We report experimental verification of an extended depth of focus (EDF) system with near-diffraction-limited performance capabilities. Dowski and Cathey [Appl. Opt. 34, 1859-1866 (1995)] described the theory of this s...
详细信息
We report experimental verification of an extended depth of focus (EDF) system with near-diffraction-limited performance capabilities. Dowski and Cathey [Appl. Opt. 34, 1859-1866 (1995)] described the theory of this system in detail. We can create an EDF system by modifying a standard incoherent optical system with a special cubic phase plate placed at the aperture stop. We briefly review the theory and present the first optical experimental verification of this EDF system. The phase plate codes the wave front, producing a modified optical transfer function. Once the image is transformed into digital form, a signal-processing step decodes the image and produces the final in-focus image. We have produced a number of images from various optical systems using the phase plate, thus demonstrating the success of this EDF system. (C) 1997 Optical Society of America.
The use of multivariate information visualization techniques is intrinsically difficult because the multidimensional nature of data cannot be effectively presented and understood on real-world displays, which have lim...
详细信息
Multi-version programming is employed in fault-tolerant computersystems in order to provide protection against common-mode failure in software. Multi-version programming involves building diverse software implementat...
详细信息
Multi-version programming is employed in fault-tolerant computersystems in order to provide protection against common-mode failure in software. Multi-version programming involves building diverse software implementations of critical functions. The premise of building diverse versions is that the likelihood of a programming error in one version causing a failure in an identical manner as an error in another version is reduced. Skeptics of multi-version programming have correctly pointed out that common-mode failures between redundant diverse versions can reduce the return on investment in creating diverse versions. To date, other than using historical data from other projects, there has been no way to estimate the potential for a given multi-version programming system to suffer a common-mode failure. This paper presents an algorithm and software analysis prototype to reduce the uncertainty of whether software flaws in diverse versions can result in common-mode failure. The analysis uses software fault-injection techniques to subject one or more versions to anomalous behavior. From this, we can predict how the software will behave if real faults exist in the multiple versions.
In this paper, we propose three different parallel algorithms based on a state-of-the-art global router called TimberWolfSC. The parallel algorithms have been implemented by using the Message Passing Interface (MPI), ...
详细信息
In this paper, we propose three different parallel algorithms based on a state-of-the-art global router called TimberWolfSC. The parallel algorithms have been implemented by using the Message Passing Interface (MPI), and have been evaluated on a wide range of parallel platforms such as the Sun Sparccenter 1000 and the Intel Paragon. Our experimental results show good speedups and qualities from two of these parallel algorithms. We have been able to reduce runtimes of some circuits from half an hour to 5 minutes, obtained speedups of about 4.0 to 5.0 on 8 processors, with less than 2-3% degradation of quality of the solutions.
This paper reports on our experience in writing a parallel version of a chaos router simulator using the new data-driven parallel language ZPL. The simulator is a large program that tests the capabilities of ZPL. The ...
详细信息
ISBN:
(纸本)0780333837
This paper reports on our experience in writing a parallel version of a chaos router simulator using the new data-driven parallel language ZPL. The simulator is a large program that tests the capabilities of ZPL. The (parallel) ZPL program is compared with the existing serial implementation on two very different architectures: a 16-processor Intel Paragon and a cluster of eight Alpha workstations. On the Paragon, the simulator performs best when simulating medium- to large-sized routers, and on the Alpha cluster, it performs best when simulating large routers. Thus a user can choose the parallel platform best suited to the router size.
In this paper we present some novel algorithms for scheduling hierarchical signal flow graphs in the domain of high-level synthesis. There are several key contributions of this paper. First, we develop a novel extensi...
详细信息
In this paper we present some novel algorithms for scheduling hierarchical signal flow graphs in the domain of high-level synthesis. There are several key contributions of this paper. First, we develop a novel extension of the force directed scheduling problem which naturally handles loops and conditionals by coming up with a scheme of scheduling hierarchical signal flow graphs. Second, we develop three new parallel algorithms for the scheduling problem. Third, our parallel algorithms are portable across a wide range of parallel platforms. We report results on a set of high-level synthesis benchmarks on 8-processor SGI Challenge and a network of 4 SUN SPARCstation5 work stations. Finally, while some parallel algorithms for VLSI CAD reported by earlier researchers have reported a loss of qualities of results, our parallel algorithms produce exactly the same results as the sequential algorithms on which they are based.
This paper presents the results of an analyse's of failures in several releases of Tandem's NonStop-UX operating system. NonStop-UX is based on UNIX System V. The analysis covers software failures from the fie...
详细信息
This paper presents the results of an analyse's of failures in several releases of Tandem's NonStop-UX operating system. NonStop-UX is based on UNIX System V. The analysis covers software failures from the field and failures reported by Tandem's test center. Faults are classified based on the status of the reported failures, the locations of the code that detected the problems, the panic messages generated by the systems, the faulty source modules, and the types of developer's mistakes. We present distributions of the failure and repair times for unique and duplicate failures. We also discuss how the analysis results can be used for assessing the dependability of the operating system and guiding improvement efforts.
Multicast protocols that provide message ordering and delivery guarantees are becoming increasingly important in distributed system design. However, despite the large number of such protocols, little analytical work h...
Scientific applications often require some strategy for temporary data storage to do the largest possible simulations. The use of virtual memory for temporary data storage has received criticism because of performance...
详细信息
ISBN:
(纸本)9780897918541
Scientific applications often require some strategy for temporary data storage to do the largest possible simulations. The use of virtual memory for temporary data storage has received criticism because of performance problems. However, modern virtual memory found in recent operating systems such as Cenju-3/DE give application writers control over virtual memory policies. We demonstrate that custom virtual memory policies can dramatically reduce virtual memory overhead and allow applications to run out-of-core efficiently. We also demonstrate that the main advantage of virtual memory, namely programming simplicity, is not lost.
Scientific applications often require some strategy for temporary data storage to do the largest possible simulations. The use of virtual memory for temporary data storage has received criticism because of performance...
详细信息
Scientific applications often require some strategy for temporary data storage to do the largest possible simulations. The use of virtual memory for temporary data storage has received criticism because of performance problems. However, modern virtual memory found in recent operating systems such as Cenju-3/DE give application writers control over virtual memory policies. We demonstrate that custom virtual memory policies can dramatically reduce virtual memory overhead and allow applications to run out-of-core efficiently. We also demonstrate that the main advantage of virtual memory, namely programming simplicity, is not lost.
暂无评论