RISC Processors. Hierarchical VLSI Design. Multiple Layered Architecture. 6. Case Study: Formal Verification of RISC Processors using HOL

Size: px
Start display at page:

Download "RISC Processors. Hierarchical VLSI Design. Multiple Layered Architecture. 6. Case Study: Formal Verification of RISC Processors using HOL"

Transcription

1 6. Case Study: Formal Verfcaton of RISC Processors usng HOL RISC Processors Motvaton RISC Verfcaton Model Dervng Formal Specfcatons Verfcaton Tasks Ppelne Correctness Processor Specfc Defntons Expermental Results Conclusons References Page Advantages: Popular and used n a wde range of applcatons Smaller and smpler nstructon set than CISCs Herarchcal and well structured Problems: Reasonng about the ppelne verfcaton Complexty of contemporary RISC-Processors Restrcton to the core archtecture 6. (of 29) 6.2 (of 29) Multple Layered Archtecture Herarchcal VLSI Desgn Archtecture Core Archtecture: RISC processor base Basc ppelne Basc nstructon set (nteger, logc, load/ store, control) Protected Archtecture Numerc Archtecture Core Archtecture RTL Desgn Logc Gates Net. Transstor Net. Layout 6.3 (of 29) 6.4 (of 29)

2 Formal Verfcaton of Mcroprocessors RISC Instructon Executon ADD R Rj SUB R Rj JMP ### MOV R Rj Instr. Set MEM PC RF Prog. Model HW-Desgn RISC Instructon: Ppelne Stages: Clock Phases: Instructon Cycle u u+ IF ID WB t t+ t t+n s Clock n p 2 Specfcaton Proof Implementaton 3 4 Behavoral Descrpton Structural Descrpton Bus pr. Ppelne Stage RF read 6.5 (of 29) 6.6 (of 29) Instructon Classes MIPS Ppelne Structure Ppelne stages IF ID EX MEM WB ALU IF_X ID_X ALUOUT A op B MEM_A WB_A LOAD IF_X A RF [rs] 2 B RF [rs2] STORE IR M[PC] PC PC+4 2 IR IR EX_L MEM_L RF [rd] LMDR ID_X EX_S M[DMAR SMDR CONTROL IF_X ID_C Instructon Classes Class nstructon: corresponds to the set of nstructons wth smlar semantcs, e.g. ALU, FLP, LOAD, CONTROL abstracts the behavor of a group of nstructons, e.g. ALU:= (ADD,SUB,SHIFT,OR, ) Class Level: set of all nstructon classes Class abstracton orented proofs: -reducng the verfcaton overhead -reasonng about few class nstructons -nstantatng the obtaned theorems for nstructons at the archtectural level 6.7 (of 29) 6.8 (of 29) 2

3 RISC Verfcaton Model Dervng Formal Specfcatons Archtecture and class levels: Archtecture Level Class Level Stage Level Phase Level Abstracton Specfed usng the nstructon cycle tme granularty Derved automatcally from the nstructon set Example: - Manual: ADD:= RF[rd] RF[rs] + RF[rs2] - Archtecture Level: ADD_Instr (...):= u:inst_cycle. RF(u+)[rd(u)] = RF(u)[rs(u)] + RF(u)[rs2(u)] Hardware (RTL) - Class Level: ALU_Instr (...):= u:inst_cycle. RF(u+)[rd(u)] = RF(u)[rs(u)] op RF(u)[rs2(u)] 6.9 (of 29) 6.0 (of 29) Dervng Formal Specfcatons Stage and phase levels: Specfed usng the clock cycle or the clock phase tme granulartes Derved automatcally from the ppelne structure Example: - Common ID-stage: ID_Instr (...):= t: Clk_cycle. A(t+) = RF(t) [rs(t)] B(t+) = RF(t) [rs2(t)] IR(t+) = IR(t) RTL of MIPS (smplfed) ext_trap ackn Trap Control Bypass Logc IR3 IR2 IR IR Man Decode ControlUnt Datapath rd mem_data PC and Branch Logc Instr Memory mem_addr lmdr_mux rw smdr_mux alu_op a_mux,b_mux Imm rs rs2 WB MEM EX ID IF Reg.Fle ALUout A ALUout alu_op ALU B Reg.Fle LMDR DMAR rw dmem_addr dmem_data SMDR Data Memory 6. (of 29) 6.2 (of 29) 3

4 Hardware Formal Descrpton RTL: Specfed as a hardware structure (net lst) Derved automatcally from a schematc n CADENCE Formally descrbed as a herarchy of predcates: RTL (PC, I-MEM, RF,, A, B,, IR, IR, ) = rs,rs2,rd,alu_op,rw, mem_adr,. DataPath (RF, A, B, Aluout, alu_op, ) Control_Unt (PC, IR, rw, mem_adr, ) Instr_Memory (I-MEM, mem_adr, ) Data_Memory (D-MEM, dmem_adr, rw, ) Verfcaton Tasks Goal: Any nstructon sequence of the RISC archtecture s correctly executed by the mplementaton (RTL) Step: nstructons RTL Instructon Level Step 2: SW_Contrants, RTL I IF ID EX MEM WB IF ID EX MEM WB I IF ID EX MEM WB IF ID EX MEM WB I ns IF ID EX MEM WB tme Correct_Instr_Ppelnng 6.3 (of 29) 6.4 (of 29) Step : Correctness of Sngle Instructons Step 2: Ppelne Correctness Goal: The RTL mplements the semantcs of the nstructon set correctly Herarchcal proof of the Class Level: RTL Phase Level Phase Level Stage Level Stage Level Class Level Instantatons for each archtectural nstructon: RTL Phase Level Stage Level Instructon Level Automatc goal settngs usng parameterzed functons Automatc proofs usng parameterzed proof scrpts nstructons I IF ID EX MEM WB IF ID EX MEM WB I IF ID EX MEM WB IF ID EX MEM WB I ns IF ID EX MEM WB Clock n s tme Goal: all combnatons of n s nstructons n the ppelne are executed wthout conflcts 6.5 (of 29) 6.6 (of 29) 4

5 Ppelne Conflcts Facltatng the Ppelne Conflct Verfcaton Resource conflcts (structural hazards) arse from the smultaneous use of resources Data conflcts (data hazards) occur due to data dependences between the nstructons n the ppelne Control conflcts (control hazards) arse due to the lnear ppelne flow caused by control nstructons Correct_Instr_Ppelnng:= I I ns : class_nstructon. ( Resource_Conflct (I I ns )) ( Data_Conflct (I I ns )) ( Control_Conflct (I I ns )) All possble conflct combnatons between n s potental nstructons n the ppelne: multple conflcts Conflcts between pars of nstructons: dual conflcts - multple conflcts are specfed n terms of dual conflcts - verfcaton of multple conflcts s deduced from that of dual conflcts Conflct specfcatons based on the herarchy levels of the RISC model - multple and dual conflcts are consdered for each specfc level - ndependent herarchcal proof at each level possble 6.7 (of 29) 6.8 (of 29) Example: Data Conflcts RAW Data Conflct Specfcaton - Read-After-Wrte (RAW) - Wrte-After-Read (WAR) - Wrte-After-Wrte (WAW) Data_Conflct (I I ns ):= Multple_RAW_Conflct (I I ns ) Multple_WAR_Conflct (I I ns ) Multple_WAW_Conflct (I I ns ) Verfcaton goal: SW_Contrants, RTL Multple_RAW_Conflct (I I ns ) Multple_WAR_Conflct (I I ns ) Multple_WAW_Conflct (I I ns ) Multple Conflct: nstructons I I I ns Multple_RAW_Conflct (I I ns ):= Dual_RAW_Conflct ((I, t ), (I j, t +j-)), j (, j =... n s ) ( < j) Dual Conflct: Dual_RAW_Conflct ((I, t ), (I j, t j)):= Stage_RAW_Conflct ( ) Phase_RAW_Conflct ( ) n s tme 6.9 (of 29) 6.20 (of 29) 5

6 RAW Data Conflct Specfcaton RAW Data Conflct Verfcaton Stage Level Conflct: Stage_RAW_Conflct ( ):= (t j - t ) (s - s j) Stage_Range (I, s, r) Stage_Doman (I j, s j,r) I I j j t R j s j s t W Ultmate goal: I I ns. Multple_RAW_Conflct (I I ns ) Step : I I j. j. Dual_RAW_Conflct ((I, t ), (I, t j)) j Phase Level Conflct: Phase_RAW_Conflct ( ):= ( j - ) (s - s j) (p j p ) Phase_Range (I,s,p,r) Phase_Doman (I, s, p, j j j S S j 0 /j p p np P P j R j W Step 2: ( Dual_RAW_Conflct) ( Multple_RAW_Conflct) Step 2 s straghtforward Step s equvalent to: Stage_RAW_Conflct) [( Phase_RAW_Conflct) ] 6.2 (of 29) 6.22 (of 29) Goal: Stage RAW Data Conflct Verfcaton II j. t t j. s s j. r. Stage_RAW_Conflct ( ) Processor Specfc Defntons Enumeraton types for ppelne characterstcs: ppelne_stage = IF ID EX MEM WB clock_phase = Tactc: DATA_CONFLICT_TAC Stage_RAW_Conflct Subgoals: (I = LOAD), (I j= ALU), [(s = WB), (s j = ID), (r = RF) ] ( j - ) 3 Resoluton n software ( delayed load ): SW_Constrant:= [(I = LOAD) (Ij = ALU) (r = RF) ] (( t j - t ) 3) Enumeraton types for class, stage and phase nstructons: class_nstructon = ALU ALU_I LOAD STORE CONTROL stage_nstructon = phase_nstructon = Enumeraton types for level correspondng resources: CL_resource = PC RF of RF_addr I_MEM D_MEM IAR SL_resource = PL_resource = 6.23 (of 29) 6.24 (of 29) 6

7 RISC Verfcaton Methodology Expermental Results ADD R Rj SUB R Rj JMP ### MOV R Rj Arch. Level Class Level SemantcalCorrectness Class Abstracton Model Constructon Archtecture Level Stage Level Class Level Stage Level Phase Level RTL Phase Level RTL SW- Constr. Ppelne Correctness Verfcaton Goal Tme n sec Comments Predcates Extractons Resource Conflcts Conflcts RAW Conflcts Conflct cases WAR Conflcts Conflcts WAW Conflcts Conflcts Control Conflcts Conflct case Ppelne Correctness Semantcal Correctness MIPS Verfcaton (h 33mn) 6.25 (of 29) 6.26 (of 29) Expermental Results (MIPS Processor) Conclusons RISC core CPU 32 bt archtecture 5 nstructons 5 stage ppelne mplemented n CADENCE Complexty: 50,000 transstors verfed down to RTL n HOL Theorem-prover based verfcaton could be automated by restrctng to classes of crcuts: RISC processors Novel herarchcal Specfcaton and Verfcatonmodel Overhead reducton usng the noton of nstructon classes Two ndependent verfcaton tasks: - semantcal and - ppelne correctness Automatc verfcaton usng few generalzed tactcs Processor ndependent verfcaton methodology Overall methodology mplemented n the HOL system Applcaton on a typcal RISC processor (MIPS) 6.27 (of 29) 6.28 (of 29) 7

8 References. S. Tahar and R. Kumar: A Practcal Methodology for the Formal Verfcaton of RISC Processors; Formal Methods n Systems Desgn, Vol. 3, No. 2, September 998, Kluwer Academc Publshers, pp S. Tahar and R. Kumar: Formal Specfcaton and Verfcaton Technques for RISC-Ppelne Conflcts; The Computer Journal, Vol. 38, No. 2, July 995, Oxford Unversty Press, pp (of 29) 8

CMP N 301 Computer Architecture. Appendix C

CMP N 301 Computer Architecture. Appendix C CMP N 301 Computer Architecture Appendix C Outline Introduction Pipelining Hazards Pipelining Implementation Exception Handling Advanced Issues (Dynamic Scheduling, Out of order Issue, Superscalar, etc)

More information

ECE 3401 Lecture 23. Pipeline Design. State Table for 2-Cycle Instructions. Control Unit. ISA: Instruction Specifications (for reference)

ECE 3401 Lecture 23. Pipeline Design. State Table for 2-Cycle Instructions. Control Unit. ISA: Instruction Specifications (for reference) ECE 3401 Lecture 23 Pipeline Design Control State Register Combinational Control Logic New/ Modified Control Word ISA: Instruction Specifications (for reference) P C P C + 1 I N F I R M [ P C ] E X 0 PC

More information

Project Two RISC Processor Implementation ECE 485

Project Two RISC Processor Implementation ECE 485 Project Two RISC Processor Implementation ECE 485 Chenqi Bao Peter Chinetti November 6, 2013 Instructor: Professor Borkar 1 Statement of Problem This project requires the design and test of a RISC processor

More information

3. (2) What is the difference between fixed and hybrid instructions?

3. (2) What is the difference between fixed and hybrid instructions? 1. (2 pts) What is a "balanced" pipeline? 2. (2 pts) What are the two main ways to define performance? 3. (2) What is the difference between fixed and hybrid instructions? 4. (2 pts) Clock rates have grown

More information

TOPICS MULTIPLIERLESS FILTER DESIGN ELEMENTARY SCHOOL ALGORITHM MULTIPLICATION

TOPICS MULTIPLIERLESS FILTER DESIGN ELEMENTARY SCHOOL ALGORITHM MULTIPLICATION 1 2 MULTIPLIERLESS FILTER DESIGN Realzaton of flters wthout full-fledged multplers Some sldes based on support materal by W. Wolf for hs book Modern VLSI Desgn, 3 rd edton. Partly based on followng papers:

More information

Clock-Gating and Its Application to Low Power Design of Sequential Circuits

Clock-Gating and Its Application to Low Power Design of Sequential Circuits Clock-Gatng and Its Applcaton to Low Power Desgn of Sequental Crcuts ng WU Department of Electrcal Engneerng-Systems, Unversty of Southern Calforna Los Angeles, CA 989, USA, Phone: (23)74-448 Massoud PEDRAM

More information

Pipelining. Traditional Execution. CS 365 Lecture 12 Prof. Yih Huang. add ld beq CS CS 365 2

Pipelining. Traditional Execution. CS 365 Lecture 12 Prof. Yih Huang. add ld beq CS CS 365 2 Pipelining CS 365 Lecture 12 Prof. Yih Huang CS 365 1 Traditional Execution 1 2 3 4 1 2 3 4 5 1 2 3 add ld beq CS 365 2 1 Pipelined Execution 1 2 3 4 5 1 2 3 4 5 1 2 3 4 5 1 2 3 4 5 1 2 3 4 5 1 2 3 4 5

More information

L07-L09 recap: Fundamental lesson(s)!

L07-L09 recap: Fundamental lesson(s)! L7-L9 recap: Fundamental lesson(s)! Over the next 3 lectures (using the IPS ISA as context) I ll explain:! How functions are treated and processed in assembly! How system calls are enabled in assembly!

More information

A New Design of Multiplier using Modified Booth Algorithm and Reversible Gate Logic

A New Design of Multiplier using Modified Booth Algorithm and Reversible Gate Logic Internatonal Journal of Computer Applcatons Technology and Research A New Desgn of Multpler usng Modfed Booth Algorthm and Reversble Gate Logc K.Nagarjun Department of ECE Vardhaman College of Engneerng,

More information

An Integrated OR/CP Method for Planning and Scheduling

An Integrated OR/CP Method for Planning and Scheduling An Integrated OR/CP Method for Plannng and Schedulng John Hooer Carnege Mellon Unversty IT Unversty of Copenhagen June 2005 The Problem Allocate tass to facltes. Schedule tass assgned to each faclty. Subect

More information

NP-Completeness : Proofs

NP-Completeness : Proofs NP-Completeness : Proofs Proof Methods A method to show a decson problem Π NP-complete s as follows. (1) Show Π NP. (2) Choose an NP-complete problem Π. (3) Show Π Π. A method to show an optmzaton problem

More information

Some Consequences. Example of Extended Euclidean Algorithm. The Fundamental Theorem of Arithmetic, II. Characterizing the GCD and LCM

Some Consequences. Example of Extended Euclidean Algorithm. The Fundamental Theorem of Arithmetic, II. Characterizing the GCD and LCM Example of Extended Eucldean Algorthm Recall that gcd(84, 33) = gcd(33, 18) = gcd(18, 15) = gcd(15, 3) = gcd(3, 0) = 3 We work backwards to wrte 3 as a lnear combnaton of 84 and 33: 3 = 18 15 [Now 3 s

More information

ICS 233 Computer Architecture & Assembly Language

ICS 233 Computer Architecture & Assembly Language ICS 233 Computer Architecture & Assembly Language Assignment 6 Solution 1. Identify all of the RAW data dependencies in the following code. Which dependencies are data hazards that will be resolved by

More information

A Reconfigurable System on Chip Implementation for Elliptic Curve Cryptography over GF(2 n )

A Reconfigurable System on Chip Implementation for Elliptic Curve Cryptography over GF(2 n ) Reconfgurable System on Chp Implementaton for Ellptc Curve Cryptography over GF( n ) Mchael Jung, M. Ernst, F. Madlener, S. Huss, R. lümel Integrated Crcuts and Systems Lab Computer Scence Department Darmstadt

More information

1. (2 )Clock rates have grown by a factor of 1000 while power consumed has only grown by a factor of 30. How was this accomplished?

1. (2 )Clock rates have grown by a factor of 1000 while power consumed has only grown by a factor of 30. How was this accomplished? 1. (2 )Clock rates have grown by a factor of 1000 while power consumed has only grown by a factor of 30. How was this accomplished? 2. (2 )What are the two main ways to define performance? 3. (2 )What

More information

CPSC 3300 Spring 2017 Exam 2

CPSC 3300 Spring 2017 Exam 2 CPSC 3300 Spring 2017 Exam 2 Name: 1. Matching. Write the correct term from the list into each blank. (2 pts. each) structural hazard EPIC forwarding precise exception hardwired load-use data hazard VLIW

More information

4. (3) What do we mean when we say something is an N-operand machine?

4. (3) What do we mean when we say something is an N-operand machine? 1. (2) What are the two main ways to define performance? 2. (2) When dealing with control hazards, a prediction is not enough - what else is necessary in order to eliminate stalls? 3. (3) What is an "unbalanced"

More information

Message modification, neutral bits and boomerangs

Message modification, neutral bits and boomerangs Message modfcaton, neutral bts and boomerangs From whch round should we start countng n SHA? Antone Joux DGA and Unversty of Versalles St-Quentn-en-Yvelnes France Jont work wth Thomas Peyrn 1 Dfferental

More information

Using the Minimum Set of Input Combinations to Minimize the Area of Local Routing Networks in Logic Clusters. FPGAs. Andy Ye Ryerson University

Using the Minimum Set of Input Combinations to Minimize the Area of Local Routing Networks in Logic Clusters. FPGAs. Andy Ye Ryerson University Usng the Mnmum Set of Input Combnatons to Mnmze the Area of Local Routng Networks n Logc Clusters Contanng Logcally Equvalent I/Os n FPGAs Andy Ye Ryerson Unversty Mnmum-area IIBs how to mnmze the area

More information

Logic effort and gate sizing

Logic effort and gate sizing EEN454 Dgtal Integrated rcut Desgn Logc effort and gate szng EEN 454 Introducton hp desgners face a bewlderng arra of choces What s the best crcut topolog for a functon? How man stages of logc gve least

More information

Module 3 LOSSY IMAGE COMPRESSION SYSTEMS. Version 2 ECE IIT, Kharagpur

Module 3 LOSSY IMAGE COMPRESSION SYSTEMS. Version 2 ECE IIT, Kharagpur Module 3 LOSSY IMAGE COMPRESSION SYSTEMS Verson ECE IIT, Kharagpur Lesson 6 Theory of Quantzaton Verson ECE IIT, Kharagpur Instructonal Objectves At the end of ths lesson, the students should be able to:

More information

Computer Engineering Department. CC 311- Computer Architecture. Chapter 4. The Processor: Datapath and Control. Single Cycle

Computer Engineering Department. CC 311- Computer Architecture. Chapter 4. The Processor: Datapath and Control. Single Cycle Computer Engineering Department CC 311- Computer Architecture Chapter 4 The Processor: Datapath and Control Single Cycle Introduction The 5 classic components of a computer Processor Input Control Memory

More information

( ) = ( ) + ( 0) ) ( )

( ) = ( ) + ( 0) ) ( ) EETOMAGNETI OMPATIBIITY HANDBOOK 1 hapter 9: Transent Behavor n the Tme Doman 9.1 Desgn a crcut usng reasonable values for the components that s capable of provdng a tme delay of 100 ms to a dgtal sgnal.

More information

EEE 241: Linear Systems

EEE 241: Linear Systems EEE : Lnear Systems Summary #: Backpropagaton BACKPROPAGATION The perceptron rule as well as the Wdrow Hoff learnng were desgned to tran sngle layer networks. They suffer from the same dsadvantage: they

More information

Bit-Parallel Word-Serial Multiplier in GF(2 233 ) and Its VLSI Implementation. Dr. M. Ahmadi

Bit-Parallel Word-Serial Multiplier in GF(2 233 ) and Its VLSI Implementation. Dr. M. Ahmadi Bt-Parallel Word-Seral Multpler n GF(2 233 ) and Its VLSI Implementaton Supervsors: Student: Dr. Huapeng Wu Dr. M. Ahmad Wenka Tang Contents Introducton to Fnte Feld Research Motvatons Proposed Multplers

More information

Representations of Elementary Functions Using Binary Moment Diagrams

Representations of Elementary Functions Using Binary Moment Diagrams Representatons of Elementary Functons Usng Bnary Moment Dagrams Tsutomu Sasao Department of Computer Scence and Electroncs, Kyushu Insttute of Technology Izua 82-852, Japan Shnobu Nagayama Department of

More information

CPU DESIGN The Single-Cycle Implementation

CPU DESIGN The Single-Cycle Implementation CSE 202 Computer Organization CPU DESIGN The Single-Cycle Implementation Shakil M. Khan (adapted from Prof. H. Roumani) Dept of CS & Eng, York University Sequential vs. Combinational Circuits Digital circuits

More information

MDL-Based Unsupervised Attribute Ranking

MDL-Based Unsupervised Attribute Ranking MDL-Based Unsupervsed Attrbute Rankng Zdravko Markov Computer Scence Department Central Connectcut State Unversty New Brtan, CT 06050, USA http://www.cs.ccsu.edu/~markov/ markovz@ccsu.edu MDL-Based Unsupervsed

More information

Processor Design & ALU Design

Processor Design & ALU Design 3/8/2 Processor Design A. Sahu CSE, IIT Guwahati Please be updated with http://jatinga.iitg.ernet.in/~asahu/c22/ Outline Components of CPU Register, Multiplexor, Decoder, / Adder, substractor, Varity of

More information

EXAMPLES 4/12/2018. The MIPS Pipeline. Hazard Summary. Show the pipeline diagram. Show the pipeline diagram. Pipeline Datapath and Control

EXAMPLES 4/12/2018. The MIPS Pipeline. Hazard Summary. Show the pipeline diagram. Show the pipeline diagram. Pipeline Datapath and Control The MIPS Pipeline CSCI206 - Computer Organization & Programming Pipeline Datapath and Control zybook: 11.6 Developed and maintained by the Bucknell University Computer Science Department - 2017 Hazard

More information

[2] Predicting the direction of a branch is not enough. What else is necessary?

[2] Predicting the direction of a branch is not enough. What else is necessary? [2] When we talk about the number of operands in an instruction (a 1-operand or a 2-operand instruction, for example), what do we mean? [2] What are the two main ways to define performance? [2] Predicting

More information

Logical Effort of Higher Valency Adders

Logical Effort of Higher Valency Adders Logcal Effort of gher Valency Adders Davd arrs arvey Mudd College E. Twelfth St. Claremont, CA Davd_arrs@hmc.edu Abstract gher valency parallel prefx adders reduce the number of logc levels at the expense

More information

Computing Correlated Equilibria in Multi-Player Games

Computing Correlated Equilibria in Multi-Player Games Computng Correlated Equlbra n Mult-Player Games Chrstos H. Papadmtrou Presented by Zhanxang Huang December 7th, 2005 1 The Author Dr. Chrstos H. Papadmtrou CS professor at UC Berkley (taught at Harvard,

More information

CSCI-564 Advanced Computer Architecture

CSCI-564 Advanced Computer Architecture CSCI-564 Advanced Computer Architecture Lecture 8: Handling Exceptions and Interrupts / Superscalar Bo Wu Colorado School of Mines Branch Delay Slots (expose control hazard to software) Change the ISA

More information

Beyond Zudilin s Conjectured q-analog of Schmidt s problem

Beyond Zudilin s Conjectured q-analog of Schmidt s problem Beyond Zudln s Conectured q-analog of Schmdt s problem Thotsaporn Ae Thanatpanonda thotsaporn@gmalcom Mathematcs Subect Classfcaton: 11B65 33B99 Abstract Usng the methodology of (rgorous expermental mathematcs

More information

Faster Searching by Elimination

Faster Searching by Elimination Faster Searchng by Elmnaton Theodore S. Norvell Electrcal and Computer Engneerng Memoral Unversty December 6, 010 Abstract The SIMPLE system, under development at Memoral Unversty, allows abstract problem

More information

Sketching Sampled Data Streams

Sketching Sampled Data Streams Sketchng Sampled Data Streams Florn Rusu and Aln Dobra CISE Department Unversty of Florda March 31, 2009 Motvaton & Goal Motvaton Multcore processors How to use all the processng power? Parallel algorthms

More information

Tests of Single Linear Coefficient Restrictions: t-tests and F-tests. 1. Basic Rules. 2. Testing Single Linear Coefficient Restrictions

Tests of Single Linear Coefficient Restrictions: t-tests and F-tests. 1. Basic Rules. 2. Testing Single Linear Coefficient Restrictions ECONOMICS 35* -- NOTE ECON 35* -- NOTE Tests of Sngle Lnear Coeffcent Restrctons: t-tests and -tests Basc Rules Tests of a sngle lnear coeffcent restrcton can be performed usng ether a two-taled t-test

More information

Detecting Attribute Dependencies from Query Feedback

Detecting Attribute Dependencies from Query Feedback Detectng Attrbute Dependences from Query Feedback Peter J. Haas 1, Faban Hueske 2, Volker Markl 1 1 IBM Almaden Research Center 2 Unverstät Ulm VLDB 2007 Peter J. Haas The Problem: Detectng (Parwse) Dependent

More information

NCU EE -- DSP VLSI Design. Tsung-Han Tsai 1

NCU EE -- DSP VLSI Design. Tsung-Han Tsai 1 NCU EE -- DSP VLSI Design. Tsung-Han Tsai 1 Multi-processor vs. Multi-computer architecture µp vs. DSP RISC vs. DSP RISC Reduced-instruction-set Register-to-register operation Higher throughput by using

More information

Inner Product. Euclidean Space. Orthonormal Basis. Orthogonal

Inner Product. Euclidean Space. Orthonormal Basis. Orthogonal Inner Product Defnton 1 () A Eucldean space s a fnte-dmensonal vector space over the reals R, wth an nner product,. Defnton 2 (Inner Product) An nner product, on a real vector space X s a symmetrc, blnear,

More information

Real-Time Systems. Multiprocessor scheduling. Multiprocessor scheduling. Multiprocessor scheduling

Real-Time Systems. Multiprocessor scheduling. Multiprocessor scheduling. Multiprocessor scheduling Real-Tme Systems Multprocessor schedulng Specfcaton Implementaton Verfcaton Multprocessor schedulng -- -- Global schedulng How are tasks assgned to processors? Statc assgnment The processor(s) used for

More information

Lecture: Pipelining Basics

Lecture: Pipelining Basics Lecture: Pipelining Basics Topics: Performance equations wrap-up, Basic pipelining implementation Video 1: What is pipelining? Video 2: Clocks and latches Video 3: An example 5-stage pipeline Video 4:

More information

Global Optimization of Bilinear Generalized Disjunctive Programs

Global Optimization of Bilinear Generalized Disjunctive Programs Global Optmzaton o Blnear Generalzed Dsunctve Programs Juan Pablo Ruz Ignaco E. Grossmann Department o Chemcal Engneerng Center or Advanced Process Decson-mang Unversty Pttsburgh, PA 15213 1 Non-Convex

More information

Lecture 7: Multistage Logic Networks. Best Number of Stages

Lecture 7: Multistage Logic Networks. Best Number of Stages Lecture 7: Multstage Logc Networks Multstage Logc Networks (cont. from Lec 06) Examples Readng: Ch. Best Number of Stages How many stages should a path use? Mnmzng number of stages s not always fastest

More information

CSE Computer Architecture I

CSE Computer Architecture I Execution Sequence Summary CSE 30321 Computer Architecture I Lecture 17 - Multi Cycle Control Michael Niemier Department of Computer Science and Engineering Step name Instruction fetch Instruction decode/register

More information

Simple Instruction-Pipelining. Pipelined Harvard Datapath

Simple Instruction-Pipelining. Pipelined Harvard Datapath 6.823, L8--1 Simple ruction-pipelining Laboratory for Computer Science M.I.T. http://www.csg.lcs.mit.edu/6.823 Pipelined Harvard path 6.823, L8--2. I fetch decode & eg-fetch execute memory Clock period

More information

Interconnect Optimization for Deep-Submicron and Giga-Hertz ICs

Interconnect Optimization for Deep-Submicron and Giga-Hertz ICs Interconnect Optmzaton for Deep-Submcron and Gga-Hertz ICs Le He http://cadlab.cs.ucla.edu/~hele UCLA Computer Scence Department Los Angeles, CA 90095 Outlne Background and overvew LR-based STIS optmzaton

More information

[2] Predicting the direction of a branch is not enough. What else is necessary?

[2] Predicting the direction of a branch is not enough. What else is necessary? [2] What are the two main ways to define performance? [2] Predicting the direction of a branch is not enough. What else is necessary? [2] The power consumed by a chip has increased over time, but the clock

More information

Provable Security Signatures

Provable Security Signatures Provable Securty Sgnatures UCL - Louvan-la-Neuve Wednesday, July 10th, 2002 LIENS-CNRS Ecole normale supéreure Summary Introducton Sgnature FD PSS Forkng Lemma Generc Model Concluson Provable Securty -

More information

Turing Machines (intro)

Turing Machines (intro) CHAPTER 3 The Church-Turng Thess Contents Turng Machnes defntons, examples, Turng-recognzable and Turng-decdable languages Varants of Turng Machne Multtape Turng machnes, non-determnstc Turng Machnes,

More information

A Novel, Low-Power Array Multiplier Architecture

A Novel, Low-Power Array Multiplier Architecture A Noel, Low-Power Array Multpler Archtecture by Ronak Bajaj, Saransh Chhabra, Sreehar Veeramachanen, MB Srnas n 9th Internatonal Symposum on Communcaton and Informaton Technology 29 (ISCIT 29) Songdo -

More information

Department of Statistics University of Toronto STA305H1S / 1004 HS Design and Analysis of Experiments Term Test - Winter Solution

Department of Statistics University of Toronto STA305H1S / 1004 HS Design and Analysis of Experiments Term Test - Winter Solution Department of Statstcs Unversty of Toronto STA35HS / HS Desgn and Analyss of Experments Term Test - Wnter - Soluton February, Last Name: Frst Name: Student Number: Instructons: Tme: hours. Ads: a non-programmable

More information

Appendix B: Resampling Algorithms

Appendix B: Resampling Algorithms 407 Appendx B: Resamplng Algorthms A common problem of all partcle flters s the degeneracy of weghts, whch conssts of the unbounded ncrease of the varance of the mportance weghts ω [ ] of the partcles

More information

Formulas for the Determinant

Formulas for the Determinant page 224 224 CHAPTER 3 Determnants e t te t e 2t 38 A = e t 2te t e 2t e t te t 2e 2t 39 If 123 A = 345, 456 compute the matrx product A adj(a) What can you conclude about det(a)? For Problems 40 43, use

More information

# c i. INFERENCE FOR CONTRASTS (Chapter 4) It's unbiased: Recall: A contrast is a linear combination of effects with coefficients summing to zero:

# c i. INFERENCE FOR CONTRASTS (Chapter 4) It's unbiased: Recall: A contrast is a linear combination of effects with coefficients summing to zero: 1 INFERENCE FOR CONTRASTS (Chapter 4 Recall: A contrast s a lnear combnaton of effects wth coeffcents summng to zero: " where " = 0. Specfc types of contrasts of nterest nclude: Dfferences n effects Dfferences

More information

On balancing multiple video streams with distributed QoS control in mobile communications

On balancing multiple video streams with distributed QoS control in mobile communications On balancng multple vdeo streams wth dstrbuted QoS control n moble communcatons Arjen van der Schaaf, José Angel Lso Arellano, and R. (Inald) L. Lagendjk TU Delft, Mekelweg 4, 68 CD Delft, The Netherlands

More information

The stream cipher MICKEY

The stream cipher MICKEY The stream cpher MICKEY-128 2.0 Steve Babbage Vodafone Group R&D, Newbury, UK steve.babbage@vodafone.com Matthew Dodd Independent consultant matthew@mdodd.net www.mdodd.net 30 th June 2006 Abstract: We

More information

Linear Feature Engineering 11

Linear Feature Engineering 11 Lnear Feature Engneerng 11 2 Least-Squares 2.1 Smple least-squares Consder the followng dataset. We have a bunch of nputs x and correspondng outputs y. The partcular values n ths dataset are x y 0.23 0.19

More information

A Fast Computer Aided Design Method for Filters

A Fast Computer Aided Design Method for Filters 2017 Asa-Pacfc Engneerng and Technology Conference (APETC 2017) ISBN: 978-1-60595-443-1 A Fast Computer Aded Desgn Method for Flters Gang L ABSTRACT *Ths paper presents a fast computer aded desgn method

More information

Calculation of time complexity (3%)

Calculation of time complexity (3%) Problem 1. (30%) Calculaton of tme complexty (3%) Gven n ctes, usng exhaust search to see every result takes O(n!). Calculaton of tme needed to solve the problem (2%) 40 ctes:40! dfferent tours 40 add

More information

High Performance Rotation Architectures Based on the Radix-4 CORDIC Algorithm

High Performance Rotation Architectures Based on the Radix-4 CORDIC Algorithm IEEE TRANSACTIONS ON COMPUTERS, VOL. 46, NO. 8, AUGUST 997 855 Hgh Performance Rotaton Archtectures Based on the Radx-4 CORDIC Algorthm Elsardo Antelo, Julo Vllalba, Javer D. Bruguera, and Emlo L. Zapata

More information

MA 323 Geometric Modelling Course Notes: Day 13 Bezier Curves & Bernstein Polynomials

MA 323 Geometric Modelling Course Notes: Day 13 Bezier Curves & Bernstein Polynomials MA 323 Geometrc Modellng Course Notes: Day 13 Bezer Curves & Bernsten Polynomals Davd L. Fnn Over the past few days, we have looked at de Casteljau s algorthm for generatng a polynomal curve, and we have

More information

ISSN: ISO 9001:2008 Certified International Journal of Engineering and Innovative Technology (IJEIT) Volume 3, Issue 1, July 2013

ISSN: ISO 9001:2008 Certified International Journal of Engineering and Innovative Technology (IJEIT) Volume 3, Issue 1, July 2013 ISSN: 2277-375 Constructon of Trend Free Run Orders for Orthogonal rrays Usng Codes bstract: Sometmes when the expermental runs are carred out n a tme order sequence, the response can depend on the run

More information

Simple Instruction-Pipelining. Pipelined Harvard Datapath

Simple Instruction-Pipelining. Pipelined Harvard Datapath 6.823, L8--1 Simple ruction-pipelining Updated March 6, 2000 Laboratory for Computer Science M.I.T. http://www.csg.lcs.mit.edu/6.823 Pipelined Harvard path 6.823, L8--2. fetch decode & eg-fetch execute

More information

Tutorial 2. COMP4134 Biometrics Authentication. February 9, Jun Xu, Teaching Asistant

Tutorial 2. COMP4134 Biometrics Authentication. February 9, Jun Xu, Teaching Asistant Tutoral 2 COMP434 ometrcs uthentcaton Jun Xu, Teachng sstant csjunxu@comp.polyu.edu.hk February 9, 207 Table of Contents Problems Problem : nswer the questons Problem 2: Power law functon Problem 3: Convoluton

More information

Effective Power Optimization combining Placement, Sizing, and Multi-Vt techniques

Effective Power Optimization combining Placement, Sizing, and Multi-Vt techniques Effectve Power Optmzaton combnng Placement, Szng, and Mult-Vt technques Tao Luo, Davd Newmark*, and Davd Z Pan Department of Electrcal and Computer Engneerng, Unversty of Texas at Austn *Advanced Mcro

More information

Global Optimization of Truss. Structure Design INFORMS J. N. Hooker. Tallys Yunes. Slide 1

Global Optimization of Truss. Structure Design INFORMS J. N. Hooker. Tallys Yunes. Slide 1 Slde 1 Global Optmzaton of Truss Structure Desgn J. N. Hooker Tallys Yunes INFORMS 2010 Truss Structure Desgn Select sze of each bar (possbly zero) to support the load whle mnmzng weght. Bar szes are dscrete.

More information

55:041 Electronic Circuits

55:041 Electronic Circuits 55:04 Electronc Crcuts Feedback & Stablty Sectons of Chapter 2. Kruger Feedback & Stablty Confguraton of Feedback mplfer Negate feedback β s the feedback transfer functon S o S S o o S S o f S S S S fb

More information

System in Weibull Distribution

System in Weibull Distribution Internatonal Matheatcal Foru 4 9 no. 9 94-95 Relablty Equvalence Factors of a Seres-Parallel Syste n Webull Dstrbuton M. A. El-Dacese Matheatcs Departent Faculty of Scence Tanta Unversty Tanta Egypt eldacese@yahoo.co

More information

For now, let us focus on a specific model of neurons. These are simplified from reality but can achieve remarkable results.

For now, let us focus on a specific model of neurons. These are simplified from reality but can achieve remarkable results. Neural Networks : Dervaton compled by Alvn Wan from Professor Jtendra Malk s lecture Ths type of computaton s called deep learnng and s the most popular method for many problems, such as computer vson

More information

Chapter 5 Multilevel Models

Chapter 5 Multilevel Models Chapter 5 Multlevel Models 5.1 Cross-sectonal multlevel models 5.1.1 Two-level models 5.1.2 Multple level models 5.1.3 Multple level modelng n other felds 5.2 Longtudnal multlevel models 5.2.1 Two-level

More information

Planning and Scheduling to Minimize Makespan & Tardiness. John Hooker Carnegie Mellon University September 2006

Planning and Scheduling to Minimize Makespan & Tardiness. John Hooker Carnegie Mellon University September 2006 Plannng and Schedulng to Mnmze Makespan & ardness John Hooker Carnege Mellon Unversty September 2006 he Problem Gven a set of tasks, each wth a deadlne 2 he Problem Gven a set of tasks, each wth a deadlne

More information

Equivalence Checking of Dissimilar Circuits II

Equivalence Checking of Dissimilar Circuits II Equvalence Checkng of Dssmlar Crcuts II Cadence Berkeley Labs 1995 Unversty Ave.,Sute 460, Berkeley, Calforna,94704 phone: (510)-647-2825, fax: (510)-486-0205 CDNL-TR-2004-0830 August 2004 Eugene Goldberg

More information

Foundations of Arithmetic

Foundations of Arithmetic Foundatons of Arthmetc Notaton We shall denote the sum and product of numbers n the usual notaton as a 2 + a 2 + a 3 + + a = a, a 1 a 2 a 3 a = a The notaton a b means a dvdes b,.e. ac = b where c s an

More information

Experience with Automatic Generation Control (AGC) Dynamic Simulation in PSS E

Experience with Automatic Generation Control (AGC) Dynamic Simulation in PSS E Semens Industry, Inc. Power Technology Issue 113 Experence wth Automatc Generaton Control (AGC) Dynamc Smulaton n PSS E Lu Wang, Ph.D. Staff Software Engneer lu_wang@semens.com Dngguo Chen, Ph.D. Staff

More information

Lecture 4: Universal Hash Functions/Streaming Cont d

Lecture 4: Universal Hash Functions/Streaming Cont d CSE 5: Desgn and Analyss of Algorthms I Sprng 06 Lecture 4: Unversal Hash Functons/Streamng Cont d Lecturer: Shayan Oves Gharan Aprl 6th Scrbe: Jacob Schreber Dsclamer: These notes have not been subjected

More information

Lectures on Multivariable Feedback Control

Lectures on Multivariable Feedback Control Lectures on Multvarable Feedback Control Al Karmpour Department of Electrcal Engneerng, Faculty of Engneerng, Ferdows Unversty of Mashhad June 200) Chapter 9: Quanttatve feedback theory Lecture Notes of

More information

Computer Architecture

Computer Architecture Lecture 2: Iakovos Mavroidis Computer Science Department University of Crete 1 Previous Lecture CPU Evolution What is? 2 Outline Measurements and metrics : Performance, Cost, Dependability, Power Guidelines

More information

MEM 255 Introduction to Control Systems Review: Basics of Linear Algebra

MEM 255 Introduction to Control Systems Review: Basics of Linear Algebra MEM 255 Introducton to Control Systems Revew: Bascs of Lnear Algebra Harry G. Kwatny Department of Mechancal Engneerng & Mechancs Drexel Unversty Outlne Vectors Matrces MATLAB Advanced Topcs Vectors A

More information

Application of Nonbinary LDPC Codes for Communication over Fading Channels Using Higher Order Modulations

Application of Nonbinary LDPC Codes for Communication over Fading Channels Using Higher Order Modulations Applcaton of Nonbnary LDPC Codes for Communcaton over Fadng Channels Usng Hgher Order Modulatons Rong-Hu Peng and Rong-Rong Chen Department of Electrcal and Computer Engneerng Unversty of Utah Ths work

More information

CS 52 Computer rchitecture and Engineering Lecture 4 - Pipelining Krste sanovic Electrical Engineering and Computer Sciences University of California at Berkeley http://www.eecs.berkeley.edu/~krste! http://inst.eecs.berkeley.edu/~cs52!

More information

Speeding up Computation of Scalar Multiplication in Elliptic Curve Cryptosystem

Speeding up Computation of Scalar Multiplication in Elliptic Curve Cryptosystem H.K. Pathak et. al. / (IJCSE) Internatonal Journal on Computer Scence and Engneerng Speedng up Computaton of Scalar Multplcaton n Ellptc Curve Cryptosystem H. K. Pathak Manju Sangh S.o.S n Computer scence

More information

Combinational Circuit Design

Combinational Circuit Design Combnatonal Crcut Desgn Part I: Desgn Procedure and Examles Part II : Arthmetc Crcuts Part III : Multlexer, Decoder, Encoder, Hammng Code Combnatonal Crcuts n nuts Combnatonal Crcuts m oututs A combnatonal

More information

CHAPTER 17 Amortized Analysis

CHAPTER 17 Amortized Analysis CHAPTER 7 Amortzed Analyss In an amortzed analyss, the tme requred to perform a sequence of data structure operatons s averaged over all the operatons performed. It can be used to show that the average

More information

LINEAR TRANSFORMATION OF BINARY DECISION DIAGRAMS TROUGH SPECTRAL DOMAIN

LINEAR TRANSFORMATION OF BINARY DECISION DIAGRAMS TROUGH SPECTRAL DOMAIN LINEAR TRANSFORMATION OF BINARY DECISION DIAGRAMS TROUGH SPECTRAL DOMAIN Mlena Stankovc, Suzana Stokovc 2 Faculty of Electronc Engneerng, Unversty of Ns, A Medvedeva 4, 8 Ns, SERBIA, mstankovc@elfaknacyu,

More information

CSci 6974 and ECSE 6966 Math. Tech. for Vision, Graphics and Robotics Lecture 21, April 17, 2006 Estimating A Plane Homography

CSci 6974 and ECSE 6966 Math. Tech. for Vision, Graphics and Robotics Lecture 21, April 17, 2006 Estimating A Plane Homography CSc 6974 and ECSE 6966 Math. Tech. for Vson, Graphcs and Robotcs Lecture 21, Aprl 17, 2006 Estmatng A Plane Homography Overvew We contnue wth a dscusson of the major ssues, usng estmaton of plane projectve

More information

Design of Digital Circuits Lecture 14: Microprogramming. Prof. Onur Mutlu ETH Zurich Spring April 2017

Design of Digital Circuits Lecture 14: Microprogramming. Prof. Onur Mutlu ETH Zurich Spring April 2017 Design of Digital Circuits Lecture 4: Microprogramming Prof. Onur Mutlu ETH Zurich Spring 27 7 April 27 Agenda for Today & Next Few Lectures! Single-cycle Microarchitectures! Multi-cycle and Microprogrammed

More information

Simple Instruction-Pipelining (cont.) Pipelining Jumps

Simple Instruction-Pipelining (cont.) Pipelining Jumps 6.823, L9--1 Simple ruction-pipelining (cont.) + Interrupts Updated March 6, 2000 Laboratory for Computer Science M.I.T. http://www.csg.lcs.mit.edu/6.823 Src1 ( j / ~j ) Src2 ( / Ind) Pipelining Jumps

More information

Einstein-Podolsky-Rosen Paradox

Einstein-Podolsky-Rosen Paradox H 45 Quantum Measurement and Spn Wnter 003 Ensten-odolsky-Rosen aradox The Ensten-odolsky-Rosen aradox s a gedanken experment desgned to show that quantum mechancs s an ncomplete descrpton of realty. The

More information

55:041 Electronic Circuits

55:041 Electronic Circuits 55:04 Electronc Crcuts Feedback & Stablty Sectons of Chapter 2. Kruger Feedback & Stablty Confguraton of Feedback mplfer S o S ε S o ( S β S ) o Negate feedback S S o + β β s the feedback transfer functon

More information

COS 521: Advanced Algorithms Game Theory and Linear Programming

COS 521: Advanced Algorithms Game Theory and Linear Programming COS 521: Advanced Algorthms Game Theory and Lnear Programmng Moses Charkar February 27, 2013 In these notes, we ntroduce some basc concepts n game theory and lnear programmng (LP). We show a connecton

More information

Gated Clock Routing Minimizing the Switched Capacitance *

Gated Clock Routing Minimizing the Switched Capacitance * Gated Clock Routng Mnmzng the Swtched Capactance * Jaewon Oh and Massoud Pedram Dept. of Electrcal Engneerng Systems Unversty of Southern Calforna Los Angeles, CA 989 Tel: (3) 74-448 e-mal: [oh, massoud]@zugros.usc.edu

More information

LINEAR REGRESSION ANALYSIS. MODULE IX Lecture Multicollinearity

LINEAR REGRESSION ANALYSIS. MODULE IX Lecture Multicollinearity LINEAR REGRESSION ANALYSIS MODULE IX Lecture - 30 Multcollnearty Dr. Shalabh Department of Mathematcs and Statstcs Indan Insttute of Technology Kanpur 2 Remedes for multcollnearty Varous technques have

More information

On the Multicriteria Integer Network Flow Problem

On the Multicriteria Integer Network Flow Problem BULGARIAN ACADEMY OF SCIENCES CYBERNETICS AND INFORMATION TECHNOLOGIES Volume 5, No 2 Sofa 2005 On the Multcrtera Integer Network Flow Problem Vassl Vasslev, Marana Nkolova, Maryana Vassleva Insttute of

More information

Marginal Models for categorical data.

Marginal Models for categorical data. Margnal Models for categorcal data Applcaton to condtonal ndependence and graphcal models Wcher Bergsma 1 Marcel Croon 2 Jacques Hagenaars 2 Tamas Rudas 3 1 London School of Economcs and Poltcal Scence

More information

Bayesian Networks. Course: CS40022 Instructor: Dr. Pallab Dasgupta

Bayesian Networks. Course: CS40022 Instructor: Dr. Pallab Dasgupta Bayesan Networks Course: CS40022 Instructor: Dr. Pallab Dasgupta Department of Computer Scence & Engneerng Indan Insttute of Technology Kharagpur Example Burglar alarm at home Farly relable at detectng

More information

Design. Dr. A. Sahu. Indian Institute of Technology Guwahati

Design. Dr. A. Sahu. Indian Institute of Technology Guwahati CS222: Processor Design: Multi Cycle Design Dr. A. Sahu Dept of Comp. Sc. & Engg. Indian Institute of Technology Guwahati Mid Semester Exam Multi Cycle design Outline Clock periods in single cycle and

More information

8 Derivation of Network Rate Equations from Single- Cell Conductance Equations

8 Derivation of Network Rate Equations from Single- Cell Conductance Equations Physcs 178/278 - Davd Klenfeld - Wnter 2015 8 Dervaton of Network Rate Equatons from Sngle- Cell Conductance Equatons We consder a network of many neurons, each of whch obeys a set of conductancebased,

More information

ENEE350 Lecture Notes-Weeks 14 and 15

ENEE350 Lecture Notes-Weeks 14 and 15 Pipelining & Amdahl s Law ENEE350 Lecture Notes-Weeks 14 and 15 Pipelining is a method of processing in which a problem is divided into a number of sub problems and solved and the solu8ons of the sub problems

More information