RTL Power Optimization with Gate-level Accuracy
|
|
- Ellen Short
- 8 years ago
- Views:
Transcription
1 RTL Power Optimiztion with Gte-level Accurcy Qi Wng Cdence Design Systems, Inc Sumit Roy Clypto Design Systems, Inc 555 River Oks Prkwy, Sn Jose Bunker Hill Lne, Suite 208, SntClr ABSTRACT Trditionl RTL power optimiztion techniques commit trnsformtions t the RTL sed on the estimtion of re, dely nd power. However, ecuse of indequte power nd dely informtion, the power optimiztion trnsformtions pplied t the RTL my cuse unexpected results fter synthesis, such s worsened dely or incresed power dissiption. Our solution to this prolem is to divide RTL power optimiztion into two steps, nmely RTL explortion nd gte-level commitment. During RTL explortion phse potentil cndidtes for pplying some specific RTL trnsformtion re identified where high level informtion permits fster nd more effective nlysis. These cndidtes re simply mrked on the netlist. Then during the gte-level commitment phse when ccurte power nd dely informtion is ville, the finl decision of whether ccepting or rejecting the cndidte is mde to chieve the est power nd dely trde-offs. 1. INTRODUCTION Power consumption hs ecome n incresingly importnt optimiztion metric in the design of microelectronic systems. Power optimiztion cn e chieved t different levels within design cycle, though it is well known tht the higher the level of strction where power optimiztion techniques re pplied, the higher the potentil power svings[1,2]. Clock-gte trnsformtion is proly y fr the most commonly used RTL power optimiztion technique[3]. In mny design situtions, dt is loded into registers infrequently, ut the clock signl continues to switch t every clock cycle, driving lrge cpcitive lod. This mkes the clock signl mjor source of dynmic power dissiption. Identifying periods of inctivity in the registers nd disling the clock during those periods cn sve significnt mounts of power [1,3]. However, clock gting is restricted to sving power on sequentil elements only. Figure 1.1 shows design where register nk tkes the result of the multiplier only s its input. The power dissipted y the multiplier is wsted during the cycle when the register nk is not loding the dt. Clock gting cnnot e used for this prolem since it only reduces the power of the register nk. One solution is to shut down the multiplier when its outputs re not used, s shown y the two nks of shded AND gtes in the Figure 1.2. This technique is known s opernd isoltion [5] or sleep-mode optimiztion. In Figure 1.2, the multiplier is clled sleep-mode cndidte; the signl e is clled the enle signl for the sleep-mode cndidte; nd the dded logic of AND gtes for turning off the multiplier re clled the sleep-mode logic. Sleep-mode trnsformtion of given design involves the tsks of identifying the set of sleepmode cndidtes nd the corresponding enles, nd mking decision on whether inserting the sleep-mode logic or not so tht e (1) (2) Figure 1. A design (1) without sleep-mode (2) with sleepmode trnsformtion. power cn e optimized under some constrints such s dely or re. 2. Relted Work In [4], control-signl gting technique is proposed to reduce the switching ctivities on dtpth uses. The ide is to use oservility don t cre conditions of uses to gte control signls going to the us driver modules so tht the switching ctivity on the module inputs does not propgte to the us. Unlike the sleepmode trnsformtion, the proposed method does not work for dtpth uses or modules which re not driven y registers. The other prolem of the method is tht it computes oservility don t cre sed on the structurl netlist of design, which my e very expensive or even prohiitive on rel designs with intensive dtpth elements. To the est of our knowledge, work of [5] presents the first comprehensive pproch tht utomtes sleep-mode (opernd isoltion) on RTL netlist. Unlike the work in [4], this pper presents complicted RTL power model to estimte the power svings y introducing the sleep-mode logic. Additionlly, rther thn using n existing signl for the enle signl for the sleepmode logic, new function is used nd computed y structurl nlysis of the trnsitive fnout of module. The work of [6] is different from ove introduced techniques in tht it chieves power sving y redesigning control logic to reconfigure the existing dtpth components under idle conditions. The drwck of this technique is tht it works well on control-flow intensive designs ut not on dt-flow intensive designs. Additionlly, the technique my significntly chnge the finl netlist to reduce power. This my not e fvored in rel industril designs when power is secondry optimiztion trget s compred to dely in most design situtions. All ove solutions suffer from common prolem: committing n optimiztion move t the RTL in hopes of sving power fter logic nd physicl optimiztion. It is well known tht power estimtions t RTL cn significntly differ from the rel chip power or even gte level power estimtions [2,3]. Since there is no ccurte power nd timing informtion ville t RTL to perform the correct trde-off, these solutions my end up e Permission to mke digitl or hrd copies of ll or prt of this work for personl or clssroom use is grnted without fee provided tht copies re not mde or distriuted for profit or commercil dvntge nd tht copies er this notice nd the full cittion on the first pge. To copy otherwise, to repulish, to post on servers or to redistriute to lists, requires prior specific permission nd/or fee. ICCAD 03, Novemer 11-13, 2003, Sn Jose, Cliforni, USA. Copyright 2003 ACM /03/ $
2 incresing the ctul power or dely of the synthesized netlist. Even if some provides cpility to undo the trnsformtions t the end of the synthesis run[5], the optimizer hs lredy spent lot of effort optimizing the wrong criticl pths which re mostly not reversile. This my cuse extr long run time or, design with worse power nd timing compred to the one without pplying the RTL trnsformtion. In this pper, we present novel solution to solve the ove prolem. This unique pproch consists of two steps, nmely RTL explortion nd gte-level commitment. First, during RTL explortion, we use the Control Dt Flow Grph (CDFG) generted from the RTL description of design to identify ll the sleep mode trnsformtion cndidtes, including the enle signls for ech cndidte. The enle signl is computed y performing ehviorl level oservility nlysis (BLOA) on CDFG, s to e descried in Section 3. Since CDFG contins ll high-level informtion (control nd dt flow), we re le to identify ll possile sleep-mode trnsformtion opportunities presented in design. More importntly, since the enle signls re computed directly from the control flow, it elimintes the concern tht some enle signls my e synthesized into some other logic during synthesis, thus losing the opportunity of ny possile trnsformtions ssocited with the signl. After identifying ll the cndidtes, we mrk the gte level netlist to "rememer" these potentil trnsformtions without ltering the dt pth or the control pth of the design. Noticely, ecuse the originl dt nd control pths of the design re mintined, the logic nd timing optimiztion pplied lter will work on the true criticl pth nd no effort is wsted. After logic nd timing optimiztion hs een completed, ech "mrk" of the potentil sleep mode trnsformtion will e evluted nd committed or removed to mke sure it sves power without violting timing or re constrints. This is referred s gte-level commitment in the pper. It needs to e pointed out tht ecuse of the vilility of ccurte power nd timing informtion t this stge ny decision mde t this point reflects the rel sttus of the design. In ddition to the improved ccurcy, the complexity of the lgorithm is significntly reduced since no complicted nd error-prone RTL power nd dely models re required. It needs to e noted tht we re not proposing new RTL power trnsformtion. Insted, we re proposing new pproch on how to pply the RTL power trnsformtion known s opernd isoltion or sleep-mode trnsformtion. With the seprtion of RTL explortion nd gte-level commitment, the proposed pproch tkes the dvntge of oth rich control-dt-flow informtion t the RTL nd the ccurte power nd dely informtion t the gte-level so tht the est possile power dely trdeoff cn e chieved. Our technique gurntees tht design with sleep-mode trnsformtions inserted hs less power nd sme or etter timing compred to design without the trnsformtions without significnt run time overhed on the existing timing optimiztion flow. 3. Behviorl Oservility Anlysis Oservility nlysis in logic circuits hs een widely used in logic synthesis, test genertion, nd mny other ECAD prolems [8]. In this section, we extend the ide of oservility nlysis to the ehviorl level description of digitl system, i.e. CDFG. It is referred s ehviorl level oservility nlysis (BLOA) for the rest of the pper Introduction of CDFG A CDFG is grphicl representtion of the ehviors of digitl hrdwre. The grph is generted from hrdwre ehviorl description lnguges, such s Verilog or VHDL, nd serves s n interfce to different RTL nd rchitecturl synthesis pckges. More detils out CDFG cn e found in [7]. A CDFG consists of nodes nd directed edges. The nodes represent opertions in the ehviorl description. The edges model the trnsfer of vlues etween the nodes, i.e. the result of one opertion (node) is pssed to the rgument of nother one. Every rgument of n opertion cn e seen s n input port of the corresponding node of the CDFG. Every result of n opertion cn e seen s n output port of the corresponding node of the CDFG. A token is defined s single dt vlue instnce. There re four mjor types of nodes. i 0 i 1 i k-1 n op c i n rnch i 0 i 1 i k-1 n merge n cons o 0 o 1 o j-1 o 0 o 1 o j-1 o o 0 o 1 o j-1 () () (c) (d) Figure 2. CDFG nodes. () Opertion node () rnch node (c) merge node (d) construct node. ) Opertion nodes: Opertions cn e rithmetic, like +,-,,, or Boolen, like,, or cn e more complex functions or n instntition of nother grph, which models the procedures nd functions in the ehviorl specifiction. The grphicl representtion of n opertion node n op with input edges i 0 to i k-1 nd output edges o 0 to o j-1 is shown in Figure 2.. The node performs the opertion defined y n op on the dt vlues of the input edges nd trnsfer the result to ll output edges. ) Brnch nodes: A rnch node hs two input ports, control port nd dt port, nd t lest one output dt port. Bsed on the vlue of token on the control port, one nd only one output port is selected nd the token on the input dt port is pssed to the selected output port. The grphicl representtion of rnch node n rnch with input dt edge i nd input control edge c nd output edge o 0 to o j-1 is shown in Figure 2.. For exmple, if the dt vlue on the control edge c is 0, then the dt vlue on the input edge i is trnsferred to the output edge o 0. c) Merge nodes: Merge nodes re dul to rnch nodes. A merge node hs one output dt port, one input control port nd severl input dt ports. It psses the token on one input dt port, selected y the vlue of the token on the control port, to the output port. The grphicl representtion of merge node n merge with input dt edges i 0 to i k-1 nd input control edge c nd output edge o which is shown in Figure 2.c. For exmple, if the dt vlue on the control edge c is 0, then the dt vlue on the input edge i 0 is trnsferred to the output edge o. d) Construct nodes: These re specil nodes, which only serve the purpose to generte tokens to control the rnch nd merge nodes. It hs one input dt port nd t lest one output control ports. Only one output port is selected to pss the token from the input port ccording to the vlue of the token. The grphicl representtion of merge node is shown in Figure 2.d. c i
3 Other types of nodes include input, output, register nd constnt nodes. Every grph requires t lest one input node nd one output node. Constnt nodes re nodes which generte constnt dt vlue t their single output port. Input, output nd register nodes correspond to input, output ports nd registers of the design represented y the CDFG respectively. 3.2 Oservility of CDFG Nodes nd Edges A token in CDFG is the counterprt of signl in logic circuit. In the rest we refer to the ehviorl level oservility nlysis s the token oservility nlysis on CDFG. Definition 1: token oservle condition (TOC) of n edge e ij, denoted y TOC(e ij ), is the condition under which the token on tht edge cn e oserved t one or more output nodes of CDFG. Definition 2: node oservle condition (NOC) of node n i, denoted y NOC(n i ), is the condition under which the token on ny output edge of the node cn e oserved t one or more output nodes of CDFG. Given CDFG, the TOC nd NOC for ll edges nd nodes cn e computed y trversing the grph from the output nodes to the input nodes nd pplying pproprite Boolen opertions. Let,, nd denote the Boolen AND, OR, inversion opertions respectively. For ech different type of node, the TOCs of ll edges nd NOCs of ll nodes re computed s follows. 1) Output nodes: By definition, for n output node n out with input edge i, NOC(n out ) = 1, TOC(i) = 1 2) Opertion nodes: For n opertion node n op such s the one in Figure 2. with input edges of i 0,, i k-1 nd output edges of o 0,, o j-1, we hve NOC(n op ) = TOC(o 0 ) TOC(o 1 ) TOC(o j-1 ) TOC(i p ) = NOC(n op ), p {0, 1,, k-1} For the ske of TOC/NOC nlysis, input nd construct nodes re treted the sme s opertion nodes. 3) Brnch nodes: For rnch node n rnch s shown in Figure 2., with input dt edge of i nd input control edge of c nd output edges of o 0,, o j-1, we hve NOC(n rnch ) = TOC(o 0 ) TOC(o 1 ) TOC(o j-1 ) TOC(c) = NOC(n rnch ) TOC(i) = ( c 0 TOC(o 0 )) (c 1 TOC(o 1 )) (c j-1 TOC(o j-1 )) where c p, p [0,j-1] is Boolen encoding of the vriles for the vlue of the token t the control port to select output port p. For exmple, if the token on c is two it wide (c= c 1 c 0 ) nd output port 2 is selected, i.e. c is (10) in inry, then the condition to select port is c 1 c 0. 4) Merge nodes: For merge node n merge s shown in Figure 2.c, with input dt edges of i 0,, i k-1 nd input control edge of c nd output edge of o, we hve NOC(n merge ) = TOC(o) TOC(c) = TOC(o) TOC(i p ) = c p TOC(o), p [0,k-1] The definition of c p is the dul to tht descried for rnch nodes, i.e. the condition under which the input port p is selected y n merge to pss the token to the output port. As in [5], to void the computtionl complexity we ssume the NOC of register node to e 1. In other words, we do not nlysis oservilities cross register oundry Computtion of TOC/NOC Computing TOC/NOC requires Boolen opertions. A common wy to perform Boolen opertions is to use BDD (Binry Decision Digrm [9]). The prolem of this pproch is tht BDD is not roust enough to hndle lrge Boolen functions. In this section, n efficient nd yet simple pproch to compute TOC/NOC of CDFG is proposed. The ide of the pproch is the seprtion of trversing CDFG nd computing TOC/NOC. Insted of uilding BDD for the TOC/NOC of ech edge nd node, logic network is constructed whenever Boolen opertion is required to compute the TOC/NOC. The logic network is then optimized using trditionl logic optimiztion techniques such s lgeric trnsformtions [8], to otin the optimized Boolen function of the TOC/NOC. The trnsformtions used in the optimiztion process re chosen to e simple enough so tht computing TOC/NOC will e lmost invisile to the overll optimiztion flow. This method is idel for the front-end RTL synthesis tool where CDFG is trnslted into gte level netlist nd there exists one-to-one correspondence etween the ojects of CDFG nd the ojects of the logic network. The method is est explined y n exmple. clk register output in1 in2 cmp en N2 N3 N4 N1 construct E1 E2 N8 2 N5 N9 == N11 E3 E4 + N12 E5 N13 E6 N14 E7 N15 E8 N16 N10 construct Figure 3. An exmple CDFG In Figure 3, the CDFG of simple digitl system is shown. As stted ove, fter gte level netlist is generted from this CDFG, there is n one-to-one correspondence etween the ojects of CDFG nd the ojects of the generted logic network. For exmple, let e the corresponding signl for node N1 nd e the corresponding signl for node N10 in the netlist. We will explin the computtion of TOC for edges E1 nd E2 in Figure 4. The computtion strts from the output nodes using the formuls in the Section 3 depended on the type of the node visited. It is esy to see the TOC of edges E8 nd E7 is simply logic 1, s highlighted in Figure 4. For edge E6, the TOC is the Boolen AND of the TOC of E7 nd the vrile of the control port of the
4 E8,E7 1 c E6 d E5,E4 e E3,E2,E1 in1 SleepControlModule_0 Figure 4. Compute TOC for edges of CDFG in Figure 3. node N14 which is the sme s the vrile t the output port of construct node N1. Therefore in Figure 4 the AND gte c is constructed whose output represents the TOC of E6. Similrly, the TOC of edge E5 is the AND of TOC of edge E6 nd the vrile of the control port of node N13. The AND gte d is creted for the TOC of edge E5. The process continues until the edges E1 nd E2 re reched. As shown in Figure 4, the output of the AND gte e represents the TOC of edges E2 nd E1. After pplying simple logic optimiztions, the TOC of edges E1, E2 nd E3 is simply the AND of nd. Note tht only single trversl from the output nodes to the inputs is required to compute the TOCs of these edges. The complexity of the lgorithm is O( V + E ) where V nd E re the numer of nodes nd edges of CDFG respectively. In our experience, the numer of nodes nd edges of CDFG is much less thn those of the corresponding structurl netlist. As result, the proposed technique for TOC/NOC computtion is extremely fst even for very ig stte-of-rt digitl designs. 4. Proposed Sleep-mode Trnsformtions As descried erlier, the proposed sleep-mode trnsformtion consists of two steps, nmely RTL explortion nd gte-level commitment. 4.1 RTL Explortion The ppliction of BLOA techniques introduced in Section 3 to sleep-mode trnsformtion is strightforwrd. The corresponding logic of n opertion node is perfect cndidte for sleep-mode trnsformtion where the computed TOC/NOC cn e used to generte the corresponding enle signl. Nodes with TOC equl to 1 cn not e cndidtes for sleep mode trnsformtion ecuse the outputs of the corresponding logic lock re lwys oservle. During the explortion phse, complete BLOA is performed on the CDFG. Opertion nodes with NOC not equl to 1 re selected s cndidtes. These cndidtes re then mrked on the gte-level netlist. No ctul implementtion is performed in this phse. Commitment of these trnsformtions is delyed fter gte-level optimiztion hs een done where ccurte power nd timing informtion is ville. For exmple, BLOA nlysis of the design shown in Figure 3 finds tht under the condition of & the outputs of the multiplier (node N5) re not used, where nd re the signls in the netlist corresponding to the condition represented y construct node N1 nd N10 respectively. The netlist of the design fter RTL explortion is shown in Figure 5. Compred to the norml netlist fter RTL synthesis, the RTL sleep-mode explored netlist hs two new inserted modules clled SleepModeModule, one in front of ech multiplier input. The inserted modules hve following chrcteristics. First the dt us is feed-through within the module. Second, within the SleepModeModule,, there is nother module clled SleepModeControlModule. It contins the complex in2 SleepControlModule_1 SleepModeModule_1 Figure 5. Netlist fter RTL sleep-mode explortion for the multiplier of the exmple in Figure 3. enle function for the sleep-mode cndidte. In this cse, it is the AND function of nd. There exists one-to-one correspondence etween the input pins of the SleepModeControlModule nd the input ports of the SleepModeModule, ut they re not connected. The SleepModeModule serves s the mrk for the cndidte of sleep-mode trnsformtion, which is the multiplier in this cse. Note tht even though the multiplier hierrchy my e dissolved during synthesis, the mrk for the sleep-mode cndidte will e preserved, ecuse the SleepModeModule is not dissolved, which could e esily done. The SleepModeControlModule serves s the vehicle to rememer the enle logic for this cndidte. The oneto-one correspondence imposed y pin nmes etween the input ports of the SleepModeModule nd inputs of the SleepModeControlModule is required during the committing phse where the enle logic is ctully connected. Becuse no extr lod is dded to the control nd the dt pth, the criticl pth of the originl design will e preserved. As result, the lter logic nd timing optimiztion will e le to focus on the rel criticl pth nd optimize the netlist s if no sleep-mode trnsformtions re performed. Therefore, s long s the sleepmode cndidtes re not committed, there is no concern tht the they my cuse new timing violtions when the originl design meets timing fter logic nd timing optimiztion. Another dvntge of the technique is tht it llows only portion of the enle function to e used s the enle logic for the sleep-mode cndidte during the gte-level commitment phse, known s prtil sleep-mode committing. 4.2 Gte-level Commitment After logic nd timing optimiztion, decision to commit ech individul cndidte is mde sed on whether or not the power is reduced without violting the timing constrints. The lgorithm is shown in Figure 6. First, we sort ll sleep mode cndidtes sed on the potentil power svings. The commitment strts from the sleep-mode cndidte which hs the iggest potentil power svings. Then for ech selected cndidte, the input ports of SleepModeModule nd the input pins of SleepModeControlModule tht hve the sme nme re connected. The ctul gting logic is inserted nd n incrementl power nd timing nlysis is performed. If the gte level 42
5 Prtilly committing 1. Connect Inside of SleepModeModule 2. Insert AND gtes 3. Power sved nd timing met? N 4. Is enle logic reducile? Y 5.Reduce enle logic to improve timing Fully committing N Y 7. Stop 6. Remove ll inserted logic nd hierrchies enle logic y executing steps 3 through 5 (in Figure 6). In this exmple, we know tht the enle logic for this cndidte is &. This mens tht either or cn lso e used s the enle logic. Since we do not wnt to e prt of the enle function ecuse of timing violtion, we cn use s the enle logic for input us in2. In other words, y removing the input of from the originl enle function, the new enle function is reduced from & to. Note tht prtil commitment is possile ecuse the enle logic nd the inputs for ech sleep mode cndidte re seprtely derived during RTL synthesis nd preserved fter logic nd timing optimiztion. As shown in Figure 6, the prtil committing loop stops when the enle logic cnnot e reduced further. The prtil commitment cpility of the proposed pproch differs significntly from the trditionl pproch where, if sleep mode trnsformtion violtes timing constrints, it is completely removed. Our pproch provides much lrger scope to perform power dely trde-offs. Finlly, if committing sleep-mode cndidte cuses power increse or timing violtion even fter prtil committing, we cn simply un-commit the sleep-mode cndidte y removing ll inserted logic on the control nd dt pth, nd then dissolve the inserted hierrchicl modules. Figure 6. Gte level sleep-mode commit lgorithm. commitment succeeds t step 3, then it is clled fully committed. Tht is, whtever cndidtes nd enle logic identified t RTL is fully committed to sve power without violting timing constrints. For exmple, to fully commit the sleep-mode modules inserted in Figure 5, we cn simply connect the control portion of the circuit within the SleepModeModule nd insert AND gtes on the dt signls, s shown in Figure Gte-level Prtilly Committing However, the full commit my cuse new timing violtions. For exmple, let s ssume tht fter fully committing ll sleep-mode modules, the pth from to the second input of multiplier violtes timing constrints, s highlighted in Figure 7. To void the newly introduced timing violtion, one solution is to completely remove the sleep-mode logic t input in2 of the multiplier, ut doing this will significntly limit the power reduction tht cn e chieved. A much etter solution is to prtilly commit the sleep-mode SleepModeModule_0 5. Flow Integrtion nd Implementtion The proposed RTL power optimiztion technique cn e semlessly integrted into ny existing design flow. The RTL explortion cn e dded t the end of norml RTL synthesis, nd the gte-level commitment cn e dded fter timing optimiztion completes. Existing flow needs no modifiction to pply the technique. More importntly, the seprtion of RTL explortion from gte-level elimintes possile itertions etween the RTL nd the gte level tht cn occur in trditionl pproches. In trditionl pproches, it is possile tht timing constrints cn not e met even y undoing ll the sleep-mode trnsformtions fter gte level optimiztion, ecuse they my hve shifted the criticl pths. This is not prolem for the proposed technique ecuse the decision for commitment of cndidte is delyed until the circuit hs een optimized for timing. At this stge, the ccurte power nd dely estimtion cn e esily otined from the gte level power nd timing nlysis engine. As result, ech commitment mkes sure tht it sves power without violting timing constrints. The dely of the circuit fter gte-level committing is gurnteed to e no worse thn the dely of the RTL elortion sleep-mode explortion in1 in2 SleepModeModule_1 Figure 7. Netlist fter gte-level sleep-mode full commitment for the exmple in Figure pre-plcement gte level optimiztion sleep-mode commitment physicl synthesis plce & route Figure 8. Flow integrtion
6 # Inst. Slck Tot. Pow. DP Power (ns) (mw) (mw) (%) circuit efore committing. Finlly, since the decision of sleepmode commitment is delyed to gte-level, it elimintes the need for complicted nd generlly inccurte RTL power nd dely models [5]. The proposed lgorithm is implemented in Cdence PKS/LPS 5.0 relese [10]. As shown in Figure 8, the stndrd flow consists of locks with no shdes nd the sleep-mode flow includes the two shded oxes. The flow strts from the RTL of design. During RTL explortion, sleep-mode logic is inserted ut not fully connected. After norml flow of pre-plcement timing nd dtpth optimiztion, including resource shring nd opertor merging [10], it then strts the gte-level commitment phse of the sleep-mode trnsformtion. This is done efore the physicl plcement of the design. The reson we do not perform the commitment phse fter plcement ecuse the commitment phse my introduce significnt mount of new logic which could cuse the incrementl plcement filure. The sign-off qulity power nd timing nlysis engine provided y PKS re used to compute the power nd dely (Step 3 of Figure 6) ccurtely in the commitment phse. More specificlly, fter insertion of the gting logic (Step 2 of Figure 6), the PKS/LPS incrementl power nd timing nlysis engine is used to otin the ccurte power nd dely informtion to compre it with the power nd dely informtion efore the trnsformtion. If power is reduced nd dely is not worsened, the sleep-mode trnsformtion will then e ccepted nd committed into the netlist. Otherwise, the sleepmode logic is removed. In other words, the dely nd power penlty due to the inserted gting logic is considered during the commitment phse. 6. Experiment Results Six industril circuits were chosen for experiments. Design 4 is microprocessor, Design 5 nd 6 re communiction chips. The types of the rest circuits re unknown. All designs except Design 6 hve customer provided test enches, which were used to simulte the circuit to get the switching ctivities for power nlysis. For Design 6, rndom input ptterns were used to simulte to otin the switching ctivities for power nlysis. Tle 1 shows the chrcteristics of ech design. The column Inst shows the numer of instnces of the design. The columns Slck nd Tot. Pow re the slck nd power dissiption of the design fter norml synthesis nd optimiztion. The lst column DP Power shows the totl dt-pth component power nd its percentge of the totl power in column Tot. Pow. Since sleepmode trnsformtions trget only for power optimiztion on these RTL Explortion SM cnd. CPU SM Comm Gte-level commitment Slck Pow. (ns) Sved D % D % % 16.3% D % D % % 6.4% D % D % % 20.0% D % D % % 4.1% D % D % % 14.7% D % D % % 23.5% Tle 1. Designs used for experiments Tle 2. Experimentl results with proposed method 44 CPU locks, in the experiment, we only use the power of these locks to show the power svings of the proposed technique. The experimentl results re shown in Tle 2. Column SM cnd. shows the numer of sleep-mode cndidtes identified during RTL explortion. The second column CPU shows the run time increse in percentge of sleep-mode RTL explortion compred to tht of norml RTL elortion. The results show tht the RTL explortion is very efficient nd introduces lmost no dditionl computtion time. Column SM comm. shows the numer of sleep-mode cndidtes committed in the gte-level commitment phse. Column Slck shows the slck fter gte level optimiztion. Column Pow. Sved shows the totl power sved s percentge of the dtpth power, s shown in Column 5 in Tle 1. The lst column shows the CPU run time of the gtelevel commitment s percentge of the totl run time of the norml gte level optimiztion. The re increse due to the finl inserted sleep-mode modules re not shown ecuse the mximum re overhed mong ll designs is less thn 1%. Since the proposed method will not modify the originl timing pth fter RTL explortion nd the commitment of ech sleep-mode logic is delyed fter timing optimiztion, the timing optimiztion will work s if there is no sleep mode logic inserted. The trget slck of gte level optimiztion for ech design is 0. For designs with negtive slck in Tle 1, the finl slck fter gte level commitment is not worse thn tht in Tle 1. For designs with positive slck in Tle 1, the finl slck is smller ut not less thn 0 fter the gte level commitment. The power svings cn e chieved strongly depend on the timing constrints, the switching ctivities of the enle function, nd the power dissiption of the dt pth locks. For exmple, in Design 2, most of the sleep-mode cndidtes re not committed t the gte level ecuse the proilities of enle signls re close to 1 which leves little room for power svings. For Design 6, most of the sleep-mode cndidtes re not committed due to the tight dely constrint. As comprison we did nother set of experiments. In these experiments, fter RTL explortion, we simply mp the netlist without ny other optimiztion nd commit the sleep-mode cndidtes sed on the power nd dely informtion otined t this level. This is similr to the trditionl pproch [5] where the sleep-mode trnsformtions re committed sed on RTL power nd dely estimtion. The results re shown in Tle 3. The column SM inserted shows the numer of sleep mode logic inserted. The column slck shows the slck fter timing optimiztion. The column power sved shows the dtpth power sved in percentge compred to the netlist without ny sleep-
7 SM Inserted Slck (ns) power sved CPU overhed D % 0.98 D % 1.01 D % 1.63 D % 0.96 D % 1.57 D % 2.10 Tle 3. Results of committing cndidtes t RTL mode inserted, column 5 of Tle 1. The column of CPU overhed is the rtio of the totl CPU time of this experiment to the CPU time using the proposed technique. Compre the Tle 2 nd 3 we cn see tht for Design 1, 2 nd 4, the results re very similr. However, the results of Design 3, 5 nd 6 from Tle 2 re much etter thn those from Tle 3. For exmple, for Design 6 in Tle 3, lot of sleep mode cndidtes re committed sed on the inccurte power nd dely informtion. Unfortuntely, it ws found during timing optimiztion tht most of the inserted sleep-mode logic ecome prt of the timing criticl pths nd significntly worsen the performnce of the design. Therefore the timing optimiztion spends significntly more run time nd gte resources to improve the slck. As result, the finl design consumes more power thn the one without the sleep-mode trnsformtions nd misses the timing trget. Overll, for Design 6, the proposed method chieved 4.3% power svings with no degrdtion of circuit dely nd the trditionl method produced finl netlist with more power, worst dely nd rn twice slower. To show the roustness of the proposed technique in terms of chieving est power delys trde-offs, we select Design 6 to run gte-level commitment with different nd relxed timing constrints. The result is shown in Tle 4. Ech row shows the experimentl results with different set of timing constrints. Row 1 shows the results with the originl timing constrints. Rows 2 to 4 show the results with the relxed timing constrints. The column Relxed constr. shows the degree of the relxtion of timing constrints in percentge. It cn e seen tht, for Design 6 when the timing constrint is relxed, more sleep-mode cndidtes cn e committed t the gte level nd significnt more power svings, s much s 45%, cn e chieved. The results show tht the chievle power svings of the proposed technique re mostly ounded y the timing constrints nd the switching ctivities of the enle signls. The lower the ctivities of the enle signls nd the looser the timing constrints, the more power reduction cn e chieved. Given the specified timing constrints, the proposed technique will pply the sleep-mode trnsformtions to sve the most power without worsening the timing. Relxed constr. SM Inserted power sved not relxed 0% % relxed 1 25% % relxed 2 50% % relxed 3 100% % Tle 4. Results of Design 6 with relxed timing constrints 7. Conclusion nd Future Work In this pper we propose new pproch to pply known RTL power optimiztion technique to chieve the est possile power dely trde-offs. The concept of reking the optimiztion into two steps, i.e. RTL explortion nd gte-level commitment, hs lot of dvntges over trditionl techniques s shown in the experimentl results. First, it hs little impct on the norml logic nd timing optimiztion ecuse ll sleep-mode modules inserted fter RTL explortion preserve the originl connectivity nd lods of the dt nd control pths of the design. Therefore the run time nd finl slck of timing optimiztion re the sme s if there is no sleep-mode logic inserted. This mkes the proposed technique very prcticl for current min strem design methodology where the first design trget is timing nd power is normlly secondry concern. Secondly, since the committing of the sleep-mode is delyed until the design is timing optimized, ccurte power dely trde-off cn e chieved given the exct timing nd power informtion ville t tht point. Finlly it hs the cpility of prtil committing of the sleep-mode modules which leds to much lrger solution spce eing explored to chieve the optiml power nd dely trde-off. Overll, no itertion etween RTL nd gte-level optimiztion required to chieve timing closure nd sve power when using the proposed technique. The experimentl results show tht the proposed method cn chieve meningful power svings with no impct on existing norml timing optimiztion t ll where the trditionl methods my produce design with worse timing nd power nd longer run time. Currently we re working on pply the sme concept to other RTL power trnsformtions such s clock gting. 8. REFERENCES [1] A.P. Chndrksn nd R. W. Brodersen, Low Power Digitl CMOS Design, Kluwer Acdemic Pulishers, [2] K. Keutzer nd P. Vnekergen, The Impct of CAD on the Design of Low Power Digitl Circuits [3] M. Pedrm, Power Minimiztion in IC Design: Principles nd Applictions, ACM Trnsctions on Design Automtion of Electronics Systems, Jnury 1996, Vol 1-1, pp [4] H. Kpdi, L. Benini, nd G. De Micheli, Reducing Switching Activity on Dtpth Buses with Control-Signl Gting, IEEE Journl of Solid-Stte Circuits, Vol. 34, No. 3, Mrch 1999, pp [5] M. Munch, nd et. l., Automting RT-Level Opernd Isoltion to Minimize Power Consumption in Dtpths, Proceedings of Design nd Test Automtion Conference in Europe. [6] S. Dey nd et. l., Controller-Bsed Power Mngement for Control-Flow Intensive Designs, IEEE Trns. on Computer-Aided Design of Integrted Circuits nd Systems, Vol. 18, No. 10, Octoer 1999, pp [7] J. vn Eijndhoven, G. de Jong, nd L. Stok. The ASCIS dt flow grph: semntics nd textul formt. Technicl Report EUT-Report 91-E-251, Eindhoven University of Technology, Eindhoven, Netherlnds, June [8] De Micheli. Synthesis nd Optimiztion of Digitl Circuits. McGrw-hill, Inc., [9] R. Brynt. Grph-sed lgorithms for oolen function mnipultion. IEEE Trnsctions on Computers, C-35(8): , Aug [10] Cdence Low Power Synthesis (LPS) User s Guide for Cdence PKS. 45
Reasoning to Solve Equations and Inequalities
Lesson4 Resoning to Solve Equtions nd Inequlities In erlier work in this unit, you modeled situtions with severl vriles nd equtions. For exmple, suppose you were given usiness plns for concert showing
More informationEQUATIONS OF LINES AND PLANES
EQUATIONS OF LINES AND PLANES MATH 195, SECTION 59 (VIPUL NAIK) Corresponding mteril in the ook: Section 12.5. Wht students should definitely get: Prmetric eqution of line given in point-direction nd twopoint
More informationOr more simply put, when adding or subtracting quantities, their uncertainties add.
Propgtion of Uncertint through Mthemticl Opertions Since the untit of interest in n eperiment is rrel otined mesuring tht untit directl, we must understnd how error propgtes when mthemticl opertions re
More informationCS99S Laboratory 2 Preparation Copyright W. J. Dally 2001 October 1, 2001
CS99S Lortory 2 Preprtion Copyright W. J. Dlly 2 Octoer, 2 Ojectives:. Understnd the principle of sttic CMOS gte circuits 2. Build simple logic gtes from MOS trnsistors 3. Evlute these gtes to oserve logic
More informationHow To Network A Smll Business
Why network is n essentil productivity tool for ny smll business Effective technology is essentil for smll businesses looking to increse the productivity of their people nd processes. Introducing technology
More informationSmall Business Networking
Why network is n essentil productivity tool for ny smll business Effective technology is essentil for smll businesses looking to increse the productivity of their people nd business. Introducing technology
More informationPolynomial Functions. Polynomial functions in one variable can be written in expanded form as ( )
Polynomil Functions Polynomil functions in one vrible cn be written in expnded form s n n 1 n 2 2 f x = x + x + x + + x + x+ n n 1 n 2 2 1 0 Exmples of polynomils in expnded form re nd 3 8 7 4 = 5 4 +
More informationOutline of the Lecture. Software Testing. Unit & Integration Testing. Components. Lecture Notes 3 (of 4)
Outline of the Lecture Softwre Testing Lecture Notes 3 (of 4) Integrtion Testing Top-down ottom-up ig-ng Sndwich System Testing cceptnce Testing istriution of ults in lrge Industril Softwre System (ISST
More information2 DIODE CLIPPING and CLAMPING CIRCUITS
2 DIODE CLIPPING nd CLAMPING CIRCUITS 2.1 Ojectives Understnding the operting principle of diode clipping circuit Understnding the operting principle of clmping circuit Understnding the wveform chnge of
More informationSmall Business Networking
Why network is n essentil productivity tool for ny smll business Effective technology is essentil for smll businesses looking to increse the productivity of their people nd business. Introducing technology
More informationSmall Business Networking
Why network is n essentil productivity tool for ny smll business Effective technology is essentil for smll businesses looking to increse the productivity of their people nd processes. Introducing technology
More informationHow To Set Up A Network For Your Business
Why Network is n Essentil Productivity Tool for Any Smll Business TechAdvisory.org SME Reports sponsored by Effective technology is essentil for smll businesses looking to increse their productivity. Computer
More informationRegular Sets and Expressions
Regulr Sets nd Expressions Finite utomt re importnt in science, mthemtics, nd engineering. Engineers like them ecuse they re super models for circuits (And, since the dvent of VLSI systems sometimes finite
More informationSmall Business Networking
Why network is n essentil productivity tool for ny smll business Effective technology is essentil for smll businesses looking to increse the productivity of their people nd processes. Introducing technology
More informationVendor Rating for Service Desk Selection
Vendor Presented By DATE Using the scores of 0, 1, 2, or 3, plese rte the vendor's presenttion on how well they demonstrted the functionl requirements in the res below. Also consider how efficient nd functionl
More informationHillsborough Township Public Schools Mathematics Department Computer Programming 1
Essentil Unit 1 Introduction to Progrmming Pcing: 15 dys Common Unit Test Wht re the ethicl implictions for ming in tody s world? There re ethicl responsibilities to consider when writing computer s. Citizenship,
More informationAppendix D: Completing the Square and the Quadratic Formula. In Appendix A, two special cases of expanding brackets were considered:
Appendi D: Completing the Squre nd the Qudrtic Formul Fctoring qudrtic epressions such s: + 6 + 8 ws one of the topics introduced in Appendi C. Fctoring qudrtic epressions is useful skill tht cn help you
More informationSection 5-4 Trigonometric Functions
5- Trigonometric Functions Section 5- Trigonometric Functions Definition of the Trigonometric Functions Clcultor Evlution of Trigonometric Functions Definition of the Trigonometric Functions Alternte Form
More informationSection 5.2, Commands for Configuring ISDN Protocols. Section 5.3, Configuring ISDN Signaling. Section 5.4, Configuring ISDN LAPD and Call Control
Chpter 5 Configurtion of ISDN Protocols This chpter provides instructions for configuring the ISDN protocols in the SP201 for signling conversion. Use the sections tht reflect the softwre you re configuring.
More informationP.3 Polynomials and Factoring. P.3 an 1. Polynomial STUDY TIP. Example 1 Writing Polynomials in Standard Form. What you should learn
33337_0P03.qp 2/27/06 24 9:3 AM Chpter P Pge 24 Prerequisites P.3 Polynomils nd Fctoring Wht you should lern Polynomils An lgeric epression is collection of vriles nd rel numers. The most common type of
More informationAntiSpyware Enterprise Module 8.5
AntiSpywre Enterprise Module 8.5 Product Guide Aout the AntiSpywre Enterprise Module The McAfee AntiSpywre Enterprise Module 8.5 is n dd-on to the VirusScn Enterprise 8.5i product tht extends its ility
More informationEngineer-to-Engineer Note
Engineer-to-Engineer Note EE-280 Technicl notes on using Anlog Devices DSPs, processors nd development tools Visit our Web resources http://www.nlog.com/ee-notes nd http://www.nlog.com/processors or e-mil
More informationSmall Businesses Decisions to Offer Health Insurance to Employees
Smll Businesses Decisions to Offer Helth Insurnce to Employees Ctherine McLughlin nd Adm Swinurn, June 2014 Employer-sponsored helth insurnce (ESI) is the dominnt source of coverge for nonelderly dults
More informationIntroducing Kashef for Application Monitoring
WextWise 2010 Introducing Kshef for Appliction The Cse for Rel-time monitoring of dtcenter helth is criticl IT process serving vriety of needs. Avilbility requirements of 6 nd 7 nines of tody SOA oriented
More informationEngineer-to-Engineer Note
Engineer-to-Engineer Note EE-265 Technicl notes on using Anlog Devices DSPs, processors nd development tools Contct our technicl support t dsp.support@nlog.com nd t dsptools.support@nlog.com Or visit our
More informationEconomics Letters 65 (1999) 9 15. macroeconomists. a b, Ruth A. Judson, Ann L. Owen. Received 11 December 1998; accepted 12 May 1999
Economics Letters 65 (1999) 9 15 Estimting dynmic pnel dt models: guide for q mcroeconomists b, * Ruth A. Judson, Ann L. Owen Federl Reserve Bord of Governors, 0th & C Sts., N.W. Wshington, D.C. 0551,
More informationLINEAR TRANSFORMATIONS AND THEIR REPRESENTING MATRICES
LINEAR TRANSFORMATIONS AND THEIR REPRESENTING MATRICES DAVID WEBB CONTENTS Liner trnsformtions 2 The representing mtrix of liner trnsformtion 3 3 An ppliction: reflections in the plne 6 4 The lgebr of
More informationConcept Formation Using Graph Grammars
Concept Formtion Using Grph Grmmrs Istvn Jonyer, Lwrence B. Holder nd Dine J. Cook Deprtment of Computer Science nd Engineering University of Texs t Arlington Box 19015 (416 Ytes St.), Arlington, TX 76019-0015
More informationTechniques for Requirements Gathering and Definition. Kristian Persson Principal Product Specialist
Techniques for Requirements Gthering nd Definition Kristin Persson Principl Product Specilist Requirements Lifecycle Mngement Elicit nd define business/user requirements Vlidte requirements Anlyze requirements
More informationEcon 4721 Money and Banking Problem Set 2 Answer Key
Econ 472 Money nd Bnking Problem Set 2 Answer Key Problem (35 points) Consider n overlpping genertions model in which consumers live for two periods. The number of people born in ech genertion grows in
More informationMath 135 Circles and Completing the Square Examples
Mth 135 Circles nd Completing the Squre Exmples A perfect squre is number such tht = b 2 for some rel number b. Some exmples of perfect squres re 4 = 2 2, 16 = 4 2, 169 = 13 2. We wish to hve method for
More informationAPPLICATION NOTE Revision 3.0 MTD/PS-0534 August 13, 2008 KODAK IMAGE SENDORS COLOR CORRECTION FOR IMAGE SENSORS
APPLICATION NOTE Revision 3.0 MTD/PS-0534 August 13, 2008 KODAK IMAGE SENDORS COLOR CORRECTION FOR IMAGE SENSORS TABLE OF FIGURES Figure 1: Spectrl Response of CMOS Imge Sensor...3 Figure 2: Byer CFA Ptterns...4
More informationTwo hours UNIVERSITY OF MANCHESTER SCHOOL OF COMPUTER SCIENCE. Date: Friday 16 th May 2008. Time: 14:00 16:00
COMP20212 Two hours UNIVERSITY OF MANCHESTER SCHOOL OF COMPUTER SCIENCE Digitl Design Techniques Dte: Fridy 16 th My 2008 Time: 14:00 16:00 Plese nswer ny THREE Questions from the FOUR questions provided
More informationVoIP for the Small Business
Reducing your telecommunictions costs VoIP (Voice over Internet Protocol) offers low cost lterntive to expensive trditionl phone services nd is rpidly becoming the communictions system of choice for smll
More informationHow To Make A Network More Efficient
Rethinking Virtul Network Emedding: Sustrte Support for Pth Splitting nd Migrtion Minln Yu, Yung Yi, Jennifer Rexford, Mung Ching Princeton University Princeton, NJ {minlnyu,yyi,jrex,chingm}@princeton.edu
More informationEquivalence Checking. Sean Weaver
Equivlene Cheking Sen Wever Equivlene Cheking Given two Boolen funtions, prove whether or not two they re funtionlly equivlent This tlk fouses speifilly on the mehnis of heking the equivlene of pirs of
More informationFAULT TREES AND RELIABILITY BLOCK DIAGRAMS. Harry G. Kwatny. Department of Mechanical Engineering & Mechanics Drexel University
SYSTEM FAULT AND Hrry G. Kwtny Deprtment of Mechnicl Engineering & Mechnics Drexel University OUTLINE SYSTEM RBD Definition RBDs nd Fult Trees System Structure Structure Functions Pths nd Cutsets Reliility
More informationT H E S E C U R E T R A N S M I S S I O N P R O T O C O L O F S E N S O R A D H O C N E T W O R K
Z E S Z Y T Y N A U K O W E A K A D E M I I M A R Y N A R K I W O J E N N E J S C I E N T I F I C J O U R N A L O F P O L I S H N A V A L A C A D E M Y 2015 (LVI) 4 (203) A n d r z e j M r c z k DOI: 10.5604/0860889X.1187607
More informationffiiii::#;#ltlti.*?*:j,'i#,rffi
5..1 EXPEDTNG A PROJECT. 187 700 6 o 'o-' 600 E 500 17 18 19 20 Project durtion (dys) Figure 6-6 Project cost vs. project durtion for smple crsh problem. Using Excel@ to Crsh Project T" llt ffiiii::#;#ltlti.*?*:j,'i#,rffi
More information5 a LAN 6 a gateway 7 a modem
STARTER With the help of this digrm, try to descrie the function of these components of typicl network system: 1 file server 2 ridge 3 router 4 ckone 5 LAN 6 gtewy 7 modem Another Novell LAN Router Internet
More informationMorgan Stanley Ad Hoc Reporting Guide
spphire user guide Ferury 2015 Morgn Stnley Ad Hoc Reporting Guide An Overview For Spphire Users 1 Introduction The Ad Hoc Reporting tool is ville for your reporting needs outside of the Spphire stndrd
More informationOperations with Polynomials
38 Chpter P Prerequisites P.4 Opertions with Polynomils Wht you should lern: Write polynomils in stndrd form nd identify the leding coefficients nd degrees of polynomils Add nd subtrct polynomils Multiply
More informationSpace Vector Pulse Width Modulation Based Induction Motor with V/F Control
Interntionl Journl of Science nd Reserch (IJSR) Spce Vector Pulse Width Modultion Bsed Induction Motor with V/F Control Vikrmrjn Jmbulingm Electricl nd Electronics Engineering, VIT University, Indi Abstrct:
More informationA Network Management System for Power-Line Communications and its Verification by Simulation
A Network Mngement System for Power-Line Communictions nd its Verifiction y Simultion Mrkus Seeck, Gerd Bumiller GmH Unterschluerscher-Huptstr. 10, D-90613 Großhersdorf, Germny Phone: +49 9105 9960-51,
More informationVirtual Machine. Part II: Program Control. Building a Modern Computer From First Principles. www.nand2tetris.org
Virtul Mchine Prt II: Progrm Control Building Modern Computer From First Principles www.nnd2tetris.org Elements of Computing Systems, Nisn & Schocken, MIT Press, www.nnd2tetris.org, Chpter 8: Virtul Mchine,
More informationTool Support for Feature-Oriented Software Development
Tool Support for Feture-Oriented Softwre Development FetureIDE: An Eclipse-Bsed Approch Thoms Leich leich@iti.cs.unimgdeurg.de Sven Apel pel@iti.cs.unimgdeurg.de Lur Mrnitz mrnitz@cs.unimgdeurg.de ABSTRACT
More informationScalable Mining of Large Disk-based Graph Databases
Sclle Mining of Lrge Disk-sed Grph Dtses Chen Wng Wei Wng Jin Pei Yongti Zhu Bile Shi Fudn University, Chin, {chenwng, weiwng1, 2465, shi}@fudn.edu.cn Stte University of New York t Bufflo, USA & Simon
More informationTreatment Spring Late Summer Fall 0.10 5.56 3.85 0.61 6.97 3.01 1.91 3.01 2.13 2.99 5.33 2.50 1.06 3.53 6.10 Mean = 1.33 Mean = 4.88 Mean = 3.
The nlysis of vrince (ANOVA) Although the t-test is one of the most commonly used sttisticl hypothesis tests, it hs limittions. The mjor limittion is tht the t-test cn be used to compre the mens of only
More informationNew Internet Radio Feature
XXXXX XXXXX XXXXX /XW-SMA3/XW-SMA4 New Internet Rdio Feture EN This wireless speker hs een designed to llow you to enjoy Pndor*/Internet Rdio. In order to ply Pndor/Internet Rdio, however, it my e necessry
More informationClearPeaks Customer Care Guide. Business as Usual (BaU) Services Peace of mind for your BI Investment
ClerPeks Customer Cre Guide Business s Usul (BU) Services Pece of mind for your BI Investment ClerPeks Customer Cre Business s Usul Services Tble of Contents 1. Overview...3 Benefits of Choosing ClerPeks
More informationAnswer, Key Homework 10 David McIntyre 1
Answer, Key Homework 10 Dvid McIntyre 1 This print-out should hve 22 questions, check tht it is complete. Multiple-choice questions my continue on the next column or pge: find ll choices efore mking your
More informationData replication in mobile computing
Technicl Report, My 2010 Dt repliction in mobile computing Bchelor s Thesis in Electricl Engineering Rodrigo Christovm Pmplon HALMSTAD UNIVERSITY, IDE SCHOOL OF INFORMATION SCIENCE, COMPUTER AND ELECTRICAL
More informationSource Code verification Using Logiscope and CodeReducer. Christophe Peron Principal Consultant Kalimetrix
Source Code verifiction Using Logiscope nd CodeReducer Christophe Peron Principl Consultnt Klimetrix Agend Introducing Logiscope: Improving confidence nd developer s productivity Bsed on stte-of-the-rt
More informationDlNBVRGH + Sickness Absence Monitoring Report. Executive of the Council. Purpose of report
DlNBVRGH + + THE CITY OF EDINBURGH COUNCIL Sickness Absence Monitoring Report Executive of the Council 8fh My 4 I.I...3 Purpose of report This report quntifies the mount of working time lost s result of
More informationFactoring Polynomials
Fctoring Polynomils Some definitions (not necessrily ll for secondry school mthemtics): A polynomil is the sum of one or more terms, in which ech term consists of product of constnt nd one or more vribles
More informationBasic Research in Computer Science BRICS RS-02-13 Brodal et al.: Solving the String Statistics Problem in Time O(n log n)
BRICS Bsic Reserch in Computer Science BRICS RS-02-13 Brodl et l.: Solving the String Sttistics Prolem in Time O(n log n) Solving the String Sttistics Prolem in Time O(n log n) Gerth Stølting Brodl Rune
More informationUnderstanding Basic Analog Ideal Op Amps
Appliction Report SLAA068A - April 2000 Understnding Bsic Anlog Idel Op Amps Ron Mncini Mixed Signl Products ABSTRACT This ppliction report develops the equtions for the idel opertionl mplifier (op mp).
More information1.00/1.001 Introduction to Computers and Engineering Problem Solving Fall 2011 - Final Exam
1./1.1 Introduction to Computers nd Engineering Problem Solving Fll 211 - Finl Exm Nme: MIT Emil: TA: Section: You hve 3 hours to complete this exm. In ll questions, you should ssume tht ll necessry pckges
More informationNetwork Configuration Independence Mechanism
3GPP TSG SA WG3 Security S3#19 S3-010323 3-6 July, 2001 Newbury, UK Source: Title: Document for: AT&T Wireless Network Configurtion Independence Mechnism Approvl 1 Introduction During the lst S3 meeting
More informationLearning Outcomes. Computer Systems - Architecture Lecture 4 - Boolean Logic. What is Logic? Boolean Logic 10/28/2010
/28/2 Lerning Outcomes At the end of this lecture you should: Computer Systems - Architecture Lecture 4 - Boolen Logic Eddie Edwrds eedwrds@doc.ic.c.uk http://www.doc.ic.c.uk/~eedwrds/compsys (Hevily sed
More informationMathematics. Vectors. hsn.uk.net. Higher. Contents. Vectors 128 HSN23100
hsn.uk.net Higher Mthemtics UNIT 3 OUTCOME 1 Vectors Contents Vectors 18 1 Vectors nd Sclrs 18 Components 18 3 Mgnitude 130 4 Equl Vectors 131 5 Addition nd Subtrction of Vectors 13 6 Multipliction by
More informationSimulation of operation modes of isochronous cyclotron by a new interative method
NUKLEONIKA 27;52(1):29 34 ORIGINAL PAPER Simultion of opertion modes of isochronous cyclotron y new intertive method Ryszrd Trszkiewicz, Mrek Tlch, Jcek Sulikowski, Henryk Doruch, Tdeusz Norys, Artur Srok,
More informationOne Minute To Learn Programming: Finite Automata
Gret Theoreticl Ides In Computer Science Steven Rudich CS 15-251 Spring 2005 Lecture 9 Fe 8 2005 Crnegie Mellon University One Minute To Lern Progrmming: Finite Automt Let me tech you progrmming lnguge
More informationCombined Liability Insurance. Information and Communication Technology Proposal form
Comined Liility Insurnce Informtion nd Communiction Technology Proposl form Comined Liility Insurnce Informtion nd Communiction Technology - Proposl form This proposl form must e completed nd signed y
More informationExperiment 6: Friction
Experiment 6: Friction In previous lbs we studied Newton s lws in n idel setting, tht is, one where friction nd ir resistnce were ignored. However, from our everydy experience with motion, we know tht
More informationWEB DELAY ANALYSIS AND REDUCTION BY USING LOAD BALANCING OF A DNS-BASED WEB SERVER CLUSTER
Interntionl Journl of Computers nd Applictions, Vol. 9, No., 007 WEB DELAY ANALYSIS AND REDUCTION BY USING LOAD BALANCING OF A DNS-BASED WEB SERVER CLUSTER Y.W. Bi nd Y.C. Wu Abstrct Bsed on our survey
More informationIntegration. 148 Chapter 7 Integration
48 Chpter 7 Integrtion 7 Integrtion t ech, by supposing tht during ech tenth of second the object is going t constnt speed Since the object initilly hs speed, we gin suppose it mintins this speed, but
More informationEE247 Lecture 4. For simplicity, will start with all pole ladder type filters. Convert to integrator based form- example shown
EE247 Lecture 4 Ldder type filters For simplicity, will strt with ll pole ldder type filters Convert to integrtor bsed form exmple shown Then will ttend to high order ldder type filters incorporting zeros
More informationAN ANALYTICAL HIERARCHY PROCESS METHODOLOGY TO EVALUATE IT SOLUTIONS FOR ORGANIZATIONS
AN ANALYTICAL HIERARCHY PROCESS METHODOLOGY TO EVALUATE IT SOLUTIONS FOR ORGANIZATIONS Spiros Vsilkos (), Chrysostomos D. Stylios (),(b), John Groflkis (c) () Dept. of Telemtics Center, Computer Technology
More informationBayesian Updating with Continuous Priors Class 13, 18.05, Spring 2014 Jeremy Orloff and Jonathan Bloom
Byesin Updting with Continuous Priors Clss 3, 8.05, Spring 04 Jeremy Orloff nd Jonthn Bloom Lerning Gols. Understnd prmeterized fmily of distriutions s representing continuous rnge of hypotheses for the
More informationPerformance analysis model for big data applications in cloud computing
Butist Villlpndo et l. Journl of Cloud Computing: Advnces, Systems nd Applictions 2014, 3:19 RESEARCH Performnce nlysis model for big dt pplictions in cloud computing Luis Edurdo Butist Villlpndo 1,2,
More informationUse Geometry Expressions to create a more complex locus of points. Find evidence for equivalence using Geometry Expressions.
Lerning Objectives Loci nd Conics Lesson 3: The Ellipse Level: Preclculus Time required: 120 minutes In this lesson, students will generlize their knowledge of the circle to the ellipse. The prmetric nd
More informationEfficient load-balancing routing for wireless mesh networks
Computer Networks 51 (007) 50 66 www.elsevier.com/locte/comnet Efficient lod-blncing routing for wireless mesh networks Yigl Bejerno, Seung-Je Hn b, *,1, Amit Kumr c Bell Lbortories, Lucent Technologies,
More informationAn Undergraduate Curriculum Evaluation with the Analytic Hierarchy Process
An Undergrdute Curriculum Evlution with the Anlytic Hierrchy Process Les Frir Jessic O. Mtson Jck E. Mtson Deprtment of Industril Engineering P.O. Box 870288 University of Albm Tuscloos, AL. 35487 Abstrct
More informationJaERM Software-as-a-Solution Package
JERM Softwre-s--Solution Pckge Enterprise Risk Mngement ( ERM ) Public listed compnies nd orgnistions providing finncil services re required by Monetry Authority of Singpore ( MAS ) nd/or Singpore Stock
More informationLec 2: Gates and Logic
Lec 2: Gtes nd Logic Kvit Bl CS 34, Fll 28 Computer Science Cornell University Announcements Clss newsgroup creted Posted on we-pge Use it for prtner finding First ssignment is to find prtners Due this
More informationA.7.1 Trigonometric interpretation of dot product... 324. A.7.2 Geometric interpretation of dot product... 324
A P P E N D I X A Vectors CONTENTS A.1 Scling vector................................................ 321 A.2 Unit or Direction vectors...................................... 321 A.3 Vector ddition.................................................
More informationBabylonian Method of Computing the Square Root: Justifications Based on Fuzzy Techniques and on Computational Complexity
Bbylonin Method of Computing the Squre Root: Justifictions Bsed on Fuzzy Techniques nd on Computtionl Complexity Olg Koshelev Deprtment of Mthemtics Eduction University of Texs t El Pso 500 W. University
More informationGene Expression Programming: A New Adaptive Algorithm for Solving Problems
Gene Expression Progrmming: A New Adptive Algorithm for Solving Prolems Cândid Ferreir Deprtmento de Ciêncis Agráris Universidde dos Açores 9701-851 Terr-Chã Angr do Heroísmo, Portugl Complex Systems,
More informationDecision Rule Extraction from Trained Neural Networks Using Rough Sets
Decision Rule Extrction from Trined Neurl Networks Using Rough Sets Alin Lzr nd Ishwr K. Sethi Vision nd Neurl Networks Lbortory Deprtment of Computer Science Wyne Stte University Detroit, MI 48 ABSTRACT
More informationIaaS Configuration for Virtual Platforms
IS Configurtion for Virtul Pltforms vcloud Automtion Center 6.0 This document supports the version of ech product listed nd supports ll susequent versions until the document is replced y new edition. To
More informationUNIVERSITY OF NOTTINGHAM. Discussion Papers in Economics STRATEGIC SECOND SOURCING IN A VERTICAL STRUCTURE
UNVERSTY OF NOTTNGHAM Discussion Ppers in Economics Discussion Pper No. 04/15 STRATEGC SECOND SOURCNG N A VERTCAL STRUCTURE By Arijit Mukherjee September 004 DP 04/15 SSN 10-438 UNVERSTY OF NOTTNGHAM Discussion
More informationLearner-oriented distance education supporting service system model and applied research
SHS Web of Conferences 24, 02001 (2016) DOI: 10.1051/ shsconf/20162402001 C Owned by the uthors, published by EDP Sciences, 2016 Lerner-oriented distnce eduction supporting service system model nd pplied
More informationHealth insurance exchanges What to expect in 2014
Helth insurnce exchnges Wht to expect in 2014 33096CAEENABC 02/13 The bsics of exchnges As prt of the Affordble Cre Act (ACA or helth cre reform lw), strting in 2014 ALL Americns must hve minimum mount
More informationModular Generic Verification of LTL Properties for Aspects
Modulr Generic Verifiction of LTL Properties for Aspects Mx Goldmn Shmuel Ktz Computer Science Deprtment Technion Isrel Institute of Technology {mgoldmn, ktz}@cs.technion.c.il ABSTRACT Aspects re seprte
More informationGraphs on Logarithmic and Semilogarithmic Paper
0CH_PHClter_TMSETE_ 3//00 :3 PM Pge Grphs on Logrithmic nd Semilogrithmic Pper OBJECTIVES When ou hve completed this chpter, ou should be ble to: Mke grphs on logrithmic nd semilogrithmic pper. Grph empiricl
More informationThe Velocity Factor of an Insulated Two-Wire Transmission Line
The Velocity Fctor of n Insulted Two-Wire Trnsmission Line Problem Kirk T. McDonld Joseph Henry Lbortories, Princeton University, Princeton, NJ 08544 Mrch 7, 008 Estimte the velocity fctor F = v/c nd the
More informationValue Function Approximation using Multiple Aggregation for Multiattribute Resource Management
Journl of Mchine Lerning Reserch 9 (2008) 2079-2 Submitted 8/08; Published 0/08 Vlue Function Approximtion using Multiple Aggregtion for Multittribute Resource Mngement Abrhm George Wrren B. Powell Deprtment
More informationPentominoes. Pentominoes. Bruce Baguley Cascade Math Systems, LLC. The pentominoes are a simple-looking set of objects through which some powerful
Pentominoes Bruce Bguley Cscde Mth Systems, LLC Astrct. Pentominoes nd their reltives the polyominoes, polycues, nd polyhypercues will e used to explore nd pply vrious importnt mthemticl concepts. In this
More informationLinear Programming in Database
9 Liner Progrmming in Dtse Akir Kwguchi nd Andrew Ngel Deprtment of Computer Science, The City College of New York. New York, New York United Sttes of Americ Keywords: liner progrmming, simple method,
More informationHealth insurance marketplace What to expect in 2014
Helth insurnce mrketplce Wht to expect in 2014 33096VAEENBVA 06/13 The bsics of the mrketplce As prt of the Affordble Cre Act (ACA or helth cre reform lw), strting in 2014 ALL Americns must hve minimum
More informationTraffic Rank Based QoS Routing in Wireless Mesh Network
Trffic Rnk Bsed QoS Routing in Wireless Mesh Network Deep P Kmble #1, Sujth P Terdl *2 #1 Deprtment of Computer Science nd Engineering, Poojy Doddp App College of Engineering, Gulbrg, Krntk, Indi. *2 Deprtment
More informationNeighborhood Based Fast Graph Search in Large Networks
Neighborhood Bsed Fst Grph Serch in Lrge Networks Arijit Khn Dept. of Computer Science University of Cliforni Snt Brbr, CA 9306 rijitkhn@cs.ucsb.edu Ziyu Gun Dept. of Computer Science University of Cliforni
More informationIn-circuit temporal monitors for runtime verification of reconfigurable designs
In-circuit temporl monitors for runtime verifiction of reconfigurble designs Tim Todmn Deprtment of Computing Imperil College London tephn tilkerich Airbus Group Innovtions Willy-Messerschmitt tr., Wyne
More informationVMware Horizon Mirage Web Manager Guide
VMwre Horizon Mirge We Mnger Guide Horizon Mirge 4.3 This document supports the version of ech product listed nd supports ll susequent versions until the document is replced y new edition. To check for
More informationTablet Charging Wall Mount 12
User's Guide Tlet Chrging Wll Mount 12 For the ltest User Instlltion Guide plese visit: www.ergotron.com User's Guide - English Guí del usurio - Espñol Mnuel de l utilisteur - Frnçis Geruikersgids - Deutsch
More informationHelicopter Theme and Variations
Helicopter Theme nd Vritions Or, Some Experimentl Designs Employing Pper Helicopters Some possible explntory vribles re: Who drops the helicopter The length of the rotor bldes The height from which the
More informationEasyMP Network Projection Operation Guide
EsyMP Network Projection Opertion Guide Contents 2 About EsyMP Network Projection Functions of EsyMP Network Projection... 5 Vrious Screen Trnsfer Functions... 5 Instlling the Softwre... 6 Softwre Requirements...6
More informationThe LENA TM Language Environment Analysis System:
FOUNDATION The LENA TM Lnguge Environment Anlysis System: Audio Specifictions of the DLP-0121 Michel Ford, Chrles T. Ber, Dongxin Xu, Umit Ypnel, Shrmi Gry LENA Foundtion, Boulder, CO LTR-03-2 September
More information