbigniew Dziong 1, and Michal Pióro 2 1 Department of Electrical Engineering, École de Technologie Supérieure, Univerity of Quebec, Montréal, Canada

More information

SIMIT 7. Profinet IO Gateway. User Manual

SIMIT 7. Profinet IO Gateway. User Manual SIMIT 7 Profinet IO Gateway Uer Manual Edition January 2013 Siemen offer imulation oftware to plan, imulate and optimize plant and machine. The imulation- and optimizationreult are only non-binding uggetion

More information

ES205 Analysis and Design of Engineering Systems: Lab 1: An Introductory Tutorial: Getting Started with SIMULINK

ES205 Analysis and Design of Engineering Systems: Lab 1: An Introductory Tutorial: Getting Started with SIMULINK ES05 Analyi and Deign of Engineering Sytem: Lab : An Introductory Tutorial: Getting Started with SIMULINK What i SIMULINK? SIMULINK i a oftware package for modeling, imulating, and analyzing dynamic ytem.

More information

else end while End References

else end while End References 621-630. [RM89] [SK76] Roenfeld, A. and Melter, R. A., Digital geometry, The Mathematical Intelligencer, vol. 11, No. 3, 1989, pp. 69-72. Sklanky, J. and Kibler, D. F., A theory of nonuniformly digitized

More information

Chapter 13 Non Sampling Errors

Chapter 13 Non Sampling Errors Chapter 13 Non Sampling Error It i a general aumption in the ampling theory that the true value of each unit in the population can be obtained and tabulated without any error. In practice, thi aumption

More information

Analytical Redundancy and Fuzzy Inference in AUV Fault Detection and Compensation

Analytical Redundancy and Fuzzy Inference in AUV Fault Detection and Compensation Analytical Redundancy and Fuzzy Inference in AUV Fault Detection and Compenation A. J. Healey Profeor and Director Center for AUV Reearch Naval Potgraduate School Monterey, CA 93953 healey@me.np.navy.mil

More information

Operational Semantics Class notes for a lecture given by Mooly Sagiv Tel Aviv University 24/5/2007 By Roy Ganor and Uri Juhasz

Operational Semantics Class notes for a lecture given by Mooly Sagiv Tel Aviv University 24/5/2007 By Roy Ganor and Uri Juhasz Operational emantic Page Operational emantic Cla note for a lecture given by Mooly agiv Tel Aviv Univerity 4/5/7 By Roy Ganor and Uri Juhaz Reference emantic with Application, H. Nielon and F. Nielon,

More information

Cutting Stock by Iterated Matching. Andreas Fritsch, Oliver Vornberger. University of Osnabruck. D Osnabruck.

Cutting Stock by Iterated Matching. Andreas Fritsch, Oliver Vornberger. University of Osnabruck. D Osnabruck. Cutting Stock by Iterated Matching Andrea Fritch, Oliver Vornberger Univerity of Onabruck Dept of Math/Computer Science D-4909 Onabruck andy@informatikuni-onabrueckde Abtract The combinatorial optimization

More information

Shortest Paths Problem. CS 362, Lecture 20. Today s Outline. Negative Weights

Shortest Paths Problem. CS 362, Lecture 20. Today s Outline. Negative Weights Shortet Path Problem CS 6, Lecture Jared Saia Univerity of New Mexico Another intereting problem for graph i that of finding hortet path Aume we are given a weighted directed graph G = (V, E) with two

More information

The Implementation of an Adaptive Mechanism in the RTP Packet in Mobile Video Transmission

The Implementation of an Adaptive Mechanism in the RTP Packet in Mobile Video Transmission 2011 International Conference on Information Management and Engineering (ICIME 2011) IPCSIT vol. 52 (2012) (2012) IACSIT Pre, Singapore DOI: 10.7763/IPCSIT.2012.V52.91 The Implementation of an Adaptive

More information

A User-Attention Based Focus Detection Framework and Its Applications

A User-Attention Based Focus Detection Framework and Its Applications A Uer-Attention Baed Focu Detection Framework and It Application Chia-Chiang Ho, Wen-Huang Cheng, Ting-Jian Pan, Ja-Ling Wu Communication and Multimedia Laboratory, Department of Computer Science and Information

More information

Service and Network Management Interworking in Future Wireless Systems

Service and Network Management Interworking in Future Wireless Systems Service and Network Management Interworking in Future Wirele Sytem V. Tountopoulo V. Stavroulaki P. Demeticha N. Mitrou and M. Theologou National Technical Univerity of Athen Department of Electrical Engineering

More information

How to Select Measurement Points in Access Point Localization

How to Select Measurement Points in Access Point Localization Proceeding of the International MultiConference of Engineer and Computer Scientit 205 Vol II, IMECS 205, March 8-20, 205, Hong Kong How to Select Meaurement Point in Acce Point Localization Xiaoling Yang,

More information

A Load Balancing Model based on Load-aware for Distributed Controllers. Fengjun Shang, Wenjuan Gong

A Load Balancing Model based on Load-aware for Distributed Controllers. Fengjun Shang, Wenjuan Gong 4th International Conference on Machinery, Material and Computing Technology (ICMMCT 2016) A Load Balancing Model baed on Load-aware for Ditributed Controller Fengjun Shang, Wenjuan Gong College of Compute

More information

Topics. Lecture 37: Global Optimization. Issues. A Simple Example: Copy Propagation X := 3 B > 0 Y := 0 X := 4 Y := Z + W A := 2 * 3X

Topics. Lecture 37: Global Optimization. Issues. A Simple Example: Copy Propagation X := 3 B > 0 Y := 0 X := 4 Y := Z + W A := 2 * 3X Lecture 37: Global Optimization [Adapted from note by R. Bodik and G. Necula] Topic Global optimization refer to program optimization that encompa multiple baic block in a function. (I have ued the term

More information

Stress-Blended Eddy Simulation (SBES) - A new Paradigm in hybrid RANS-LES Modeling

Stress-Blended Eddy Simulation (SBES) - A new Paradigm in hybrid RANS-LES Modeling Stre-Blended Eddy Simulation (SBES) - A new Paradigm in hybrid RANS-LES Modeling Menter F.R. ANSYS Germany GmbH Introduction It i oberved in many CFD imulation that RANS model how inherent technology limitation

More information

Today s Outline. CS 561, Lecture 23. Negative Weights. Shortest Paths Problem. The presence of a negative cycle might mean that there is

Today s Outline. CS 561, Lecture 23. Negative Weights. Shortest Paths Problem. The presence of a negative cycle might mean that there is Today Outline CS 56, Lecture Jared Saia Univerity of New Mexico The path that can be trodden i not the enduring and unchanging Path. The name that can be named i not the enduring and unchanging Name. -

More information

Laboratory Exercise 6

Laboratory Exercise 6 Laboratory Exercie 6 Adder, Subtractor, and Multiplier a a The purpoe of thi exercie i to examine arithmetic circuit that add, ubtract, and multiply number. Each b c circuit will be decribed in Verilog

More information

Delaunay Triangulation: Incremental Construction

Delaunay Triangulation: Incremental Construction Chapter 6 Delaunay Triangulation: Incremental Contruction In the lat lecture, we have learned about the Lawon ip algorithm that compute a Delaunay triangulation of a given n-point et P R 2 with O(n 2 )

More information

Modeling and Analysis of Slow CW Decrease for IEEE WLAN

Modeling and Analysis of Slow CW Decrease for IEEE WLAN Modeling and Analyi of Slow CW Decreae for IEEE 82. WLAN Qiang Ni, Imad Aad 2, Chadi Barakat, and Thierry Turletti Planete Group 2 Planete Group INRIA Sophia Antipoli INRIA Rhône-Alpe Sophia Antipoli,

More information

Aalborg Universitet. Published in: Proceedings of the Working Conference on Advanced Visual Interfaces

Aalborg Universitet. Published in: Proceedings of the Working Conference on Advanced Visual Interfaces Aalborg Univeritet Software-Baed Adjutment of Mobile Autotereocopic Graphic Uing Static Parallax Barrier Paprocki, Martin Marko; Krog, Kim Srirat; Kritofferen, Morten Bak; Krau, Martin Publihed in: Proceeding

More information

New Structural Decomposition Techniques for Constraint Satisfaction Problems

New Structural Decomposition Techniques for Constraint Satisfaction Problems New Structural Decompoition Technique for Contraint Satifaction Problem Yaling Zheng and Berthe Y. Choueiry Contraint Sytem Laboratory Univerity of Nebraka-Lincoln Email: yzheng choueiry@ce.unl.edu Abtract.

More information

Spring 2012 EE457 Instructor: Gandhi Puvvada

Spring 2012 EE457 Instructor: Gandhi Puvvada Spring 2012 EE457 Intructor: Gandhi Puvvada Quiz (~ 10%) Date: 2/17/2012, Friday in SLH200 Calculator and Cadence Verilog Guide are allowed; Time: 10:00AM-12:45PM Cloed-book/Cloed-note Exam Total point:

More information

LinkGuide: Towards a Better Collection of Hyperlinks in a Website Homepage

LinkGuide: Towards a Better Collection of Hyperlinks in a Website Homepage Proceeding of the World Congre on Engineering 2007 Vol I LinkGuide: Toward a Better Collection of Hyperlink in a Webite Homepage A. Ammari and V. Zharkova chool of Informatic, Univerity of Bradford anammari@bradford.ac.uk,

More information

(12) Patent Application Publication (10) Pub. No.: US 2011/ A1

(12) Patent Application Publication (10) Pub. No.: US 2011/ A1 (19) United State US 2011 0316690A1 (12) Patent Application Publication (10) Pub. No.: US 2011/0316690 A1 Siegman (43) Pub. Date: Dec. 29, 2011 (54) SYSTEMAND METHOD FOR IDENTIFYING ELECTRICAL EQUIPMENT

More information

Modeling of underwater vehicle s dynamics

Modeling of underwater vehicle s dynamics Proceeding of the 11th WEA International Conference on YTEM, Agio Nikolao, Crete Iland, Greece, July 23-25, 2007 44 Modeling of underwater vehicle dynamic ANDRZEJ ZAK Department of Radiolocation and Hydrolocation

More information

A Study of a Variable Compression Ratio and Displacement Mechanism Using Design of Experiments Methodology

A Study of a Variable Compression Ratio and Displacement Mechanism Using Design of Experiments Methodology A Study of a Variable Compreion Ratio and Diplacement Mechanim Uing Deign of Experiment Methodology Shugang Jiang, Michael H. Smith, Maanobu Takekohi Abtract Due to the ever increaing requirement for engine

More information

VLSI Design 9. Datapath Design

VLSI Design 9. Datapath Design VLSI Deign 9. Datapath Deign 9. Datapath Deign Lat module: Adder circuit Simple adder Fat addition Thi module omparator Shifter Multi-input Adder Multiplier omparator detector: A = 1 detector: A = 11 111

More information

AN ALGORITHM FOR RESTRICTED NORMAL FORM TO SOLVE DUAL TYPE NON-CANONICAL LINEAR FRACTIONAL PROGRAMMING PROBLEM

AN ALGORITHM FOR RESTRICTED NORMAL FORM TO SOLVE DUAL TYPE NON-CANONICAL LINEAR FRACTIONAL PROGRAMMING PROBLEM RAC Univerity Journal, Vol IV, No, 7, pp 87-9 AN ALGORITHM FOR RESTRICTED NORMAL FORM TO SOLVE DUAL TYPE NON-CANONICAL LINEAR FRACTIONAL PROGRAMMING PROLEM Mozzem Hoain Department of Mathematic Ghior Govt

More information

Module Size Distribution and Defect Density

Module Size Distribution and Defect Density Module Size Ditribution and Defect Computer Science Dept. Colorado State Univerity With update 1 Module Size Ditribution and Defect Significance: Factor that affect defect denity Exiting work: Data & Hypothei

More information

Frequency Table Computation on Dataflow Architecture

Frequency Table Computation on Dataflow Architecture Frequency Table Computation on Dataflow Architecture P. Škoda *, V. Sruk **, and B. Medved Rogina * * Ruđer Bošković Intitute, Zagreb, Croatia ** Faculty of Electrical Engineering and Computing, Univerity

More information

Domain-Specific Modeling for Rapid System-Wide Energy Estimation of Reconfigurable Architectures

Domain-Specific Modeling for Rapid System-Wide Energy Estimation of Reconfigurable Architectures Domain-Specific Modeling for Rapid Sytem-Wide Energy Etimation of Reconfigurable Architecture Seonil Choi 1,Ju-wookJang 2, Sumit Mohanty 1, Viktor K. Praanna 1 1 Dept. of Electrical Engg. 2 Dept. of Electronic

More information

CS 467/567: Divide and Conquer on the PRAM

CS 467/567: Divide and Conquer on the PRAM CS 467/567: Divide and Conquer on the PRAM Stefan D. Bruda Winter 2017 BINARY SEARCH Problem: Given a equence S 1..n orted in nondecreaing order and a value x, find the ubcript k uch that S i x If n proceor

More information

DWH Performance Tuning For Better Reporting

DWH Performance Tuning For Better Reporting DWH Performance Tuning For Better Sandeep Bhargava Reearch Scholar Naveen Hemrajani Aociate Profeor Dineh Goyal Aociate Profeor Subhah Gander IT Profeional ABSTRACT: The concept of data warehoue deal in

More information

An Approach to a Test Oracle for XML Query Testing

An Approach to a Test Oracle for XML Query Testing An Approach to a Tet Oracle for XML Query Teting Dae S. Kim-Park, Claudio de la Riva, Javier Tuya Univerity of Oviedo Computing Department Campu of Vieque, /n, 33204 (SPAIN) kim_park@li.uniovi.e, claudio@uniovi.e,

More information

A System Dynamics Model for Transient Availability Modeling of Repairable Redundant Systems

A System Dynamics Model for Transient Availability Modeling of Repairable Redundant Systems International Journal of Performability Engineering Vol., No. 3, May 05, pp. 03-. RAMS Conultant Printed in India A Sytem Dynamic Model for Tranient Availability Modeling of Repairable Redundant Sytem

More information

DECENTRALIZED structured overlays and distributed. Distributed, Secure Load Balancing with Skew, Heterogeneity, and Churn

DECENTRALIZED structured overlays and distributed. Distributed, Secure Load Balancing with Skew, Heterogeneity, and Churn Harvard Technical Report TR-3-4 Ditributed, Secure Load Balancing with Skew, Heterogeneity, and Churn Jonathan Ledlie and Margo Seltzer Abtract Numerou propoal exit for load balancing in peer-to-peer (pp)

More information

Module Size Distribution and Defect Density

Module Size Distribution and Defect Density Module Size Ditribution and Defect Yahwant K. Malaiya and Jaon Denton Computer Science Dept. Colorado State Univerity 1 Module Size Ditribution and Defect Significance: Factor that affect defect denity

More information

Policy-based Injection of Private Traffic into a Public SDN Testbed

Policy-based Injection of Private Traffic into a Public SDN Testbed Intitut für Techniche Informatik und Kommunikationnetze Adrian Friedli Policy-baed Injection of Private Traffic into a Public SDN Tetbed Mater Thei MA-2013-12 Advior: Dr. Bernhard Ager, Vaileio Kotroni

More information

An efficient resource allocation algorithm for OFDMA cooperative relay networks with fairness and QoS guaranteed

An efficient resource allocation algorithm for OFDMA cooperative relay networks with fairness and QoS guaranteed Univerity of Wollongong Reearch Online Faculty of Informatic - Paper (Archive) Faculty of Engineering and Information Science 200 An efficient reource allocation algorithm for OFDMA cooperative relay network

More information

MAT 155: Describing, Exploring, and Comparing Data Page 1 of NotesCh2-3.doc

MAT 155: Describing, Exploring, and Comparing Data Page 1 of NotesCh2-3.doc MAT 155: Decribing, Exploring, and Comparing Data Page 1 of 8 001-oteCh-3.doc ote for Chapter Summarizing and Graphing Data Chapter 3 Decribing, Exploring, and Comparing Data Frequency Ditribution, Graphic

More information

CS201: Data Structures and Algorithms. Assignment 2. Version 1d

CS201: Data Structures and Algorithms. Assignment 2. Version 1d CS201: Data Structure and Algorithm Aignment 2 Introduction Verion 1d You will compare the performance of green binary earch tree veru red-black tree by reading in a corpu of text, toring the word and

More information

Coordinated TCP Westwood Congestion Control for Multiple Paths over Wireless Networks

Coordinated TCP Westwood Congestion Control for Multiple Paths over Wireless Networks Coordinated TCP Wetwood Congetion Control for Multiple Path over Wirele Network Tuan Anh Le, Choong eon Hong, and Eui-Nam Huh Department of Computer Engineering, Kyung Hee Univerity 1 eocheon, Giheung,

More information

Fall 2010 EE457 Instructor: Gandhi Puvvada Date: 10/1/2010, Friday in SGM123 Name:

Fall 2010 EE457 Instructor: Gandhi Puvvada Date: 10/1/2010, Friday in SGM123 Name: Fall 2010 EE457 Intructor: Gandhi Puvvada Quiz (~ 10%) Date: 10/1/2010, Friday in SGM123 Name: Calculator and Cadence Verilog guide are allowed; Cloed-book, Cloed-note, Time: 12:00-2:15PM Total point:

More information

Maneuverable Relays to Improve Energy Efficiency in Sensor Networks

Maneuverable Relays to Improve Energy Efficiency in Sensor Networks Maneuverable Relay to Improve Energy Efficiency in Senor Network Stephan Eidenbenz, Luka Kroc, Jame P. Smith CCS-5, MS M997; Lo Alamo National Laboratory; Lo Alamo, NM 87545. Email: {eidenben, kroc, jpmith}@lanl.gov

More information

See chapter 8 in the textbook. Dr Muhammad Al Salamah, Industrial Engineering, KFUPM

See chapter 8 in the textbook. Dr Muhammad Al Salamah, Industrial Engineering, KFUPM Goal programming Objective of the topic: Indentify indutrial baed ituation where two or more objective function are required. Write a multi objective function model dla a goal LP Ue weighting um and preemptive

More information

Distributed Partial Information Management (DPIM) Schemes for Survivable Networks - Part II

Distributed Partial Information Management (DPIM) Schemes for Survivable Networks - Part II IEEE INFOCO 2002 1 Ditributed Partial Information anagement (DPI) Scheme for Survivable Network - Part II Dahai Xu Chunming Qiao Department of Computer Science and Engineering State Univerity of New York

More information

Part 1 A New Number Format: The Unum

Part 1 A New Number Format: The Unum Part 1 yr op A New Number Format: The Unum ht ig 1 Overview l- ia er at M or yl Ta an Fr ci You can t boil the ocean. Former Intel executive, reacting to the idea of unum. Incidentally, the pronunciation

More information

Edits in Xylia Validity Preserving Editing of XML Documents

Edits in Xylia Validity Preserving Editing of XML Documents dit in Xylia Validity Preerving diting of XML Document Pouria Shaker, Theodore S. Norvell, and Denni K. Peter Faculty of ngineering and Applied Science, Memorial Univerity of Newfoundland, St. John, NFLD,

More information

An Active Stereo Vision System Based on Neural Pathways of Human Binocular Motor System

An Active Stereo Vision System Based on Neural Pathways of Human Binocular Motor System Journal of Bionic Engineering 4 (2007) 185 192 An Active Stereo Viion Sytem Baed on Neural Pathway of Human Binocular Motor Sytem Yu-zhang Gu 1, Makoto Sato 2, Xiao-lin Zhang 2 1. Department of Advanced

More information

ADAM - A PROBLEM-ORIENTED SYMBOL PROCESSOR

ADAM - A PROBLEM-ORIENTED SYMBOL PROCESSOR ADAM - A PROBLEM-ORIENTED SYMBOL PROCESSOR A. P. Mullery and R. F. Schauer Thoma J. Waton Reearch Center International Buine Machine Corporation Yorktown Height, New York R. Rice International Buine Machine

More information

Modeling the Effect of Mobile Handoffs on TCP and TFRC Throughput

Modeling the Effect of Mobile Handoffs on TCP and TFRC Throughput Modeling the Effect of Mobile Handoff on TCP and TFRC Throughput Antonio Argyriou and Vijay Madietti School of Electrical and Computer Engineering Georgia Intitute of Technology Atlanta, Georgia 3332 25,

More information

An Intro to LP and the Simplex Algorithm. Primal Simplex

An Intro to LP and the Simplex Algorithm. Primal Simplex An Intro to LP and the Simplex Algorithm Primal Simplex Linear programming i contrained minimization of a linear objective over a olution pace defined by linear contraint: min cx Ax b l x u A i an m n

More information

Laboratory Exercise 6

Laboratory Exercise 6 Laboratory Exercie 6 Adder, Subtractor, and Multiplier The purpoe of thi exercie i to examine arithmetic circuit that add, ubtract, and multiply number. Each circuit will be decribed in Verilog and implemented

More information

Kinematics Programming for Cooperating Robotic Systems

Kinematics Programming for Cooperating Robotic Systems Kinematic Programming for Cooperating Robotic Sytem Critiane P. Tonetto, Carlo R. Rocha, Henrique Sima, Altamir Dia Federal Univerity of Santa Catarina, Mechanical Engineering Department, P.O. Box 476,

More information

Architecture and grid application of cluster computing system

Architecture and grid application of cluster computing system Architecture and grid application of cluter computing ytem Yi Lv*, Shuiqin Yu, Youju Mao Intitute of Optical Fiber Telecom, Chongqing Univ. of Pot & Telecom, Chongqing, 400065, P.R.China ABSTRACT Recently,

More information

Hardware-Based IPS for Embedded Systems

Hardware-Based IPS for Embedded Systems Hardware-Baed IPS for Embedded Sytem Tomoaki SATO, C&C Sytem Center, Hiroaki Univerity Hiroaki 036-8561 Japan Shuya IMARUOKA and Maa-aki FUKASE Graduate School of Science and Technology, Hiroaki Univerity

More information

Laboratory Exercise 6

Laboratory Exercise 6 Laboratory Exercie 6 Adder, Subtractor, and Multiplier The purpoe of thi exercie i to examine arithmetic circuit that add, ubtract, and multiply number. Each circuit will be decribed in VHL and implemented

More information

Development of an atmospheric climate model with self-adapting grid and physics

Development of an atmospheric climate model with self-adapting grid and physics Intitute of Phyic Publihing Journal of Phyic: Conference Serie 16 (2005) 353 357 doi:10.1088/1742-6596/16/1/049 SciDAC 2005 Development of an atmopheric climate model with elf-adapting grid and phyic Joyce

More information

Fast Address Sequence Generation for Data-Parallel Programs Using Integer Lattices

Fast Address Sequence Generation for Data-Parallel Programs Using Integer Lattices Fat Addre Sequence Generation for Data-Parallel Program Uing Integer Lattice Ahwath Thirumalai and J Ramanujam Dept of Electrical & Computer Engineering Louiiana State Univerity, Baton Rouge, LA 70803

More information

International Journal of Engineering Research & Technology (IJERT) ISSN: Vol. 2 Issue 5, May

International Journal of Engineering Research & Technology (IJERT) ISSN: Vol. 2 Issue 5, May Intertage Pipeline VLI Architecture for 2-D DWT Ajinkya. Bankar 1,Bhavika. haha 2, P.K. Kadbe 3 E&TC Department, Pune Univerity 1,2,3 VPCOE Baramati Abtract In thi paper, a cheme for the deign of a high-pd

More information