PERFORMANCE ANALYSIS OF REAL-TIME EMBEDDED SOFTWARE
|
|
- Ethan Day
- 6 years ago
- Views:
Transcription
1 PERFORMANCE ANALYSIS OF REAL-TIME EMBEDDED SOFTWARE
2 PERFORMANCE ANALYSIS OF REAL-TIME EMBEDDED SOFTWARE Yau-Tsun Steven Li Monterey Design Systems, Inc. Sharad Malik Princeton University ~. " SPRINGER SCIENCE+BUSINESS MEDIA, LLC
3 ISBN DOI / ISBN (ebook) Library of Congress Cataloging-in-Publication Data A C.I.P. Catalogue record for this book is available from the Library of Congress. Copyright 1999 by Springer Science+Business Media New York in 1999 Originally published by Kluwer Academic Publishers in 1999 Softcover reprint of the hardcover Ist edition 1999 AlI rights reserved. No part of this publication may be reproduced, stored in a retrieval system or transmitted in any form or by any means, mechanical, photocopying, recording, or otherwise, without the prior written permission of the publisher, Springer Science+Business Media, LLC Printed on acid-free paper.
4 Contents List of Figures List of Tables Preface Acknowledgments ix xiii xv xvii 1. INTRODUCTION 1.1 The Emergence of Embedded Systems 1.2 Performance Constraints of Embedded Systems Challenges in Designing Embedded Systems Research Goals Two Sub-Problems Summary Organization of this Book 8 2. RELATED WORK IN TIMING ANALYSIS FOR EMBEDDED SOFTWARE Introduction Program Path Analysis Program Restrictions Extreme Case Timing Analysis Microarchitecture Modeling Retargetability Issues Summary PROGRAM PATH ANALYSIS Introduction Problems with Program Path Analysis Execution Count Analysis Program Control Flow and Logical Flow 28
5 vi PERFORMANCE ANALYSIS OF REAL-TIME EMBEDDED SOFTWARE 3.5 Integer Linear Programming Formulation Structural Constraints Functionality Constraints Functionality Constraints versus IDL Solving ILP Problems Experimental Validation Chapter Conclusions MICROARCHITECTURE MODELING Introduction Overview Simple Microarchitectures Advanced Microarchitectures and Memory Systems Cache Modeling Cache Organization Instruction Cache Modeling Difficulty in Instruction Cache Modeling Previous Work ILP techniques Direct Mapped Instruction Cache Analysis Cost Function Linking with Program Path Analysis Cache Constraints Set Associative Instruction Cache Analysis States of a Cache Set Set Associative Cache Constraints Interprocedural Calls Data Cache Modeling Simulation-Based Analysis Pipeline Modeling Experiments Instruction Cache Analysis Data Cache Analysis Cache and Pipeline Analysis Comparison with Other Analysis Techniques Chapter Conclusions A RETARGETABLE TIMING ANALYSIS TOOL - CINDERELLA Introduction Issues in Timing Analysis Basic Information for Timing Analysis Extracting Control Flow and Path Information 107
6 Contents vii 5.3 Classification of Retargeting Information Reading and Decoding the Program Modeling the Hardware 5.4 Implementation of Retargetable Modules Object File Module Instruction Set Module Machine Module ILP Solver Module User Interface 5.5 Operations 5.6 Chapter Conclusions 6. CONCLUSIONS 6.1 Contributions Program Path Analysis Microarchitecture Modeling Implementation 6.2 Future Research Directions Appendices A-Practical Complexity of the I LP Problems References Index 145
7 List of Figures 1.1 Estimated bound must enclose actual bound, which in turn encloses simulation results A simple wait loop whose loop bound cannot be determined automatically A simple for loop whose loop bounds can be determined statically An example of MARS-C code Different parts of the code are sometimes related Exponential blowup of program paths Different parts of the code are sometimes related Factors affecting the values of basic block variables An example of the if -then-else statement and its control flow graph An example of the while loop statement and its CFG An example showing how function calls are represented Loop bounds for nested loops. Line numbers and basic block variables (Xi'S) are labeled beside the source code check_data example from Park's thesis An example showing how the path relationship between the caller and the callee function can be specified The functionality constraints for function check_data () are expanded into four functionality constraint sets. At least one of them must be satisfied. Note that Set 2 and Set 3 are null sets because of the contradicting values on variable X An example code fragment to illustrate how the functionality constraints will affect the performance of solving the ILP instance Accuracy of program path analysis. 47
8 x PERFORMANCE ANALYSIS OF REAL-TIME EMBEDDED SOFfWARE 4.1 The partitioning of a memory address for locating its position in the cache Organization of a 2-way set associative cache with 4 cache sets A simple cache conflicting problem. Two statements, line 4 and 6 (shown in italic font), conflict with each other An example showing how the I-blocks are constructed A general cache conflict graph containing two conflicting I-blocks Cache conflict graph for the conflicting I-blocks in cache set 0 of the example shown in Figure An example control flow graph with two conflicting I-blocks (B4. 1 and B7. 1) from two different loops. The italicized numbers shown on the left of the variables are the worst case solution returned by the ILP solver Cache conflict graphs of conflicting I-blocks (B4.1 and B7.d in Figure 4.7. The italicized numbers shown on the left of the variables are the worst case solution returned by the ILP solver A simple example showing how the cache state transition graph is constructed when there are three conflicting I-blocks Bl.l, B4. 1 and B An example code fragment showing how function calls are handled Integrating data cache modeling with the rest A four-stage pipeline implemented in the Intel i960kb processor Accuracy in 512, byte direct mapped instruction cache analysis Accuracy in 512, byte 2-way set associative instruction cache analysis Accuracy in 1, KB 2-way set associative instruction cache analysis Accuracy in modeling programs running on Intel's QT960 evaluation board Comparison of estimated WCETs Comparison of estimated BCETs A block diagram showing the structure of cinderella. The dark area represents the target independent code. 113
9 LIST OF FIGURES xi 5.2 Graphical user interface of cinderella. The Cinderella window shows estimated bounds (best case and worst case) of the program, its source code and the basic block variables. When the mouse pointer is at the variable, a pop-up window displays further information for that variable. The Cache Table window shows how the basic blocks are mapped to the cache sets. The Functionality Constraints window shows linear constraints representing loop bounds and additional path information. The Assembly Code window displays the assembly instructions and their addresses. This is handy for tracing code transformations done by compiler optimizations Dialog box for selecting the top level function for analysis Dialog box for selecting the machine that is compatible with the selected program Simplified C++ code showing how the cinderella core reads a basic block for constructing the control flow graphs Providing a loop bound Dialog box for adding functionality constraint A flow chart showing the operations of cinderella. The left hand side shows the user actions and the right hand side shows the corresponding operations that cinderella performs. 125
10 List of Tables 2.1 Comparison of various extreme case performance analysis techniques Transformation from IDL to functionality constraints Set of benchmark examples, their descriptions, source file line sizes and Intel i960kb binary code sizes Program path analysis results. The estimated bound and the calculated bound are in units of clock cycles Complexity of program path analysis for the benchmark programs Results for 512, byte direct mapped instruction cache with 16, byte line size Results for 512, byte 2-way set associative instruction cache with 16, byte line size Results for 1, KB 2-way set associative instruction cache with 16, byte line size Results for data cache modeling Results for modeling programs running on Intel QT960 evaluation board Comparison of different analysis techniques Code size of cinderella Functions provided by object file module Functions provided by instruction set module Functions provided by machine module. 119
11 Preface Embedded systems are characterized by the presence of processors running application specific software. Recent years have seen a large growth of such systems. This trend is projected to continue with the growth of systems on a chip. Many of these systems have strict performance and cost requirements. To design these systems, sophisticated timing analysis tools are needed to accurately determine the extreme case (best case and worst case) performance of the software components. Existing techniques for this analysis have one or more of the following limitations: they cannot model complicated programs, they cannot model advanced micro-architectural features of the processor, such as cache memories and pipelines, they cannot be easily retargeted for new hardware platforms. These limitations often result in loose estimation of the software performance. Hence, more powerful and expensive hardware is typically required in conservatively overdesigned systems to guarantee that the software component meets all timing deadlines. This drives up the cost of the system unnecessarily. In this monograph, a new timing analysis technique is proposed to overcome the above limitations. The technique determines the bounds on the extreme case (best case and worst case) execution time of a program when running on a given hardware system. It partitions the problem into two sub-problems: program path analysis and microarchitecture modeling. Program path analysis analyzes the structure of the program and determines the set of paths that results in the extreme case execution time. Microarchitecture modeling accurately models the timing properties of the hardware, including pipelined processors and caches, and determines the execution time of a known sequence of instructions. The technique transforms the problem into a set in-
12 xvi PERFORMANCE ANALYSIS OF REAL-TIME EMBEDDED SOFfWARE teger linear programming problems, for which the optimum solution is the estimated worst case or best case execution time of the program. The timing analysis technique has been implemented in a tool called cinderella, which features a retargetable backend so that new hardware platforms can be modeled with minimum programming effort. Currently, the Intel i960kb and the Motorola M68000 platforms have been implemented. Extensive experiments have been conducted to show that the tool is capable of analyzing large and complicated programs accurately.
13 Acknowledgments I would like to express my sincere appreciation to Professor Sharad Malik, my Ph. D. thesis advisor at Princeton University, for his guidance, support, and encouragement. lowe him my gratitude for giving me the opportunity to work on the challenging and rewarding research reported in this monograph. This work has benefited from many stimulating discussions with Professors Andrew Wolfe and Margaret Martonosi. I would also like to thank our editor Carl Harris for his patience and help in preparing this monograph. Most of all, I would like to thank Leona Chan, my brother, and my parents for the constant support and encouragement. Finally, the support of this work by the Office of Naval Research (grant NOO ) is gratefully acknowledged. Vau-Tsun Steven Li The final work on this manuscript was completed while I was on sabbatical leave from Princeton University, and a visiting professor at the Indian Institute of Technology, New Delhi. I would like to thank both institutions for making this possible. Sharad Malik
Efficient Microarchitecture Modeling and Path Analysis for Real-Time Software. Yau-Tsun Steven Li Sharad Malik Andrew Wolfe
Efficient Microarchitecture Modeling and Path Analysis for Real-Time Software Yau-Tsun Steven Li Sharad Malik Andrew Wolfe 1 Introduction Paper examines the problem of determining the bound on the worst
More informationMULTIMEDIA DATABASE MANAGEMENT SYSTEMS
MULTIMEDIA DATABASE MANAGEMENT SYSTEMS THE KLUWER INTERNATIONAL SERIES IN ENGINEERING AND COMPUTER SCIENCE MULTIMEDIA SYSTEMS AND APPLICATIONS Recently Published Titles: Consulting Editor Borko Furht Florida
More informationRETARGETABLE CODE GENERATION FOR DIGITAL SIGNAL PROCESSORS
RETARGETABLE CODE GENERATION FOR DIGITAL SIGNAL PROCESSORS RETARGETABLE CODE GENERATION FOR DIGITAL SIGNAL PROCESSORS Rainer LEUPERS University of Dortmund Department of Computer Science Dortmund, Germany
More informationSYNTHESIS OF FINITE STATE MACHINES: LOGIC OPTIMIZATION
SYNTHESIS OF FINITE STATE MACHINES: LOGIC OPTIMIZATION SYNTHESIS OF FINITE STATE MACHINES: LOGIC OPTIMIZATION Tiziano Villa University of California/Berkeley Timothy Kam Intel Corporation Robert K. Brayton
More informationPerformance Analysis of Embedded Software Using Implicit Path Enumeration
Performance Analysis of Embedded Software Using Implicit Path Enumeration Yau-Tsun Steven Li Sharad Malik Department of Electrical Engineering, Princeton University, NJ 08544, USA. Abstract Embedded computer
More informationARCHITECTURE AND CAD FOR DEEP-SUBMICRON FPGAs
ARCHITECTURE AND CAD FOR DEEP-SUBMICRON FPGAs THE KLUWER INTERNATIONAL SERIES IN ENGINEERING AND COMPUTER SCIENCE ARCHITECTURE AND CAD FOR DEEP-SUBMICRON FPGAs Vaughn Betz Jonathan Rose Alexander Marquardt
More informationWIRELESS ATM AND AD-HOC NETWORKS. Protocols and Architectures
WIRELESS ATM AND AD-HOC NETWORKS Protocols and Architectures WIRELESS ATM AND AD-HOC NETWORKS Protocols and Architectures C-K Toh, Ph.D. University of Cambridge Cambridge, United Kingdom SPRINGER-SCIENCE+BUSINESS
More informationSPECC: SPECIFICATION LANGUAGE AND METHODOLOGY
SPECC: SPECIFICATION LANGUAGE AND METHODOLOGY SPECC: SPECIFICATION LANGUAGE AND METHODOLOGY Daniel D. Gajski Jianwen Zhu Rainer Dömer Andreas Gerstlauer Shuqing Zhao University of California, Irvine SPRINGER
More informationEnergy Efficient Microprocessor Design
Energy Efficient Microprocessor Design Energy Efficient Microprocessor Design by Thomas D. Burd Robert W. Brodersen with Contributions Irom Trevor Pering Anthony Stratakos Berkeley Wireless Research Center
More informationTHE VERILOG? HARDWARE DESCRIPTION LANGUAGE
THE VERILOG? HARDWARE DESCRIPTION LANGUAGE THE VERILOGf HARDWARE DESCRIPTION LANGUAGE by Donald E. Thomas Carnegie Mellon University and Philip R. Moorby Cadence Design Systems, Inc. SPRINGER SCIENCE+BUSINESS
More informationTopological Structure and Analysis of Interconnection Networks
Topological Structure and Analysis of Interconnection Networks Network Theory and Applications Volume 7 Managing Editors: Ding-Zhu Du, University of Minnesota, U.S.A. and Cauligi Raghavendra, University
More informationLoop Tiling for Parallelism
Loop Tiling for Parallelism THE KLUWER INTERNATIONAL SERIES IN ENGINEERING AND COMPUTER SCIENCE LOOP TILING FOR PARALLELISM JINGLING XUE School of Computer Science and Engineering The University of New
More informationPERFORMANCE EVALUATION, PREDICTION AND VISUALIZATION OF PARALLEL SYSTEMS
PERFORMANCE EVALUATION, PREDICTION AND VISUALIZATION OF PARALLEL SYSTEMS The Kluwer International Series on ASIAN STUDIES IN COMPUTER AND INFORMATION SCIENCE Series Editor Kai-Yuan Cai Beijing University
More informationHIGH-SPEED COMMUNICATION NETWORKS
HIGH-SPEED COMMUNICATION NETWORKS HIGH-SPEED COMMUNICATION NETWORKS Edited by Harry Perros North Carolina State University Raleigh, North Carolina Springer Science+Busines s Media, LL C Library of Congress
More informationVERILOG QUICKSTART. James M. Lee Cadence Design Systems, Inc. SPRINGER SCIENCE+BUSINESS MEDIA, LLC
VERILOG QUICKSTART VERILOG QUICKSTART by James M. Lee Cadence Design Systems, Inc. ~. " SPRINGER SCIENCE+BUSINESS MEDIA, LLC ISBN 978-1-4613-7801-3 ISBN 978-1-4615-6113-2 (ebook) DOI 10.1007/978-1-4615-6113-2
More informationINTRUSION DETECTION IN DISTRIBUTED SYSTEMS An Abstraction-Based Approach
INTRUSION DETECTION IN DISTRIBUTED SYSTEMS An Abstraction-Based Approach Library of Congress Cataloging-in-Publication ISBN 978-1-4613-5091-0 ISBN 978-1-4615-0467-2 (ebook) DOI 10.1007/978-1-4615-0467-2
More informationSYNCHRONIZATION IN REAL-TIME SYSTEMS. A Priority Inheritance Approach
SYNCHRONIZATION IN REAL-TIME SYSTEMS A Priority Inheritance Approach THE KLUWER INTERNATIONAL SERIES IN ENGINEERING AND COMPUTER SCIENCE REAL-TIME SYSTEMS Consulting Editor John A. Stankovic REAL TIME
More informationFunctional Programming in R
Functional Programming in R Advanced Statistical Programming for Data Science, Analysis and Finance Thomas Mailund Functional Programming in R: Advanced Statistical Programming for Data Science, Analysis
More informationCOMMUNICATION SYSTEMS The State of the Art
COMMUNICATION SYSTEMS The State of the Art IFIP The International Federation for Information Processing lfip was founded in 1960 under the auspices of UNESCO, following the First World Computer Congress
More informationHonorary Professor Supercomputer Education and Research Centre Indian Institute of Science, Bangalore
COMPUTER ORGANIZATION AND ARCHITECTURE V. Rajaraman Honorary Professor Supercomputer Education and Research Centre Indian Institute of Science, Bangalore T. Radhakrishnan Professor of Computer Science
More informationPrecise and Efficient FIFO-Replacement Analysis Based on Static Phase Detection
Precise and Efficient FIFO-Replacement Analysis Based on Static Phase Detection Daniel Grund 1 Jan Reineke 2 1 Saarland University, Saarbrücken, Germany 2 University of California, Berkeley, USA Euromicro
More informationTIME-CONSTRAINED TRANSACTION MANAGEMENT. Real-Time Constraints in Database Transaction Systems
TIME-CONSTRAINED TRANSACTION MANAGEMENT Real-Time Constraints in Database Transaction Systems The Kluwer International Series on ADV ANCES IN DATABASE SYSTEMS Other books in the Series: Series Editor Ahmed
More informationMicrocontrollers. Principles and Applications. Ajit Pal +5 V 2K 8. 8 bit dip switch. P2 8 Reset switch Microcontroller AT89S52 100E +5 V. 2.
Ajit Pal Microcontrollers Principles and Applications +5 V 2K 8 8 bit dip switch P2 8 Reset switch Microcontroller AT89S52 100E +5 V +5 V 2.2K 10 uf RST 7 Segment common anode LEDs P1(0-6) & P3(0-6) 7
More informationGroupware and the World Wide Web
Groupware and the World Wide Web Edited by Richard Bentley, Uwe Busbach, David Kerr & Klaas Sikkel German National Research Center for Information Technology, Institutefor Applied Information Technology
More informationGraphics Programming in c++
Graphics Programming in c++ Springer London Berlin Heidelberg New York Barcelona Budapest Hong Kong Milan Paris Santa Clara Singapore Tokyo Mark Walmsley Graphics Programming in c++ Writing Graphics Applications
More informationApplication-Specific Mesh-based Heterogeneous FPGA Architectures
Application-Specific Mesh-based Heterogeneous FPGA Architectures Husain Parvez H abib Mehrez Application-Specific Mesh-based Heterogeneous FPGA Architectures Husain Parvez Habib Mehrez Université Pierre
More informationAlgorithm Collections for Digital Signal Processing Applications Using Matlab
Algorithm Collections for Digital Signal Processing Applications Using Matlab Algorithm Collections for Digital Signal Processing Applications Using Matlab E.S. Gopi National Institute of Technology, Tiruchi,
More informationINVERSE PROBLEMS IN GROUNDWATER MODELING
INVERSE PROBLEMS IN GROUNDWATER MODELING Theory and Applications of Transport in Porous Media Series Editor: Jacob Bear, Technion - Israel Institute of Technology, Haifa, Israel Volume 6 The titles published
More informationFUNCTIONAL DECOMPOSITION WITH APPLICATION TO FPGA SYNTHESIS
FUNCTIONAL DECOMPOSITION WITH APPLICATION TO FPGA SYNTHESIS Functional Decomposition with Application to FPGA Synthesis by Christoph Scholl Institute of Computer Science, Albert-Ludwigs-University, Freiburg
More informationMicroprocessor Theory
Microprocessor Theory and Applications with 68000/68020 and Pentium M. RAFIQUZZAMAN, Ph.D. Professor California State Polytechnic University Pomona, California and President Rafi Systems, Inc. WILEY A
More informationA Structured Programming Approach to Data
A Structured Programming Approach to Data Derek Coleman A Structured Programming Approach to Data Springer-Verlag New York Derek Coleman Department of Computation Institute of Science Technology University
More informationGuide to RISC Processors
Guide to RISC Processors Sivarama P. Dandamudi Guide to RISC Processors for Programmers and Engineers Sivarama P. Dandamudi School of Computer Science Carleton University Ottawa, ON K1S 5B6 Canada sivarama@scs.carleton.ca
More informationBuilding Custom Tasks for SQL Server Integration Services
Building Custom Tasks for SQL Server Integration Services Andy Leonard Building Custom Tasks for SQL Server Integration Services Andy Leonard Farmville, Virginia, USA ISBN-13 (pbk): 978-1-4842-2939-2 ISBN-13
More informationDISSEMINATING SECURITY UPDATES AT INTERNET SCALE
DISSEMINATING SECURITY UPDATES AT INTERNET SCALE Advances in Information Security Sushil Jajodia Consulting editor Center for Secure Information Systems George Mason University Fairfax, VA 22030-4444 email:
More informationJAVA MICROARCHITECTURES
JAVA MICROARCHITECTURES THE KLUWER INTERNATIONAL SERIES IN ENGINEERING AND COMPUTER SCIENCE JAVA MICROARCHITECTURES Edited by Vijaykrishnan Narayanan Pennsylvania State University Mario I. Wolczko Sun
More informationMICROPROCESSOR Architecture, Programming and Interfacing SUNIL MATHUR. Assistant Professor Maharaja Agrasen Institute of Technology Delhi
MICROPROCESSOR 8086 Architecture, Programming and Interfacing SUNIL MATHUR Assistant Professor Maharaja Agrasen Institute of Technology Delhi New Delhi-110001 2011 MICROPROCESSOR 8086: Architecture, Programming
More informationWorst Case Execution Time Analysis for Synthesized Hardware
Worst Case Execution Time Analysis for Synthesized Hardware Jun-hee Yoo ihavnoid@poppy.snu.ac.kr Seoul National University, Seoul, Republic of Korea Xingguang Feng fengxg@poppy.snu.ac.kr Seoul National
More informationAn Introduction to Programming with IDL
An Introduction to Programming with IDL Interactive Data Language Kenneth P. Bowman Department of Atmospheric Sciences Texas A&M University AMSTERDAM BOSTON HEIDELBERG LONDON NEW YORK OXFORD PARIS SAN
More informationMINING VERY LARGE DATABASES WITH PARALLEL PROCESSING
MINING VERY LARGE DATABASES WITH PARALLEL PROCESSING The Kluwer International Series on ADVANCES IN DATABASE SYSTEMS Series Editor Ahmed K. Elmagarmid Purdue University West Lafayette, IN 47907 Other books
More informationFundamentals of Operating Systems. Fifth Edition
Fundamentals of Operating Systems Fifth Edition Fundamentals of Operating Systems A.M. Lister University of Queensland R. D. Eager University of Kent at Canterbury Fifth Edition Springer Science+Business
More informationTheory of Automatic Robot Assembly and Programming
Theory of Automatic Robot Assembly and Programming Theory of Automatic Robot Assembly and Programming Bartholomew o. Nnaji Professor and Director Automation and Robotics Laboratory Department of Industrial
More informationPARALLEL ARCHITECTURES AND PARALLEL ALGORITHMS FOR INTEGRATED VISION SYSTEMS
PARALLEL ARCHITECTURES AND PARALLEL ALGORITHMS FOR INTEGRATED VISION SYSTEMS THE KLUWER INTERNATIONAL SERIES IN ENGINEERING AND COMPUTER SCIENCE ROBOTICS: VISION, MANIPULATION AND SENSORS Consulting Editor:
More informationPARALLEL, OBJECT -ORIENTED, AND ACTIVE KNOWLEDGE BASE SYSTEMS
PARALLEL, OBJECT -ORIENTED, AND ACTIVE KNOWLEDGE BASE SYSTEMS The Kluwer International Series on ADVANCES IN DATABASE SYSTEMS Series Editor Ahmed K. Elmagarmid Purdue University West Lafayette, IN 47907
More informationSireesha R Basavaraju Embedded Systems Group, Technical University of Kaiserslautern
Sireesha R Basavaraju Embedded Systems Group, Technical University of Kaiserslautern Introduction WCET of program ILP Formulation Requirement SPM allocation for code SPM allocation for data Conclusion
More informationUnderstanding and Writing Compilers
Understanding and Writing Compilers Macmillan Computer Science Series Consulting Editor Professor F. H. Sumner, University of Manchester G. M. Birtwistle, Discrete Event Modelling on Simula Richard Bornat,
More informationChunjie Duan Brock J. LaMeres Sunil P. Khatri. On and Off-Chip Crosstalk Avoidance in VLSI Design
Chunjie Duan Brock J. LaMeres Sunil P. Khatri On and Off-Chip Crosstalk Avoidance in VLSI Design 123 On and Off-Chip Crosstalk Avoidance in VLSI Design Chunjie Duan Brock J. LaMeres Sunil P. Khatri On
More informationHardware Acceleration of EDA Algorithms
Hardware Acceleration of EDA Algorithms Kanupriya Gulati Sunil P. Khatri Hardware Acceleration of EDA Algorithms Custom ICs, FPGAs and GPUs 123 Kanupriya Gulati 109 Branchwood Trl Coppell TX 75019 USA
More informationHIGH-LEVEL SYNTHESIS FOR REAL-TIME DIGITAL SIGNAL PROCESSING
HIGH-LEVEL SYNTHESIS FOR REAL-TIME DIGITAL SIGNAL PROCESSING THE KLUWER INTERNATIONAL SERIES IN ENGINEERING AND COMPUTER SCIENCE VLSI, COMPUTER ARCHITECfURE AND DIGITAL SIGNAL PROCESSING Latest Titles
More informationASSIGNMENT PROBLEMS IN PARALLEL AND DISTRIBUTED COMPUTING
ASSIGNMENT PROBLEMS IN PARALLEL AND DISTRIBUTED COMPUTING THE KLUWER INTERNATIONAL SERIES IN ENGINEERING AND COMPUTER SCIENCE PARALLEL PROCESSING AND FIFTH GENERATION COMPUTING Consulting Editor Doug DeGroot
More informationHardware-Software Codesign. 9. Worst Case Execution Time Analysis
Hardware-Software Codesign 9. Worst Case Execution Time Analysis Lothar Thiele 9-1 System Design Specification System Synthesis Estimation SW-Compilation Intellectual Prop. Code Instruction Set HW-Synthesis
More informationSoftware Development for SAP R/3
Software Development for SAP R/3 Springer-Verlag Berlin Heidelberg GmbH Ulrich Mende Software Development for SAP R/3 Data Dictionary, ABAP/4, Interfaces With Diskette With 124 Figures and Many Example
More informationPhilip Andrew Simpson. FPGA Design. Best Practices for Team-based Reuse. Second Edition
FPGA Design Philip Andrew Simpson FPGA Design Best Practices for Team-based Reuse Second Edition Philip Andrew Simpson San Jose, CA, USA ISBN 978-3-319-17923-0 DOI 10.1007/978-3-319-17924-7 ISBN 978-3-319-17924-7
More informationAAM Guide for Authors
ISSN: 1932-9466 AAM Guide for Authors Application and Applied Mathematics: An International Journal (AAM) invites contributors from throughout the world to submit their original manuscripts for review
More informationScheduling in Distributed Computing Systems Analysis, Design & Models
Scheduling in Distributed Computing Systems Analysis, Design & Models (A Research Monograph) Scheduling in Distributed Computing Systems Analysis, Design & Models (A Research Monograph) by Deo Prakash
More informationScenario Manager User Guide. Release September 2013
Scenario Manager User Guide Release 6.2.1 September 2013 Scenario Manager User Guide Release 6.2.1 September 2013 Document Control Number: 9MN12-62110017 Document Number: SMUG-13-FCCM-0017-6.2.1-01 Oracle
More informationLow Level X Window Programming
Low Level X Window Programming Ross J. Maloney Low Level X Window Programming An Introduction by Examples 123 Dr. Ross J. Maloney Yenolam Corporation Booragoon, WA Australia ISBN 978-3-319-74249-6 ISBN
More informationWorst-Case Execution Time Estimation for Hardware-assisted Multithreaded Processors
Worst-Case Execution Time Estimation for Hardware-assisted Multithreaded Processors Patrick Crowley & Jean-Loup Baer Department of Computer Science & Engineering University of Washington Seattle, WA 98195-2350
More informationGeorge Grätzer. Practical L A TEX
Practical L A TEX George Grätzer Practical L A TEX 123 George Grätzer Toronto, ON, Canada Additional material to this book can be downloaded from http://extras.springer.com ISBN 978-3-319-06424-6 ISBN
More informationROBUST MODEL-BASED FAULT DIAGNOSIS FOR DYNAMIC SYSTEMS
ROBUST MODEL-BASED FAULT DIAGNOSIS FOR DYNAMIC SYSTEMS The Kluwer International Series on ASIAN STUDIES IN COMPUTER AND INFORMATION SCIENCE Series Editor Kai-Yuan Cai Beijing University of Aeronautics
More informationOn the Near-Optimality of List Scheduling Heuristics for Local and Global Instruction Scheduling
On the Near-Optimality of List Scheduling Heuristics for Local and Global Instruction Scheduling by John Michael Chase A thesis presented to the University of Waterloo in fulfillment of the thesis requirement
More informationADAPTIVE HYPERTEXT AND HYPERMEDIA
ADAPTIVE HYPERTEXT AND HYPERMEDIA ADAPTIVE HYPERTEXT AND HYPERMEDIA Edited by Peter Brusilovsky Carnegie Mellon University Alfred Kobsa GMDFIT German National Research Centre for Information Technology
More informationThe SQL Guide to Pervasive PSQL. Rick F. van der Lans
The SQL Guide to Pervasive PSQL Rick F. van der Lans Copyright 2009 by R20/Consultancy All rights reserved; no part of this publication may be reproduced, stored in a retrieval system, or transmitted in
More informationGEO BASED ROUTING FOR BORDER GATEWAY PROTOCOL IN ISP MULTI-HOMING ENVIRONMENT
GEO BASED ROUTING FOR BORDER GATEWAY PROTOCOL IN ISP MULTI-HOMING ENVIRONMENT Duleep Thilakarathne (118473A) Degree of Master of Science Department of Electronic and Telecommunication Engineering University
More informationHierarchical Scheduling in Parallel and Cluster Systems
Hierarchical Scheduling in Parallel and Cluster Systems SERIES IN COMPUTER SCIENCE Series Editor: Rami G. Melhem University of Pittsburgh Pittsburgh, Pennsylvania ENGINEERING ELECTRONIC NEGOTIATIONS A
More informationWhy AI + ILP is good for WCET, but MC is not, nor ILP alone
Why AI + ILP is good for WCET, but MC is not, nor ILP alone Reinhard Wilhelm Informatik Universität des Saarlandes Saarbrücken Abstract. A combination of Abstract Interpretation (AI) with Integer Linear
More informationDigital Signal Processing System Design: LabVIEW-Based Hybrid Programming Nasser Kehtarnavaz
Digital Signal Processing System Design: LabVIEW-Based Hybrid Programming Nasser Kehtarnavaz Digital Signal Processing System Design: LabVIEW-Based Hybrid Programming by Nasser Kehtarnavaz University
More informationWhitestein Series in software Agent Technologies. About whitestein Technologies
Whitestein Series in software Agent Technologies Series Editors: Marius Walliser Stefan Brantschen Monique Calisti Thomas Hempfling This series reports new developments in agent-based software technologies
More informationBASIC INTERFACING CONCEPTS
Contents i SYLLABUS UNIT - I 8085 ARCHITECTURE Introduction to Microprocessors and Microcontrollers, 8085 Processor Architecture, Internal Operations, Instructions and Timings, Programming the 8085-Introduction
More informationDelivering MPEG-4 Based Audio-Visual Services
Delivering MPEG-4 Based Audio-Visual Services MULTIMEDIA SYSTEMS AND APPLICATIONS SERIES Recently Published Titles: Consulting Editor Borko Furht Florida Atlantic University DELIVERING MPEG-4 BASED AUDIO-VISUAL
More informationA Structured Programming Approach to Data
A Structured Programming Approach to Data Macmillan Computer Science Series Consulting Editor: Professor F. H. Sumner, University of Manchester J. K. Buckle, The ICL 2900 Series Andrew J. T. Colin, Programming
More informationFLASH MEMORIES SPRINGER-SCIENCE+BUSINESS MEDIA, LLC. Paulo Cappelletti. Carla Golla. PieroOlivo. Enrico Zanoni
FLASH MEMORIES FLASH MEMORIES By Paulo Cappelletti Carla Golla PieroOlivo Enrico Zanoni SPRINGER-SCIENCE+BUSINESS MEDIA, LLC Library of Congress Cataloging-in-Publication Data Flash memories 1 by Paulo
More informationComputer Science Workbench. Editor: Tosiyasu L. Kunii
Computer Science Workbench Editor: Tosiyasu L. Kunii H. Kitagawa T.L. Kunii The U nnortnalized Relational Data Model F or Office Form Processor Design With 78 Figures Springer-Verlag Tokyo Berlin Heidelberg
More informationWireless Networks. Series Editor Xuemin Sherman Shen University of Waterloo Waterloo, Ontario, Canada
Wireless Networks Series Editor Xuemin Sherman Shen University of Waterloo Waterloo, Ontario, Canada More information about this series at http://www.springer.com/series/14180 Sachin Shetty Xuebiao Yuchi
More informationAnalysis of Algorithms
Second Edition Design and Analysis of Algorithms Prabhakar Gupta Vineet Agarwal Manish Varshney Design and Analysis of ALGORITHMS SECOND EDITION PRABHAKAR GUPTA Professor, Computer Science and Engineering
More informationCACHE DESIGN AND TIMING ANALYSIS FOR PREEMPTIVE MULTI-TASKING REAL-TIME UNIPROCESSOR SYSTEMS. Yudong Tan
CACHE DESIGN AND TIMING ANALYSIS FOR PREEMPTIVE MULTI-TASKING REAL-TIME UNIPROCESSOR SYSTEMS A Dissertation Presented to The Academic Faculty by Yudong Tan In Partial Fulfillment of the Requirements for
More informationTASK SCHEDULING FOR PARALLEL SYSTEMS
TASK SCHEDULING FOR PARALLEL SYSTEMS Oliver Sinnen Department of Electrical and Computer Engineering The University of Aukland New Zealand TASK SCHEDULING FOR PARALLEL SYSTEMS TASK SCHEDULING FOR PARALLEL
More informationObject-Oriented Programming and Data Structures
Java Methods A & AB Object-Oriented Programming and Data Structures Maria Litvin Phillips Academy, Andover, Massachusetts Gary Litvin Skylight Software, Inc. Skylight Publishing Andover, Massachusetts
More informationHW/SW Codesign. WCET Analysis
HW/SW Codesign WCET Analysis 29 November 2017 Andres Gomez gomeza@tik.ee.ethz.ch 1 Outline Today s exercise is one long question with several parts: Basic blocks of a program Static value analysis WCET
More informationAbout the Authors... iii Introduction... xvii. Chapter 1: System Software... 1
Table of Contents About the Authors... iii Introduction... xvii Chapter 1: System Software... 1 1.1 Concept of System Software... 2 Types of Software Programs... 2 Software Programs and the Computing Machine...
More informationPredictable paging in real-time systems: an ILP formulation
Predictable paging in real-time systems: an ILP formulation Damien Hardy Isabelle Puaut Université Européenne de Bretagne / IRISA, Rennes, France Abstract Conventionally, the use of virtual memory in real-time
More informationStep 1: Download the Overdrive Media Console App
Step 1: Download the Overdrive Media Console App I. Tap the Play Store icon on your tablet. II. Using the Search Feature, Type Overdrive and select the first entry in the suggested apps list (it has an
More informationThe Discovery and Retrieval of Temporal Rules in Interval Sequence Data
The Discovery and Retrieval of Temporal Rules in Interval Sequence Data by Edi Winarko, B.Sc., M.Sc. School of Informatics and Engineering, Faculty of Science and Engineering March 19, 2007 A thesis presented
More informationOptical Network Design and Modelling
Optical Network Design and Modelling Come and visit the IT & Applied Computing Resource Centre: www.it-ch.com IFIP - The International Federation for Information Processing IFIP was founded in 1960 under
More informationJava Quick Syntax Reference. Second Edition. Mikael Olsson
Java Quick Syntax Reference Second Edition Mikael Olsson Java Quick Syntax Reference Second Edition Mikael Olsson Java Quick Syntax Reference Mikael Olsson Hammarland, Länsi-Suomi, Finland ISBN-13 (pbk):
More informationCopyright protected. Use is for Single Users only via a VHP Approved License. For information and printed versions please see
TOGAF 9 Certified Study Guide 4th Edition The Open Group Publications available from Van Haren Publishing The TOGAF Series: The TOGAF Standard, Version 9.2 The TOGAF Standard Version 9.2 A Pocket Guide
More informationComputer Architecture A Quantitative Approach
Computer Architecture A Quantitative Approach Third Edition John L. Hennessy Stanford University David A. Patterson University of California at Berkeley With Contributions by David Goldberg Xerox Palo
More informationINFORMATION RETRIEVAL SYSTEMS: Theory and Implementation
INFORMATION RETRIEVAL SYSTEMS: Theory and Implementation THE KLUWER INTERNATIONAL SERIES ON INFORMATION RETRIEVAL Series Editor W. Bruce Croft University of Massachusetts Amherst, MA 01003 Also in the
More informationShared Cache Aware Task Mapping for WCRT Minimization
Shared Cache Aware Task Mapping for WCRT Minimization Huping Ding & Tulika Mitra School of Computing, National University of Singapore Yun Liang Center for Energy-efficient Computing and Applications,
More informationWindows 10 Revealed. The Universal Windows Operating System for PC, Tablets, and Windows Phone. Kinnary Jangla
Windows 10 Revealed The Universal Windows Operating System for PC, Tablets, and Windows Phone Kinnary Jangla Windows 10 Revealed Kinnary Jangla Bing Maps San Francisco, California, USA ISBN-13 (pbk): 978-1-4842-0687-4
More informationComputer Architecture
Computer Architecture Springer-Verlag Berlin Heidelberg GmbH Silvia M. Mueller Wolfgang J. Paul Computer Architecture Complexity and Correctness With 214 Figures and 185 Tables Springer Silvia Melitta
More informationDOMINANT BLOCK GUIDED OPTIMAL CACHE SIZE ESTIMATION TO MAXIMIZE IPC OF EMBEDDED SOFTWARE
DOMINANT BLOCK GUIDED OPTIMAL CACHE SIZE ESTIMATION TO MAXIMIZE IPC OF EMBEDDED SOFTWARE Rajendra Patel 1 and Arvind Rajawat 2 1,2 Department of Electronics and Communication Engineering, Maulana Azad
More informationModeling Control Speculation for Timing Analysis
Modeling Control Speculation for Timing Analysis Xianfeng Li, Tulika Mitra and Abhik Roychoudhury School of Computing, National University of Singapore, 3 Science Drive 2, Singapore 117543. Abstract. The
More informationIntegrated Circuit Design Using. Open Cores and Design Tools. Martha SaloméLópez de la Fuente
Integrated Circuit Design Using Open Cores and Design Tools Martha SaloméLópez de la Fuente Science Publishing Group 548 Fashion Avenue New York, NY 10018 www.sciencepublishinggroup.com Published by Science
More informationHistory-based Schemes and Implicit Path Enumeration
History-based Schemes and Implicit Path Enumeration Claire Burguière and Christine Rochange Institut de Recherche en Informatique de Toulouse Université Paul Sabatier 6 Toulouse cedex 9, France {burguier,rochange}@irit.fr
More informationFINITE FIELDS FOR COMPUTER SCIENTISTS AND ENGINEERS
FINITE FIELDS FOR COMPUTER SCIENTISTS AND ENGINEERS THE KLUWER INTERNATIONAL SERIES IN ENGINEERING AND COMPUTER SCIENCE INFORMATION THEORY Consulting Editor Robert G. Gallager FINITE FIELDS FOR COMPUTER
More informationINFORMATION SECURITY MANAGEMENT & SMALL SYSTEMS SECURITY
INFORMATION SECURITY MANAGEMENT & SMALL SYSTEMS SECURITY IFIP - The International Federation for Information Processing IFIP was founded in 1960 under the auspices of UNESCO, following the First World
More informationCITY UNIVERSITY OF NEW YORK. Creating a New Project in IRBNet. i. After logging in, click Create New Project on left side of the page.
CITY UNIVERSITY OF NEW YORK Creating a New Project in IRBNet i. After logging in, click Create New Project on left side of the page. ii. Enter the title of the project, the principle investigator s (PI)
More informationYves Nievergelt. Wavelets Made Easy. Springer Science+Business Media, LLC
Wavelets Made Easy Yves Nievergelt Wavelets Made Easy Springer Science+Business Media, LLC Yves Nievergelt Department of Mathematics Eastem Washington University Cheney, WA 99004-2431 USA Library of Congress
More informationResearch on Industrial Security Theory
Research on Industrial Security Theory Menggang Li Research on Industrial Security Theory Menggang Li China Centre for Industrial Security Research Beijing, People s Republic of China ISBN 978-3-642-36951-3
More informationChapter 1 Readme.doc definitions you need to know 1
Contents Foreword xi Preface to the second edition xv Introduction xvii Chapter 1 Readme.doc definitions you need to know 1 Sample data 1 Italics 1 Introduction 1 Dimensions, measures, members and cells
More information