Douglas W. Clark. Aiken Computation Lab. Cambridge, MA look only at performance, and in fact only at performance. architecture.

Size: px
Start display at page:

Download "Douglas W. Clark. Aiken Computation Lab. Cambridge, MA 02138. look only at performance, and in fact only at performance. architecture."

Transcription

1 Performance from Architecture: Comparing a RISC and a CISC with Similar Hardware Organization Dileep Bhandarkar Digital Equipment Corp. 146 Main Street (MLO5-2/G1) Maynard, MA Dougla W. Clark Aiken Computation Lab Harvard Univerity Cambridge, MA Abtract Performance comparion acro dierent computer architecture cannot uually eparate the architectural contribution from variou implementation and technology contribution to performance. Thi paper compare an example implementation from the RISC and CISC architectural chool (a MIPS M/2000 and a Digital VAX 8700) on nine of the ten SPEC benchmark. The organizational imilarity of thee machine provide an opportunity to examine the purely architectural advantage of RISC. The RISC approach offer, compared with VAX, many fewer cycle per intruction but omewhat more intruction per program. Uing reult from a oftware monitor on the MIPS machine and a hardware monitor on the VAX, thi paper how that the reulting advantage in cycle per program range from lightly under a factor of 2 to almot a factor of 4, with a geometric mean of 2.7. It alo demontrate the correlation between cycle per intruction and relative intruction count. Variou reaon for thi correlation, and for the conitent net advantage of RISC, are dicued. 1 Introduction The lat decade ha een the emergence and rapid ucce of Reduced Intruction Set Computer, or RISC, architecture. Following early work by Cray [32, 27] and Cocke [6, 7] and an implementation at IBM [25], univerity reearcher, epecially at Berkeley [23] and Stanford [16] developed deign principle, built proceor, and founded companie. Today the ucce of RISC architecture from SUN (the Berkeley-inpired SPARC deign), MIPS (the Stanfordinpired MIPS deign), and traditional emiconductor companie (Motorola, Intel) i evident big computer companie like IBM, Hewlett Packard, and Digital have alo embraced the concept. The RISC approach promie many advantage over Complex Intruction Set Computer, or CISC, architecture, including uperior performance, deign implicity, rapid development time, and other [19, 22]. Studying all of thee factor at once i beyond the cope of thi paper, which will on leave from Digital Equipment Corp., look only at performance, and in fact only at performance from the architectural perpective. That i, we will try to control for all inuence on performance other than architecture. We will do thi by tudying two machine, one from each architectural chool, that are trikingly imilar in hardware organization, albeit quite dierent intechnology and cot. We will how that thee dierence are not due to architecture. Our fundamental frame of reference will be the nowfamiliar expreion of performance a a product of the number of intruction executed, the average numberofmachine cycle needed to execute one intruction, and the cycle time: time program = intruction program cycle intruction time cycle We (along with many other) have found thi formulation to be a powerful tool for analyzing, comparing, and projecting proceor performance. The three term are function of variou apect of a ytem deign. The number of intruction executed i a function (for a xed algorithm and ource program) of the compiler and the target architecture, and i uually independent of the detailed hardware implementation and the technology. The machine' baic cycle time, however, i a function mot trongly of the underlying technology (gate peed, RAM peed, and o on), and alo of the hardware tructure or microarchitecture of the machine, particularly the degree of pipelining. The cycle time may alo be aected by the intruction-et architecture. The middle term average number of cycle per executed intruction, or CPI ha the mot complex determinant. The intruction-et architecture i a primary one: in a complex architecture like the VAX, there are individual intruction (uch acharacter-tring-move) whoe execution require hundred of cycle a RISC would accomplih the ame function with (ay) hundred of intruction each taking only one or two cycle. Another important determinant i the hardware organization, epecially the degree of pipelining and the tructure of the cache-memory ubytem. Finally, the compiler can aect thi factor too, through it choice of certain intruction equence over other, through the general quality of it code optimization, and (for ome architecture) through it ability tochedule intruction to avoid tall. The eence of the RISC performance objective i thi: compared with the CISC approach exemplied by VAX, intruction-et architecture hould facilitate implementation that achieve a gro reduction in cycle per intruction

2 MIPS M/2000 Intruction Fetch from I-Cache Read regiter, prepare I-tream contant ALU one cycle - TLB + D-Cache Write regiter with cache data or ALU reult VAX 8700 VAX intruction decode (optional) Microintruction Fetch from control tore Read regiter, prepare I-tream contant ALU TLB + Cache, write regiter with ALU reult Write regiter with cache data Figure 1: Simplied illutration of the two intruction pipeline. A new intruction (microintruction on the VAX) can tart every cycle. The VAX decode cycle i omitted when a microroutine i more than one microintruction long [4]. and poibly ome improvement in cycle time while allowing an increae in the number of intruction executed. The goal i a ubtantial net improvement in execution time. The qualitative evidence that thi goal ha been achieved i by now nearly overwhelming. What i lacking, though, i a careful architectural analyi, and that i what we intend to provide in thi paper. We will need to make two aumption for our tudy: rt, that the compiler are of equivalent quality and econd, that cycle time i not a function of architecture. We arenotentirely happy with the compiler aumption, particularly ince it i quite imprecie and dicult to meaure, but we did ue the bet available compiler for each machine. Our cycle time aumption i valid for technologie and deign approache in which the cycle time i determined by uch architecture-neutral thing a the time to get through an integer ALU and the time to read the rt-level cache. If, on the other hand, ome VAX-pecic function, uch ain- truction decoding or control-tore equencing, limit cycle time, then the neceary adjutment to our reult i a imple multiplication. In any event, we are not addreing the cycle time quetion here. In eence we are looking at thi architectural quetion: what performance advantage doe a RISC have over a VAX with the ame cycle time and imilar hardware organization, given good compiler for each machine? The next ection of thi paper dicue in more detail our two machine, the meaurement method ued for each, and the benchmark that were run. Section 3 preent the baic reult from our meaurement, including intruction count and average cycle per intruction for each machine. Section 4 i a dicuion of thee reult and of everal type of explanatory factor. Section 5 then briey conider variation on implementation tyle for both architecture and ummarize our baic reult, concluding the paper. 2 Apparatu and Method 2.1 The Machine We meaured Digital' VAX 8700 (a ingle proceor verion of the 8800) [4, 11, 30] againt MIPS Computer Sytem' MIPS M/2000 [19, 26]. We concede at the outet that thee two machine are very dierent in technology, ize, and cot: the VAX proceor i nine board full of ECL gate array the MIPS proceor i one board with two cutom CMOS chip. However, there i another VAX, the model 4000/300, whoe proceor i organizationally imilar to the 8700' and technologically imilar to the MIPS M/2000'. The exitence of thi VAX demontrate that the technology dierence between our two meaured machine i not a conequence of architecture. But why not compare the two CMOS machine directly? The main reaon i that only the 8700 had the hardware intrumentation demanded by our meaurement [5]. And in fact, a we will ee, the CMOS VAX' reemblance to the MIPS engine i omewhat le than the 8700'. There are trong organizational imilaritie between the VAX 8700 and the MIPS M/2000. Figure 1 i a impli- ed repreentation of the main CPU pipeline in the two machine. Both illutration have abtracted away ome half-cycle boundarie that appear in the actual hardware, but neither mirepreent the fundamental operation of the pipe. Both machine can iue a new intruction (microintruction on the VAX) every cycle. Figure 1 how that the pipeline match up quite cloely, with the obviou exception of the VAX intruction decode tage. But note that we are matching the MIPS intruction fetch tage with the VAX microintruction fetch tage. Indeed, the 8700 micro-engine hare with the MIPS implementation the following feature: a large et of general purpoe regiter ingle-cycle three-regiter intruction bypaing of ALU reult around the regiter le and to the ALU input o that a regiter can be read in the intruction immediately after the one in which it i written ingle-cycle load and tore intruction that make an addre by adding a diplacement to a regiter bypaing of cache read data around the regiter le and to the ALU input a one-cycle delay lot following a load that can be lled by any intruction not uing the loaded regiter and delayed branche (but the VAX delay i longer ee Section 4.3 below). Thi trong imilarity between MIPS intruction and VAX 8700 microintruction mean that the comparative performance challenge for thi VAX might be viewed a the problem of mapping VAX intruction into microintruction eciently. Awe will dicu in Section 4, ecient mapping i ometime eay but more often quite dicult. Both implementation repreent reaonable tate-of-theart \mid-range" technology. Even though the VAX 8700

3 Table 1: Machine Implementation Parameter VAX 4000/300 MIPS M/2000 VAX 8700 Chip Firt Silicon n/a Sytem Ship CPU REX520 R3000 n/a Technology Cutom CMOS Cutom CMOS ECL gate array Component count CPU 140K tranitor, 115K tranitor approx. 100 gate array, 180Kbit mem 1200 gate each FPU 134K tranitor 105K tranitor (included above) Feature ize 1.5 micron 1.2 micron Die ize CPU 12x12 mm 2 7.6x8.7 mm 2 n/a FPU 12.7x11 mm x12.6 mm 2 Cycle time 28 n. 40 n. 45 n. On-chip cache 2KB none n/a Board cache 128KBI+D 64 KB I, 64 KB D 64 KB I+D TLB 64 entrie 64 entrie 1024 entrie Page ize 512 byte 4Kbyte 512 byte Memory acce time 13 cycle 12 cycle 16 cycle FP multiply 15 cycle 5cycle 15 cycle FP Add 14 cycle 2cycle 11 cycle Lit price $100K $80K $492K Performance Overall SPECmark Integer SPECmark FP SPECmark ue ECL gate-array technology, an adaptation of it microarchitecture ha been implemented in a VLSI CMOS chip [2, 13] that appear in VAX 6000 Model 400 and VAX 4000 Model 300 ytem. Table 1 ummarize the alient implementation characteritic of our two machine together with the VAX 4000/300. The MIPS M/2000 and the VAX 4000/300 are both implemented in cutom CMOS technology, both having a one-chip CPU connected to a one-chip FPU. A direct comparion of thee machine would be complicated by the fact that one ha an on-chip cache and the other doe not. The VAX chip ue omewhat more tranitor, and the CPU ue additional bit of memory for it on-chip cache and microcode. Hence the cot of the VAX chip would be greater than the cot of the MIPS chip, if they ued the ame fabrication proce. We believe that the lower chip cot would be a mall part of the overall cot of a ytem ytem price, of coure, are determined by market factor and buine conideration. Digital' price for it 1990 worktation employing the VAX and MIPS chip are cloe: $12K for the VAXtation 3100/76 (6.6 SPECmark) and $15K for the DECtation 5000/200 (18.5 SPECmark). The VAX 8700 and the MIPS M/2000 have ditractingly imilar cycle time. Thi imilarity we regard merely a a coincidence it i the machine' organizational imilarity that we rely on to jutify our ide-by-ide comparion, not their cycle time. The MIPS machine ha a few advantage: it ha a eparate intruction cache, lightly fater main memory, and coniderably fater oating point. We will argue in Section 4 that the dierence in oating-point performance ha an architectural bai. The M/2000 allow ome overlap of oating-point intruction [19], wherea the VAXe have very minimal overlap. Thee factor hould all contribute to a lightly wider dierence in cycle per intruction between the MIPS ytem and the VAX ytem. 2.2 The Benchmark We ue the SPEC Releae 1 benchmark for our analyi [31]. SPEC i a non-prot corporation whoe member include major worktation and computer companie uch a Digital, HP, IBM, MIPS, Silicon Graphic, Sun, and other. SPEC wa founded to develop a tandard et of benchmark that are application baed. The rt releae ha been available ince October Ten benchmark were elected from a large number of propective candidate. Each repreent a real application or a ignicant kernel extracted from an application, run for an extended length of time, and put a reaonable load on mot modern ytem. Thee benchmark are much more meaningful meaure of CPU performance than \toy" benchmark (Tower of Hanoi, Puzzle, Dhrytone, Whettone, etc.) that have ometime been ued. All SPEC benchmark are portable, and the only program change allowed are SPEC-approved change for portability. They all produce ubtantially the ame anwer on all ytem teted. Reult are expreed in term of the SPECratio or performance relative to the VAX-11/780 for each benchmark. The geometric mean of all ten ratio i called SPECmark. The SPEC Releae 1 uite conit of four integer benchmark (gcc, epreo, eqntott, and li) written in C, and ix oating-point benchmark (pice, doduc, naa7, matrix300, fpppp, and tomcatv) written in Fortran. For detail on thee program, ee [31]. Even though pice wa meant tobea oating-point benchmark, the circuit being imulated reult in a fairly low ue of oating-point operation, and hould therefore be viewed a a mixed integer and oating-point

4 Table 2: RISC factor intruc. CPI RISC benchmark ratio MIPS VAX ratio factor pice2g matrix naa fpppp tomcatv doduc epreo eqntott li geo. mean benchmark [28]. We were not able to meaure gcc on our intrumented VAX 8700, o all of our reult are for the nine other benchmark only. Alo, our run of epreo ued jut one of the four input circuit (bca). We ued the mot up-to-date verion of compiler that were available to u in mid-1990 on both architecture: VAX Fortran V5.0-1 and VAX C V3.1 MIPS F77 v2.0 (v2.10 for matrix300) and CC v2.0. While we have een ome mall dierence in later verion of the compiler, only in the cae of matrix300 on MIPS did the dierence warrant repeating our meaurement. 2.3 The Monitor A hardware monitor deigned pecially for the VAX 8700 wa ued to meaure the SPEC benchmark in detail. Thi monitor, decribed in [5], ue the micro-pc hitogram technique introduced in [14]: a real-time count ikept for each microintruction, and in every cycle the microintruction then in execution in the ALU ha it count incremented. A microcoded machine uch a the VAX 8700 can reveal a great deal of it detailed behavior in thi way claication of the microaddree into appropriate group allow many thing to be meaured. Since the monitor provide count of all cycle and of all intruction, CPI can be calculated directly. Two toolwere ued on MIPS M/2000 ytem to produce execution prole of the SPEC benchmark: Pixie and Pixtat [21]. Pixie read an executable program, partition it into baic block, and write an equivalent program containing additional code that count the execution of each baic block. When thi Pixie-generated program i run, it generate a le containing the baic block count. Then Pixtat analyze the program execution and produce a report on opcode frequencie and variou other thing. CPI i calculated by dividing the CPU time in cycle from an unintrumented run by Pixtat' report of the intruction count (which exclude NOP). 3 Reult 3.1 Intruction and CPI Table 2 how that the chief architecturally-directed performance goal of the RISC approach ha been achieved for the MIPS deign (given the compiler). It how that for all of the SPEC benchmark, average CPI on the MIPS M/2000 i much le than on the VAX The number of intruction, on the other hand, ha increaed, but not nearly a much. The intruction ratio in the table i jut the ratio of MIPS intruction execution to VAX intruction execution, and i alway greater than 1, ranging from a little over 1 to nearly 4, with a geometric mean of The CPI ratio i average VAX CPI divided by average MIPS CPI (we dene it thi way tomake both ratio be greater than 1). It i never lower than 3, goe a high a 10.45, and ha a geometric mean over the nine program of The combined eectofthetwo ratio the net eect on performance i what we call the RISC factor: it i the ratio of the number of cycle per program on the VAX to the correponding number on the MIPS. It i alo obviouly jut the CPI ratio divided by the intruction ratio. Thi factor range from jut under 2 to jut under 4, with a geometric mean of In Table 2 and ubequent table we rank the benchmark in order of increaing RISC factor. Let u look rt at CPI. Both architecture diplay a wide pread of value, panning a range of about 3:1 for MIPS and 4:1 for VAX. The heavy oating-point benchmark have quite large CPI on the VAX, due to the oating-point hardware (Table 1) pice tand out becaue it actually doe very little oating point (Table 3, below). It would be quite mileading to ue the geometric mean of CPI a \typical" gure without reference to the pecic nine program they repreent. Depite the wide variance of intruction and CPI ratio, the RISC factor pan a range of jut under 2:1. The three highet RISC factor are attached to the three integer benchmark, which have the three lowet intruction ratio but only mean-valued CPI ratio. The three lowet RISC factor, on the other hand, come from benchmark that have three of the four lowet CPI ratio but mean-valued intruction ratio. In the middle of Table 2 lie the three benchmark with the highet value of both ratio. The correlation between intruction and CPI ratio i a central reult of thi paper, and will be dicued further below. 3.2 Operation count Table 3 how the execution frequency of oating-point intruction on the twoarchitecture. The MIPS frequency i alway lower than VAX becaue the MIPS architecture require load and tore intruction where the VAX ue operand pecier, whoe execution i charged to the oating-point intruction in which they appear. The RISC factor i clearly not a function of the oating-point percentage on either machine. Except for doduc, the raw number of oating-point intruction i eentially the ame between the two architecture, a indeed it ought tobeifthetwo Fortran compiler do an equally good job. The extra MIPS intruction in doduc ugget that the MIPS compiler mied ome optimization that the VAX compiler found. Table 3 alo report the number of load and tore per intruction together with the raw count of each operation on MIPS relative tovax. VAX almot alway doe more memory reference the exception i tore in fpppp. One explanation for the extra reference i the maller number of general regiter and the lack of oating-point regiter on the VAX, a point we will dicu in Section 4. A a rule the oating-point benchmark do more load and tore than the integer one both machine have 32-bit data path and o need two memory reference for a double-preciion operand. There i a wide range of load and tore per intruction, and nothing in the table i correlated with RISC factor. Only in li i a

5 Table 3: Floating-point operation and 32-bit load/tore oating-point operation 32-bit load 32-bit tore per intruction MIPS count per intruction MIPS count per intruction MIPS count RISC benchmark MIPS VAX (VAX=1) MIPS VAX (VAX=1) MIPS VAX (VAX=1) factor pice2g matrix naa fpppp tomcatv doduc epreo eqntott li Table 4: Cache behavior D-tream cache read mie I-tream cache mie mi ratio (%) per intruction MIPS count per intruction MIPS count RISC benchmark MIPS VAX MIPS VAX (VAX=1) MIPS VAX (VAX=1) factor pice2g matrix naa fpppp tomcatv doduc epreo eqntott li ignicant percentage of the VAX reference attributable to regiter aving and retoring in the procedure linkage intruction (48 percent of all load and tore). 3.3 Cache behavior Table 4 report the cache behavior of the nine benchmark on the two machine. The VAX reult come from the hardware monitor, which i attached not only to the micro-pc but alo to the memory bu [5] the MIPS reult come from cache imulation [20]. All three of the cache (mixed Intruction and Data on the VAX, eparate on MIPS) are 64 KByte, direct-mapped, and write-through (except the MIPS I-cache), with 64-byte block. SPEC benchmark cache performance in other conguration ha been invetigated by Pnevmatikato and Hill [24]. There i a relationhip between the RISC factor and the D-tream mi ratio, particularly on the VAX: roughly peaking, higher mi ratio are attached to lower RISC factor. In particular, the three benchmark with the highet mi ratio on both machine alo have the three lowet RISC factor. Thee three alo have three of the four highet relative count of mie on MIPS. The compelling explanation for the low RISC factor i of coure the fact that a cache mi of xed delay degrade the performance of a low-cpi RISC machine more than it doe a high-cpi VAX. The I-tream i much le important than the D-tream for almot all benchmark on both machine. Particularly in the MIPS M/2000, with it eparate I-cache, the I-tream cache behavior i excellent. The VAX implementation, with it hared cache, experience many more I-tream mie, but the eect i till mall: the program with the highet percentage of cycle lot to I-tream tall i li, which loe only 4 percent. The next-highet I-tream tall gure i 1.8 percent. One might aume that the MIPS D-tream mi ratio would be conitently lower than the VAX one, given the eparate D-cache. But Table 4 how that the MIPS number i actually wore on four benchmark and cloe on a fth. While detailed cache behavior i often quite incrutable, there i an intuitive explanation for thi. VAX load outnumber MIPS load in large part becaue VAX ha fewer regiter, and o the \extra" load are often reference to data that the MIPS compiler keep in regiter. If the compiler' judgement i good, then thee load ought to be more likely to hit in the VAX cache than the ret of the load. Thi eect would be tronget when the VAX I-tream i not a major factor in cache performance, and in fact Table 4 how that for the mot part mall VAX I-tream mi rate come from program in which the MIPS D-tream mi ratio i above or cloe to the VAX' (the exception i epreo). 4 Dicuion Figure 2 illutrate the relationhip between the intruction ratio and the CPI ratio. A we pointed out earlier, the RISC factor itelf ha lower variance than either of it contituent thi i illutrated in the gure by the tendency of the point to cluter around a ingle line of contant relative performance, namely the line MIPS = 2:66 VAX. The correlation ha a imple and natural explanation: given reaonable compiler, higher VAX CPI hould correpond to a higher relative intruction count on MIPS. In thi ection we will explore the correlation of the ratio, conider why RISC ha a ignicant net advantage, and look at explanation for what variance there i in RISC factor.

6 I N S T R A T I O MIPS =1 VAX 2 fpppp ; ;; tomcatv ; ;;; pice2g6 doduc matrix300 naa7 epreo li ; ;;; eqntott ; ;;; CPI RATIO 3 4 Figure 2: Intruction ratio veru CPI ratio. Line of contant RISC factor are hown. 4.1 Exploring the extreme Anumber of factor are at work in Figure 2. Some help explain the tradeo between MIPS intruction and VAX CPI, while other help explain the conitent net advantage of MIPS. There are even a few factor that favor VAX. Before conidering carefully thee variou factor we will take a cloer look at two of the SPEC benchmark, fpppp and eqntott. Benchmark fpppp ha the highet CPI ratio and the highet intruction ratio of any ofthebenchmark eqntott i jut the revere. Neither one, however, ha the highet or lowet CPI on either machine, and neither ha the highet or lowet RISC factor. Benchmark fpppp ha extraordinary intruction and CPI ratio: the MIPS intruction count i nearly 4 time the VAX count, and the 8700' average CPI i over 10 time the M/2000'! Our meaurement how that thi program ha the highet number of operand pecier per VAX intruction of any benchmark (Figure 3, below), the highet number of load per intruction in both architecture (Table 3), and the highet frequency of oating-point operation on VAX (Table 3). Becaue the number of load i imilar, and the number of oating-point operation nearly identical on the two architecture, it i reaonable to imagine a correpondence between a VAX oating-point intruction and a equence of MIPS intruction. Suppoe the operand are in memory on both architecture. Then the VAX will load it double-preciion operand with operand-pecier microcode, whoe cycle of execution are charged to the oating-point intruction. The MIPS machine will intead do two ingle-cycle 32-bit load intruction per double-preciion operand, followed by a oatingpoint intruction that operate on regiter. Any neceary addre calculation that can be done in operand pecier would further increae the MIPS intruction count and the VAX CPI. If the reult need to go to memory, the VAX will again ue a multiple-cycle operand pecier microroutine and charge the cycle to the oating-point intruction. The MIPS machine will do two ingle-cycle tore, poibly urrounded by addre arithmetic intruction. Compared with the other benchmark, fpppp will ee thee eect more trongly becaue of it large number of load and high denity of (double-preciion) operand pecier. The reult i an unuually high intruction ratio and CPI ratio. If thi were the entire tory, fpppp' RISC factor would be 1.0 and not 2.7. The main explanation i the relative performance of the oating-point hardware. The MIPS implementation i much fater (ee Table 1), and alo allow ome intruction overlap. The VAX pend more than half it CPI in oating-point intruction execution (not counting operand pecier) and ha only trivial intruction overlap. Other poible contributing factor are the eect of the larger number of regiter and the fater MIPS branche (ee below) but ince the number of load i cloe between the two machine, and the number of branche quite mall, we believe thee eect are much maller than the eect of the oating-point hardware. Benchmark eqntott i very dierent from fpppp. It ha the lowet CPI ratio and the lowet intruction ratio of all nine benchmark. In fact the two machine execute almot the ame number of intruction (Table 2). For thi program, then, we need to nd explanation that raie VAX CPI without imultaneouly raiing the MIPS intruction count. VAX operand pecier once again explain a good deal. Eqntott ha the lowet number of operand pecier per VAX intruction of any of the benchmark (Figure 3), and alo ha a very mall number of load and tore (Table 3). So to the extent thatwe can fairly imagine a VAX intruction mapping into ome equence of MIPS intruction, what i happening here i exactly the oppoite of what happened in fpppp. That i, operand pecier proceing doe not correpond to extra MIPS intruction very often. Alo, the frequent ue of regiter increae VAX CPI without increaing MIPS intruction count becaue the 8700 uually ue a eparate cycle for each regiter operand. A two-regiter integer add, for example, take one intruction on both architecture, but three cycle on the VAX 8700 veru MIPS' one. Although the number of load i mall, VAX doe almot twice a many a MIPS, raiing the VAX CPI and providing evidence that thi benchmark benet from the larger number of regiter in MIPS. Finally, both

7 I N S T rdoduc r pice2g6 fpppp rmatrix300 rnaa7 R rli repreo A reqntott 1 T I O OPERAND SPECIFIERS PER VAX INSTRUCTION r tomcatv r Figure 3: The correlation between the number of operand pecier per VAX intruction and the intruction ratio implementation of eqntott branch very frequently, which i relatively bad for VAX CPI, ince imple branche take more cycle on the VAX Architectural factor with compenating inuence We will now conider more cloely the factor we have encountered in looking at fpppp and eqntott, beginning with thoe that have compenating inuence on the two architecture: about the ame cot in MIPS intruction and VAX CPI. VAX operand pecier: load and tore. Mot VAX memory reference and load of immediate data are done by operand pecier microcode. Some of thee are quite imple, loading a ingle I-tream contant, ay, or uing the content of a regiter to addre memory. The MIPS architecture would need to ue eparate load and tore intruction to accomplih the ame function. Some pecier do variou kind of addre calculation (indexing, auto-increment, and o on) that take multiple VAX cycle and would correpond to multiple MIPS intruction. And nally, doublepreciion operand are loaded and tored by ingle(twocycle) operand pecier on VAX, where they would (in the imple cae) taketwo intruction on MIPS. The average number of operand pecier per VAX intruction i in fact correlated with intruction ratio, a hown in Figure 3. Fancy VAX intruction: neceary functionality. Some VAX intruction perform function more ophiticated than MIPS can accomplih in a ingle intruction. Loop control intruction, for example, increment the loop index, tet it againt a limit, and do a conditional branch. When the ame or a imilar function i required on MIPS, it will ue multiple intruction. If the VAX microcode and the MIPS equence ue the ame algorithm, we have, again, compenating eect on intruction ratio and CPI ratio. 4.3 Architectural factor favoring MIPS A number of factor contribute to the conitent net advantage of the M/2000. Mot reult in increaed VAX CPI, and two (number of regiter and branch diplacement ize) can alo inate the VAX intruction count. Operand pecier decoding. The VAX 8700 (and mot other model) uually take at leat one cycle to proce each operand pecier. When the pecier reference memory, there i a compenating inuence on MIPS intruction count. But for regiter and literal pecier, thi imply mean more VAX CPI without a matching eect on MIPS. A three-regiter integer add, for example, take four cycle on the 8700 but jut one on the MIPS machine. Number of regiter. The MIPS architecture ha 32 (32- bit wide) general regiter and 16 (64-bit wide) oatingpoint regiter VAX ha 15 (32-bit wide) general regiter that can be ued for both integer and oating-point data. Thi can obviouly lead to more memory reference on the VAX (done either with operand pecier, or with intruction, if an operand i to be loaded into a regiter and reued, or a reult aved), while having no compenating eect on MIPS. Thee extra memory reference take cycle to execute and may cot till more cycle if they mi in the cache or tall for ome other reaon. Floating-point hardware and intruction overlap. The ue of a large and eparate et of oating-point regiter help MIPS, epecially in late-1980 CMOS, where the oatingpoint unit i not in the ame chip a the CPU. Floating point operation can be performed without requiring data to be moved between chip. In a VAX microproceor implementation uch a the 6000/400 or the 4000/300, everal cycle are required to move both ource operand from the CPU into the FPU, and read the reult back into the CPU. For example, in thee VAXe the actual oating-point multiply take only ve cycle inide the FPU compared to the fteen cycle required for the entire multiply intruction. Since VAX ue the ame regiter for integer and oating point, ignicant overlapping of intruction would require complex regiter coreboarding. Thu the conguration of regiter i an architectural dierence with ignicant performance conequence when the FPU i not integrated within thecpu.having only regiter detination for oating-point intruction i another uch dierence becaue of thi it i much eaier to overlap execution of multi-cycle intruction on MIPS. Simple jump and branche. The time for the implet taken branch (or unconditional jump) on the VAX 8700 i ve cycle. On MIPS, which ha a delayed branch, it i one cycle if the delay lot i lled, and two otherwie. Thi dierence i due in large part to the VAX condition code, which are et in a late pipeline tage and inuence the earliet pipe tage (intruction decode) when a conditional branch i done, thereby creating a pipeline bubble. Thi bubble cannot be lled by other non-branch intruction becaue the condition code are et by almot every VAX intruction [9]. Thi in turn mean that adding an intruction cache would not pay unle branch prediction hardware were added too. The rarer unconditional jump could prot from an I-cache, but thi wa not reaon enough to jutify one in the 8700, and o thee jump alo take ve cycle. MIPS conditional branche intead ue the condition of a regiter, which i read in an early pipe tage, and which, of coure, i not changed by intruction inerted between the write of the regiter and the branch. Independent of the ue of the MIPS branch-delay lot, which we regard a a eparate eect (ee below), the lower branche cot VAX CPI. Dierent VAXe may have dierent implementation of the branch intruction, of coure, but it i dicult to ee how anyvax could achieve the MIPS peed without lot of extra hardware (e.g., branch prediction). Fancy VAX intruction: unneceary overhead and wated generality. Some complex VAX intruction imple-

8 ment functionality that i imply not needed, or i too general, or both. Perhap in ome of thee cae the VAX compiler could ue impler intruction, but where they do not, we have an eect on VAX CPI with no increae in MIPS intruction count. The claic example of thi i the VAX procedure call and return intruction. Sometime the extra overhead include memory reference, a in the procedure intruction, where regiter are ometime aved and retored needlely. Intruction cheduling: lled delay lot. The MIPS architecture allow intruction to be inerted in code poition that might otherwie be lot to pipeline delay. The intruction after a conditional branch i alway executed and the intruction after a load can do anything except reference the loaded regiter [19]. Thi ability i not preent inthevax architecture (although the 8700 microcode ue both delay lot when it can). Sometime the branch-delay or loaddelay lot cannot be ued, and mut be lled by a NOP. But when the delay lot i lled by a ueful intruction, the eect i a relative decreae in MIPS CPI. Tranlation buer. The MIPS architecture ha a much larger page ize, which mean, among other thing, that a MIPS TLB can map much more memory than a VAX TLB with the ame number of entrie. (The M/2000' mall TLB map one-half the memory of the 8700' much larger TLB.) Alo, MIPS TLB entrie are tagged with a proce ID, which mean that the TLB need not be uhed on a proce context witch. The uual arrangement onvaxe i to uh the proce half of the TLB on a context witch. Branch diplacement ize. Simple conditional branch intruction have 8-bit PC diplacement in the VAX architecture, and eectively 18-bit one in MIPS. When 8 bit i too few and 18 i enough, a VAX program will ue an extra intruction. 4.4 Architectural factor favoring VAX There are in fact twoarchitectural feature that favor VAX in thi comparion. Neither appear to have a ignicant eect in the SPEC benchmark. Big I-tream contant. The VAX architecture include addre diplacement and abolute addree of 32 bit, and immediate data of whatever ize the opcode demand. It i poible to implement the delivery of a 32-bit I-tream contant o that it i a fat a the delivery of a 16-bit or 8-bit contant. When a big diplacement, abolute addre, or large data contant ineededby the program but not available in a regiter, the MIPS architecture would ue two intruction in the imple cae, veru the VAX' one-cycle operand pecier. Not-taken branche. VAX implementation can eaily make not-taken conditional branche execute in one cycle (the 8700 doe thi). The MIPS architecture require the execution of one intruction after a conditional branch, and when that intruction i a NOP, the eective cot of the branch itwo cycle. 4.5 Variance of the RISC factor No ingle phenomenon explain the variance of the program' RISC factor around the mean of 2.66, but there are a couple of uggetive eect. The oating-point benchmark do relatively better on the VAX, the integer one on MIPS. However, the percentage of oating point (Table 3) eem not to be relevant: the lowet RISC factor, for example, i attached to the program (pice) with the mallet amount of oating point (leaving out the integer benchmark) the bigget oating-point percentage go with program with mean RISC factor (fpppp and tomcatv). All of the oatingpoint benchmark are written in Fortran and all the integer one in C, o in fact we can't dientangle the contribution of the compiler dierence from the contribution of oating point, but it eem likely to u that the eect of the compiler by itelf i mall. Both machine' cache behavior eem looely correlated with RISC factor, a i hown in Table 4. The D-tream cache mi ratio, epecially in the VAX, fall a the RISC factor rie, with a few exception in each architecture. There are ome peculiaritie of the two program with extreme RISC factor. Li ha the highet RISC factor, and tand out from the other benchmark in everal way: it ha the lowet (VAX) and econd-lowet(mips) D- tream cache mi ratio it pend the greatet percentage of it VAX cycle in the procedure call and return intruction (28 percent of all cycle, compared with the econd-highet value, 7.5 percent, for epreo) and it ha by far the highet proportion of addreunaligned memory reference in the VAX, which are handled by cotly microcode trap in the Spice ha the lowet RISC factor, and it own pecularitie. Saavedra-Barrera ha oberved that the particular input circuit ued in the SPEC verion caue pice to pend an unuually large amount of time in one mall integer routine [28]. We have already een that pice ha the highet D- tream mi ratio, with the MIPS value being quite high (26.9 percent). It alo ha the lowet number of load per intruction on MIPS, o that the high mi ratio hurt le than it otherwie might. 5 Concluion We now peculate briey on future implementation direction for each architecture, and then ummarize the paper. 5.1 Future CPI i a function of a computer' architecture, but alo of it hardware implementation, of coure. The VAX 8700 deigner trove to minimize cycle time at the poible expene of cycle per intruction, uing a traightforward pipelined microengine. It i poible to reduce VAX CPI further by adding gate (and complexity and cot). High-end VAX implementation uch a the model 8600 [8, 10] and 9000 [15, 12] attempt to do jut that. The model 9000, in particular, ue a large amount of logic (roughly one million gate-array gate for the ytem [1]) to achieve the lowet CPI of any VAX, a hown in Figure 4. The CPI improvement i the highet for the oatingpoint benchmark. The VAX 9000 attempt to iue imple (but multi-pecier) VAX intruction at the rate of one per cycle, and include the neceary regiter coreboarding and other hardware feature to allow ubtantial oating-point intruction overlap. The reult i a demontration that a large number of gate can yield a VAX implementation with

9 C P I VAX 8700 VAX 9000 pice2g6 matrix300 naa7 fpppp tomcatv doduc epreo eqntott li geo. mean Figure 4: CPI on two VAX implementation cycle per program comparable to a imple RISC implementation. It eem likely, however, that uch an implementation would not be able to achieve the cycle time that a RISC deign could, in the ame technology. A gate denitie increae, it i conceivable that ome future ingle-chip CMOS VAX implementation might achieve CPI number that are cloe to the VAX 9000'. Jut a VAX CPI can be improved by the gate-intenive approach of the model 9000 deign, o RISC CPI can be improved by upercalar or uperpipelined deign [18, 29]. The IBM RISC Sytem/6000 [17], for example, ha a peak iue rate of four intruction per cycle. So while VAX may \catch up" to current ingleintruction-iue RISC performance, RISC deign will puh on with earlier adoption of advanced implementation technique, achieving till higher performance. The VAX architectural diadvantage might thu be viewed a a time lag of ome number of year. 5.2 Summary and caveat In thi paper we have attempted to iolate architecture from implementation in our examination of organizationally imilar RISC and CISC engine. The RISC, the MIPS M/2000, ha ignicantly higher architecturally-determined performance than the CISC, the Digital VAX 8700, on the SPEC benchmark. We oberved a wide variability in both intruction ratio and CPI ratio, but found that thee two ratio are correlated. A the following table how, the pan of the net performance advantage what we called the RISC factor i ignicantly narrower than the pan of either ratio: min geo. mean max VAX CPI MIPS CPI CPI ratio (VAX/MIPS) Int. ratio (MIPS/VAX) RISC factor We examined a number of architectural factor that help Three caveat go along with our reult. Firt, we cannot eaily dientangle the inuence of the compiler from the inuence of the architecture. Thu, trictly peaking, our reult do not compare the VAX and MIPS architecture per e, but rather the combination of architecture with compiler. We have aumed that the compiler quality (in term of generated code peed) i the \ame" for both, while at the ame time demontrating occaional intance of quality difference. So contrary to our aumption, it may very well be that compiler dierence, not architecture, are reponible for ome of the performance dierence we meaured. Second, we meaured a rather mall number of program. Meaurement that attempt to characterize machine broadly hould be baed on much more data. It would be deirable, too, to have a wider variety of programming language and application repreented in the et. Finally, wehave looked in thi paper at application-level proceor performance only. At the ytem level, other architectural factor may aect relative performance. Anderon et al. [3] have recently tudied ome operating ytem primitive and found that the performance of thee primitive on RISC, a compared to VAX, ha not caled with application program performance. And of coure the I/O ytem will determine the performance of ome program, quite independent of proceor architecture. But while our quantitative reult maychange omewhat a compiler evolve, a more program are meaured, and a operating-ytem eect are included, we believe that the fundamental nding will tand up: from the architectural point of view (that i, neglecting cycle time), RISC a exemplied by MIPS oer a ignicant proceor performance advantage over a VAX of comparable hardware organization. Acknowledgment. We would like to thank Rajeh Kothari and Simon Steely for their aitance in performing the meaurement, Earl Killian for providing cache imulation reult for the M/2000, and John DeRoa, Joel Emer, Bob Sproull, Bob Supnik, and an anonymou referee for their comment on an earlier draft of thi paper. explain the variance of the ratio, and the overall advantage of MIPS.

10 Reference [1] Adiletta, M.J., et al. Semiconductor Technology in a High-performance VAX Sytem. Digital Technical Journal 2, 4(Fall 1990), pp [2] Allmon, R. et al. CMOS Implementation of a 32b Computer ISSCC Technical Diget, Feb. 1989, pp [3] Anderon, T.E., Levy, H.M., Berhad, B.N., and Lazowka, E.D. The Interaction of Architecture and Operating Sytem Deign. Proc. Fourth Int. Conf. on Architectural Support for Prog. Lang. and Op. Syt., ACM/IEEE, Palo Alto, CA, April 1991, to appear. [4] Clark, D.W. Pipelining and Performance in the VAX Proc. Second Int. Conf. on Architectural Support for Prog. Lang. and Op. Syt., ACM/IEEE, Palo Alto, CA, Oct. 1987, pp [5] Clark, D.W., Bannon, P.J., and Keller, J.B. Meauring VAX 8800 Performance with a Hitogram Hardware Monitor. Proc. 15th Annual International Sympoium on Computer Architecture, Honolulu, May 1988, pp [6] Cocke, J. The Search for Performance in Scientic Proceor. Comm. ACM 31, 3 (March 1988), pp [7] Cocke, J. and Marktein, V. The evolution of RISC Technology at IBM. IBM J. of Reearch and Dev. 34, 1 (Jan. 1990), pp [8] DeRoa, J., Glackemeyer, R., and Knight, T. Deign and Implementation of the VAX 8600 Pipeline. Computer 18, 5 (May 1985), pp [9] DeRoa, J. and Levy, H.M. An Evaluation of Branch Architecture. Proc. 14th Annual International Sympoium on Computer Architecture, Pittburgh, PA, June [10] Digital Equipment Corp. Digital Technical Journal 1 (Aug. 1985), DEC, Maynard, MA. Thi entire iue deal with the VAX [11] Digital Equipment Corp. Digital Technical Journal 4 (Feb. 1987), DEC, Maynard, MA. Thi entire iue deal with the VAX 8800 family. [12] Digital Equipment Corp. Digital Technical Journal 2, 4(Fall 1990), DEC, Maynard, MA. Thi entire iue deal with the VAX [13] Durdan, W.H. et al. An Overview of the VAX 6000 Model 400 Chip Set. Digital Technical Journal 2, 2 (Spring 1990), Digital Equipment Corp., Maynard, MA, pp [14] Emer, J.S. and Clark, D.W. A Characterization of Proceor Performance in the VAX-11/780. Proc. 11th Annual International Sympoium on Computer Architecture, Ann Arbor, MI, June 1984, pp [15] Foum, T. and Fite, D. Deigning a VAX for High Performance. Compcon Spring 90, IEEE, San Francico, 1990, pp [16] Henney, J.L., et al., The MIPS Machine. Proc. Compcon Spring 82, IEEE, San Francico, [17] International Buine Machine Corp. Journal of Reearch and Development 34, 1 (Jan. 1990). Thi entire iue deal with the IBM RISC Sytem/6000. [18] Jouppi, N.P. and Wall, D.W. Available Intruction- Level Parallelim for Supercalar and Superpipelined Machine. Proc. Third Int. Conf. on Architectural Support for Prog. Lang. and Op. Syt., ACM/IEEE, Boton, MA, April 1989, pp [19] Kane, G. MIPS R2000 RISC Architecture. Englewood Cli, NJ: Prentice-Hall, [20] Killian, E. MIPS cache imulation reult. Peronal communication, Nov [21] MIPS Computer Sytem, Inc. MIPS Language Programmer' Guide, [22] Patteron, D.A. Reduced Intruction Set Computer. Comm. ACM 28, 1 (Jan. 1985), pp [23] Patteron, D.A. and Sequin, C. RISC-1: A Reduced Intruction Set VLSI Computer. Proc. 8th Annual International Sympoium on Computer Architecture, Minneapoli, May 1981, pp [24] Pnevmatikato, D.N. and Hill, M.D. Cache Performance of the Integer SPEC Benchmark on a RISC. ACM Comp. Arch. New 18, 2 (June 1990), pp [25] Radin, G. The 801 Minicomputer. Proc. Symp. on Architectural Support for Prog. Lang. and Op. Syt., ACM/IEEE, Palo Alto, CA, March 1982, pp [26] Riordan, T., et al. Deign Uing the MIPS R3000/R3010 RISC Chipet. Proc. Compcon Spring 89, IEEE, San Francico, Spring [27] Ruell, R.M. The Cray-1 Computer Sytem. Comm. ACM 21, 1 (Jan. 1978), pp [28] Saavedra-Barrera, R.H. The SPEC and Perfect Club Benchmark: Promie and Limitation. Hot Chip Sympoium 2. Santa Clara, CA, Aug [29] Smith, M.D., Johnon, M., and Horowitz, M.A. Limit on Multiple Intruction Iue. Proc. Third Int. Conf. on Architectural Support for Prog. Lang. and Op. Syt., ACM/IEEE, Boton, MA, April 1989, pp [30] Strecker, W.D. VAX-11/780 A Virtual Addre Extenion for the PDP-11 Family Computer. Proc. NCC, AFIPS Pre, Montvale, NJ, 1978, pp [31] Sytem Performance Evaluation Cooperative. SPEC Newletter: Benchmark Reult, Wateride Aoc., Fremont, CA, Fall 89, Winter 90, Spring 90. [32] Thornton, J.E. Deign of a Computer: The Control Data Glenview, IL: Scott, Foreman, and Co., 1970.

DISTRIBUTED DATA PARALLEL TECHNIQUES FOR CONTENT-MATCHING INTRUSION DETECTION SYSTEMS. G. Chapman J. Cleese E. Idle

DISTRIBUTED DATA PARALLEL TECHNIQUES FOR CONTENT-MATCHING INTRUSION DETECTION SYSTEMS. G. Chapman J. Cleese E. Idle DISTRIBUTED DATA PARALLEL TECHNIQUES FOR CONTENT-MATCHING INTRUSION DETECTION SYSTEMS G. Chapman J. Cleee E. Idle ABSTRACT Content matching i a neceary component of any ignature-baed network Intruion Detection

More information

Name: SID: Instructions

Name: SID: Instructions CS168 Fall 2014 Homework 1 Aigned: Wedneday, 10 September 2014 Due: Monday, 22 September 2014 Name: SID: Dicuion Section (Day/Time): Intruction - Submit thi homework uing Pandagrader/GradeScope(http://www.gradecope.com/

More information

Unit 11 Using Linear Regression to Describe Relationships

Unit 11 Using Linear Regression to Describe Relationships Unit 11 Uing Linear Regreion to Decribe Relationhip Objective: To obtain and interpret the lope and intercept of the leat quare line for predicting a quantitative repone variable from a quantitative explanatory

More information

DISTRIBUTED DATA PARALLEL TECHNIQUES FOR CONTENT-MATCHING INTRUSION DETECTION SYSTEMS

DISTRIBUTED DATA PARALLEL TECHNIQUES FOR CONTENT-MATCHING INTRUSION DETECTION SYSTEMS DISTRIBUTED DATA PARALLEL TECHNIQUES FOR CONTENT-MATCHING INTRUSION DETECTION SYSTEMS Chritopher V. Kopek Department of Computer Science Wake Foret Univerity Winton-Salem, NC, 2709 Email: kopekcv@gmail.com

More information

Project Management Basics

Project Management Basics Project Management Baic A Guide to undertanding the baic component of effective project management and the key to ucce 1 Content 1.0 Who hould read thi Guide... 3 1.1 Overview... 3 1.2 Project Management

More information

A technical guide to 2014 key stage 2 to key stage 4 value added measures

A technical guide to 2014 key stage 2 to key stage 4 value added measures A technical guide to 2014 key tage 2 to key tage 4 value added meaure CONTENTS Introduction: PAGE NO. What i value added? 2 Change to value added methodology in 2014 4 Interpretation: Interpreting chool

More information

Queueing systems with scheduled arrivals, i.e., appointment systems, are typical for frontal service systems,

Queueing systems with scheduled arrivals, i.e., appointment systems, are typical for frontal service systems, MANAGEMENT SCIENCE Vol. 54, No. 3, March 28, pp. 565 572 in 25-199 ein 1526-551 8 543 565 inform doi 1.1287/mnc.17.82 28 INFORMS Scheduling Arrival to Queue: A Single-Server Model with No-Show INFORMS

More information

Optical Illusion. Sara Bolouki, Roger Grosse, Honglak Lee, Andrew Ng

Optical Illusion. Sara Bolouki, Roger Grosse, Honglak Lee, Andrew Ng Optical Illuion Sara Bolouki, Roger Groe, Honglak Lee, Andrew Ng. Introduction The goal of thi proect i to explain ome of the illuory phenomena uing pare coding and whitening model. Intead of the pare

More information

Two Dimensional FEM Simulation of Ultrasonic Wave Propagation in Isotropic Solid Media using COMSOL

Two Dimensional FEM Simulation of Ultrasonic Wave Propagation in Isotropic Solid Media using COMSOL Excerpt from the Proceeding of the COMSO Conference 0 India Two Dimenional FEM Simulation of Ultraonic Wave Propagation in Iotropic Solid Media uing COMSO Bikah Ghoe *, Krihnan Balaubramaniam *, C V Krihnamurthy

More information

SCM- integration: organiational, managerial and technological iue M. Caridi 1 and A. Sianei 2 Dipartimento di Economia e Produzione, Politecnico di Milano, Italy E-mail: maria.caridi@polimi.it Itituto

More information

FEDERATION OF ARAB SCIENTIFIC RESEARCH COUNCILS

FEDERATION OF ARAB SCIENTIFIC RESEARCH COUNCILS Aignment Report RP/98-983/5/0./03 Etablihment of cientific and technological information ervice for economic and ocial development FOR INTERNAL UE NOT FOR GENERAL DITRIBUTION FEDERATION OF ARAB CIENTIFIC

More information

Assessing the Discriminatory Power of Credit Scores

Assessing the Discriminatory Power of Credit Scores Aeing the Dicriminatory Power of Credit Score Holger Kraft 1, Gerald Kroiandt 1, Marlene Müller 1,2 1 Fraunhofer Intitut für Techno- und Wirtchaftmathematik (ITWM) Gottlieb-Daimler-Str. 49, 67663 Kaierlautern,

More information

Cluster-Aware Cache for Network Attached Storage *

Cluster-Aware Cache for Network Attached Storage * Cluter-Aware Cache for Network Attached Storage * Bin Cai, Changheng Xie, and Qiang Cao National Storage Sytem Laboratory, Department of Computer Science, Huazhong Univerity of Science and Technology,

More information

2. METHOD DATA COLLECTION

2. METHOD DATA COLLECTION Key to learning in pecific ubject area of engineering education an example from electrical engineering Anna-Karin Cartenen,, and Jonte Bernhard, School of Engineering, Jönköping Univerity, S- Jönköping,

More information

REDUCTION OF TOTAL SUPPLY CHAIN CYCLE TIME IN INTERNAL BUSINESS PROCESS OF REAMER USING DOE AND TAGUCHI METHODOLOGY. Abstract. 1.

REDUCTION OF TOTAL SUPPLY CHAIN CYCLE TIME IN INTERNAL BUSINESS PROCESS OF REAMER USING DOE AND TAGUCHI METHODOLOGY. Abstract. 1. International Journal of Advanced Technology & Engineering Reearch (IJATER) REDUCTION OF TOTAL SUPPLY CHAIN CYCLE TIME IN INTERNAL BUSINESS PROCESS OF REAMER USING DOE AND Abtract TAGUCHI METHODOLOGY Mr.

More information

6. Friction, Experiment and Theory

6. Friction, Experiment and Theory 6. Friction, Experiment and Theory The lab thi wee invetigate the rictional orce and the phyical interpretation o the coeicient o riction. We will mae ue o the concept o the orce o gravity, the normal

More information

Exposure Metering Relating Subject Lighting to Film Exposure

Exposure Metering Relating Subject Lighting to Film Exposure Expoure Metering Relating Subject Lighting to Film Expoure By Jeff Conrad A photographic expoure meter meaure ubject lighting and indicate camera etting that nominally reult in the bet expoure of the film.

More information

Report 4668-1b 30.10.2010. Measurement report. Sylomer - field test

Report 4668-1b 30.10.2010. Measurement report. Sylomer - field test Report 4668-1b Meaurement report Sylomer - field tet Report 4668-1b 2(16) Contet 1 Introduction... 3 1.1 Cutomer... 3 1.2 The ite and purpoe of the meaurement... 3 2 Meaurement... 6 2.1 Attenuation of

More information

A Note on Profit Maximization and Monotonicity for Inbound Call Centers

A Note on Profit Maximization and Monotonicity for Inbound Call Centers OPERATIONS RESEARCH Vol. 59, No. 5, September October 2011, pp. 1304 1308 in 0030-364X ein 1526-5463 11 5905 1304 http://dx.doi.org/10.1287/opre.1110.0990 2011 INFORMS TECHNICAL NOTE INFORMS hold copyright

More information

A New Optimum Jitter Protection for Conversational VoIP

A New Optimum Jitter Protection for Conversational VoIP Proc. Int. Conf. Wirele Commun., Signal Proceing (Nanjing, China), 5 pp., Nov. 2009 A New Optimum Jitter Protection for Converational VoIP Qipeng Gong, Peter Kabal Electrical & Computer Engineering, McGill

More information

Performance of a Browser-Based JavaScript Bandwidth Test

Performance of a Browser-Based JavaScript Bandwidth Test Performance of a Brower-Baed JavaScript Bandwidth Tet David A. Cohen II May 7, 2013 CP SC 491/H495 Abtract An exiting brower-baed bandwidth tet written in JavaScript wa modified for the purpoe of further

More information

Acceleration-Displacement Crash Pulse Optimisation A New Methodology to Optimise Vehicle Response for Multiple Impact Speeds

Acceleration-Displacement Crash Pulse Optimisation A New Methodology to Optimise Vehicle Response for Multiple Impact Speeds Acceleration-Diplacement Crah Pule Optimiation A New Methodology to Optimie Vehicle Repone for Multiple Impact Speed D. Gildfind 1 and D. Ree 2 1 RMIT Univerity, Department of Aeropace Engineering 2 Holden

More information

TIME SERIES ANALYSIS AND TRENDS BY USING SPSS PROGRAMME

TIME SERIES ANALYSIS AND TRENDS BY USING SPSS PROGRAMME TIME SERIES ANALYSIS AND TRENDS BY USING SPSS PROGRAMME RADMILA KOCURKOVÁ Sileian Univerity in Opava School of Buine Adminitration in Karviná Department of Mathematical Method in Economic Czech Republic

More information

A Spam Message Filtering Method: focus on run time

A Spam Message Filtering Method: focus on run time , pp.29-33 http://dx.doi.org/10.14257/atl.2014.76.08 A Spam Meage Filtering Method: focu on run time Sin-Eon Kim 1, Jung-Tae Jo 2, Sang-Hyun Choi 3 1 Department of Information Security Management 2 Department

More information

TRADING rules are widely used in financial market as

TRADING rules are widely used in financial market as Complex Stock Trading Strategy Baed on Particle Swarm Optimization Fei Wang, Philip L.H. Yu and David W. Cheung Abtract Trading rule have been utilized in the tock market to make profit for more than a

More information

Partial optimal labeling search for a NP-hard subclass of (max,+) problems

Partial optimal labeling search for a NP-hard subclass of (max,+) problems Partial optimal labeling earch for a NP-hard ubcla of (max,+) problem Ivan Kovtun International Reearch and Training Center of Information Technologie and Sytem, Kiev, Uraine, ovtun@image.iev.ua Dreden

More information

v = x t = x 2 x 1 t 2 t 1 The average speed of the particle is absolute value of the average velocity and is given Distance travelled t

v = x t = x 2 x 1 t 2 t 1 The average speed of the particle is absolute value of the average velocity and is given Distance travelled t Chapter 2 Motion in One Dimenion 2.1 The Important Stuff 2.1.1 Poition, Time and Diplacement We begin our tudy of motion by conidering object which are very mall in comparion to the ize of their movement

More information

Redesigning Ratings: Assessing the Discriminatory Power of Credit Scores under Censoring

Redesigning Ratings: Assessing the Discriminatory Power of Credit Scores under Censoring Redeigning Rating: Aeing the Dicriminatory Power of Credit Score under Cenoring Holger Kraft, Gerald Kroiandt, Marlene Müller Fraunhofer Intitut für Techno- und Wirtchaftmathematik (ITWM) Thi verion: June

More information

CASE STUDY BRIDGE. www.future-processing.com

CASE STUDY BRIDGE. www.future-processing.com CASE STUDY BRIDGE TABLE OF CONTENTS #1 ABOUT THE CLIENT 3 #2 ABOUT THE PROJECT 4 #3 OUR ROLE 5 #4 RESULT OF OUR COLLABORATION 6-7 #5 THE BUSINESS PROBLEM THAT WE SOLVED 8 #6 CHALLENGES 9 #7 VISUAL IDENTIFICATION

More information

Performance of Multiple TFRC in Heterogeneous Wireless Networks

Performance of Multiple TFRC in Heterogeneous Wireless Networks Performance of Multiple TFRC in Heterogeneou Wirele Network 1 Hyeon-Jin Jeong, 2 Seong-Sik Choi 1, Firt Author Computer Engineering Department, Incheon National Univerity, oaihjj@incheon.ac.kr *2,Correponding

More information

How Enterprises Can Build Integrated Digital Marketing Experiences Using Drupal

How Enterprises Can Build Integrated Digital Marketing Experiences Using Drupal How Enterprie Can Build Integrated Digital Marketing Experience Uing Drupal acquia.com 888.922.7842 1.781.238.8600 25 Corporate Drive, Burlington, MA 01803 How Enterprie Can Build Integrated Digital Marketing

More information

A note on profit maximization and monotonicity for inbound call centers

A note on profit maximization and monotonicity for inbound call centers A note on profit maximization and monotonicity for inbound call center Ger Koole & Aue Pot Department of Mathematic, Vrije Univeriteit Amterdam, The Netherland 23rd December 2005 Abtract We conider an

More information

Mixed Method of Model Reduction for Uncertain Systems

Mixed Method of Model Reduction for Uncertain Systems SERBIAN JOURNAL OF ELECTRICAL ENGINEERING Vol 4 No June Mixed Method of Model Reduction for Uncertain Sytem N Selvaganean Abtract: A mixed method for reducing a higher order uncertain ytem to a table reduced

More information

Brand Equity Net Promoter Scores Versus Mean Scores. Which Presents a Clearer Picture For Action? A Non-Elite Branded University Example.

Brand Equity Net Promoter Scores Versus Mean Scores. Which Presents a Clearer Picture For Action? A Non-Elite Branded University Example. Brand Equity Net Promoter Score Veru Mean Score. Which Preent a Clearer Picture For Action? A Non-Elite Branded Univerity Example Ann Miti, Swinburne Univerity of Technology Patrick Foley, Victoria Univerity

More information

QUANTIFYING THE BULLWHIP EFFECT IN THE SUPPLY CHAIN OF SMALL-SIZED COMPANIES

QUANTIFYING THE BULLWHIP EFFECT IN THE SUPPLY CHAIN OF SMALL-SIZED COMPANIES Sixth LACCEI International Latin American and Caribbean Conference for Engineering and Technology (LACCEI 2008) Partnering to Succe: Engineering, Education, Reearch and Development June 4 June 6 2008,

More information

MECH 2110 - Statics & Dynamics

MECH 2110 - Statics & Dynamics Chapter D Problem 3 Solution 1/7/8 1:8 PM MECH 11 - Static & Dynamic Chapter D Problem 3 Solution Page 7, Engineering Mechanic - Dynamic, 4th Edition, Meriam and Kraige Given: Particle moving along a traight

More information

CASE STUDY ALLOCATE SOFTWARE

CASE STUDY ALLOCATE SOFTWARE CASE STUDY ALLOCATE SOFTWARE allocate caetud y TABLE OF CONTENTS #1 ABOUT THE CLIENT #2 OUR ROLE #3 EFFECTS OF OUR COOPERATION #4 BUSINESS PROBLEM THAT WE SOLVED #5 CHALLENGES #6 WORKING IN SCRUM #7 WHAT

More information

Return on Investment and Effort Expenditure in the Software Development Environment

Return on Investment and Effort Expenditure in the Software Development Environment International Journal of Applied Information ytem (IJAI) IN : 2249-0868 Return on Invetment and Effort Expenditure in the oftware Development Environment Dineh Kumar aini Faculty of Computing and IT, ohar

More information

Senior Thesis. Horse Play. Optimal Wagers and the Kelly Criterion. Author: Courtney Kempton. Supervisor: Professor Jim Morrow

Senior Thesis. Horse Play. Optimal Wagers and the Kelly Criterion. Author: Courtney Kempton. Supervisor: Professor Jim Morrow Senior Thei Hore Play Optimal Wager and the Kelly Criterion Author: Courtney Kempton Supervior: Profeor Jim Morrow June 7, 20 Introduction The fundamental problem in gambling i to find betting opportunitie

More information

Apigee Edge: Apigee Cloud vs. Private Cloud. Evaluating deployment models for API management

Apigee Edge: Apigee Cloud vs. Private Cloud. Evaluating deployment models for API management Apigee Edge: Apigee Cloud v. Private Cloud Evaluating deployment model for API management Table of Content Introduction 1 Time to ucce 2 Total cot of ownerhip 2 Performance 3 Security 4 Data privacy 4

More information

MSc Financial Economics: International Finance. Bubbles in the Foreign Exchange Market. Anne Sibert. Revised Spring 2013. Contents

MSc Financial Economics: International Finance. Bubbles in the Foreign Exchange Market. Anne Sibert. Revised Spring 2013. Contents MSc Financial Economic: International Finance Bubble in the Foreign Exchange Market Anne Sibert Revied Spring 203 Content Introduction................................................. 2 The Mone Market.............................................

More information

Linear Momentum and Collisions

Linear Momentum and Collisions Chapter 7 Linear Momentum and Colliion 7.1 The Important Stuff 7.1.1 Linear Momentum The linear momentum of a particle with ma m moving with velocity v i defined a p = mv (7.1) Linear momentum i a vector.

More information

Growth and Sustainability of Managed Security Services Networks: An Economic Perspective

Growth and Sustainability of Managed Security Services Networks: An Economic Perspective Growth and Sutainability of Managed Security Service etwork: An Economic Perpective Alok Gupta Dmitry Zhdanov Department of Information and Deciion Science Univerity of Minneota Minneapoli, M 55455 (agupta,

More information

Free Enterprise, the Economy and Monetary Policy

Free Enterprise, the Economy and Monetary Policy Free Enterprie, the Economy and Monetary Policy free (fre) adj. not cont Free enterprie i the freedom of individual and buinee to power of another; at regulation. It enable individual and buinee to create,

More information

Review of Multiple Regression Richard Williams, University of Notre Dame, http://www3.nd.edu/~rwilliam/ Last revised January 13, 2015

Review of Multiple Regression Richard Williams, University of Notre Dame, http://www3.nd.edu/~rwilliam/ Last revised January 13, 2015 Review of Multiple Regreion Richard William, Univerity of Notre Dame, http://www3.nd.edu/~rwilliam/ Lat revied January 13, 015 Aumption about prior nowledge. Thi handout attempt to ummarize and yntheize

More information

HUMAN CAPITAL AND THE FUTURE OF TRANSITION ECONOMIES * Michael Spagat Royal Holloway, University of London, CEPR and Davidson Institute.

HUMAN CAPITAL AND THE FUTURE OF TRANSITION ECONOMIES * Michael Spagat Royal Holloway, University of London, CEPR and Davidson Institute. HUMAN CAPITAL AND THE FUTURE OF TRANSITION ECONOMIES * By Michael Spagat Royal Holloway, Univerity of London, CEPR and Davidon Intitute Abtract Tranition economie have an initial condition of high human

More information

Availability of WDM Multi Ring Networks

Availability of WDM Multi Ring Networks Paper Availability of WDM Multi Ring Network Ivan Rado and Katarina Rado H d.o.o. Motar, Motar, Bonia and Herzegovina Faculty of Electrical Engineering, Mechanical Engineering and Naval Architecture, Univerity

More information

Unusual Option Market Activity and the Terrorist Attacks of September 11, 2001*

Unusual Option Market Activity and the Terrorist Attacks of September 11, 2001* Allen M. Potehman Univerity of Illinoi at Urbana-Champaign Unuual Option Market Activity and the Terrorit Attack of September 11, 2001* I. Introduction In the aftermath of the terrorit attack on the World

More information

Scheduling of Jobs and Maintenance Activities on Parallel Machines

Scheduling of Jobs and Maintenance Activities on Parallel Machines Scheduling of Job and Maintenance Activitie on Parallel Machine Chung-Yee Lee* Department of Indutrial Engineering Texa A&M Univerity College Station, TX 77843-3131 cylee@ac.tamu.edu Zhi-Long Chen** Department

More information

Utility-Based Flow Control for Sequential Imagery over Wireless Networks

Utility-Based Flow Control for Sequential Imagery over Wireless Networks Utility-Baed Flow Control for Sequential Imagery over Wirele Networ Tomer Kihoni, Sara Callaway, and Mar Byer Abtract Wirele enor networ provide a unique et of characteritic that mae them uitable for building

More information

Ohm s Law. Ohmic relationship V=IR. Electric Power. Non Ohmic devises. Schematic representation. Electric Power

Ohm s Law. Ohmic relationship V=IR. Electric Power. Non Ohmic devises. Schematic representation. Electric Power Ohm Law Ohmic relationhip V=IR Ohm law tate that current through the conductor i directly proportional to the voltage acro it if temperature and other phyical condition do not change. In many material,

More information

Risk Management for a Global Supply Chain Planning under Uncertainty: Models and Algorithms

Risk Management for a Global Supply Chain Planning under Uncertainty: Models and Algorithms Rik Management for a Global Supply Chain Planning under Uncertainty: Model and Algorithm Fengqi You 1, John M. Waick 2, Ignacio E. Gromann 1* 1 Dept. of Chemical Engineering, Carnegie Mellon Univerity,

More information

Towards Control-Relevant Forecasting in Supply Chain Management

Towards Control-Relevant Forecasting in Supply Chain Management 25 American Control Conference June 8-1, 25. Portland, OR, USA WeA7.1 Toward Control-Relevant Forecating in Supply Chain Management Jay D. Schwartz, Daniel E. Rivera 1, and Karl G. Kempf Control Sytem

More information

Queueing Models for Multiclass Call Centers with Real-Time Anticipated Delays

Queueing Models for Multiclass Call Centers with Real-Time Anticipated Delays Queueing Model for Multicla Call Center with Real-Time Anticipated Delay Oualid Jouini Yve Dallery Zeynep Akşin Ecole Centrale Pari Koç Univerity Laboratoire Génie Indutriel College of Adminitrative Science

More information

Chapter 10 Stocks and Their Valuation ANSWERS TO END-OF-CHAPTER QUESTIONS

Chapter 10 Stocks and Their Valuation ANSWERS TO END-OF-CHAPTER QUESTIONS Chapter Stoc and Their Valuation ANSWERS TO EN-OF-CHAPTER QUESTIONS - a. A proxy i a document giving one peron the authority to act for another, typically the power to vote hare of common toc. If earning

More information

A Life Contingency Approach for Physical Assets: Create Volatility to Create Value

A Life Contingency Approach for Physical Assets: Create Volatility to Create Value A Life Contingency Approach for Phyical Aet: Create Volatility to Create Value homa Emil Wendling 2011 Enterprie Rik Management Sympoium Society of Actuarie March 14-16, 2011 Copyright 2011 by the Society

More information

Four Ways Companies Can Use Open Source Social Publishing Tools to Enhance Their Business Operations

Four Ways Companies Can Use Open Source Social Publishing Tools to Enhance Their Business Operations Four Way Companie Can Ue Open Source Social Publihing Tool to Enhance Their Buine Operation acquia.com 888.922.7842 1.781.238.8600 25 Corporate Drive, Burlington, MA 01803 Four Way Companie Can Ue Open

More information

INTERACTIVE TOOL FOR ANALYSIS OF TIME-DELAY SYSTEMS WITH DEAD-TIME COMPENSATORS

INTERACTIVE TOOL FOR ANALYSIS OF TIME-DELAY SYSTEMS WITH DEAD-TIME COMPENSATORS INTERACTIVE TOOL FOR ANALYSIS OF TIMEDELAY SYSTEMS WITH DEADTIME COMPENSATORS Joé Lui Guzmán, Pedro García, Tore Hägglund, Sebatián Dormido, Pedro Alberto, Manuel Berenguel Dep. de Lenguaje y Computación,

More information

Efficient Pricing and Insurance Coverage in Pharmaceutical Industry when the Ability to Pay Matters

Efficient Pricing and Insurance Coverage in Pharmaceutical Industry when the Ability to Pay Matters ömmföäfläafaäflaflafla fffffffffffffffffffffffffffffffffff Dicuion Paper Efficient Pricing and Inurance Coverage in Pharmaceutical Indutry when the Ability to Pay Matter Vea Kanniainen Univerity of Helinki,

More information

The Import-Export Paradigm for High-Quality College Courses

The Import-Export Paradigm for High-Quality College Courses Public Policy Editor: Stephen Ruth ruth@gmu.edu The Import-Export Paradigm for High-Quality College Coure An Anwer to Tuition Through-the- Roof Cot Spiral? Stephen Ruth George Maon Univerity Three new

More information

The Cash Flow Statement: Problems with the Current Rules

The Cash Flow Statement: Problems with the Current Rules A C C O U N T I N G & A U D I T I N G accounting The Cah Flow Statement: Problem with the Current Rule By Neii S. Wei and Jame G.S. Yang In recent year, the tatement of cah flow ha received increaing attention

More information

Global Imbalances or Bad Accounting? The Missing Dark Matter in the Wealth of Nations. Ricardo Hausmann and Federico Sturzenegger

Global Imbalances or Bad Accounting? The Missing Dark Matter in the Wealth of Nations. Ricardo Hausmann and Federico Sturzenegger Global Imbalance or Bad Accounting? The Miing Dark Matter in the Wealth of Nation Ricardo Haumann and Federico Sturzenegger CID Working Paper No. 124 January 2006 Copyright 2006 Ricardo Haumann, Federico

More information

January 21, 2015. Abstract

January 21, 2015. Abstract T S U I I E P : T R M -C S J. R January 21, 2015 Abtract Thi paper evaluate the trategic behavior of a monopolit to influence environmental policy, either with taxe or with tandard, comparing two alternative

More information

Control of Wireless Networks with Flow Level Dynamics under Constant Time Scheduling

Control of Wireless Networks with Flow Level Dynamics under Constant Time Scheduling Control of Wirele Network with Flow Level Dynamic under Contant Time Scheduling Long Le and Ravi R. Mazumdar Department of Electrical and Computer Engineering Univerity of Waterloo,Waterloo, ON, Canada

More information

RO-BURST: A Robust Virtualization Cost Model for Workload Consolidation over Clouds

RO-BURST: A Robust Virtualization Cost Model for Workload Consolidation over Clouds !111! 111!ttthhh IIIEEEEEEEEE///AAACCCMMM IIInnnttteeerrrnnnaaatttiiiooonnnaaalll SSSyyymmmpppoooiiiuuummm ooonnn CCCllluuuttteeerrr,,, CCClllooouuuddd aaannnddd GGGrrriiiddd CCCooommmpppuuutttiiinnnggg

More information

Pekka Helkiö, 58490K Antti Seppälä, 63212W Ossi Syd, 63513T

Pekka Helkiö, 58490K Antti Seppälä, 63212W Ossi Syd, 63513T Pekka Helkiö, 58490K Antti Seppälä, 63212W Oi Syd, 63513T Table of Content 1. Abtract...1 2. Introduction...2 2.1 Background... 2 2.2 Objective and Reearch Problem... 2 2.3 Methodology... 2 2.4 Scoping

More information

Software Engineering Management: strategic choices in a new decade

Software Engineering Management: strategic choices in a new decade Software Engineering : trategic choice in a new decade Barbara Farbey & Anthony Finkeltein Univerity College London, Department of Computer Science, Gower St. London WC1E 6BT, UK {b.farbey a.finkeltein}@ucl.ac.uk

More information

Bidding for Representative Allocations for Display Advertising

Bidding for Representative Allocations for Display Advertising Bidding for Repreentative Allocation for Diplay Advertiing Arpita Ghoh, Preton McAfee, Kihore Papineni, and Sergei Vailvitkii Yahoo! Reearch. {arpita, mcafee, kpapi, ergei}@yahoo-inc.com Abtract. Diplay

More information

Mobile Network Configuration for Large-scale Multimedia Delivery on a Single WLAN

Mobile Network Configuration for Large-scale Multimedia Delivery on a Single WLAN Mobile Network Configuration for Large-cale Multimedia Delivery on a Single WLAN Huigwang Je, Dongwoo Kwon, Hyeonwoo Kim, and Hongtaek Ju Dept. of Computer Engineering Keimyung Univerity Daegu, Republic

More information

Tax Evasion and Self-Employment in a High-Tax Country: Evidence from Sweden

Tax Evasion and Self-Employment in a High-Tax Country: Evidence from Sweden Tax Evaion and Self-Employment in a High-Tax Country: Evidence from Sweden by Per Engtröm * and Bertil Holmlund ** Thi verion: May 17, 2006 Abtract Self-employed individual have arguably greater opportunitie

More information

Turbulent Mixing and Chemical Reaction in Stirred Tanks

Turbulent Mixing and Chemical Reaction in Stirred Tanks Turbulent Mixing and Chemical Reaction in Stirred Tank André Bakker Julian B. Faano Blend time and chemical product ditribution in turbulent agitated veel can be predicted with the aid of Computational

More information

A model for the relationship between tropical precipitation and column water vapor

A model for the relationship between tropical precipitation and column water vapor Click Here for Full Article GEOPHYSICAL RESEARCH LETTERS, VOL. 36, L16804, doi:10.1029/2009gl039667, 2009 A model for the relationhip between tropical precipitation and column water vapor Caroline J. Muller,

More information

Analysis of Mesostructure Unit Cells Comprised of Octet-truss Structures

Analysis of Mesostructure Unit Cells Comprised of Octet-truss Structures Analyi of Meotructure Unit Cell Compried of Octet-tru Structure Scott R. Johnton *, Marque Reed *, Hongqing V. Wang, and David W. Roen * * The George W. Woodruff School of Mechanical Engineering, Georgia

More information

Progress 8 measure in 2016, 2017, and 2018. Guide for maintained secondary schools, academies and free schools

Progress 8 measure in 2016, 2017, and 2018. Guide for maintained secondary schools, academies and free schools Progre 8 meaure in 2016, 2017, and 2018 Guide for maintained econdary chool, academie and free chool July 2016 Content Table of figure 4 Summary 5 A ummary of Attainment 8 and Progre 8 5 Expiry or review

More information

A Resolution Approach to a Hierarchical Multiobjective Routing Model for MPLS Networks

A Resolution Approach to a Hierarchical Multiobjective Routing Model for MPLS Networks A Reolution Approach to a Hierarchical Multiobjective Routing Model for MPLS Networ Joé Craveirinha a,c, Rita Girão-Silva a,c, João Clímaco b,c, Lúcia Martin a,c a b c DEEC-FCTUC FEUC INESC-Coimbra International

More information

Unobserved Heterogeneity and Risk in Wage Variance: Does Schooling Provide Earnings Insurance?

Unobserved Heterogeneity and Risk in Wage Variance: Does Schooling Provide Earnings Insurance? TI 011-045/3 Tinbergen Intitute Dicuion Paper Unoberved Heterogeneity and Rik in Wage Variance: Doe Schooling Provide Earning Inurance? Jacopo Mazza Han van Ophem Joop Hartog * Univerity of Amterdam; *

More information

Tips For Success At Mercer

Tips For Success At Mercer Tip For Succe At Mercer 2008-2009 A Do-It-Yourelf Guide to Effective Study Skill Produced by the Office of Student Affair Welcome to You may be a recent high chool graduate about to tart your very firt

More information

1 Introduction. Reza Shokri* Privacy Games: Optimal User-Centric Data Obfuscation

1 Introduction. Reza Shokri* Privacy Games: Optimal User-Centric Data Obfuscation Proceeding on Privacy Enhancing Technologie 2015; 2015 (2):1 17 Reza Shokri* Privacy Game: Optimal Uer-Centric Data Obfucation Abtract: Conider uer who hare their data (e.g., location) with an untruted

More information

SELF-MANAGING PERFORMANCE IN APPLICATION SERVERS MODELLING AND DATA ARCHITECTURE

SELF-MANAGING PERFORMANCE IN APPLICATION SERVERS MODELLING AND DATA ARCHITECTURE SELF-MANAGING PERFORMANCE IN APPLICATION SERVERS MODELLING AND DATA ARCHITECTURE RAVI KUMAR G 1, C.MUTHUSAMY 2 & A.VINAYA BABU 3 1 HP Bangalore, Reearch Scholar JNTUH, Hyderabad, India, 2 Yahoo, Bangalore,

More information

Profitability of Loyalty Programs in the Presence of Uncertainty in Customers Valuations

Profitability of Loyalty Programs in the Presence of Uncertainty in Customers Valuations Proceeding of the 0 Indutrial Engineering Reearch Conference T. Doolen and E. Van Aken, ed. Profitability of Loyalty Program in the Preence of Uncertainty in Cutomer Valuation Amir Gandomi and Saeed Zolfaghari

More information

BUILT-IN DUAL FREQUENCY ANTENNA WITH AN EMBEDDED CAMERA AND A VERTICAL GROUND PLANE

BUILT-IN DUAL FREQUENCY ANTENNA WITH AN EMBEDDED CAMERA AND A VERTICAL GROUND PLANE Progre In Electromagnetic Reearch Letter, Vol. 3, 51, 08 BUILT-IN DUAL FREQUENCY ANTENNA WITH AN EMBEDDED CAMERA AND A VERTICAL GROUND PLANE S. H. Zainud-Deen Faculty of Electronic Engineering Menoufia

More information

Health Insurance and Social Welfare. Run Liang. China Center for Economic Research, Peking University, Beijing 100871, China,

Health Insurance and Social Welfare. Run Liang. China Center for Economic Research, Peking University, Beijing 100871, China, Health Inurance and Social Welfare Run Liang China Center for Economic Reearch, Peking Univerity, Beijing 100871, China, Email: rliang@ccer.edu.cn and Hao Wang China Center for Economic Reearch, Peking

More information

Module 8. Three-phase Induction Motor. Version 2 EE IIT, Kharagpur

Module 8. Three-phase Induction Motor. Version 2 EE IIT, Kharagpur Module 8 Three-phae Induction Motor Verion EE IIT, Kharagpur Leon 33 Different Type of Starter for Induction Motor (IM Verion EE IIT, Kharagpur Inructional Objective Need of uing arter for Induction motor

More information

Growth and Sustainability of Managed Security Services Networks: An Economic Perspective

Growth and Sustainability of Managed Security Services Networks: An Economic Perspective Growth and Sutainability of Managed Security Service etwork: An Economic Perpective Alok Gupta Dmitry Zhdanov Department of Information and Deciion Science Univerity of Minneota Minneapoli, M 55455 (agupta,

More information

How To Prepare For A Mallpox Outbreak

How To Prepare For A Mallpox Outbreak Iue Brief No. 1 Bioterrorim and Health Sytem Preparedne Addreing the Smallpox Threat: Iue, Strategie, and Tool www.ahrq.gov The Agency for Healthcare Reearch and Quality (AHRQ) i the lead agency charged

More information

Physics 111. Exam #1. January 24, 2014

Physics 111. Exam #1. January 24, 2014 Phyic 111 Exam #1 January 24, 2014 Name Pleae read and follow thee intruction carefully: Read all problem carefully before attempting to olve them. Your work mut be legible, and the organization clear.

More information

Chapter 10 Velocity, Acceleration, and Calculus

Chapter 10 Velocity, Acceleration, and Calculus Chapter 10 Velocity, Acceleration, and Calculu The firt derivative of poition i velocity, and the econd derivative i acceleration. Thee derivative can be viewed in four way: phyically, numerically, ymbolically,

More information

Change Management Plan Blackboard Help Course 24/7

Change Management Plan Blackboard Help Course 24/7 MIT 530 Change Management Plan Help Coure 24/7 Submitted by: Sheri Anderon UNCW 4/20/2008 Introduction The Univerity of North Carolina Wilmington (UNCW) i a public comprehenive univerity, one of the ixteen

More information

Tap Into Smartphone Demand: Mobile-izing Enterprise Websites by Using Flexible, Open Source Platforms

Tap Into Smartphone Demand: Mobile-izing Enterprise Websites by Using Flexible, Open Source Platforms Tap Into Smartphone Demand: Mobile-izing Enterprie Webite by Uing Flexible, Open Source Platform acquia.com 888.922.7842 1.781.238.8600 25 Corporate Drive, Burlington, MA 01803 Tap Into Smartphone Demand:

More information

Office of Tax Analysis U.S. Department of the Treasury. A Dynamic Analysis of Permanent Extension of the President s Tax Relief

Office of Tax Analysis U.S. Department of the Treasury. A Dynamic Analysis of Permanent Extension of the President s Tax Relief Office of Tax Analyi U.S. Department of the Treaury A Dynamic Analyi of Permanent Extenion of the Preident Tax Relief July 25, 2006 Executive Summary Thi Report preent a detailed decription of Treaury

More information

Trusted Document Signing based on use of biometric (Face) keys

Trusted Document Signing based on use of biometric (Face) keys Truted Document Signing baed on ue of biometric (Face) Ahmed B. Elmadani Department of Computer Science Faculty of Science Sebha Univerity Sebha Libya www.ebhau.edu.ly elmadan@yahoo.com ABSTRACT An online

More information

Sector Concentration in Loan Portfolios and Economic Capital. Abstract

Sector Concentration in Loan Portfolios and Economic Capital. Abstract Sector Concentration in Loan Portfolio and Economic Capital Klau Düllmann and Nancy Machelein 2 Thi verion: September 2006 Abtract The purpoe of thi paper i to meaure the potential impact of buine-ector

More information

SHARESYNC SECURITY FEATURES

SHARESYNC SECURITY FEATURES www.kyboxinnovation.com SHARESYNC SECURITY FEATURES ShareSync provide a high degree of ecurity and protection which allow adminitrator to: Aure compliance with ecurity bet practice Get full viibility over

More information

INFORMATION Technology (IT) infrastructure management

INFORMATION Technology (IT) infrastructure management IEEE TRANSACTIONS ON CLOUD COMPUTING, VOL. 2, NO. 1, MAY 214 1 Buine-Driven Long-term Capacity Planning for SaaS Application David Candeia, Ricardo Araújo Santo and Raquel Lope Abtract Capacity Planning

More information

A COMPARATIVE STUDY OF THREE-PHASE AND SINGLE-PHASE PLL ALGORITHMS FOR GRID-CONNECTED SYSTEMS

A COMPARATIVE STUDY OF THREE-PHASE AND SINGLE-PHASE PLL ALGORITHMS FOR GRID-CONNECTED SYSTEMS A COMPARATIE STUDY OF THREEPHASE AND SINGLEPHASE PLL ALGORITHMS FOR GRIDCONNECTED SYSTEMS Ruben Marco do Santo Filho Centro Federal de Educação Tecnológica CEFETMG Coord. Eletrônica Av. Amazona 553 Belo

More information

Support Vector Machine Based Electricity Price Forecasting For Electricity Markets utilising Projected Assessment of System Adequacy Data.

Support Vector Machine Based Electricity Price Forecasting For Electricity Markets utilising Projected Assessment of System Adequacy Data. The Sixth International Power Engineering Conference (IPEC23, 27-29 November 23, Singapore Support Vector Machine Baed Electricity Price Forecating For Electricity Maret utiliing Projected Aement of Sytem

More information

RISK MANAGEMENT POLICY

RISK MANAGEMENT POLICY RISK MANAGEMENT POLICY The practice of foreign exchange (FX) rik management i an area thrut into the potlight due to the market volatility that ha prevailed for ome time. A a conequence, many corporation

More information

your Rights Consumer Guarantees Understanding Consumer Electronic Devices, Home Appliances & Home Entertainment Products

your Rights Consumer Guarantees Understanding Consumer Electronic Devices, Home Appliances & Home Entertainment Products Conumer Guarantee Undertanding your Right Conumer Electronic Device, Home Appliance & Home Entertainment Product Voluntary Warranty Guide February 2014 JB Hi-Fi Group Pty Ltd (ABN 37 093 II4 286) The Autralian

More information

CHARACTERISTICS OF WAITING LINE MODELS THE INDICATORS OF THE CUSTOMER FLOW MANAGEMENT SYSTEMS EFFICIENCY

CHARACTERISTICS OF WAITING LINE MODELS THE INDICATORS OF THE CUSTOMER FLOW MANAGEMENT SYSTEMS EFFICIENCY Annale Univeritati Apuleni Serie Oeconomica, 2(2), 200 CHARACTERISTICS OF WAITING LINE MODELS THE INDICATORS OF THE CUSTOMER FLOW MANAGEMENT SYSTEMS EFFICIENCY Sidonia Otilia Cernea Mihaela Jaradat 2 Mohammad

More information

naifa Members: SERVING AMERICA S NEIGHBORHOODS FOR 120 YEARS

naifa Members: SERVING AMERICA S NEIGHBORHOODS FOR 120 YEARS naifa Member: SERVING AMERICA S NEIGHBORHOODS FOR 120 YEARS National Aociation of Inurance and Financial Advior Serving America Neigborhood for Over 120 Year Since 1890, NAIFA ha worked to afeguard the

More information