Model Checking of Global Power Management Strategies in Software with Temporal Logic Properties

Size: px
Start display at page:

Download "Model Checking of Global Power Management Strategies in Software with Temporal Logic Properties"

Transcription

1 Model Checking of Global Power Management Strategies in Software with Temporal Logic Properties Rajdeep Mukherjee Indian Institute of Technology Kharagpur Subhankar Mukherjee Samsung India Software Operations Pallab Dasgupta Indian Institute of Technology Kharagpur ABSTRACT Complex and sophisticated power management strategies are a commonplace design policies today in order to manage the power consumption of complex low power digital integrated circuits. These global power management strategies are implemented in software/firmware and are used to orchestrate the switching between power states of multiple power domains in local power controllers which resides in hardware. In this paper, we propose a methodology of verifying such global power management softwares with safety linear temporal logic (LTL) properties using bounded model checking based verification approach. We present our results on several test cases of significant complexity to demonstrate the feasibility of the proposed framework. Categories and Subject Descriptors D.2.8 [Software Engineering]: Software/Program Verification Model Checking General Terms Embedded Software, Verification Keywords Power Intent Verification, Assertion, Bounded Model Checking, Temporal Logic 1. INTRODUCTION The rise in the use of embedded systems over the last decade has forced the developers to integrate embedded software in such systems in a rapid way. Thus the need of formally verifying the embedded software is of fundamental importance in the present scenario in order to ensure the correctness of the functionality of embedded systems. However, when a large software design is considered, formal property verification using model checker often suffers from the state space explosion problem. The main challenge for Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. To copy otherwise, to republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. ISEC 13, Feb , 2013 New Delhi, India Copyright c 2013 ACM ISBN $ any embedded software is in verifying the temporal properties over the variables and functions of the software module. The authors of [18] proposed two new approaches to integrate assertions for verifying embedded software using simulation-based verification. In the domain of low power embedded system design, the task of verifying that the implementation of the power domains and the architectural power management logic meets the micro-architectural specs has become important. This has prompted the design community to adopt standards like Unified Power Format (UPF) [17] and Common Power Format (CPF) [1] for specifying the power domains and their control points at a higher level of abstraction. The power management fabric is broadly divided into the controllers for the individual power domains and the global power management logic which orchestrates the power state transitions in the local power domains. The global power management logic is responsible for implementing the architectural power management strategy, but the per-domain controllers specified using UPF and CPF control analog interfaces, like level shifters. A recent research work has attempted to leverage perdomain UPF / CPF specifications for translating architectural power intent into assertions for enabling formal verification of the global power management logic [8]. Our work developed on the same approach, but with an important difference, namely, that the global power management logic is specified in software, as opposed to the assumption in [8] that the logic is in hardware. The significance of our contributionisbasedonthefact[11] thatmostrecentdesigns usea combination of software and micro-instructions in firmware to implement the global power management logic, and it is increasingly likely that in future this trend will become ubiquitous. The work of [16] models the synchronization between the software which implements the global power management logic with the per-domain controllers that are implemented in hardware. It then verifies the composition of the software and hardware power managers against the architectural power intent. There are several important differences in verifying a power management fabric that is partially controlled by software / firmware, as opposed to ones that are implemented solely in hardware. Typically global power management (GPM) software is driven by software/hardware interrupts. For example, if an interruptcomes then the GPM executes a sequence of instructions in order to determine the next state of itself as well as the local power managers. The task of the GPM is to determine the global power management strategies and

2 provide directives to the local power managers (LPM) (typically in hardware) which are responsible for actual execution of these strategies into hardware. Our objective in this paper is to model such software power management units by capturing the execution semantics in terms of the interrupts that drive the software, specifying the architectural intent (safety requirements) of the power management strategies in terms of these interrupt, and formally verifying the architectural intent on the software using state of the art formal software verification techniques. An incorrectly implemented global power controller might issue illegal power state transition sequence and GPM directives thereby violating the desired power-intent. It is therefore imperative to consider the timing and functionality of the GPM software in verification. Thus the verification of the global power management strategies in software is important in guaranteeing the functional correctness of the directives that it issues over the entire power-management fabric. The main contributions of this paper are as follows: 1. We allow the specification of the global power management strategy in a procedural language like C. 2. Given the LTL properties capturing architectural power intent, we automatically translate the temporal logic properties into safety properties of given depth using unfolding technique. 3. The GPM software is automatically instrumented with the assertions generated in step The instrumented code is then passed to the CEGAR loop for model checking the GPM software against the safety properties. 2. RELATED WORK In the past, LTL [19] has been the most acceptable logic for describing temporal properties in the model checking environment such as SPIN [10]. Assertion-based verification methodology is useful for hardware verification technique[7]. However, this technique of verification is not suitable for verifying embedded software which contains complex programming constructs like complex data types, pointers, recursive functions etc. and has no notion of timing behaviors. The crux in the verification of embedded software lies in monitoring the valuation of the program variables, functions, conditional loops and complex pointer handling based on temporal property specification. Formal methods prove to be efficient for verifying temporal properties over medium sized embedded software. However, for larger software design, an abstraction technique is used in order to avoid the state-explosion problem for the back-end model checker. The tool named BLAST [9] verifies temporal safety properties on software using predicate abstraction technique. BLAST uses Counter-Example Guided Abstraction Refinement(CE- GAR) framework for model checking software. It iterates the whole process by first constructing an abstract model of the software based on predicates, then checks the safety properties, and if the property fails, it refines the model based on the counter-example. The software model checking approaches can be categorized as follows: 1. Bounded Model Checking(BMC) [3] based verification 2. Predicate abstraction based model checking using a theorem prover or SAT solver [9, 4, 2] 3. Modeling the semantics of the software using suitable abstraction technique and then verify the abstract model using BDD-based and SAT-based model checkers. The tool CBMC [5] performs the formal verification of ANSI-C programs using bounded model checking based approach. However, the boundedness restricts the tool for proving the correctness of the software. Therefore, the verification of temporal properties of embedded software is still a challenge for the verification community. A low-power digital integrated circuit can be viewed as the composition of several individual power-domains constituting the design, a set of power control circuitry (PCC), and the power control logic (PCL). PCC provides a power control interface which is driven by the PCL so as to make power state transitions within the power managed domain. A PCC consists of various isolation cells, retention cells, level shifters and voltage regulators. Further, PCL can be decomposed into two separate power managers for larger circuits, namely the local power manager (LPM) and the global power manager (GPM). LPM s are mainly per-domain local power managers which issues valid control signals to the corresponding power domain so as to make a valid power state transition. The GPM implements various global power management properties. It orchestrates the LPM s to implement the architectural power management strategy. The architectural view of such power management logic is popular among architects [12, 13]. Figure 1 shows the architectural components of a low-power digital integrated circuits. UPF 1 UPF 2 Design Partitioned into Power Domains(PD) LPM 1 PD 1 PCC 1 PD 2 PD 4 PCC 4 PD 3 PCC 2 PCC 3 Power Control Logic (PCL) Architectural Power intent LPM 2 LPM 3 LPM 4 Global Power Manager Global Assertions UPF 4 UPF3 Predicate Table Figure 1: Architectural Power Managed Design Component The architectural power management strategies are usually specified by architects using names of architectural power domains and their power states. However, the PCC are driven by low level control signals from PCL which are used to perform actions like isolation, retention as well as specific power state transitions inside the power domains. The recent work of [8] addresses the issue of bridging the existing disconnection between the high level architectural properties

3 and low-level control signals over which the PCL is defined, and performs the formal verification of the Power Control Logic(PCL) at the register transfer level. In [8], all controllers are given in Verilog and so it is implemented using standard model checkers from the hardware domain. In our problem the global power management logic is in software and the local controllers are in Verilog. Hence we propose a verification framework for the purpose of verifying the correctness of the global power management logic against the architectural power intent. Software-based power management strategy tries to exploit explicit power management hooks provided by the underlying architecture that are of particular interest to a software at higher level in an intelligent manner. Power management software employs efficient algorithms to ensure that the system and devices maintains low power state as long as possible without degrading system performance. In order to make maximum utilization of the CPU, modern day operating system like Linux implements dynamic voltage and frequency scaling (DVFS) based on the system s utilization via heuristic algorithms. Recently, Intel s Nehalem microarchitecture uses a dedicated on-die microcontroller [11], called the power control unit (PCU) that runs embedded firmware, used for making power management decisions based on global inputs like temperature, current, power and OS requests. Thus, the migration from hardware to firmware / software based power management in modern day processors provides efficient platform for managing system s power. 3. FORMAL MODEL The GPM software is triggered by software/hardware interrupts. On waking up, the GPM issues one or more directives and goes back to sleep. The directives are executed by the local controllers to actuate the power state transitions. Our objective is to verify architectural assertions over the global power management software. The GPM software is used to implement the overall power management strategies of the embedded system and orchestrate the switching between power states of multiple power domains in local power controllers. Unlike conventional software verification techniques, the main aspect of verifying the power management software lies in the fact that the program states (comprising valuation of the program variables and program locations) and the power states defining the per-domain power states are two different entities. The architectural properties are specified relating the power states and its transitions. In order to formally capture the execution semantics of the GPM, we model the interrupts that drive the GPM with a single clock, that is the time period between any two consecutive interrupts define a time cycle. Figure 2 depicts the scenario for a typical GPM software. We take an example in English language describing a typical safety requirement. The architectural assertions are defined over the GPM power state and may be used to capture the temporal nature of the power management behavior. With the GPM software execution model described in this section, it is possible to encode the above requirement using a temporal logic property as follows: For example, let us consider an architectural property comprising three power domains namely CORE, MEMORY and TRANSMITTER. The properties may be temporal in nature in order to capture the architectural power intent or Interrupt GPM Instruction 1 Instruction 2 Instruction 3 GPM_STATE GPM_STATE (NEW) LPM_1_STATE LPM_2_STATE LPM_3_STATE Figure 2: GPM execution model it may be safety properties as well. LPM_1_STATE (NEW) LPM_2_STATE (NEW) LPM_3_STATE (NEW) 1. Property 1: We may be interested to verify a temporal property which specifies that : Once the MEMORY domain is ON, the TRANSMIT- TER domain has to be ON within 1 to 2 cycle. The property can be encoded as follows: G(M_ON_T_OFF -> F [1:2] M_ON_T_ON) 2. Property 2: Global safety properties may also be used to capture power management strategies which specifies that : CORE and TRANSMITTER domains are never ON together. The property can be encoded as follows: G(C_ON_T_OFF C_OFF_T_ON C_OFF_T_OFF) 4. VERIFICATION FRAMEWORK Let PD be the total number of power domains and M be the total number of states. Then, we have N = log 2 M number of state variables. The inputs of the system are as follows: 1. Software code of the Global Power Manager (GPM) 2. GPM specification as a set of Temporal Logic properties (ϕ i,j ) encoded in terms of N state variables S 0, S 1,, S N 1. We use ϕ i,j to denote that ϕ is true at the i th time step and ϕ is to be unfolded further for j time steps. We interchangeably use ϕ i to denote ϕ i,0, that is ϕ is true at the i th time step and is not unfolded further. 4.1 Procedure For performing the verification task we unfold the LTL properties upto certain depth (either determined from the properties if they are bounded or chosen by the verification engineer) in order to express them as safety properties of the software. This is facilitated by maintaining state information up to the chosen depth. The steps of the proposed approach shown in Figure 3 work as follows. 1. We store j-depth of state information. Thus, we need to expand the property ϕ upto j-depth. 2. The recursive unfolding of ϕ i,j is defined as follows:

4 Global Power Manager Software Instrumented Software MODEL CHECKER Verification Framework Verification Report Verified LTL Properties Unfolding Safety Reachability Property Falsified Figure 3: Work Flow of Proposed Method (a) p i,j p i where p is an atomic proposition. (b) ( ϕ) i,j ϕ i,j (c) (ϕ 1 ϕ 2) i,j (ϕ) 1 i,j (ϕ) 2 i,j (d) (Xϕ) i,j ϕ i+1,j 1 (e) (ϕ 1 Uϕ 2) i,j ϕ 2 i,j ( ϕ 2 i,j ϕ 1 i+1,j 1 ϕ 2 i+1,j 1 ) ( ϕ 2 i,j ϕ 1 i,j ϕ 2 i+1,j 1 ϕ 1 i+1,j 1 ϕ 2 i+2,j 2 ) j times ItistobenotedthatafterunfoldingϕbecomesBoolean properties over the set of Boolean variables j S0, k S1, k, SN 1. k k=0 3. Whenever some state change takes place in the GPM software due to the arrival of specific interrupt signals, the unfolded safety assertions are automatically instrumented inside the controller. 4. The instrumented code is then passed to the CEGAR framework to verify for the reachability of the embedded safety properties. 4.2 Example The verification and the working of the GPM software with respect to architectural intent can be described by the following example. Consider the following LTL property: ϕ F(X(s)) Suppose, we unfold ϕ at the i th time instance upto a depth d = 3 as follows. ϕ i,3 (F(X(s))) i,3 (Xs) i,3 (( Xs) i,3 (Xs) i+1,2 ) (( Xs) i,3 ( Xs) i+1,2 (Xs) i+2,1 ) (( Xs) i,3 ( Xs) i+1,2 ( Xs) i+2,1 (Xs) i+3,0 ) s i+1 ( s i+1 s i+2 ) ( s i+1 s i+2 s i+3 ) ( s i+1 s i+2 s i+3 ) We save 4 levels of state bits S 0,S 1,S 2,S 3 in order to encode the LTL property in terms of safety property. The corresponding safety (for every i) Boolean assertion equivalent to ϕ (only upto a depth of 3) is: ϕ 3 S 1 ( S 1 S 2 ) ( S 1 S 2 S 3 ) ( S 1 S 2 S 3 ) Let us now consider the semantics of the global power management controller software. When the program is in a particular power state and some external interrupt arrives, the power management strategy determines the next state and the signals asserted during the process. Each state of the global power manager controller corresponds to the set of states of the individual local power managers. Our GPM software has the following form: int state; void controller() while (state_change_interrupt) state = new_state; The global controller is instrumented with the unfolded safety properties. The update saved state information() procedure maintains state information upto certain depth of the temporal property which is either determined by the property if they are bounded or specified by the verification engineer. The instrumented code is as follows: int state; int S0, S1, S2, S3; void controller() while (state_change_interrupt) state = new_state; update_saved_state_information(); //- state change takes place :: unfolded assertion is inserted - S1 (!S1 && S2) (!S1 &&!S2 && S3) (!S1 &&!S2 &&!S3); 4.3 Case Study In order to outline the syntax for specifying the global power management (GPM) logic, we consider an example consisting of three power domains, namely CORE, MEM- ORY and TRANSMITTER. The GPM description starts with an enumeration of the power states of the design: enum STATE ST0, //Core-Off, Trans-Off, Mem-PartiallyOn ST1, //Core-Off, Trans-Off, Mem-FullOn ST2, //Core-StandBy, Trans-Off, Mem-PartiallyOn ST3, //Core-Active, Trans-Off, Mem-FullOn ST4, //Core-Off, Trans-Low, Mem-FullOn ST5, //Core-Off, Trans-High, Mem-FullOn ; The following C code snippet for the GPM logic implements the following aspect of the power management strategy: On getting an interrupt signal, the GPM drives a transition from ST0 to ST2 while retaining the

5 same state for other two domains. It also drives a transition from ST0 to ST1 if either of the following two conditions hold: [(finish && setbit) (!finish && signal_transmit)] IRQ 15 Interrupt Port Multiplication PD3 6 Port Register File Primary Integer Unit Secondary Integer Unit The GPM retains the same state if none of the above conditions occur. Division Unit PD4 PD 1 PD 2 Main Memory GPM_core_mem_transmitter() const enum STATE curst; int interrupt_new, setbit_new, signal_transmit_new, signal_str_new ; // Output of GPM D Cache Superscalar Controller PD6 I Cache PD7 Cache Controller Memory Controller PD 5 AHB interface if(curst == ST0) interrupt_new = interrupt; //saves initial configuration setbit_new = setbit; signal_transmit_new = signal_transmit; if(interrupt == 1) setbit_new = 0; signal_transmit_new = 0; state = ST2; // Transition :: ST0 - ST2 else if( (finish && setbit) (!finish && signal_transmit)) if(finish && setbit) signal_transmit_new = 0; signal_str_new = 1; if(!finish && signal_transmit) setbit_new = 0; signal_str_new = 1; state = ST1; // Transition :: ST0 - ST1 else signal_str_new = 1; finish_new = 1; state = ST0; // Transition :: ST0 - ST0 // end module The signals interrupt, setbit, signal transmit, and finish are inputs to the GPM. These variables are modified by operating system events or by hardware events. The variables curst and state contain the current state and the next state values respectively. Writing the state variable acts as a directive to the local per-domain power controllers to change the power states to match with this variable. Let us consider the following bounded LTL property [6]. G((ST2 -> F [0:2] ST1) (ST3 -> F [1:2] ST0)) Since this is a safety requirement, so the unfolding of the property into safety property is shown as follows. The state level information in each iteration i of the GPM execution is updated and captured using the variable L i. ( (( L_0 == ST2 ) && ( L_0 == ST1 )) (( L_0 == ST2 ) && ( L_1 == ST1 )) (( L_0 == ST2 ) && ( L_2 == ST1 ))) ((( L_0 == ST3 ) && ( L_1 == ST0 )) ((( L_0 == ST3 ) && ( L_2 == ST0 )))) These assertions are automatically instrumented inside the GPM software and the level informations are updated whenever some state change takes place. Figure 4: Power Domains of eleon3 processor 5. EXPERIMENTAL RESULTS In this section, we present experimental results on six test cases, namely PowerTrans, PowerCounter, Promethues and low-power Enhanced Leon3 benchmarks [14, 15], namely, eleon3-singlecore, eleon3-dualcore and eleon3-quadcore. We have used Linear Temporal Logic (LTL) to express the temporal safety architectural properties and invoked SA- TABS[4], a verification tool for ANSI-C and C++ programs, to perform the model checking of the GPM software. The results presented in this section are performed on a 2.33 GHz INTEL(R) XEON(TM) CPU with 16 GB RAM. Figure 4 shows the different power domains of the singlecore eleon3 processor, namely primary integer unit, a secondary integer unit, a multiplication unit, a division unit, a memory controller unit, a cache unit, and a storage elements unit. Each domain has its own power modes, like ACTIVE, IDLE, OFF, FULL ON and PARTIAL ON, as decided by the architects. These power states are further specified using three flags, namely voltage, frequency, bias flag. There also exists potential transient states between the off state and on state of a power domain, namely Isolation, Retention, or between two on states by changing the voltage-frequency pair in particular order. The GPM design details for various benchmark circuits are summarized below in Table 5. Column 2 denotes the size of the global power manager in terms of number of lines of code. The number of power states present in each global power manager of the power control logic is listed in Column 3. We also report the verification results using the Model checking tool SATABS [4] in Table 5. Column 4 denotes the number of global assertions. The maximum unfold depth among all global architectural properties is reported in Column 5. Column 6 shows the verification time and Column 7 reports the memory usage by the proposed methods. 6. CONCLUSION This paper demonstrates the verification of global power management strategies implemented in software with respect to safety LTL properties using reachability analysis. The LTL properties are automatically translated into safety properties of a given depth and the generated assertions are automatically instrumented inside the GPM software. The instrumented code is then passed to the CEGAR framework for model checking the GPM software with respect to safety properties and thereby ensuring the correctness of the global power management strategies in software. Thus, the proposed verification framework is suitable for proving the

6 Table 1: Results Demonstrating GPM Design Details And Verification Time No. of Number No. Maximum Verification Design Lines of of Unfold Time Memory Name of code states assertions Depth (sec) (MB) PowerTrans PowerCounter Prometheus eleon3-singlecore eleon3-dualcore eleon3-quadcore correctness of the embedded software against the temporal architectural assertions and the experimental results on embedded power management strategies for ELEON processor shows the feasibility of the proposed verification approach. 7. REFERENCES [1] Power forward, a practical guide for low power design - an experience with cpf. [available] online: [2] T. Ball, V. Levin, and S. K. Rajamani. A decade of software model checking with slam. Commun. ACM, 54(7):68 76, [3] A. Biere, A. Cimatti, E. M. Clarke, O. Strichman, and Y. Zhu. Bounded model checking. Advances in Computers, 58: , [4] E. Clarke, D. Kroening, N. Sharygina, and K. Yorav. Satabs: Sat-based predicate abstraction for ansi-c. In Proc. of TACAS, pages , [5] E. M. Clarke, D. Kroening, and K. Yorav. Behavioral consistency of c and verilog programs using bounded model checking. In Proc. of DAC, pages , [6] P. Dasgupta. A Roadmap for Formal Property Verification. Springer-Verlag New York, Inc., Secaucus, NJ, [7] H. Foster, A. Krolnik, and D. Lacey. Assertion-based design (2. ed.). Kluwer, [8] A. Hazra, S. Goyal, D. P., and A. Pal. Formal verification of architectural power intent. IEEE Transactions on VLSI Systems, 21(1):78 91, [9] T. Henzinger, R. Jhala, R. Majumdar, and G. Sutre. Software verification with blast. In Proc. of SPIN, pages , [10] G. J. Holzmann. Logic verification of ansi-c code with spin. In Proc. of 7th International SPIN Workshop, pages , [11] Intel and C. i7 (Nehalem) Dynamic Power Management. [available] online: impact.asu.edu/cse591sp11/nahelempm.pdf. [12] C. Isci, A. Buyuktosunoglu, C. Cher, P. Bose, and M. Martonosi. An analysis of efficient multi-core global power management policies: Maximizing performance for a given power budget. In Proc. of MICRO, pages , [13] A. Lungu, P. Bose, D. J. Sorin, S. German, and G. Janssen. Multicore power management: Ensuring robustness via early-stage formal verification. In Proc. of MEMOCODE, pages 78 87, [14] K. Marcinek, A. W. Luczyk, and W. A. Pleskacz. Enhanced leon3 core for superscalar processing. In Proc. of DDECS, pages IEEE Computer Society, [15] K. Marcinek, A. W. Luczyk, and W. A. Pleskacz. Enhanced leon3 low power ip core for dsm technologies. In Proc. of MIXDES, pages , [16] R. Mukherjee, P. Dasgupta, A. Pal, and S. Mukherjee. Formal verification of hardware / software power management strategies. In Proc. of 26th International Conference on VLSI Design, [17] R. Mukherjee, A. Srivastava, and S. Bailey. Static and formal verification of power aware designs at the rtl using upf. In Proc. of DVCon, pages 42 47, [18] P. Nalla, J. Ruf, T. Kropf, W. Rosenstiel, and T. Kirsten. Verification of temporal properties in automotive embedded software. In Proc. of DATE, pages , [19] A. Pnueli. The temporal logic of programs. In Proc. of 18th IEEE Symposium on Foundations of Computer Science, pages 46 57, 1977.

Model Checking: An Introduction

Model Checking: An Introduction Announcements Model Checking: An Introduction Meeting 2 Office hours M 1:30pm-2:30pm W 5:30pm-6:30pm (after class) and by appointment ECOT 621 Moodle problems? Fundamentals of Programming Languages CSCI

More information

Building SMT-based Software Model Checkers: an Experience Report

Building SMT-based Software Model Checkers: an Experience Report Building SMT-based Software Model Checkers: an Experience Report Alessandro Armando Artificial Intelligence Laboratory (AI-Lab) Dipartimento di Informatica Sistemistica e Telematica (DIST) University of

More information

Verification of Temporal Properties in Automotive Embedded Software

Verification of Temporal Properties in Automotive Embedded Software Verification of Temporal Properties in Automotive Embedded Software Djones Lettnin, Pradeep K. Nalla,Jürgen Ruf, Thomas Kropf and Wolfgang Rosenstiel University of Tübingen Department of Computer Engineering

More information

Formal Verification Coverage: Computing the Coverage Gap between Temporal Specifications

Formal Verification Coverage: Computing the Coverage Gap between Temporal Specifications Formal Verification Coverage: Computing the Coverage Gap between Temporal Specifications Sayantan Das Prasenjit Basu Ansuman Banerjee Pallab Dasgupta P.P. Chakrabarti Department of Computer Science & Engineering

More information

The Course. http://www.cse.unsw.edu.au/~cs3153/

The Course. http://www.cse.unsw.edu.au/~cs3153/ The Course http://www.cse.unsw.edu.au/~cs3153/ Lecturers Dr Peter Höfner NICTA L5 building Prof Rob van Glabbeek NICTA L5 building Dr Ralf Huuck NICTA ATP building 2 Plan/Schedule (1) Where and When Tuesday,

More information

Static Program Transformations for Efficient Software Model Checking

Static Program Transformations for Efficient Software Model Checking Static Program Transformations for Efficient Software Model Checking Shobha Vasudevan Jacob Abraham The University of Texas at Austin Dependable Systems Large and complex systems Software faults are major

More information

Formal Specification and Verification

Formal Specification and Verification Formal Specification and Verification Stefan Ratschan Katedra číslicového návrhu Fakulta informačních technologíı České vysoké učení technické v Praze 2. 5. 2011 Stefan Ratschan (FIT ČVUT) PI-PSC 4 2.

More information

Model Checking of Software

Model Checking of Software Model Checking of Software Patrice Godefroid Bell Laboratories, Lucent Technologies SpecNCheck Page 1 August 2001 A Brief History of Model Checking Prehistory: transformational programs and theorem proving

More information

InvGen: An Efficient Invariant Generator

InvGen: An Efficient Invariant Generator InvGen: An Efficient Invariant Generator Ashutosh Gupta and Andrey Rybalchenko Max Planck Institute for Software Systems (MPI-SWS) Abstract. In this paper we present InvGen, an automatic linear arithmetic

More information

Formal Verification by Model Checking

Formal Verification by Model Checking Formal Verification by Model Checking Natasha Sharygina Carnegie Mellon University Guest Lectures at the Analysis of Software Artifacts Class, Spring 2005 1 Outline Lecture 1: Overview of Model Checking

More information

Testing Low Power Designs with Power-Aware Test Manage Manufacturing Test Power Issues with DFTMAX and TetraMAX

Testing Low Power Designs with Power-Aware Test Manage Manufacturing Test Power Issues with DFTMAX and TetraMAX White Paper Testing Low Power Designs with Power-Aware Test Manage Manufacturing Test Power Issues with DFTMAX and TetraMAX April 2010 Cy Hay Product Manager, Synopsys Introduction The most important trend

More information

Model Checking based Software Verification

Model Checking based Software Verification Model Checking based Software Verification 18.5-2006 Keijo Heljanko Keijo.Heljanko@tkk.fi Department of Computer Science and Engineering Helsinki University of Technology http://www.tcs.tkk.fi/~kepa/ 1/24

More information

An Implementation Of Multiprocessor Linux

An Implementation Of Multiprocessor Linux An Implementation Of Multiprocessor Linux This document describes the implementation of a simple SMP Linux kernel extension and how to use this to develop SMP Linux kernels for architectures other than

More information

FAULT TOLERANCE FOR MULTIPROCESSOR SYSTEMS VIA TIME REDUNDANT TASK SCHEDULING

FAULT TOLERANCE FOR MULTIPROCESSOR SYSTEMS VIA TIME REDUNDANT TASK SCHEDULING FAULT TOLERANCE FOR MULTIPROCESSOR SYSTEMS VIA TIME REDUNDANT TASK SCHEDULING Hussain Al-Asaad and Alireza Sarvi Department of Electrical & Computer Engineering University of California Davis, CA, U.S.A.

More information

Scalable Hybrid Verification for Embedded Software

Scalable Hybrid Verification for Embedded Software Scalable Hybrid Verification for Embedded Software Jörg Behrend, Djones Lettnin, Patrick Heckeler, Jürgen Ruf, Thomas Kropf and Wolfgang Rosenstiel Wilhelm-Schickard-Institute for Computer Science Department

More information

Model Checking Distributed Software

Model Checking Distributed Software Model Checking Distributed Software Sagar Chaki September 19, 2014 Software Engineering Institute Carnegie Mellon University Pittsburgh, PA 15213 Model Checking and Me 1997 : Ed visits IIT Kharagpur Just

More information

Overview Motivating Examples Interleaving Model Semantics of Correctness Testing, Debugging, and Verification

Overview Motivating Examples Interleaving Model Semantics of Correctness Testing, Debugging, and Verification Introduction Overview Motivating Examples Interleaving Model Semantics of Correctness Testing, Debugging, and Verification Advanced Topics in Software Engineering 1 Concurrent Programs Characterized by

More information

Attaining EDF Task Scheduling with O(1) Time Complexity

Attaining EDF Task Scheduling with O(1) Time Complexity Attaining EDF Task Scheduling with O(1) Time Complexity Verber Domen University of Maribor, Faculty of Electrical Engineering and Computer Sciences, Maribor, Slovenia (e-mail: domen.verber@uni-mb.si) Abstract:

More information

Coverability for Parallel Programs

Coverability for Parallel Programs 2015 http://excel.fit.vutbr.cz Coverability for Parallel Programs Lenka Turoňová* Abstract We improve existing method for the automatic verification of systems with parallel running processes. The technique

More information

ARM Webinar series. ARM Based SoC. Abey Thomas

ARM Webinar series. ARM Based SoC. Abey Thomas ARM Webinar series ARM Based SoC Verification Abey Thomas Agenda About ARM and ARM IP ARM based SoC Verification challenges Verification planning and strategy IP Connectivity verification Performance verification

More information

Quantum Support for Multiprocessor Pfair Scheduling in Linux

Quantum Support for Multiprocessor Pfair Scheduling in Linux Quantum Support for Multiprocessor fair Scheduling in Linux John M. Calandrino and James H. Anderson Department of Computer Science, The University of North Carolina at Chapel Hill Abstract This paper

More information

Energy-aware Memory Management through Database Buffer Control

Energy-aware Memory Management through Database Buffer Control Energy-aware Memory Management through Database Buffer Control Chang S. Bae, Tayeb Jamel Northwestern Univ. Intel Corporation Presented by Chang S. Bae Goal and motivation Energy-aware memory management

More information

Energy Constrained Resource Scheduling for Cloud Environment

Energy Constrained Resource Scheduling for Cloud Environment Energy Constrained Resource Scheduling for Cloud Environment 1 R.Selvi, 2 S.Russia, 3 V.K.Anitha 1 2 nd Year M.E.(Software Engineering), 2 Assistant Professor Department of IT KSR Institute for Engineering

More information

International Journal of Computer & Organization Trends Volume20 Number1 May 2015

International Journal of Computer & Organization Trends Volume20 Number1 May 2015 Performance Analysis of Various Guest Operating Systems on Ubuntu 14.04 Prof. (Dr.) Viabhakar Pathak 1, Pramod Kumar Ram 2 1 Computer Science and Engineering, Arya College of Engineering, Jaipur, India.

More information

Development of dynamically evolving and self-adaptive software. 1. Background

Development of dynamically evolving and self-adaptive software. 1. Background Development of dynamically evolving and self-adaptive software 1. Background LASER 2013 Isola d Elba, September 2013 Carlo Ghezzi Politecnico di Milano Deep-SE Group @ DEIB 1 Requirements Functional requirements

More information

From Control Loops to Software

From Control Loops to Software CNRS-VERIMAG Grenoble, France October 2006 Executive Summary Embedded systems realization of control systems by computers Computers are the major medium for realizing controllers There is a gap between

More information

Assertion Synthesis Enabling Assertion-Based Verification For Simulation, Formal and Emulation Flows

Assertion Synthesis Enabling Assertion-Based Verification For Simulation, Formal and Emulation Flows Assertion Synthesis Enabling Assertion-Based Verification For Simulation, Formal and Emulation Flows Manual Assertion Creation is ABV Bottleneck Assertion-Based Verification adopted by leading design companies

More information

Low Power AMD Athlon 64 and AMD Opteron Processors

Low Power AMD Athlon 64 and AMD Opteron Processors Low Power AMD Athlon 64 and AMD Opteron Processors Hot Chips 2004 Presenter: Marius Evers Block Diagram of AMD Athlon 64 and AMD Opteron Based on AMD s 8 th generation architecture AMD Athlon 64 and AMD

More information

Achieving Nanosecond Latency Between Applications with IPC Shared Memory Messaging

Achieving Nanosecond Latency Between Applications with IPC Shared Memory Messaging Achieving Nanosecond Latency Between Applications with IPC Shared Memory Messaging In some markets and scenarios where competitive advantage is all about speed, speed is measured in micro- and even nano-seconds.

More information

Ready Time Observations

Ready Time Observations VMWARE PERFORMANCE STUDY VMware ESX Server 3 Ready Time Observations VMware ESX Server is a thin software layer designed to multiplex hardware resources efficiently among virtual machines running unmodified

More information

ACANO SOLUTION VIRTUALIZED DEPLOYMENTS. White Paper. Simon Evans, Acano Chief Scientist

ACANO SOLUTION VIRTUALIZED DEPLOYMENTS. White Paper. Simon Evans, Acano Chief Scientist ACANO SOLUTION VIRTUALIZED DEPLOYMENTS White Paper Simon Evans, Acano Chief Scientist Updated April 2015 CONTENTS Introduction... 3 Host Requirements... 5 Sizing a VM... 6 Call Bridge VM... 7 Acano Edge

More information

Production Flash Programming Best Practices for Kinetis K- and L-series MCUs

Production Flash Programming Best Practices for Kinetis K- and L-series MCUs Freescale Semiconductor Document Number:AN4835 Application Note Rev 1, 05/2014 Production Flash Programming Best Practices for Kinetis K- and L-series MCUs by: Melissa Hunter 1 Introduction This application

More information

CHAPTER 1 INTRODUCTION

CHAPTER 1 INTRODUCTION CHAPTER 1 INTRODUCTION 1.1 Background The command over cloud computing infrastructure is increasing with the growing demands of IT infrastructure during the changed business scenario of the 21 st Century.

More information

Dynamic resource management for energy saving in the cloud computing environment

Dynamic resource management for energy saving in the cloud computing environment Dynamic resource management for energy saving in the cloud computing environment Liang-Teh Lee, Kang-Yuan Liu, and Hui-Yang Huang Department of Computer Science and Engineering, Tatung University, Taiwan

More information

PERFORMANCE ANALYSIS OF KERNEL-BASED VIRTUAL MACHINE

PERFORMANCE ANALYSIS OF KERNEL-BASED VIRTUAL MACHINE PERFORMANCE ANALYSIS OF KERNEL-BASED VIRTUAL MACHINE Sudha M 1, Harish G M 2, Nandan A 3, Usha J 4 1 Department of MCA, R V College of Engineering, Bangalore : 560059, India sudha.mooki@gmail.com 2 Department

More information

Firewall Verification and Redundancy Checking are Equivalent

Firewall Verification and Redundancy Checking are Equivalent Firewall Verification and Redundancy Checking are Equivalent H. B. Acharya University of Texas at Austin acharya@cs.utexas.edu M. G. Gouda National Science Foundation University of Texas at Austin mgouda@nsf.gov

More information

[Refer Slide Time: 05:10]

[Refer Slide Time: 05:10] Principles of Programming Languages Prof: S. Arun Kumar Department of Computer Science and Engineering Indian Institute of Technology Delhi Lecture no 7 Lecture Title: Syntactic Classes Welcome to lecture

More information

bigdata Managing Scale in Ontological Systems

bigdata Managing Scale in Ontological Systems Managing Scale in Ontological Systems 1 This presentation offers a brief look scale in ontological (semantic) systems, tradeoffs in expressivity and data scale, and both information and systems architectural

More information

Managing Data Center Power and Cooling

Managing Data Center Power and Cooling White PAPER Managing Data Center Power and Cooling Introduction: Crisis in Power and Cooling As server microprocessors become more powerful in accordance with Moore s Law, they also consume more power

More information

Using Patterns and Composite Propositions to Automate the Generation of Complex LTL

Using Patterns and Composite Propositions to Automate the Generation of Complex LTL University of Texas at El Paso DigitalCommons@UTEP Departmental Technical Reports (CS) Department of Computer Science 8-1-2007 Using Patterns and Composite Propositions to Automate the Generation of Complex

More information

Digitale Signalverarbeitung mit FPGA (DSF) Soft Core Prozessor NIOS II Stand Mai 2007. Jens Onno Krah

Digitale Signalverarbeitung mit FPGA (DSF) Soft Core Prozessor NIOS II Stand Mai 2007. Jens Onno Krah (DSF) Soft Core Prozessor NIOS II Stand Mai 2007 Jens Onno Krah Cologne University of Applied Sciences www.fh-koeln.de jens_onno.krah@fh-koeln.de NIOS II 1 1 What is Nios II? Altera s Second Generation

More information

Context-Bounded Model Checking of LTL Properties for ANSI-C Software. Jeremy Morse, Lucas Cordeiro, Bernd Fischer, Denis Nicole

Context-Bounded Model Checking of LTL Properties for ANSI-C Software. Jeremy Morse, Lucas Cordeiro, Bernd Fischer, Denis Nicole Context-Bounded Model Checking of LTL Properties for ANSI-C Software Jeremy Morse, Lucas Cordeiro, Bernd Fischer, Denis Nicole Model Checking C Model checking: normally applied to formal state transition

More information

HANDLING SUSPEND MODE ON A USB MOUSE

HANDLING SUSPEND MODE ON A USB MOUSE APPLICATION NOTE HANDLING SUSPEND MODE ON A USB MOUSE by Microcontroller Division Application Team INTRODUCTION All USB devices must support Suspend mode. Suspend mode enables the devices to enter low-power

More information

Performance Tuning Guidelines for PowerExchange for Microsoft Dynamics CRM

Performance Tuning Guidelines for PowerExchange for Microsoft Dynamics CRM Performance Tuning Guidelines for PowerExchange for Microsoft Dynamics CRM 1993-2016 Informatica LLC. No part of this document may be reproduced or transmitted in any form, by any means (electronic, photocopying,

More information

Load Testing 2U Rockbochs System

Load Testing 2U Rockbochs System Load Testing 2U Rockbochs System The purpose of this paper is to discuss the results of load testing the 2U system from Rockbochs. The system in question had the following hardware: Intel Celeron Processor

More information

Formal Verification and Linear-time Model Checking

Formal Verification and Linear-time Model Checking Formal Verification and Linear-time Model Checking Paul Jackson University of Edinburgh Automated Reasoning 21st and 24th October 2013 Why Automated Reasoning? Intellectually stimulating and challenging

More information

Power Management in Cloud Computing using Green Algorithm. -Kushal Mehta COP 6087 University of Central Florida

Power Management in Cloud Computing using Green Algorithm. -Kushal Mehta COP 6087 University of Central Florida Power Management in Cloud Computing using Green Algorithm -Kushal Mehta COP 6087 University of Central Florida Motivation Global warming is the greatest environmental challenge today which is caused by

More information

Delivering Quality in Software Performance and Scalability Testing

Delivering Quality in Software Performance and Scalability Testing Delivering Quality in Software Performance and Scalability Testing Abstract Khun Ban, Robert Scott, Kingsum Chow, and Huijun Yan Software and Services Group, Intel Corporation {khun.ban, robert.l.scott,

More information

Using Fuzzy Logic Control to Provide Intelligent Traffic Management Service for High-Speed Networks ABSTRACT:

Using Fuzzy Logic Control to Provide Intelligent Traffic Management Service for High-Speed Networks ABSTRACT: Using Fuzzy Logic Control to Provide Intelligent Traffic Management Service for High-Speed Networks ABSTRACT: In view of the fast-growing Internet traffic, this paper propose a distributed traffic management

More information

DELL. Virtual Desktop Infrastructure Study END-TO-END COMPUTING. Dell Enterprise Solutions Engineering

DELL. Virtual Desktop Infrastructure Study END-TO-END COMPUTING. Dell Enterprise Solutions Engineering DELL Virtual Desktop Infrastructure Study END-TO-END COMPUTING Dell Enterprise Solutions Engineering 1 THIS WHITE PAPER IS FOR INFORMATIONAL PURPOSES ONLY, AND MAY CONTAIN TYPOGRAPHICAL ERRORS AND TECHNICAL

More information

INSIDE. Preventing Data Loss. > Disaster Recovery Types and Categories. > Disaster Recovery Site Types. > Disaster Recovery Procedure Lists

INSIDE. Preventing Data Loss. > Disaster Recovery Types and Categories. > Disaster Recovery Site Types. > Disaster Recovery Procedure Lists Preventing Data Loss INSIDE > Disaster Recovery Types and Categories > Disaster Recovery Site Types > Disaster Recovery Procedure Lists > Business Continuity Plan 1 Preventing Data Loss White Paper Overview

More information

A Logic Approach for LTL System Modification

A Logic Approach for LTL System Modification A Logic Approach for LTL System Modification Yulin Ding and Yan Zhang School of Computing & Information Technology University of Western Sydney Kingswood, N.S.W. 1797, Australia email: {yding,yan}@cit.uws.edu.au

More information

A Static Analyzer for Large Safety-Critical Software. Considered Programs and Semantics. Automatic Program Verification by Abstract Interpretation

A Static Analyzer for Large Safety-Critical Software. Considered Programs and Semantics. Automatic Program Verification by Abstract Interpretation PLDI 03 A Static Analyzer for Large Safety-Critical Software B. Blanchet, P. Cousot, R. Cousot, J. Feret L. Mauborgne, A. Miné, D. Monniaux,. Rival CNRS École normale supérieure École polytechnique Paris

More information

Intel s SL Enhanced Intel486(TM) Microprocessor Family

Intel s SL Enhanced Intel486(TM) Microprocessor Family Intel s SL Enhanced Intel486(TM) Microprocessor Family June 1993 Intel's SL Enhanced Intel486 Microprocessor Family Technical Backgrounder Intel's SL Enhanced Intel486 Microprocessor Family With the announcement

More information

Tilburg University. Publication date: 2010. Link to publication

Tilburg University. Publication date: 2010. Link to publication Tilburg University On the formal specification of business contracts and regulatory compliance Elgammal, Onbekend; Türetken, O.; van den Heuvel, Willem-Jan; Papazoglou, Mike Published in: Proceedings of

More information

Formal verification of contracts for synchronous software components using NuSMV

Formal verification of contracts for synchronous software components using NuSMV Formal verification of contracts for synchronous software components using NuSMV Tobias Polzer Lehrstuhl für Informatik 8 Bachelorarbeit 13.05.2014 1 / 19 Problem description and goals Problem description

More information

Software based Finite State Machine (FSM) with general purpose processors

Software based Finite State Machine (FSM) with general purpose processors Software based Finite State Machine (FSM) with general purpose processors White paper Joseph Yiu January 2013 Overview Finite state machines (FSM) are commonly used in electronic designs. FSM can be used

More information

Resource Utilization of Middleware Components in Embedded Systems

Resource Utilization of Middleware Components in Embedded Systems Resource Utilization of Middleware Components in Embedded Systems 3 Introduction System memory, CPU, and network resources are critical to the operation and performance of any software system. These system

More information

Digital Design Verification

Digital Design Verification Digital Design Verification Course Instructor: Debdeep Mukhopadhyay Dept of Computer Sc. and Engg. Indian Institute of Technology Madras, Even Semester Course No: CS 676 1 Verification??? What is meant

More information

Hillstone StoneOS User Manual Hillstone Unified Intelligence Firewall Installation Manual

Hillstone StoneOS User Manual Hillstone Unified Intelligence Firewall Installation Manual Hillstone StoneOS User Manual Hillstone Unified Intelligence Firewall Installation Manual www.hillstonenet.com Preface Conventions Content This document follows the conventions below: CLI Tip: provides

More information

PCI Express Overview. And, by the way, they need to do it in less time.

PCI Express Overview. And, by the way, they need to do it in less time. PCI Express Overview Introduction This paper is intended to introduce design engineers, system architects and business managers to the PCI Express protocol and how this interconnect technology fits into

More information

JOURNAL OF OBJECT TECHNOLOGY

JOURNAL OF OBJECT TECHNOLOGY JOURNAL OF OBJECT TECHNOLOGY Online at http://www.jot.fm. Published by ETH Zurich, Chair of Software Engineering JOT, 2006 Vol. 5, No. 6, July - August 2006 On Assuring Software Quality and Curbing Software

More information

Computer Network. Interconnected collection of autonomous computers that are able to exchange information

Computer Network. Interconnected collection of autonomous computers that are able to exchange information Introduction Computer Network. Interconnected collection of autonomous computers that are able to exchange information No master/slave relationship between the computers in the network Data Communications.

More information

Testing LTL Formula Translation into Büchi Automata

Testing LTL Formula Translation into Büchi Automata Testing LTL Formula Translation into Büchi Automata Heikki Tauriainen and Keijo Heljanko Helsinki University of Technology, Laboratory for Theoretical Computer Science, P. O. Box 5400, FIN-02015 HUT, Finland

More information

evm Virtualization Platform for Windows

evm Virtualization Platform for Windows B A C K G R O U N D E R evm Virtualization Platform for Windows Host your Embedded OS and Windows on a Single Hardware Platform using Intel Virtualization Technology April, 2008 TenAsys Corporation 1400

More information

Offloading file search operation for performance improvement of smart phones

Offloading file search operation for performance improvement of smart phones Offloading file search operation for performance improvement of smart phones Ashutosh Jain mcs112566@cse.iitd.ac.in Vigya Sharma mcs112564@cse.iitd.ac.in Shehbaz Jaffer mcs112578@cse.iitd.ac.in Kolin Paul

More information

J-Sim: An Integrated Environment for Simulation and Model Checking of Network Protocols

J-Sim: An Integrated Environment for Simulation and Model Checking of Network Protocols J-Sim: An Integrated Environment for Simulation and Model Checking of Network Protocols Ahmed Sobeih, Mahesh Viswanathan, Darko Marinov and Jennifer C. Hou Department of Computer Science University of

More information

7a. System-on-chip design and prototyping platforms

7a. System-on-chip design and prototyping platforms 7a. System-on-chip design and prototyping platforms Labros Bisdounis, Ph.D. Department of Computer and Communication Engineering 1 What is System-on-Chip (SoC)? System-on-chip is an integrated circuit

More information

Pharos Control User Guide

Pharos Control User Guide Outdoor Wireless Solution Pharos Control User Guide REV1.0.0 1910011083 Contents Contents... I Chapter 1 Quick Start Guide... 1 1.1 Introduction... 1 1.2 Installation... 1 1.3 Before Login... 8 Chapter

More information

A Dynamic Assertion-based verification platform for UML Statecharts over Rhapsody

A Dynamic Assertion-based verification platform for UML Statecharts over Rhapsody A Dynamic Assertion-based verification platform for UML Statecharts over Rhapsody A. Banerjee S. Ray P. Dasgupta P.P. Chakrabarti Department of Computer Sc. & Engg. IIT Kharagpur, India - 721302 S. Ramesh

More information

Software Engineering Reference Framework

Software Engineering Reference Framework Software Engineering Reference Framework Michel Chaudron, Jan Friso Groote, Kees van Hee, Kees Hemerik, Lou Somers, Tom Verhoeff. Department of Mathematics and Computer Science Eindhoven University of

More information

Fault Modeling. Why model faults? Some real defects in VLSI and PCB Common fault models Stuck-at faults. Transistor faults Summary

Fault Modeling. Why model faults? Some real defects in VLSI and PCB Common fault models Stuck-at faults. Transistor faults Summary Fault Modeling Why model faults? Some real defects in VLSI and PCB Common fault models Stuck-at faults Single stuck-at faults Fault equivalence Fault dominance and checkpoint theorem Classes of stuck-at

More information

Operating System Impact on SMT Architecture

Operating System Impact on SMT Architecture Operating System Impact on SMT Architecture The work published in An Analysis of Operating System Behavior on a Simultaneous Multithreaded Architecture, Josh Redstone et al., in Proceedings of the 9th

More information

Automatic Verification by Abstract Interpretation

Automatic Verification by Abstract Interpretation Automatic Verification by Abstract Interpretation (Invited tutorial) Patrick Cousot École normale supérieure, Département d informatique, 45 rue d Ulm, 75230 Paris cedex 05, France Patrick.Cousot@ens.fr

More information

STUDY OF PERFORMANCE COUNTERS AND PROFILING TOOLS TO MONITOR PERFORMANCE OF APPLICATION

STUDY OF PERFORMANCE COUNTERS AND PROFILING TOOLS TO MONITOR PERFORMANCE OF APPLICATION STUDY OF PERFORMANCE COUNTERS AND PROFILING TOOLS TO MONITOR PERFORMANCE OF APPLICATION 1 DIPAK PATIL, 2 PRASHANT KHARAT, 3 ANIL KUMAR GUPTA 1,2 Depatment of Information Technology, Walchand College of

More information

ADVANCED PROCESSOR ARCHITECTURES AND MEMORY ORGANISATION Lesson-12: ARM

ADVANCED PROCESSOR ARCHITECTURES AND MEMORY ORGANISATION Lesson-12: ARM ADVANCED PROCESSOR ARCHITECTURES AND MEMORY ORGANISATION Lesson-12: ARM 1 The ARM architecture processors popular in Mobile phone systems 2 ARM Features ARM has 32-bit architecture but supports 16 bit

More information

Automated Theorem Proving - summary of lecture 1

Automated Theorem Proving - summary of lecture 1 Automated Theorem Proving - summary of lecture 1 1 Introduction Automated Theorem Proving (ATP) deals with the development of computer programs that show that some statement is a logical consequence of

More information

Elemental functions: Writing data-parallel code in C/C++ using Intel Cilk Plus

Elemental functions: Writing data-parallel code in C/C++ using Intel Cilk Plus Elemental functions: Writing data-parallel code in C/C++ using Intel Cilk Plus A simple C/C++ language extension construct for data parallel operations Robert Geva robert.geva@intel.com Introduction Intel

More information

Combining Software and Hardware Verification Techniques

Combining Software and Hardware Verification Techniques Formal Methods in System Design, 21, 251 280, 2002 c 2002 Kluwer Academic Publishers. Manufactured in The Netherlands. Combining Software and Hardware Verification Techniques ROBERT P. KURSHAN VLADIMIR

More information

Dynamic Load Balancing of Virtual Machines using QEMU-KVM

Dynamic Load Balancing of Virtual Machines using QEMU-KVM Dynamic Load Balancing of Virtual Machines using QEMU-KVM Akshay Chandak Krishnakant Jaju Technology, College of Engineering, Pune. Maharashtra, India. Akshay Kanfade Pushkar Lohiya Technology, College

More information

Cisco UCS and Fusion- io take Big Data workloads to extreme performance in a small footprint: A case study with Oracle NoSQL database

Cisco UCS and Fusion- io take Big Data workloads to extreme performance in a small footprint: A case study with Oracle NoSQL database Cisco UCS and Fusion- io take Big Data workloads to extreme performance in a small footprint: A case study with Oracle NoSQL database Built up on Cisco s big data common platform architecture (CPA), a

More information

DESIGN AND VERIFICATION OF LSR OF THE MPLS NETWORK USING VHDL

DESIGN AND VERIFICATION OF LSR OF THE MPLS NETWORK USING VHDL IJVD: 3(1), 2012, pp. 15-20 DESIGN AND VERIFICATION OF LSR OF THE MPLS NETWORK USING VHDL Suvarna A. Jadhav 1 and U.L. Bombale 2 1,2 Department of Technology Shivaji university, Kolhapur, 1 E-mail: suvarna_jadhav@rediffmail.com

More information

Power Efficiency Comparison: Cisco UCS 5108 Blade Server Chassis and IBM FlexSystem Enterprise Chassis

Power Efficiency Comparison: Cisco UCS 5108 Blade Server Chassis and IBM FlexSystem Enterprise Chassis White Paper Power Efficiency Comparison: Cisco UCS 5108 Blade Server Chassis and IBM FlexSystem Enterprise Chassis White Paper March 2014 2014 Cisco and/or its affiliates. All rights reserved. This document

More information

A Content-Based Load Balancing Algorithm for Metadata Servers in Cluster File Systems*

A Content-Based Load Balancing Algorithm for Metadata Servers in Cluster File Systems* A Content-Based Load Balancing Algorithm for Metadata Servers in Cluster File Systems* Junho Jang, Saeyoung Han, Sungyong Park, and Jihoon Yang Department of Computer Science and Interdisciplinary Program

More information

EWeb: Highly Scalable Client Transparent Fault Tolerant System for Cloud based Web Applications

EWeb: Highly Scalable Client Transparent Fault Tolerant System for Cloud based Web Applications ECE6102 Dependable Distribute Systems, Fall2010 EWeb: Highly Scalable Client Transparent Fault Tolerant System for Cloud based Web Applications Deepal Jayasinghe, Hyojun Kim, Mohammad M. Hossain, Ali Payani

More information

Universal Flash Storage: Mobilize Your Data

Universal Flash Storage: Mobilize Your Data White Paper Universal Flash Storage: Mobilize Your Data Executive Summary The explosive growth in portable devices over the past decade continues to challenge manufacturers wishing to add memory to their

More information

Binary search tree with SIMD bandwidth optimization using SSE

Binary search tree with SIMD bandwidth optimization using SSE Binary search tree with SIMD bandwidth optimization using SSE Bowen Zhang, Xinwei Li 1.ABSTRACT In-memory tree structured index search is a fundamental database operation. Modern processors provide tremendous

More information

Virtuoso and Database Scalability

Virtuoso and Database Scalability Virtuoso and Database Scalability By Orri Erling Table of Contents Abstract Metrics Results Transaction Throughput Initializing 40 warehouses Serial Read Test Conditions Analysis Working Set Effect of

More information

TPCalc : a throughput calculator for computer architecture studies

TPCalc : a throughput calculator for computer architecture studies TPCalc : a throughput calculator for computer architecture studies Pierre Michaud Stijn Eyerman Wouter Rogiest IRISA/INRIA Ghent University Ghent University pierre.michaud@inria.fr Stijn.Eyerman@elis.UGent.be

More information

FoREnSiC An Automatic Debugging Environment for C Programs

FoREnSiC An Automatic Debugging Environment for C Programs FoREnSiC An Automatic Debugging Environment for C Programs Roderick Bloem 1, Rolf Drechsler 2, Görschwin Fey 2, Alexander Finder 2, Georg Hofferek 1, Robert Könighofer 1, Jaan Raik 3, Urmas Repinski 3,

More information

Oracle BI EE Implementation on Netezza. Prepared by SureShot Strategies, Inc.

Oracle BI EE Implementation on Netezza. Prepared by SureShot Strategies, Inc. Oracle BI EE Implementation on Netezza Prepared by SureShot Strategies, Inc. The goal of this paper is to give an insight to Netezza architecture and implementation experience to strategize Oracle BI EE

More information

The Benefits of POWER7+ and PowerVM over Intel and an x86 Hypervisor

The Benefits of POWER7+ and PowerVM over Intel and an x86 Hypervisor The Benefits of POWER7+ and PowerVM over Intel and an x86 Hypervisor Howard Anglin rhbear@us.ibm.com IBM Competitive Project Office May 2013 Abstract...3 Virtualization and Why It Is Important...3 Resiliency

More information

E-commerce Verification of Embedded Software in Medical Devices

E-commerce Verification of Embedded Software in Medical Devices 2009 International Conferences on Embedded Software and Systems Semiformal Verification of Embedded Software in Medical Devices Considering Stringent Hardware Constraints Lucas Cordeiro 1, Bernd Fischer

More information

Security Overview of the Integrity Virtual Machines Architecture

Security Overview of the Integrity Virtual Machines Architecture Security Overview of the Integrity Virtual Machines Architecture Introduction... 2 Integrity Virtual Machines Architecture... 2 Virtual Machine Host System... 2 Virtual Machine Control... 2 Scheduling

More information

SYSTEM ecos Embedded Configurable Operating System

SYSTEM ecos Embedded Configurable Operating System BELONGS TO THE CYGNUS SOLUTIONS founded about 1989 initiative connected with an idea of free software ( commercial support for the free software ). Recently merged with RedHat. CYGNUS was also the original

More information

Verifying Semantic of System Composition for an Aspect-Oriented Approach

Verifying Semantic of System Composition for an Aspect-Oriented Approach 2012 International Conference on System Engineering and Modeling (ICSEM 2012) IPCSIT vol. 34 (2012) (2012) IACSIT Press, Singapore Verifying Semantic of System Composition for an Aspect-Oriented Approach

More information

Computer Systems Structure Input/Output

Computer Systems Structure Input/Output Computer Systems Structure Input/Output Peripherals Computer Central Processing Unit Main Memory Computer Systems Interconnection Communication lines Input Output Ward 1 Ward 2 Examples of I/O Devices

More information

EMC Unified Storage for Microsoft SQL Server 2008

EMC Unified Storage for Microsoft SQL Server 2008 EMC Unified Storage for Microsoft SQL Server 2008 Enabled by EMC CLARiiON and EMC FAST Cache Reference Copyright 2010 EMC Corporation. All rights reserved. Published October, 2010 EMC believes the information

More information

GameTime: A Toolkit for Timing Analysis of Software

GameTime: A Toolkit for Timing Analysis of Software GameTime: A Toolkit for Timing Analysis of Software Sanjit A. Seshia and Jonathan Kotker EECS Department, UC Berkeley {sseshia,jamhoot}@eecs.berkeley.edu Abstract. Timing analysis is a key step in the

More information

T-79.186 Reactive Systems: Introduction and Finite State Automata

T-79.186 Reactive Systems: Introduction and Finite State Automata T-79.186 Reactive Systems: Introduction and Finite State Automata Timo Latvala 14.1.2004 Reactive Systems: Introduction and Finite State Automata 1-1 Reactive Systems Reactive systems are a class of software

More information