Joint Exploration of Hardware Prefetching and Bandwidth Partitioning in Chip Multiprocessors

Size: px
Start display at page:

Download "Joint Exploration of Hardware Prefetching and Bandwidth Partitioning in Chip Multiprocessors"

Transcription

1 Joint Explortion o Hrdwre Preetching nd Bndwidth Prtitioning in Chip Multiprocessors Fng Liu liu3@ece.ncsu.edu Yn Solihin solihin@ece.ncsu.edu Deprtment o Electricl nd Computer Engineering North Crolin Stte University Rleigh, NC, USA ABSTRACT In this pper, we propose n nlyticl model-bsed study to investigte how hrdwre preetching nd memory bndwidth prtitioning impct Chip Multi-Processors (CMP) system perormnce nd how they interct. The model includes composite preetching metric tht cn help determine under which conditions preetching cn improve system perormnce, bndwidth prtitioning model tht tkes into ccount preetching eects, nd derives weighted speedup optimum bndwidth prtition sizes or dierent cores. Simultion results show tht selective preetching, guided by the composite preetching metric, coupled with dynmic bndwidth prtitioning cn improve system perormnce by 9.5% nd 2.8% on dul-core CMP nd qud-core CMP respectively.. INTRODUCTION Severl decdes o the persistent gp between microprocessor nd DRAM min memory speed improvement hs mde it impertive or tody s microprocessors to hide hundreds o processor clock cycles in memory ccess ltency. In most high perormnce microprocessors tody, this is chieved by employing severl levels o cches ugmented with hrdwre preetching [3, 8]. Hrdwre preetching works by predicting cche blocks tht re likely needed by the processor in the ner uture, nd etching them into the cche erly, llowing processor s memory ccesses to hit (i.e. ind dt) in the cche. Since preetching relies on prediction o uture memory ccesses, it is not 00% ccurte in its prediction, implying tht the ltency hiding beneit o preetching cuses n increse in o-chip memory bndwidth usge nd cche pollution. Unortuntely, the shit to multi-core design hs signiicntly incresed the pressure on the o-chip bndwidth. Moore s Lw continues to llow the doubling o trnsistors (cores) every two yers, incresing the o-chip bndwidth tric t Moore s Lw speed. However, the vilbility o o-chip bndwidth is only projected to grow t 5% nnully, due to the limittions in pin density nd power consumption [9]. This leds to problem clled the bndwidth wll, where system perormnce is incresingly limited by the vilbility o o-chip bndwidth [2]. Hence, the demnd or eicient use o o-chip bndwidth is tremendous nd incresing. Two methods hve been recently proposed to improve the eiciency o o-chip bndwidth usge. One method is to improve preetching policies. Some studies proposed throttling or eliminting the useless/bd preetches rom consuming bndwidth [, 8], nd tweking the memory scheduling policy to prioritize demnd nd proitble preetch requests [4]. Another method is to prtition the o-chip bndwidth mong cores [5, 7, 4, 3, 0, 7], by choosing prtition sizes to optimize system throughput or irness. However, these studies suer rom severl drwbcks. First, the studies ddress one technique but ignore the other: preetching studies do not include bndwidth prtitioning, wheres bndwidth prtitioning studies ssume systems tht hve no preetching. As result, the signiicnt interction between them ws missed, nd the opportunity or these techniques to work in synergy ws let unexplored. Second, the studies were perormed in n d-hoc mnner, yielding perormnce improvement but missing importnt insights. Weighted Speedup Bndwidth Shres Neither Pre PT Pre+PT str-gobmk mc-bzip2 hmmer-milc () core 2 (c2) core (c) PT Pre+PT PT Pre+PT PT Pre+PT str(c)-gobmk(c2) mc(c)-bzip2(c2) hmmer(c)-milc(c2) (b) Figure : Weighted speedup () nd optimum bndwidth lloction (b) or co-schedules running on dul-core CMP. To demonstrte the need or exploring preetching nd bndwidth prtitioning jointly, Figure () shows how preetching nd bndwidth prtitioning cn ect ech other. In the igure, system perormnce mesured s weighted speedup [] (reerring to Eqution ) o three pirs o SPEC2006 [9] benchmrks running s co-schedule on dul-core CMP system is shown with our conigurtions: bse system with no preetching or bndwidth prtitioning (Neither), hrdwre preetching only (Pre), bndwidth prtitioning only (PT), nd both preetching nd bndwidth prtitioning (Pre+PT). The three co-schedules highlight dierent interction cses. For hmmer-milc, preetching improves perormnce nd bndwidth prtitioning improves it urther due to osetting the eect o the preetcher s increse in o-chip bndwidth usge. For str-gobmk nd mc-bzip2, preetching hurts perormnce due to high o-chip bndwidth consumption. For mc-bzip2, pplying bndwidth prtitioning is not the right solution, since it cnnot recover the lost perormnce due to preetching (i.e. Pre+PT < Nei- A strem preetcher [3, 8] is used. Optimum bndwidth prtitioning scheme rom [7] is used. More detils cn be ound in Section 4.

2 ther). Such conclusion cnnot be derived in prior studies, when only bndwidth prtitioning ws studied [5, 7, 4, 3, 0, 7], or when preetchers were lwys turned on [4]. The igure points out the need to understnd when the preetcher o ech core should be turned on or o, nd how bndwidth prtitioning should be implemented in order to optimize system perormnce. Perorming the studies in n d-hoc mnner oten misses importnt insights. For exmple, it hs been ssumed tht core tht enjoys useul preetches should be rewrded with higher bndwidth lloction, wheres core or which preetching is less useul should be constrined with lower bndwidth lloction [4]. However, our experiments show the opposite. Mximum weighted speedup is chieved when core with highly useul preetching is given less bndwidth lloction, nd the resulting excess bndwidth is given to cores with less useul preetching. Figure (b) shows the bndwidth lloction or ech core tht mximizes the system throughput. The ppliction tht hs more useul preetching (higher preetching coverge nd ccurcy) runs on Core. Compring the two brs or ech co-schedule, it is cler tht in order to mximize system throughput, it is the pplictions tht show less useul preetching should receive higher bndwidth lloctions. The gol o this study is to understnd wht ctors contribute to the impct o preetching nd bndwidth prtitioning on CMP system perormnce, nd how they interct. We propose n nlyticl model-bsed study, bsed on the Cycle Per Instruction (CPI) model [6] nd queuing theory [2], tking vrious system prmeters (CPU requency, cche block size, nd vilble bndwidth), nd ppliction cche behvior metrics (miss requency, preetching requency, preetching coverge nd ccurcy, nd vrious CPIs) s input. Studying the model, coupled with empiricl evlution, we rrive t severl interesting indings, mong them re: Deploying preetching mkes the vilble bndwidth scrcer nd thereore increses the eectiveness o bndwidth prtitioning in improving system perormnce. The decision o turning preetchers on or o should be mde prior to employing bndwidth prtitioning, becuse the perormnce loss due to preetching in bndwidth-constrined systems cnnot be ully repired by bndwidth prtitioning. We discover new metric to decide whether to turn on or o the preetcher or ech core. The theoreticl optimum bndwidth lloctions cn be derived, nd simpliied version tht is implementble in hrdwre cn pproximte it quite well. The conventionl wisdom tht rewrds core tht hs more useul preetching with lrger bndwidth lloction is incorrect when preetchers o ll cores re turned on. Insted, its bndwidth lloction should be slightly more constrined. Our model explins why this is so. The indings in our study crry signiicnt implictions or CMP design nd perormnce optimiztion. As the number o cores on chip continues to double every 8-24 months, versus 0-5% ITRS projected growth in o-chip bndwidth [9], the o-chip bndwidth vilble per core will become incresingly scrcer, incresing the demnd or better o-chip bndwidth mngement. The reminder is orgnized s ollows: Section 2 reviews the relted work, Section 3 shows the construction o the nlyticl model, Section 4 vlidtes the model-driven indings through simultion bsed evlution, nd Section 5 concludes this pper. 2. RELATED WORK Bndwidth prtitioning. Reserchers hve proposed vrious bndwidth prtitioning techniques to mitigte CMP memory bndwidth contention-relted problems. The impliction is to prioritize memory requests rom dierent cores bsed on heuristics, in order to meet the objectives o Qulity o Service (QoS) [0], irness [4, 3], or throughput [5]. Liu et l. [7] investigted the impct o bndwidth prtitioning on CMP system perormnce nd its interction with shred cche prtitioning. Srikntih nd Kndemir [7] explored symbiotic prtitioning scheme on the shred cche nd o-chip bndwidth vi empiricl models. None o those bndwidth prtitioning techniques took preetching into ccount. Preetching. Hrdwre preetching is widely implemented in commercil microprocessors [3, 8] to hide the long memory ccess ltency. Due to the imperect ccurcy, preetching incurs cche pollution nd increses o-chip bndwidth consumption. Prior studies hve looked into how to mke preetching more eective in CMP. Techniques include throttling/iltering useless preetching requests [, 8] to reduce their extr bndwidth consumption. All o the bove studies ignore bndwidth contention tht rises rom demnd nd preetch requests coming rom dierent cores. Preetching nd Bndwidth Prtitioning. Only recently, preetching nd bndwidth prtitioning in CMP were studied together s inter-relted problems. Ebrhimi et l. [4] proposed to prtition bndwidth usge in the presence o preetching in CMP in order to reduce the inter-core intererence. While their results show improved system perormnce, mny questions re let unnswered. For exmple, wht undmentl ctors ect the eectiveness o preetching nd bndwidth prtitioning? How do they interct with ech other? Does combining preetching nd bndwidth prtitioning lwys chieve better perormnce thn using only one o them? Wht bndwidth shres cn produce optimum system perormnce? The gol o this pper is to ind out these nswers, tht re criticl or designing good policy or optimizing system perormnce. Due to the lck o understnding on these issues, the study [4] mde criticl error o lwys keeping the preetching engines o ll cores on regrdless o the situtions. Figure shows tht in some cses, it is better to turn the preetchers completely o. 3. ANALYTICAL MODELING 3. Assumptions nd Model Prmeters Assumptions. This study ssumes CMP with homogeneous cores, where ech core hs privte L (instruction nd dt) nd L2 (uniied) cches. Ech L2 cche hs hrdwre preetcher tht cn be turned on or o. The o-chip bndwidth is shred by ll cores through single queue interce, where ll o-chip memory requests re served in First-Redy First-Come-First-Serve (FR-FCFS) policy [6]. Our study ocuses on multi-progrmmed worklods, hence we ssume tht single-threded pplictions run on dierent cores nd do not shre dt. This mens the coherence tric is ignored. The write bcks re not modeled in the system, becuse they re much ewer thn red/write misses nd not on the criticl pth o perormnce. We deine bndwidth prtitioning s llocting rctions o ochip bndwidth to dierent cores nd enorcing these rctions s per-core quot. Thus, bndwidth prtitioning reduces inter-core intererence, without chnging the underlying memory ccess scheduling policy. The bndwidth prtitioning is implemented using token bucket lgorithm [7], with the gol to optimize the system throughput expressed s weighted speedup, which is the sum o individul Instruction Per Cycle (IPC) speedup rom ech core [] 2 : NX IP C i NX W S = = IP C lone,i i= i= CP I lone,i CP I i () 2 IP C i nd IP C lone,i re IPC o thred i when it runs in co-schedule nd when it runs lone in the system, respectively. Weighted speedup is widely used metric, nd includes some irness, s speeding up one core t the expense o others.

3 Model Prmeters. The input to the model includes system prmeters s well s per-thred prmeters listed in Tble. Tble : Input nd prmeters used in our model. System prmeters CPU clock requency (Hz) K Cche block size (Bytes) B Pek o-chip memory bndwidth (Bytes/sec) N Number o cores in the CMP Thred-speciic prmeters CP I L2,i Thred i s CPI ssuming ininite L2 cche size CP I lone,i Thred i s CPI when it runs lone in the CMP M i Thred i s L2 cche miss rte without preetching A i Thred i s L2 cche ccess requency (#ccesses/sec) M p,i Thred i s L2 cche miss rte ter preetching P i Thred i s L2 preetching rte (#preetches/#ccesses) c i Thred i s preetching coverge i Thred i s preetching ccurcy T m,i Thred i s verge memory ccess ltency (#cycles) β i Frction o bndwidth ssigned to thred i 3.2 Composite Metric or Preetching Trditionl metrics or preetching perormnce include coverge, deined s the rction o the originl cche misses tht re eliminted by preetching; nd ccurcy, deined s the rction o preetch requests tht successully eliminte cche misses. These metrics cnnot determine whether preetching should be used or not in limited o-chip bndwidth environment becuse they do not tke into ccount how much o-chip bndwidth is vilble, nd how memory ccess ltency is ected by preetching. To rrive t new metric, we strt rom the bsic Cycle per Instruction (CPI) model [6] nd dd the eect o dditionl queueing dely due to preetching tric. We use t to represent the queueing dely on the bus nd let T m be the verge ccess ltency to the memory 3, the CPI becomes: CP I = CP I L2 + h m (T m + t) (2) When preetching is pplied in the system, let CP I p present the new CPI, t p s the new queuing dely on the bus, h m,p s the new L2 misses per instruction, the CPI eqution then becomes: CP I p = CP I L2 + h m,p (T m + t p) (3) Compring Eqution 3 vs. Eqution 2, preetching my decrese the L2 miss per instruction, i.e. h m,p < h m, but increse the queueing dely, i.e. t p > t due to the extr tric generted by preetch requests. h m,p cn be expressed s the multipliction o miss requency (M pa p) nd the verge time tken to execute one instruction ( h m,p = Mp Ap CP Ip CP Ip ): Substituting Eqution 4 into Eqution 3, nd solving CP I p, we cn rrive t: CP I p = CP I L2 MpAp (T m + t p) Now we will derive t p using Little s lw. I we let λ p denote the rrivl rte o memory requests, then λ p is equl to the sum o requency o cche miss nd preetch requests: (4) (5) λ p = (M p + P )A p (6) 3 The verge memory ccess ltency T m is n mortized vlue tht implicitly includes the eect o memory bnk nd row buer conlicts, Instruction Level Prllelism (ILP) s well s Thred Level Prllelism (TLP). Little s lw [2] or queuing system sttes tht the verge queue length (L p) is equl to the rrivl rte (λ p) multiplied by the service time (T p), i.e. L p = λ p T p, while the service time on the o-chip bus is the cche block size (K) divided by the vilble bndwidth (B). Hence, the verge number o memory requests rriving during the service time is: L p = K (Mp + P )Ap (7) B I we ssume memory requests re not bursty, i.e. requests re processed bck to bck, the verge witing time o newly rriving request is equl to the L p requests tht re hed o it in the queue, multiplied by the service time. Thus, the witing time t p (in cycles) cn be expressed s: t p = K B K2 Lp = (Mp + P )Ap (8) B2 Substituting Eqution 8 into Eqution 5, expression or CP I p is: CP I p = MpApTm CP I L2 Mp(Mp+P )A2 p K2 (9) Similrly, the system without preetching hs the CPI o: CP I L2 CP I = (0) MATm M 2 A 2 K 2 In order or preetching to produce net beneit in perormnce, the CPI ter preetching must be smller thn CPI without preetching, i.e. CP I p < CP I. From the deinition o preetching coverge nd ccurcy, we hve (ssuming L2 cche ccess requency is not ected by preetching, i.e. A p = A): c = = MA MpAp MA MA MpAp P A p = M Mp M = M Mp P () (2) Rerrnging Eqution nd Eqution 2 to express M p nd P in terms o c nd, substituting them into the CP I p expression in Eqution 9, nd simpliying the inequlity CP I p < CP I, we obtin the inl expression or the inequlity: T m > MAK2 (c 2 + c ) (3) The right hnd side o the inequlity, MAK2 (c 2+ c ), is the composite metric tht tkes into ccount preetching coverge nd ccurcy, s well s cche block size, vilble bndwidth, nd miss requency. The let hnd side o the inequlity, T m, mesures the verge exposed memory ccess ltency. The inequlity essentilly provides brek-even point threshold or how lrge the verge memory ccess ltency should be or preetching to be beneicil. It is esier to meet the inequlity when the verge memory ccess ltency is lrge, the cche miss requency is smll, the vilble bndwidth is lrge, nd the coverge nd ccurcy re lrge. All these ctors mke sense qulittively, nd Eqution 3 cptures their quntittive contributions. This leds us to: OBSERVATION. Whether preetching improves or degrdes perormnce cnnot be mesured just by its coverge or ccurcy. Rther, preetching proitbility criterion in Inequlity 3 is needed, using input prmeters tht re esy to collect in hrdwre. Recll tht in the model construction, we ssumed memory requests re not bursty nd requests re processed bck to bck. This llows us to rech bndwidth utiliztion o 00% i the rrivl rte o memory requests is high. However, memory requests re bursty

4 in relity, even high rrivl rte cnnot chieve 00% utiliztion. This introduces smll inccurcy in our metric. Thus we cn deine prmeter α (0, ) such tht: T m > MAK2 (c 2 + c α ) (4) α loosely represents the degree o burstiness o memory requests nd cn be obtined rom empiricl evlution (s shown in Section 4.2.). Since α <, the minimum vlue o the right hnd side o the inequlity is MAK2 T m < MAK2 (c 2 + c ). Thus we cn conclude: OBSERVATION 2. I n ppliction running on core stisies (c 2 + c ), preetching is hrmul to peror- mnce. In ddition, i 0 > MAK2 B improves perormnce. 2 (c 2 + c ), preetching 3.3 Memory Bndwidth Prtitioning Model This model extends the bndwidth prtitioning model rom [7] by tking into ccount not just demnd etches, but lso preetch requests, nd preetching coverge nd ccurcy. In Eqution 5, we cn compute the queueing dely t p or thred i using Little s lw or the cse where we do not pply bndwidth prtitioning (i.e. requests rom ll cores contend with ech other or bndwidth ccess nturlly) nd compre it ginst the cse where we pply bndwidth prtitioning (i.e. bndwidth rction is llocted to ech core or its own requests). The CPI o thred i in system with nturl shring (no prtitioning) nd with bndwidth prtitioning cn be expressed s: CP I p,i,nopt = CP I p,i,bwpt = CP I L2,i M p,ia i T m,i (P N j= (M p,j +P j )A j) 2 M p,i K 2 (M p,i +P i ) (5) M p,ia i T m,i CP I L2,i M p,i(m p,i +P i )A 2 i K2 β 2 i B2 (6) where β i denote the rction o bndwidth llocted to thred i. Compring Eqution 6 nd 5, we cn conclude tht Eqution 5 is specil cse o Eqution 6 where: β i = which leds us to the ollowing observtion: (M p,i + P i)a i P N j= (Mp,j + Pj)Aj (7) OBSERVATION 3. In CMP system where o-chip bndwidth usge mong multiple cores is unregulted, the o-chip bndwidth is nturlly prtitioned between cores, where the nturl shre o bndwidth core uses is equl to the rtio o memory request requency (including both cche misses nd preetch requests) o the core to the sum o ll memory request requencies rom ll cores. Substituting CPI rom Eqution 6 into Eqution, with constrint o P N i=0 βi =, we cn mximize the weighted speedup using Lgrnge multipliers [7]. The solution provides the bndwidth prtition or thred i (β i) is: `CiM p,i(m p,i + P i)a 2 /3 i β i = (8) `CjM p,j(m p,j + P j)a 2 j /3 P N j= where C i = CP I lone,i CP I L2,i. This leds us to the next observtion: OBSERVATION 4. Weighted speedup-optimum bndwidth prtition or thred cn be expressed s unction o ll co-scheduled threds miss nd preetch requencies, ininite-l2 CPIs, nd CPIs when ech thred runs lone in the system, s in Eqution Prmeters in Eqution 8 my vry due to n ppliction s phse chnge 4. EMPIRICAL EVALUATION 4. Environment nd Methodology Simultion Prmeters. We use cycle-ccurte ull system simultor bsed on Simics [5] to model CMP system with dul nd qud cores. Ech core hs sclr in-order issue pipeline with 4GHz clock requency. To remove the eect o cche contention between cores, ech core hs privte L nd L2 cches. The L instruction cche nd dt cches re 6KB, 2-wy ssocitive, nd hve 2-cycle ccess ltency. The L2 cche is 52KB, 8-wy ssocitive, nd hs n 8-cycle ccess ltency. All cches use 64- byte block size, implement write-bck policy, nd LRU replcement. The bus to o-chip memory is split trnsction bus, with pek bndwidth o 800MB/s or single core system,.6gb/s or dul-core CMP nd 3.2GB/s or qud-core CMP. The verge min memory ccess ltency is 300 cycles. The CMP runs Linux OS tht comes with Fedor Core 4 distribution. Hrdwre Preetchers. The L2 cche o ech core is ugmented with typicl strem preetcher tht is commonly implemented in modern processors [3, 8] due to their low hrdwre cost nd high eectiveness or wide rnge o pplictions. Strem buers cn detect ccesses to block ddresses tht orm sequentil or stride pttern (clled strem), nd preetch the next ew blocks in the strem in nticiption o continuing ccesses rom the strem. We implement strem preetcher with our strems, nd up to our blocks preetched or ech strem coverge ccurcy str bzip2 gcc gobmk hmmer lbm libquntum mc milc nmd omnetpp perlbench povry sjeng soplex sphinx3 Figure 2: Benchmrks preetch coverge nd ccurcy. Worklod Construction. We consider seventeen C/C++ benchmrks rom the SPEC2006 benchmrk suite [9]. We compile the benchmrks using gcc compiler with O optimiztion level into x86 binries. We use the re input sets, simulte 250 million instructions ter skipping the initiliztion phse o ech benchmrk, by inserting brekpoints when mjor dt structures hve been initilized. We pir the benchmrks into co-schedules o two or our benchmrks. To reduce the number o co-schedules tht we need to evlute, we ctegorize the benchmrks bsed on the preetching chrcteristics. Figure 2 shows the preetch coverge nd ccurcy o ech benchmrk. From the igure, we pick up three representtive benchmrks tht hve low (bzip2), medium (str) nd high (hmmer) coverge nd ccurcy, nd pir ech one with the other benchmrks to cover ll representtive co-schedules. 4.2 Experimentl Results 4.2. Vlidting the Preetching Metric In this section, we investigte how well the composite preetching metric in Eqution 4 predicts preetching perormnce proitbility. We run ech ppliction on single core system with behvior. The eqution does not ssume them to be constnt, but ssumes the prmeters or ny speciic execution intervl re vilble.

5 vilble bndwidth o 800MB/s, nd mesure CPIs when preetching is turned on (CP I p) nd when preetching is turned o (CP I). Then we compute the dierence ( CP I = CP I p CP I) or ech benchmrk. A negtive number represents perormnce improvement while positive vlue represents degrdtion. Tble 2 shows the pplictions sorted by their CP Is. As comprison, we compute our composite preetching metric θ = MAK2 (c ) nd sort the pplictions in decresing order o θ. Finlly, conventionl wisdom evlutes preetching perormnce bsed on coverge or ccurcy, so we lso show the pplictions sorted in incresing order o ccurcy. Note tht Figure 2 shows tht coverge nd ccurcy re highly correlted, hence we only show ccurcy in the tble. Applictions whose rnks mtch with ones obtined rom CP I sorting re shown in bold. 2+ c Tble 2: Rnking o pplictions bsed on CP I, our composite metric θ, nd preetching ccurcy. CP I-sorted θ-sorted -sorted Benchmrk CP I Benchmrk θ Benchmrk bzip bzip bzip2 soplex soplex 48.6 gobmk mc mc gcc gobmk 0.28 gobmk soplex gcc gcc mc povry str povry nmd milc 0.40 str omnetpp povry 0.83 milc str -0.0 nmd -.47 sphinx3 milc omnetpp nmd perlbench perlbench perlbench hmmer hmmer -43. omnetpp sphinx libquntum lbm libquntum lbm hmmer lbm sphinx libquntum sjeng sjeng sjeng Let us compre the rnks o pplictions bsed on the ctul perormnce improvement due to preetching ( CP I), vs. bsed on our metric θ. The rnks o eight pplictions (shown in bold) out o sixteen exctly mtch. For the other eight pplictions, their rnks dier by t most three positions, indicting how well our metric θ correltes with the ctul perormnce. I ech ppliction is given rnk number, nd we compre rnks bsed on CP I vs. θ, the correltion coeicient computes to 95%, indicting high correltion between them. In contrst, the correltion o rnks bsed on CP I vs. ccurcy computes to 89%. Thereore, our composite metric correltes better with the ctul perormnce thn conventionl metrics. In ddition, conventionl metrics cnnot determine wht level o ccurcy or coverge is high enough to produce perormnce improvement, wheres our composite metric θ includes perormnce proitbility threshold (Eqution 4): T m > θ, where α (0, ) is α number tht relects how bursty memory ccesses re. Even when α is unknown, θ cn still determine preetching proitbility unmbiguously in some cses. For exmple, θ = or bzip2, which is much lrger thn the ully exposed memory ccess ltency T m = 300 cycles, hence θ predicts unmbiguously tht preetching will hurt perormnce (Observtion 2). In ddition, there re eight pplictions showing negtive θ vlues in Tble 2. θ predicts unmbiguously tht preetching will improve perormnce. Only or seven out o sixteen cses, the ctul vlue o α is needed to determine whether preetching is proitble. I we choose α = 0.2, ll benchmrks rnked bove str stisy T m θ, while ll benchmrks rnked t str nd below stisy α T m > θ. Thus, 0.2 provides resonble estimte or α. For α urther vlidtion, we run simultions on single core with dierent preetch lgorithms nd dierent bndwidth mount, ll results point to the sme conclusion tht α = 0.2 is good estimte or SPEC2006 benchmrks Co-Deciding Preetching nd Prtitioning In this section, we show results where our preetching proitbility metric in Inequlity 4 guides the decision to selectively turn on/o preetchers, coupled with dynmic bndwidth prtitioning. The bndwidth prtitioning is enorced using token bucket lgorithm [7], where token genertor distributes tokens to dierent per-core buckets t the rtes proportionl to the rction o bndwidth llocted to dierent cores. Ech cche miss or preetch request is llowed to go to the o-chip interce only when the core generting the request hs mtching tokens in its bucket. In the dynmic prtitioning scheme, the bndwidth shres re re-evluted every -million cycles. As in [7], we deploy simpliied prcticl implementtion by ssuming C i = in Eqution 8. Figure 3 shows the weighted speedup or our system conigurtions CMP system: no preetching or bndwidth prtitioning (Neither), only simpliied bndwidth prtitioning (Simp), ll preetchers turned on nd bndwidth prtitioning (AllPre+Simp), nd selective ctivtion o ech core s preetcher guided by preetching proitbility metric coupled with bndwidth prtitioning (Ctrl- Pre+Simp). Speciiclly, we ssume α = 0.2 s discussed in Section To mke preetching decision, we irst run the pplictions on CMP system with equl shre o the vilble bndwidth or ech core, nd proile the hrdwre counters needed or computing θ. Bsed on the computed θ, we stticlly turn on/o the preetcher o core, nd run the pplictions gin to collect perormnce. Note tht nothing prevents the preetching decision to be perormed dynmiclly t run time. However, mking preetching decision stticlly is suicient to demonstrte the eectiveness o the preetching proitbility metric. The experiments re evluted on dul-core CMP with vilble bndwidth o.6gb/s nd on qud-core CMP with vilble bndwidth o 3.2GB/s respectively. The igure shows tht in mny cses, turning on ll preetchers (AllPre+Simp) degrdes perormnce over no preetching (Simp) (i.e. 8 out o 6 co-schedules on dul core CMP, nd in 3 out o 0 co-schedules on qud-core CMP). Worse, perormnce o All- Pre+Simp is even lower thn the bse cse CMP without preetching or bndwidth prtitioning (Neither) in mjority o the bove cses. This indictes tht preetching cn be too hrmul or bndwidth prtitioning to oset. In both igures, when we use our preetching proitbility criterion to guide the decision to turn on/o ech core s preetcher, coupled with dynmic bndwidth prtitioning, the best weighted speedup cn be chieved or ll co-schedules. CtrlPre+Simp hs t lest the sme perormnce s the best o Simp nd AllPre+Simp, nd in mny cses outperorms both o them signiicntly. On verge, over Neither, Simp, nd AllPre+Simp, CtrlPre+Simp improves weighted speedup by 6.0%, 3.6% nd 9.5%, respectively on dul-core CMP, nd 7.2%, 2.5% nd 2.8%, respectively on qud-core CMP. 5. CONCLUSIONS The gol o this pper is to understnd how hrdwre preetching nd memory bndwidth prtitioning in CMP cn ect system perormnce nd interct with ech other. We hve presented n nlyticl model to chieve this gol. Firstly, we derived composite preetching metric tht cn help determine under which situtions hrdwre preetcher cn improve system perormnce. Then we constructed bndwidth prtitioning model tht cn derive weighted speedup-optimum bndwidth lloctions mong dierent cores. Finlly, we collected simultion results to vlidte the observtions obtined rom the nlyticl model, nd show system perormnce improvement tht cn be chieved by co-deciding preetching nd bndwidth prtitioning decisions using our preetching metric nd implementble dynmic bndwidth prtitioning.

6 ighted Speedup We Neither Simp AllPre+Simp CtrlPre+Simp Weighted Sp peedup () Weighted Speedup on Dul-core CMP Neither Simp AllPre+Simp CtrlPre+Simp (b) Weighted Speedup on Qud-core CMP Figure 3: Weighted speedup o optimum bndwidth prtitioning or no preetching, ll preetching, vs. selectively turning on preetchers using the composite preetching metric on dul-core CMP with.6gb/s bndwidth (), nd qud-core CMP with 3.2GB/s bndwidth (b). 6. REFERENCES [] A. Snvely et l. Symbiotic Job Scheduling or Simultneous Multithreding Processor. In Proc. o 9th Intl. Con. on Architecture Support or Progrmming Lnguge nd Operting Systems(ASPLOS), [2] B. Rogers et l. Scling the Bndwidth Wll: Chllenges in nd Avenues or CMP Scling. In Proc. o the 36th Intl. Con. on Computer Architecture (ISCA), [3] B. Sinhroy et. l. POWER5 System Microrchitecture. IBM Journl o Reserch nd Development, 49(4/5):505 52, [4] E. Ebrhimi et l. Coordinted Control o Multiple Preetchers in Multi-Core Systems. In Proc. o the 42th IEEE/ACM Intl. Symp. on Microrchitecture (MICRO), [5] E. Ipek et l. Sel-Optimizing Memory Controller: A Reinorcement Lerning Approch. In Proc.o the 35th Intl. Symp. on Computer Architecture (ISCA), [6] P. Emm. Understnding Some Simple Processor-Perormnce Limits. IBM Journl o Reserch nd Development, 4(3), 997. [7] F. Liu et l. Understnding How O-Chip Memory Bndwidth Prtitioning in Chip Multiprocessors Aects System Perormnce. In 6th Intl. Symp. on High Perormnce Computer Architecture, 200. [8] G. Hinton et l. The Microrchitecture o the Pentium 4 Processor. Intel Technology Journl, (Q), 200. [9] ITRS. Interntionl Technology Rodmp or Semiconductors: 2005 Edition, Assembly nd pckging. In [0] K.J. Nesbit et l. Fir Queuing Memory System. In Proc. o the 39th IEEE/ACM Intl. Symp. on Microrchitecture (MICRO), [] L. Sprcklen et l. Eective Instruction Preetching in Chip Multiprocessors or Modern Commercil Applictions. In th Intl. Symp. on High Perormnce Computer Architecture(HPCA), [2] J. Little. A Proo o Queueing Formul L = λw. Opertions Reserch, 9( ), 96. [3] N. Rique et l. Eective Mngement o DRAM Bndwidth in Multicore Processors. In Proc. o the 6th Intl. Con. on Prllel Architectures nd Compiltion Techniques(PACT), [4] O. Mutlu et l. Prllelism-Awre Btch Scheduling: Enhncing both Perormnce nd Firness o Shred DRAM Systems. In Proc.o the 35th Intl. Symp. on Computer Architecture (ISCA), [5] P.S. Mgnusson et l. Simics: A Full System Simultion Pltorm. IEEE Computer Society, 35(2):50 58, [6] S. Rixner et l. Memory Access Scheduling. In Proc.o the 27th Intl. Symp. on Computer Architecture (ISCA), [7] S. Srikntih et l. SRP: Symbiotic Resource Prtitioning o the Memory Hierrchy in CMPs. In In Proc. o Intl. Con. on High Perormnce Embedded Architectures nd Compilers (HiPEAC), 200. [8] S. Srinth et l. Feedbck Directed Preetching: Improving the Perormnce nd Bndwidth-eiciency o Hrdwre Preetchers. In 3th Intl. Symp. on High Perormnce Computer Architecture(HPCA), [9] Stndrd Perormnce Evlution Corportion. Spec cpu2006 benchmrks

Econ 4721 Money and Banking Problem Set 2 Answer Key

Econ 4721 Money and Banking Problem Set 2 Answer Key Econ 472 Money nd Bnking Problem Set 2 Answer Key Problem (35 points) Consider n overlpping genertions model in which consumers live for two periods. The number of people born in ech genertion grows in

More information

Operations with Polynomials

Operations with Polynomials 38 Chpter P Prerequisites P.4 Opertions with Polynomils Wht you should lern: Write polynomils in stndrd form nd identify the leding coefficients nd degrees of polynomils Add nd subtrct polynomils Multiply

More information

Economics Letters 65 (1999) 9 15. macroeconomists. a b, Ruth A. Judson, Ann L. Owen. Received 11 December 1998; accepted 12 May 1999

Economics Letters 65 (1999) 9 15. macroeconomists. a b, Ruth A. Judson, Ann L. Owen. Received 11 December 1998; accepted 12 May 1999 Economics Letters 65 (1999) 9 15 Estimting dynmic pnel dt models: guide for q mcroeconomists b, * Ruth A. Judson, Ann L. Owen Federl Reserve Bord of Governors, 0th & C Sts., N.W. Wshington, D.C. 0551,

More information

Polynomial Functions. Polynomial functions in one variable can be written in expanded form as ( )

Polynomial Functions. Polynomial functions in one variable can be written in expanded form as ( ) Polynomil Functions Polynomil functions in one vrible cn be written in expnded form s n n 1 n 2 2 f x = x + x + x + + x + x+ n n 1 n 2 2 1 0 Exmples of polynomils in expnded form re nd 3 8 7 4 = 5 4 +

More information

Reasoning to Solve Equations and Inequalities

Reasoning to Solve Equations and Inequalities Lesson4 Resoning to Solve Equtions nd Inequlities In erlier work in this unit, you modeled situtions with severl vriles nd equtions. For exmple, suppose you were given usiness plns for concert showing

More information

4. DC MOTORS. Understand the basic principles of operation of a DC motor. Understand the operation and basic characteristics of simple DC motors.

4. DC MOTORS. Understand the basic principles of operation of a DC motor. Understand the operation and basic characteristics of simple DC motors. 4. DC MOTORS Almost every mechnicl movement tht we see round us is ccomplished by n electric motor. Electric mchines re mens o converting energy. Motors tke electricl energy nd produce mechnicl energy.

More information

Mathematics. Vectors. hsn.uk.net. Higher. Contents. Vectors 128 HSN23100

Mathematics. Vectors. hsn.uk.net. Higher. Contents. Vectors 128 HSN23100 hsn.uk.net Higher Mthemtics UNIT 3 OUTCOME 1 Vectors Contents Vectors 18 1 Vectors nd Sclrs 18 Components 18 3 Mgnitude 130 4 Equl Vectors 131 5 Addition nd Subtrction of Vectors 13 6 Multipliction by

More information

ClearPeaks Customer Care Guide. Business as Usual (BaU) Services Peace of mind for your BI Investment

ClearPeaks Customer Care Guide. Business as Usual (BaU) Services Peace of mind for your BI Investment ClerPeks Customer Cre Guide Business s Usul (BU) Services Pece of mind for your BI Investment ClerPeks Customer Cre Business s Usul Services Tble of Contents 1. Overview...3 Benefits of Choosing ClerPeks

More information

Is Competition Among Charities Bad?

Is Competition Among Charities Bad? Is Competition Among Chrities Bd? Inkyung Ch nd Willim Neilson Tes A&M University, College Sttion, TX 7783 December Abstrct This pper studies tht the eect o incresed competition mong chrities or dontions,

More information

How To Set Up A Network For Your Business

How To Set Up A Network For Your Business Why Network is n Essentil Productivity Tool for Any Smll Business TechAdvisory.org SME Reports sponsored by Effective technology is essentil for smll businesses looking to increse their productivity. Computer

More information

WEB DELAY ANALYSIS AND REDUCTION BY USING LOAD BALANCING OF A DNS-BASED WEB SERVER CLUSTER

WEB DELAY ANALYSIS AND REDUCTION BY USING LOAD BALANCING OF A DNS-BASED WEB SERVER CLUSTER Interntionl Journl of Computers nd Applictions, Vol. 9, No., 007 WEB DELAY ANALYSIS AND REDUCTION BY USING LOAD BALANCING OF A DNS-BASED WEB SERVER CLUSTER Y.W. Bi nd Y.C. Wu Abstrct Bsed on our survey

More information

Helicopter Theme and Variations

Helicopter Theme and Variations Helicopter Theme nd Vritions Or, Some Experimentl Designs Employing Pper Helicopters Some possible explntory vribles re: Who drops the helicopter The length of the rotor bldes The height from which the

More information

Enterprise Risk Management Software Buyer s Guide

Enterprise Risk Management Software Buyer s Guide Enterprise Risk Mngement Softwre Buyer s Guide 1. Wht is Enterprise Risk Mngement? 2. Gols of n ERM Progrm 3. Why Implement ERM 4. Steps to Implementing Successful ERM Progrm 5. Key Performnce Indictors

More information

How To Network A Smll Business

How To Network A Smll Business Why network is n essentil productivity tool for ny smll business Effective technology is essentil for smll businesses looking to increse the productivity of their people nd processes. Introducing technology

More information

Graphs on Logarithmic and Semilogarithmic Paper

Graphs on Logarithmic and Semilogarithmic Paper 0CH_PHClter_TMSETE_ 3//00 :3 PM Pge Grphs on Logrithmic nd Semilogrithmic Pper OBJECTIVES When ou hve completed this chpter, ou should be ble to: Mke grphs on logrithmic nd semilogrithmic pper. Grph empiricl

More information

Experiment 6: Friction

Experiment 6: Friction Experiment 6: Friction In previous lbs we studied Newton s lws in n idel setting, tht is, one where friction nd ir resistnce were ignored. However, from our everydy experience with motion, we know tht

More information

Small Business Networking

Small Business Networking Why network is n essentil productivity tool for ny smll business Effective technology is essentil for smll businesses looking to increse the productivity of their people nd business. Introducing technology

More information

Small Business Networking

Small Business Networking Why network is n essentil productivity tool for ny smll business Effective technology is essentil for smll businesses looking to increse the productivity of their people nd processes. Introducing technology

More information

Math 135 Circles and Completing the Square Examples

Math 135 Circles and Completing the Square Examples Mth 135 Circles nd Completing the Squre Exmples A perfect squre is number such tht = b 2 for some rel number b. Some exmples of perfect squres re 4 = 2 2, 16 = 4 2, 169 = 13 2. We wish to hve method for

More information

Small Business Networking

Small Business Networking Why network is n essentil productivity tool for ny smll business Effective technology is essentil for smll businesses looking to increse the productivity of their people nd business. Introducing technology

More information

Small Business Networking

Small Business Networking Why network is n essentil productivity tool for ny smll business Effective technology is essentil for smll businesses looking to increse the productivity of their people nd processes. Introducing technology

More information

Example 27.1 Draw a Venn diagram to show the relationship between counting numbers, whole numbers, integers, and rational numbers.

Example 27.1 Draw a Venn diagram to show the relationship between counting numbers, whole numbers, integers, and rational numbers. 2 Rtionl Numbers Integers such s 5 were importnt when solving the eqution x+5 = 0. In similr wy, frctions re importnt for solving equtions like 2x = 1. Wht bout equtions like 2x + 1 = 0? Equtions of this

More information

Treatment Spring Late Summer Fall 0.10 5.56 3.85 0.61 6.97 3.01 1.91 3.01 2.13 2.99 5.33 2.50 1.06 3.53 6.10 Mean = 1.33 Mean = 4.88 Mean = 3.

Treatment Spring Late Summer Fall 0.10 5.56 3.85 0.61 6.97 3.01 1.91 3.01 2.13 2.99 5.33 2.50 1.06 3.53 6.10 Mean = 1.33 Mean = 4.88 Mean = 3. The nlysis of vrince (ANOVA) Although the t-test is one of the most commonly used sttisticl hypothesis tests, it hs limittions. The mjor limittion is tht the t-test cn be used to compre the mens of only

More information

Health insurance exchanges What to expect in 2014

Health insurance exchanges What to expect in 2014 Helth insurnce exchnges Wht to expect in 2014 33096CAEENABC 02/13 The bsics of exchnges As prt of the Affordble Cre Act (ACA or helth cre reform lw), strting in 2014 ALL Americns must hve minimum mount

More information

5.2. LINE INTEGRALS 265. Let us quickly review the kind of integrals we have studied so far before we introduce a new one.

5.2. LINE INTEGRALS 265. Let us quickly review the kind of integrals we have studied so far before we introduce a new one. 5.2. LINE INTEGRALS 265 5.2 Line Integrls 5.2.1 Introduction Let us quickly review the kind of integrls we hve studied so fr before we introduce new one. 1. Definite integrl. Given continuous rel-vlued

More information

Introducing Kashef for Application Monitoring

Introducing Kashef for Application Monitoring WextWise 2010 Introducing Kshef for Appliction The Cse for Rel-time monitoring of dtcenter helth is criticl IT process serving vriety of needs. Avilbility requirements of 6 nd 7 nines of tody SOA oriented

More information

Use Geometry Expressions to create a more complex locus of points. Find evidence for equivalence using Geometry Expressions.

Use Geometry Expressions to create a more complex locus of points. Find evidence for equivalence using Geometry Expressions. Lerning Objectives Loci nd Conics Lesson 3: The Ellipse Level: Preclculus Time required: 120 minutes In this lesson, students will generlize their knowledge of the circle to the ellipse. The prmetric nd

More information

EQUATIONS OF LINES AND PLANES

EQUATIONS OF LINES AND PLANES EQUATIONS OF LINES AND PLANES MATH 195, SECTION 59 (VIPUL NAIK) Corresponding mteril in the ook: Section 12.5. Wht students should definitely get: Prmetric eqution of line given in point-direction nd twopoint

More information

Vectors 2. 1. Recap of vectors

Vectors 2. 1. Recap of vectors Vectors 2. Recp of vectors Vectors re directed line segments - they cn be represented in component form or by direction nd mgnitude. We cn use trigonometry nd Pythgors theorem to switch between the forms

More information

Space Vector Pulse Width Modulation Based Induction Motor with V/F Control

Space Vector Pulse Width Modulation Based Induction Motor with V/F Control Interntionl Journl of Science nd Reserch (IJSR) Spce Vector Pulse Width Modultion Bsed Induction Motor with V/F Control Vikrmrjn Jmbulingm Electricl nd Electronics Engineering, VIT University, Indi Abstrct:

More information

CHAPTER 11 Numerical Differentiation and Integration

CHAPTER 11 Numerical Differentiation and Integration CHAPTER 11 Numericl Differentition nd Integrtion Differentition nd integrtion re bsic mthemticl opertions with wide rnge of pplictions in mny res of science. It is therefore importnt to hve good methods

More information

Factoring Polynomials

Factoring Polynomials Fctoring Polynomils Some definitions (not necessrily ll for secondry school mthemtics): A polynomil is the sum of one or more terms, in which ech term consists of product of constnt nd one or more vribles

More information

QoS Mechanisms C HAPTER 3. 3.1 Introduction. 3.2 Classification

QoS Mechanisms C HAPTER 3. 3.1 Introduction. 3.2 Classification C HAPTER 3 QoS Mechnisms 3.1 Introduction In the previous chpter, we introduced the fundmentl QoS concepts. In this chpter we introduce number of key QoS mechnisms tht enble QoS services. At the end of

More information

COMPARISON OF SOME METHODS TO FIT A MULTIPLICATIVE TARIFF STRUCTURE TO OBSERVED RISK DATA BY B. AJNE. Skandza, Stockholm ABSTRACT

COMPARISON OF SOME METHODS TO FIT A MULTIPLICATIVE TARIFF STRUCTURE TO OBSERVED RISK DATA BY B. AJNE. Skandza, Stockholm ABSTRACT COMPARISON OF SOME METHODS TO FIT A MULTIPLICATIVE TARIFF STRUCTURE TO OBSERVED RISK DATA BY B. AJNE Skndz, Stockholm ABSTRACT Three methods for fitting multiplictive models to observed, cross-clssified

More information

Health insurance marketplace What to expect in 2014

Health insurance marketplace What to expect in 2014 Helth insurnce mrketplce Wht to expect in 2014 33096VAEENBVA 06/13 The bsics of the mrketplce As prt of the Affordble Cre Act (ACA or helth cre reform lw), strting in 2014 ALL Americns must hve minimum

More information

All pay auctions with certain and uncertain prizes a comment

All pay auctions with certain and uncertain prizes a comment CENTER FOR RESEARC IN ECONOMICS AND MANAGEMENT CREAM Publiction No. 1-2015 All py uctions with certin nd uncertin prizes comment Christin Riis All py uctions with certin nd uncertin prizes comment Christin

More information

Understanding Life Cycle Costs How a Northern Pump Saves You Money

Understanding Life Cycle Costs How a Northern Pump Saves You Money Understnding Life Cycle Costs How Nrn Pump Sves You Money Reference: Hydrulic Institute (www.s.g) Introduction Wht Life Cycle Cost (LCC) Clculting Totl LCC LCC Components Wht Life Cycle Cost Life Cycle

More information

Small Business Cloud Services

Small Business Cloud Services Smll Business Cloud Services Summry. We re thick in the midst of historic se-chnge in computing. Like the emergence of personl computers, grphicl user interfces, nd mobile devices, the cloud is lredy profoundly

More information

Babylonian Method of Computing the Square Root: Justifications Based on Fuzzy Techniques and on Computational Complexity

Babylonian Method of Computing the Square Root: Justifications Based on Fuzzy Techniques and on Computational Complexity Bbylonin Method of Computing the Squre Root: Justifictions Bsed on Fuzzy Techniques nd on Computtionl Complexity Olg Koshelev Deprtment of Mthemtics Eduction University of Texs t El Pso 500 W. University

More information

9 CONTINUOUS DISTRIBUTIONS

9 CONTINUOUS DISTRIBUTIONS 9 CONTINUOUS DISTIBUTIONS A rndom vrible whose vlue my fll nywhere in rnge of vlues is continuous rndom vrible nd will be ssocited with some continuous distribution. Continuous distributions re to discrete

More information

MATH 150 HOMEWORK 4 SOLUTIONS

MATH 150 HOMEWORK 4 SOLUTIONS MATH 150 HOMEWORK 4 SOLUTIONS Section 1.8 Show tht the product of two of the numbers 65 1000 8 2001 + 3 177, 79 1212 9 2399 + 2 2001, nd 24 4493 5 8192 + 7 1777 is nonnegtive. Is your proof constructive

More information

ORBITAL MANEUVERS USING LOW-THRUST

ORBITAL MANEUVERS USING LOW-THRUST Proceedings of the 8th WSEAS Interntionl Conference on SIGNAL PROCESSING, ROBOICS nd AUOMAION ORBIAL MANEUVERS USING LOW-HRUS VIVIAN MARINS GOMES, ANONIO F. B. A. PRADO, HÉLIO KOII KUGA Ntionl Institute

More information

PROF. BOYAN KOSTADINOV NEW YORK CITY COLLEGE OF TECHNOLOGY, CUNY

PROF. BOYAN KOSTADINOV NEW YORK CITY COLLEGE OF TECHNOLOGY, CUNY MAT 0630 INTERNET RESOURCES, REVIEW OF CONCEPTS AND COMMON MISTAKES PROF. BOYAN KOSTADINOV NEW YORK CITY COLLEGE OF TECHNOLOGY, CUNY Contents 1. ACT Compss Prctice Tests 1 2. Common Mistkes 2 3. Distributive

More information

LINEAR TRANSFORMATIONS AND THEIR REPRESENTING MATRICES

LINEAR TRANSFORMATIONS AND THEIR REPRESENTING MATRICES LINEAR TRANSFORMATIONS AND THEIR REPRESENTING MATRICES DAVID WEBB CONTENTS Liner trnsformtions 2 The representing mtrix of liner trnsformtion 3 3 An ppliction: reflections in the plne 6 4 The lgebr of

More information

Binary Representation of Numbers Autar Kaw

Binary Representation of Numbers Autar Kaw Binry Representtion of Numbers Autr Kw After reding this chpter, you should be ble to: 1. convert bse- rel number to its binry representtion,. convert binry number to n equivlent bse- number. In everydy

More information

Lecture 3 Gaussian Probability Distribution

Lecture 3 Gaussian Probability Distribution Lecture 3 Gussin Probbility Distribution Introduction l Gussin probbility distribution is perhps the most used distribution in ll of science. u lso clled bell shped curve or norml distribution l Unlike

More information

An Undergraduate Curriculum Evaluation with the Analytic Hierarchy Process

An Undergraduate Curriculum Evaluation with the Analytic Hierarchy Process An Undergrdute Curriculum Evlution with the Anlytic Hierrchy Process Les Frir Jessic O. Mtson Jck E. Mtson Deprtment of Industril Engineering P.O. Box 870288 University of Albm Tuscloos, AL. 35487 Abstrct

More information

Techniques for Requirements Gathering and Definition. Kristian Persson Principal Product Specialist

Techniques for Requirements Gathering and Definition. Kristian Persson Principal Product Specialist Techniques for Requirements Gthering nd Definition Kristin Persson Principl Product Specilist Requirements Lifecycle Mngement Elicit nd define business/user requirements Vlidte requirements Anlyze requirements

More information

Data replication in mobile computing

Data replication in mobile computing Technicl Report, My 2010 Dt repliction in mobile computing Bchelor s Thesis in Electricl Engineering Rodrigo Christovm Pmplon HALMSTAD UNIVERSITY, IDE SCHOOL OF INFORMATION SCIENCE, COMPUTER AND ELECTRICAL

More information

Algebra Review. How well do you remember your algebra?

Algebra Review. How well do you remember your algebra? Algebr Review How well do you remember your lgebr? 1 The Order of Opertions Wht do we men when we write + 4? If we multiply we get 6 nd dding 4 gives 10. But, if we dd + 4 = 7 first, then multiply by then

More information

Portfolio approach to information technology security resource allocation decisions

Portfolio approach to information technology security resource allocation decisions Portfolio pproch to informtion technology security resource lloction decisions Shivrj Knungo Deprtment of Decision Sciences The George Wshington University Wshington DC 20052 knungo@gwu.edu Abstrct This

More information

Or more simply put, when adding or subtracting quantities, their uncertainties add.

Or more simply put, when adding or subtracting quantities, their uncertainties add. Propgtion of Uncertint through Mthemticl Opertions Since the untit of interest in n eperiment is rrel otined mesuring tht untit directl, we must understnd how error propgtes when mthemticl opertions re

More information

Basic Analysis of Autarky and Free Trade Models

Basic Analysis of Autarky and Free Trade Models Bsic Anlysis of Autrky nd Free Trde Models AUTARKY Autrky condition in prticulr commodity mrket refers to sitution in which country does not engge in ny trde in tht commodity with other countries. Consequently

More information

2 DIODE CLIPPING and CLAMPING CIRCUITS

2 DIODE CLIPPING and CLAMPING CIRCUITS 2 DIODE CLIPPING nd CLAMPING CIRCUITS 2.1 Ojectives Understnding the operting principle of diode clipping circuit Understnding the operting principle of clmping circuit Understnding the wveform chnge of

More information

Integration by Substitution

Integration by Substitution Integrtion by Substitution Dr. Philippe B. Lvl Kennesw Stte University August, 8 Abstrct This hndout contins mteril on very importnt integrtion method clled integrtion by substitution. Substitution is

More information

Small Businesses Decisions to Offer Health Insurance to Employees

Small Businesses Decisions to Offer Health Insurance to Employees Smll Businesses Decisions to Offer Helth Insurnce to Employees Ctherine McLughlin nd Adm Swinurn, June 2014 Employer-sponsored helth insurnce (ESI) is the dominnt source of coverge for nonelderly dults

More information

Abstract. This paper introduces new algorithms and data structures for quick counting for machine

Abstract. This paper introduces new algorithms and data structures for quick counting for machine Journl of Artiæcil Intelligence Reserch 8 è998è 67-9 Submitted 7è97; published è98 Cched Suæcient Sttistics for Eæcient Mchine Lerning with Lrge Dtsets Andrew Moore Mry Soon Lee School of Computer Science

More information

AN ANALYTICAL HIERARCHY PROCESS METHODOLOGY TO EVALUATE IT SOLUTIONS FOR ORGANIZATIONS

AN ANALYTICAL HIERARCHY PROCESS METHODOLOGY TO EVALUATE IT SOLUTIONS FOR ORGANIZATIONS AN ANALYTICAL HIERARCHY PROCESS METHODOLOGY TO EVALUATE IT SOLUTIONS FOR ORGANIZATIONS Spiros Vsilkos (), Chrysostomos D. Stylios (),(b), John Groflkis (c) () Dept. of Telemtics Center, Computer Technology

More information

Hillsborough Township Public Schools Mathematics Department Computer Programming 1

Hillsborough Township Public Schools Mathematics Department Computer Programming 1 Essentil Unit 1 Introduction to Progrmming Pcing: 15 dys Common Unit Test Wht re the ethicl implictions for ming in tody s world? There re ethicl responsibilities to consider when writing computer s. Citizenship,

More information

Value Function Approximation using Multiple Aggregation for Multiattribute Resource Management

Value Function Approximation using Multiple Aggregation for Multiattribute Resource Management Journl of Mchine Lerning Reserch 9 (2008) 2079-2 Submitted 8/08; Published 0/08 Vlue Function Approximtion using Multiple Aggregtion for Multittribute Resource Mngement Abrhm George Wrren B. Powell Deprtment

More information

Integration. 148 Chapter 7 Integration

Integration. 148 Chapter 7 Integration 48 Chpter 7 Integrtion 7 Integrtion t ech, by supposing tht during ech tenth of second the object is going t constnt speed Since the object initilly hs speed, we gin suppose it mintins this speed, but

More information

** Dpt. Chemical Engineering, Kasetsart University, Bangkok 10900, Thailand

** Dpt. Chemical Engineering, Kasetsart University, Bangkok 10900, Thailand Modelling nd Simultion of hemicl Processes in Multi Pulse TP Experiment P. Phnwdee* S.O. Shekhtmn +. Jrungmnorom** J.T. Gleves ++ * Dpt. hemicl Engineering, Ksetsrt University, Bngkok 10900, Thilnd + Dpt.hemicl

More information

Bayesian Updating with Continuous Priors Class 13, 18.05, Spring 2014 Jeremy Orloff and Jonathan Bloom

Bayesian Updating with Continuous Priors Class 13, 18.05, Spring 2014 Jeremy Orloff and Jonathan Bloom Byesin Updting with Continuous Priors Clss 3, 8.05, Spring 04 Jeremy Orloff nd Jonthn Bloom Lerning Gols. Understnd prmeterized fmily of distriutions s representing continuous rnge of hypotheses for the

More information

EE247 Lecture 4. For simplicity, will start with all pole ladder type filters. Convert to integrator based form- example shown

EE247 Lecture 4. For simplicity, will start with all pole ladder type filters. Convert to integrator based form- example shown EE247 Lecture 4 Ldder type filters For simplicity, will strt with ll pole ldder type filters Convert to integrtor bsed form exmple shown Then will ttend to high order ldder type filters incorporting zeros

More information

Efficient load-balancing routing for wireless mesh networks

Efficient load-balancing routing for wireless mesh networks Computer Networks 51 (007) 50 66 www.elsevier.com/locte/comnet Efficient lod-blncing routing for wireless mesh networks Yigl Bejerno, Seung-Je Hn b, *,1, Amit Kumr c Bell Lbortories, Lucent Technologies,

More information

Numerical Methods of Approximating Definite Integrals

Numerical Methods of Approximating Definite Integrals 6 C H A P T E R Numericl Methods o Approimting Deinite Integrls 6. APPROXIMATING SUMS: L n, R n, T n, AND M n Introduction Not only cn we dierentite ll the bsic unctions we ve encountered, polynomils,

More information

FDIC Study of Bank Overdraft Programs

FDIC Study of Bank Overdraft Programs FDIC Study of Bnk Overdrft Progrms Federl Deposit Insurnce Corportion November 2008 Executive Summry In 2006, the Federl Deposit Insurnce Corportion (FDIC) initited two-prt study to gther empiricl dt on

More information

Decision Rule Extraction from Trained Neural Networks Using Rough Sets

Decision Rule Extraction from Trained Neural Networks Using Rough Sets Decision Rule Extrction from Trined Neurl Networks Using Rough Sets Alin Lzr nd Ishwr K. Sethi Vision nd Neurl Networks Lbortory Deprtment of Computer Science Wyne Stte University Detroit, MI 48 ABSTRACT

More information

TITLE THE PRINCIPLES OF COIN-TAP METHOD OF NON-DESTRUCTIVE TESTING

TITLE THE PRINCIPLES OF COIN-TAP METHOD OF NON-DESTRUCTIVE TESTING TITLE THE PRINCIPLES OF COIN-TAP METHOD OF NON-DESTRUCTIVE TESTING Sung Joon Kim*, Dong-Chul Che Kore Aerospce Reserch Institute, 45 Eoeun-Dong, Youseong-Gu, Dejeon, 35-333, Kore Phone : 82-42-86-231 FAX

More information

Performance analysis model for big data applications in cloud computing

Performance analysis model for big data applications in cloud computing Butist Villlpndo et l. Journl of Cloud Computing: Advnces, Systems nd Applictions 2014, 3:19 RESEARCH Performnce nlysis model for big dt pplictions in cloud computing Luis Edurdo Butist Villlpndo 1,2,

More information

VoIP for the Small Business

VoIP for the Small Business Reducing your telecommunictions costs VoIP (Voice over Internet Protocol) offers low cost lterntive to expensive trditionl phone services nd is rpidly becoming the communictions system of choice for smll

More information

Unleashing the Power of Cloud

Unleashing the Power of Cloud Unleshing the Power of Cloud A Joint White Pper by FusionLyer nd NetIQ Copyright 2015 FusionLyer, Inc. All rights reserved. No prt of this publiction my be reproduced, stored in retrievl system, or trnsmitted,

More information

Traffic Rank Based QoS Routing in Wireless Mesh Network

Traffic Rank Based QoS Routing in Wireless Mesh Network Trffic Rnk Bsed QoS Routing in Wireless Mesh Network Deep P Kmble #1, Sujth P Terdl *2 #1 Deprtment of Computer Science nd Engineering, Poojy Doddp App College of Engineering, Gulbrg, Krntk, Indi. *2 Deprtment

More information

Redistributing the Gains from Trade through Non-linear. Lump-sum Transfers

Redistributing the Gains from Trade through Non-linear. Lump-sum Transfers Redistributing the Gins from Trde through Non-liner Lump-sum Trnsfers Ysukzu Ichino Fculty of Economics, Konn University April 21, 214 Abstrct I exmine lump-sum trnsfer rules to redistribute the gins from

More information

Optimal Execution of Open-Market Stock Repurchase Programs

Optimal Execution of Open-Market Stock Repurchase Programs Optiml Eecution of Open-Mrket Stock Repurchse Progrms Jcob Oded This Drft: December 15, 005 Abstrct We provide theoreticl investigtion of the eecution of open-mrket stock repurchse progrms. Our model suggests

More information

ProfileMe: Hardware Support for Instruction-Level Profiling on Out-of-Order Processors

ProfileMe: Hardware Support for Instruction-Level Profiling on Out-of-Order Processors ProfileMe: Hrdwre Support for Instruction-Level Profiling on Out-of-Order Processors Jeffrey Den Jmes E. Hicks Crl A. Wldspurger Willim E. Weihl George Chrysos Digitl Equipment Corportion Abstrct Profile

More information

Humana Critical Illness/Cancer

Humana Critical Illness/Cancer Humn Criticl Illness/Cncer Criticl illness/cncer voluntry coverges py benefits however you wnt With our criticl illness nd cncer plns, you'll receive benefit fter serious illness or condition such s hert

More information

Recognition Scheme Forensic Science Content Within Educational Programmes

Recognition Scheme Forensic Science Content Within Educational Programmes Recognition Scheme Forensic Science Content Within Eductionl Progrmmes one Introduction The Chrtered Society of Forensic Sciences (CSoFS) hs been ccrediting the forensic content of full degree courses

More information

Software Cost Estimation Model Based on Integration of Multi-agent and Case-Based Reasoning

Software Cost Estimation Model Based on Integration of Multi-agent and Case-Based Reasoning Journl of Computer Science 2 (3): 276-282, 2006 ISSN 1549-3636 2006 Science Publictions Softwre Cost Estimtion Model Bsed on Integrtion of Multi-gent nd Cse-Bsed Resoning Hsn Al-Skrn Informtion Technology

More information

Novel Methods of Generating Self-Invertible Matrix for Hill Cipher Algorithm

Novel Methods of Generating Self-Invertible Matrix for Hill Cipher Algorithm Bibhudendr chry, Girij Snkr Rth, Srt Kumr Ptr, nd Sroj Kumr Pnigrhy Novel Methods of Generting Self-Invertible Mtrix for Hill Cipher lgorithm Bibhudendr chry Deprtment of Electronics & Communiction Engineering

More information

6.2 Volumes of Revolution: The Disk Method

6.2 Volumes of Revolution: The Disk Method mth ppliction: volumes of revolution, prt ii Volumes of Revolution: The Disk Method One of the simplest pplictions of integrtion (Theorem ) nd the ccumultion process is to determine so-clled volumes of

More information

piecewise Liner SLAs and Performance Timetagment

piecewise Liner SLAs and Performance Timetagment i: Incrementl Cost bsed Scheduling under Piecewise Liner SLAs Yun Chi NEC Lbortories Americ 18 N. Wolfe Rd., SW3 35 Cupertino, CA 9514, USA ychi@sv.nec lbs.com Hyun Jin Moon NEC Lbortories Americ 18 N.

More information

The Velocity Factor of an Insulated Two-Wire Transmission Line

The Velocity Factor of an Insulated Two-Wire Transmission Line The Velocity Fctor of n Insulted Two-Wire Trnsmission Line Problem Kirk T. McDonld Joseph Henry Lbortories, Princeton University, Princeton, NJ 08544 Mrch 7, 008 Estimte the velocity fctor F = v/c nd the

More information

Project Recovery. . It Can Be Done

Project Recovery. . It Can Be Done Project Recovery. It Cn Be Done IPM Conference Wshington, D.C. Nov 4-7, 200 Wlt Lipke Oklhom City Air Logistics Center Tinker AFB, OK Overview Mngement Reserve Project Sttus Indictors Performnce Correction

More information

Performance Prediction of Distributed Load Balancing on Multicomputer Systems

Performance Prediction of Distributed Load Balancing on Multicomputer Systems Performnce Prediction of Distributed Lod Blncing on Multicomputer Systems Ishfq Ahmd *, Arif Ghfoor+, nd Kishn Mehrotr * * School of Computer nd Informtion Science, Syrcuse University, Syrcuse, NY 13244

More information

Firm Objectives. The Theory of the Firm II. Cost Minimization Mathematical Approach. First order conditions. Cost Minimization Graphical Approach

Firm Objectives. The Theory of the Firm II. Cost Minimization Mathematical Approach. First order conditions. Cost Minimization Graphical Approach Pro. Jy Bhttchry Spring 200 The Theory o the Firm II st lecture we covered: production unctions Tody: Cost minimiztion Firm s supply under cost minimiztion Short vs. long run cost curves Firm Ojectives

More information

Cost Functions for Assessment of Vehicle Dynamics

Cost Functions for Assessment of Vehicle Dynamics Cost Functions for Assessment of Vehicle Dynmics Dzmitry Svitski Automotive Engineering Deprtment Ilmenu University of Technology Ilmenu, Germny dzmitry.svitski@tu-ilmenu.de Pvel Nedom, Jroslv Mchn Skod

More information

Reputation management for distributed service-oriented architectures

Reputation management for distributed service-oriented architectures Reputtion mngement for distributed service-oriented rchitectures Article Accepted version C. Crpnzno, F. Milzzo, A. De Pol, G. Lo Re In Proceedings of the Fourth IEEE Interntionl Conference on Self- Adptive

More information

Section 7-4 Translation of Axes

Section 7-4 Translation of Axes 62 7 ADDITIONAL TOPICS IN ANALYTIC GEOMETRY Section 7-4 Trnsltion of Aes Trnsltion of Aes Stndrd Equtions of Trnslted Conics Grphing Equtions of the Form A 2 C 2 D E F 0 Finding Equtions of Conics In the

More information

9.3. The Scalar Product. Introduction. Prerequisites. Learning Outcomes

9.3. The Scalar Product. Introduction. Prerequisites. Learning Outcomes The Sclr Product 9.3 Introduction There re two kinds of multipliction involving vectors. The first is known s the sclr product or dot product. This is so-clled becuse when the sclr product of two vectors

More information

Example A rectangular box without lid is to be made from a square cardboard of sides 18 cm by cutting equal squares from each corner and then folding

Example A rectangular box without lid is to be made from a square cardboard of sides 18 cm by cutting equal squares from each corner and then folding 1 Exmple A rectngulr box without lid is to be mde from squre crdbord of sides 18 cm by cutting equl squres from ech corner nd then folding up the sides. 1 Exmple A rectngulr box without lid is to be mde

More information

Exponential and Logarithmic Functions

Exponential and Logarithmic Functions Nme Chpter Eponentil nd Logrithmic Functions Section. Eponentil Functions nd Their Grphs Objective: In this lesson ou lerned how to recognize, evlute, nd grph eponentil functions. Importnt Vocbulr Define

More information

ENHANCING CUSTOMER EXPERIENCE THROUGH BUSINESS PROCESS IMPROVEMENT: AN APPLICATION OF THE ENHANCED CUSTOMER EXPERIENCE FRAMEWORK (ECEF)

ENHANCING CUSTOMER EXPERIENCE THROUGH BUSINESS PROCESS IMPROVEMENT: AN APPLICATION OF THE ENHANCED CUSTOMER EXPERIENCE FRAMEWORK (ECEF) ENHNCING CUSTOMER EXPERIENCE THROUGH BUSINESS PROCESS IMPROVEMENT: N PPLICTION OF THE ENHNCED CUSTOMER EXPERIENCE FRMEWORK (ECEF) G.J. Both 1, P.S. Kruger 2 & M. de Vries 3 Deprtment of Industril nd Systems

More information

Engineer-to-Engineer Note

Engineer-to-Engineer Note Engineer-to-Engineer Note EE-265 Technicl notes on using Anlog Devices DSPs, processors nd development tools Contct our technicl support t dsp.support@nlog.com nd t dsptools.support@nlog.com Or visit our

More information

NOTES. Cohasset Associates, Inc. 2015 Managing Electronic Records Conference 8.1

NOTES. Cohasset Associates, Inc. 2015 Managing Electronic Records Conference 8.1 Cohsset Assocites, Inc. Expnding Your Skill Set: How to Apply the Right Serch Methods to Your Big Dt Problems Juli L. Brickell H5 Generl Counsel MER Conference My 18, 2015 H5 POWERING YOUR DISCOVERY GLOBALLY

More information

Health insurance exchanges What to expect in 2014

Health insurance exchanges What to expect in 2014 Helth insurnce exchnges Wht to expect in 2014 33096CAEENABC 11/12 The bsics of exchnges As prt of the Affordble Cre Act (ACA or helth cre reform lw), strting in 2014 ALL Americns must hve minimum mount

More information

Understanding Basic Analog Ideal Op Amps

Understanding Basic Analog Ideal Op Amps Appliction Report SLAA068A - April 2000 Understnding Bsic Anlog Idel Op Amps Ron Mncini Mixed Signl Products ABSTRACT This ppliction report develops the equtions for the idel opertionl mplifier (op mp).

More information

High-Performance Hardware Monitors to Protect Network Processors from Data Plane Attacks

High-Performance Hardware Monitors to Protect Network Processors from Data Plane Attacks High-Perormnce Hrdwre Monitors to Protect Network Processors rom Dt Plne Attcks Hrikrishnn Chndrikkutty, Deepk Unnikrishnn, Russell Tessier nd Tilmn Wol Deprtment o Electricl nd Computer Engineering University

More information

Bandwidth Allocation for Best Effort Traffic to Achieve 100% Throughput

Bandwidth Allocation for Best Effort Traffic to Achieve 100% Throughput Bndwidth Alloction for Best Effort Trffic to Achieve 100% Throughput Msoumeh Krimi, Zhuo Sun, nd Deng Pn Florid Interntionl University, Mimi, FL E-mils: {mkri001, zsun003, pnd}@fiu.edu Abstrct Generlized

More information

SPECIAL PRODUCTS AND FACTORIZATION

SPECIAL PRODUCTS AND FACTORIZATION MODULE - Specil Products nd Fctoriztion 4 SPECIAL PRODUCTS AND FACTORIZATION In n erlier lesson you hve lernt multipliction of lgebric epressions, prticulrly polynomils. In the study of lgebr, we come

More information