This paper summarizes the content and application of the SEED2002 project. SEED2002 is a university/industry collaboration to enhance and reform the education in the field of semi-custom/full-custom ASIC design at the...
详细信息
This paper summarizes the content and application of the SEED2002 project. SEED2002 is a university/industry collaboration to enhance and reform the education in the field of semi-custom/full-custom ASIC design at the universities of Mannheim, Heidelberg and Kaiserslautern, Germany. With this project Cadence Design systems enables us to teach leading-edge ASIC design using their most innovative products.
This paper presents a new algorithm for the detection of coarse-grain parallelism in loops with complex irregular computations. Loops are represented as directed acyclic graphs whose nodes are the strongly connected c...
详细信息
ISBN:
(纸本)3540440496
This paper presents a new algorithm for the detection of coarse-grain parallelism in loops with complex irregular computations. Loops are represented as directed acyclic graphs whose nodes are the strongly connected components (SCC) that appear in the Gated Single Assignment (GSA) program form, and whose edges are the use-def chains between pairs of SCCs. Loops that can be executed in parallel using run-time support are recognized at compile-time by performing a demand-driven analysis of the corresponding SCC graphs.. A prototype was implemented using the infrastructure provided by the Polaris parallelizing compiler. Encouraging experimental results for a suite of real irregular programs are shown.
Parallel computingon networks of workstations or PCs has been gaining popularity in recent years due to their competitive costprice compared to supercomputers. In this paper we provide a clusterbased solution for a hi...
详细信息
The fetch target buffer (FTB) holds information on basic blocks to predict taken branches in the fetch stream and also their target addresses. We propose a variation to FTB, the self-indexed FTB, which, through an ext...
详细信息
This paper addresses the parallelization of loops with irregular assignment computations on cc-NUMA multiprocessors. This loop pattern is distinguished by the existence of loop-carried output data dependences that can...
详细信息
Aboard current ships, such as the DDG 51, engineering control and damage control activities are manpower intensive. It is anticipated that, for future combatants, the workload demand arising from operation of systems ...
详细信息
Aboard current ships, such as the DDG 51, engineering control and damage control activities are manpower intensive. It is anticipated that, for future combatants, the workload demand arising from operation of systems under conditions of normal steaming and during casualty response will need to be markedly reduced via automated monitoring, autonomous control, and other technology initiatives. Current DDG 51 class ships can be considered as a manpower baseline and under Condition III typical engineering control involves seven to eight watchstanders at manned stations in the Central Control Station, the engine rooms and other machinery spaces. In contrast to this manning level, initiatives such as DD 21 and the integrated engineering plant (IEP) envision a partnership between the operator and the automation system, with more and more of the operator's functions being shifted to the automation system as manning levels decrease. This paper describes some human systems integration studies of workload demand reduction and, consequently, manning reduction that can be achieved due to application of several advanced technology concepts. Advanced system concept studies in relation to workload demand are described and reviewed including. Piecemeal applications of diverse automation and remote control technology concepts to selected high driver tasks in current DDG 51 activities. Development of the reduced ship's crew by virtual presence system that will provide automated monitoring and display to operators of machinery health, compartment conditions, and personnel health. The IEP envisions the machinery control system as a provider of resources that are used by various consumers around the ship. Resource needs and consumer priorities are at all times dependent upon the ship's current mission and the availability of equipment pawnbrokers.
When a mobile user using wireless devices tries to access to a Service Provider (SP) connected to wire-lined network such as the Internet, security risks experienced by SP as well as the wireless and wire-lined networ...
详细信息
The aim of the work is to provide a high performance air quality simulation using the STEM-II (Sulphur Transport Eulerian Model 2) program. First of all we optimize the sequential program with the aim of increasing da...
详细信息
The aim of the work is to provide a high performance air quality simulation using the STEM-II (Sulphur Transport Eulerian Model 2) program. First of all we optimize the sequential program with the aim of increasing data locality. Then, the optimized program is parallelized using OpenMP shared-memory directives. Experimental results on a 32-processor SGI Origin 2000 show that the parallel program achieves important reductions in the execution times.
Multithreaded processors, by simultaneously using both the thread-level parallelism and the instruction-level parallelism of applications, achieve larger instruction per cycle rate than single-thread processors. On a ...
详细信息
Multithreaded processors, by simultaneously using both the thread-level parallelism and the instruction-level parallelism of applications, achieve larger instruction per cycle rate than single-thread processors. On a multi-thread workload, a clustered organization maximizes performances. On a single-thread workload, however, all but one of the clusters are idle, degrading single-thread performance significantly. Using a clustered multi-thread performance as a baseline, we propose and analyze several mechanisms and policies to improve single-thread execution exploiting the existing hardware without a significant multi-thread performance loss. We focus on the fetch unit, which is maybe the most performance-critical stage. Essentially, we analyze three ways of exploiting the idle fetch clusters: allowing a single thread accessing its neighbor clusters, use the idle fetch clusters to provide multiple-path execution, or use them to widen the effective single-three fetch block.
This past October, the Associated Press reported that for over a month hackers effectively penetrated Microsoft's firewall and, potentially, had access to source code for future products. Over the past year, repor...
详细信息
ISBN:
(纸本)0769512127
This past October, the Associated Press reported that for over a month hackers effectively penetrated Microsoft's firewall and, potentially, had access to source code for future products. Over the past year, reported commercial espionage has been increasing steadily. These events underscore the necessary for security engineers to define and implement strong information assurance infrastructures. The concept of defense in depth is used to provide sufficient detection and defensive countermeasures to ensure an enterprise's information is protected. Over the past three years, Harris has conducted research leading to the development of an assurance superstructure tool: the Integrated Design Environment for Assurance (IDEA). Building upon concepts developed during the Network Vulnerability Tool (NVT) program, the IDEA program refined the design and provides a comprehensive assurance analysis superstructure. The IDEA program benifited from the NVT architecture to gain greater adaptive capabilities to address the evolving capabilities of external vulnerability assessment and risk management tools. This re-architected solution builds upon lessons learned during the NVT project.
暂无评论