How Computers Work Lecture 12

Size: px
Start display at page:

Download "How Computers Work Lecture 12"

Transcription

1 How Computers Work Lecture 12 A Common Chore of College Life Introduction to Pipelining How Computers Work Lecture 12 Page 1 How Computers Work Lecture 12 Page 2 Page 1 1

2 Propagation Times Doing 1 Load Step 1: Step 2: Total Time = Tpd wash = Tpd dry = = How Computers Work Lecture 12 Page 3 How Computers Work Lecture 12 Page 4 Page 2 2

3 Step 1: Doing 2 Loads Combinational (Harvard) Method Doing 2 Loads Pipelined (MIT) Method Step 2: Total Time Step 1: Total Time Step 3: = Step 2: = = = Step 4: Step 3: How Computers Work Lecture 12 Page 5 How Computers Work Lecture 12 Page 6 Page 3 3

4 Doing N Loads Harvard Method: MIT Method: A Few Definitions Latency: Time for 1 object to pass through entire system. (= for Harvard laundry) (= for MIT laundry) Throughput: Rate of objects going through. (= for Harvard laundry) (= for MIT laundry) How Computers Work Lecture 12 Page 7 How Computers Work Lecture 12 Page 8 Page 4 4

5 A Computational Problem Add 4 Numbers: A B C D As a Combinational Circuit Tpd Tpd Throughput 1 / 2 Tpd Tpd Latency 2 Tpd A B C D How Computers Work Lecture 12 Page 9 How Computers Work Lecture 12 Page 10 Page 5 5

6 As a Pipelined Circuit Simplifying Assumptions Throughput Tpd Tpd Tpd clock Tpd clock Tpd 1 / Tpd Latency 2 Tpd clock Tpd clock 1. Synchronous inputs 2. Ts = Th = 0 Tpd c-q = 0 Tcd c-q = 0 How Computers Work Lecture 12 Page 11 How Computers Work Lecture 12 Page 12 Page 6 6

7 An Inhomogeneous Case (Combinational) An Inhomogeneous Case (Pipelined) Tpd = 2 * * Throughput Tpd = 2 * * Throughput Tpd = 1 1 / 3 Latency Tpd = 1 1 / 2 Latency 3 4 How Computers Work Lecture 12 Page 13 How Computers Work Lecture 12 Page 14 Page 7 7

8 How about this one? How MIT Students REALLY do Laundry (4) (4) * Comb. Latency 6 Comb. Throughput 1/6 Pipe. Latency 12 Pipe. Throughput 1/4 Steady State Throughput = Steady State Latency = How Computers Work Lecture 12 Page 15 How Computers Work Lecture 12 Page 16 Page 8 8

9 Interleaving (an alternative to Pipelining) Interleaving Parallel Circuits For N Units of delay Tpd, steady state Throughput N / Tpd Latency clk 1-4 sel x x x x Tpd How Computers Work Lecture 12 Page 17 How Computers Work Lecture 12 Page 18 Page 9 9

10 Definition of a Well-Formed Pipeline Same number of registers along path from any input to every computational unit Insures that every computational unit sees inputs IN PHASE Is true (non-obvious) whenever the # of registered between all inputs and all outputs is the same. Method for Forming Well-Formed Pipelines Add registers to system output at will Propagate registers from intermediate outputs to intermediate inputs, cloning registers as necessary. * (2) How Computers Work Lecture 12 Page 19 How Computers Work Lecture 12 Page 20 Page 10 10

11 Method for Maximizing Throughput Pipeline around longest latency element Pipeline around other sections with latency as large as possible, but <= longest latency element. * (2) Comb. Latency 5 Comb. Throughput 1/5 Pipe. Latency 6 Pipe. Throughput 1/2 How Computers Work Lecture 12 Page 21 A Few Questions Assuming a circuit is pipelined for optimum throughput with 0 delay registers, is the pipelined throughput always greater than or equal to the combinational throughput? A: Yes Is the pipelined latency ever less than combinational latency? A: No When is the pipelined latency equal to combinational latency? A: If contents of all pipeline stages have equal combinational latency How Computers Work Lecture 12 Page 22 Page 11 11

12 MIPS = Millions of Instructions Per Second Freq = Clock Frequency, MHz CPI = Clocks per Instruction CPU Performance Review: A Top-Down View of the Beta Architecture With st(ra,c,rc) : Mem[C<rc>] <- <ra> PC Q RA1 Memory RD1 XADDR JMP(R31,XADDR,XP) ISEL 0 1 MIPS = Freq CPI 1 31:26 OPCODE 25:21 20:5 9:5 4:0 RA C RB RC 0 1 To Increase MIPS: OPCODE RA1 Register File RD1 SEXT RA2 Register File RD2 1. DECREASE CPI. ASEL BSEL - RISC reduces CPI to CPI < 0? Tough... we ll see multiple instruction issue machines at end of term. Z FN A A op B B 2. INCREASE Freq. - Freq limited by delay along longest combinational path; hence RA2 Memory RD2 - PIPELINING is the key to improved performance through fast clocks. PCSEL WDSEL D PC WD Memory WA WE WEMEM WD Register File WA WE RC WE How Computers Work Lecture 12 Page 23 How Computers Work Lecture 12 Page 24 Page 12 12

13 Pipeline Stages Sketch of 4-Stage Pipeline Instruction Fetch GOAL: Maintain (nearly) 1.0 CPI, but increase clock speed. instruction APPROACH: structure processor as 4-stage pipeline: Instruction Fetch stage: Maintains PC, fetches one instruction per cycle and passes it to Register File stage: Reads source operands from register file, passes them to Register File instruction CL A (read) B stage: Performs indicated operation, passes result to CL Write-Back stage: writes result back into register file. Write Back instruction CL Y WHAT OTHER information do we have to pass down the pipeline? instruction (write) How Computers Work Lecture 12 Page 25 How Computers Work Lecture 12 Page 26 Page 13 13

14 PC Q RA1 Memory RD1 XADDR JMP(R31,XADDR,XP) Consider a sequence of instructions:... ADDC(r1, 1, r2) 4-Pipeline Parallelism 1 ISEL 31:26 OPCODE OPCODE :21 20:5 9:5 4:0 RA C RB RC 0 1 RA1 RA2 Register File Register SEXT RD1 RD2 File SUBC(r1, 1, r3) XOR(r1, r5, r1) MUL(r1, r2, r0)... Executed on our 4-stage pipeline: R2 Written R3 Written Z ASE L FN A A op B 0 B BSE L ADDC(r1,1,r2) SUBC(r1,1,r3) R1 Read R1 Read R1 Written R0 Written PCSE L 0 1 D PC WD Memory WA WE RA2 Memory RD WDSEL WD WA RC Register File WEMEM WE WE How Computers Work Lecture 12 Page 27 XOR(r1,r5,r1) MUL(r1,r2,r0) R1,R5 Read R1,R2 Read Time How Computers Work Lecture 12 Page 28 Page 14 14

15 BUT, consider instead: LOOP: ADD(r1, r2, r3) CMPLEC(r3, 100, r0) BT(r0, LOOP) XOR(r31, r31, r3) MUL(r1, r2, r2)... Pipeline Problems PROBLEM: Pipeline Hazards Contents of a register WRITTEN by instruction k is READ by instruction k1... before its stored in! EG: ADD(r1, r2, r3) CMPLEC(r3, 100, r0) MULC(r1, 100, r4) SUB(r1, r2, r5) fails since CMPLEC sees stale <r3>. R3 Written ADD(r1,r2,r3) ADD(r1,r2,r3) CMPLEC(r3,100,r0) CMPLEC(r3,100,r0) R3 Read BT(r0.LOOP) BT(r0.LOOP) XOR(r31,r31,r3) XOR(r31,r31,r3) MUL(r1,r2,r2) MUL(r1,r2,r2) Time Time How Computers Work Lecture 12 Page 29 How Computers Work Lecture 12 Page 30 Page 15 15

16 R3 Written ADD(r1,r2,r3) CMPLEC(r3,100,r0) SOLUTIONS: 2. Stall the pipeline. Freeze, stages for 2 cycles, inserting NOPs into IR... R3 Written CMPLEC(r3,100,r0) R3 Read ADD(r1,r2,r3) NOP SOLUTIONS: 1. Program around it.... document weirdo semantics, declare it a software problem. - Breaks sequential semantics! - Costs code efficiency. NOP CMPLEC(r3,100,r0) BT(r0.LOOP) R3 Read EXAMPLE: Rewrite ADD(r1, r2, r3) CMPLEC(r3, 100, r0) MULC(r1, 100, r4) as ADD(r1, r2, r3) MULC(r1, 100, r4) SUB(r1, r2, r5) XOR(r31,r31,r3) MUL(r1,r2,r2) SUB(r1, r2, r5) HOW OFTEN can we do this? CMPLEC(r3, 100, r0) How Computers Work Lecture 12 Page 31 DRAACK: SLOW How Computers Work Lecture 12 Page 32 Page 16 16

17 SOLUTIONS: 3. Bypass Paths. Add extra data paths & control logic to re-route data in problem cases. PC Q Hardware Implementation of Bypass Paths XADDR RA1 Memory RD1 JMP(R31,XADDR,XP) ISEL :26 25:21 20:5 9:5 4:0 OPCODE RA C RB RC <R1><R2> Produced 1 OPCODE RA1 Register File RD1 SEXT 0 1 RA2 Register RD2 File ADD(r1,r2,r3) CMPLEC(r3,100,r0) <R1><R2> Used BT(r0.LOOP) Z ASE L FN A A op B 0 B BSE L XOR(r31,r31,r3) RA2 Memory RD2 MUL(r1,r2,r2) PCSE L WDSEL How Computers Work Lecture 12 Page 33 D PC WD Memory WA WE WD WA RC Register File WEMEM WE WE How Computers Work Lecture 12 Page 34 Page 17 17

18 Next Time: Detailed Design of Bypass Paths Control Logic What to do when Bypass Paths Don t Work Branch Delays / Tradeoffs Load/Store Delays / Tradeoffs Multi-Stage Memory Pipeline How Computers Work Lecture 12 Page 35 Page 18 18

Anne Bracy CS 3410 Computer Science Cornell University

Anne Bracy CS 3410 Computer Science Cornell University Anne Bracy CS 3410 Computer Science Cornell University These slides are the product of many rounds of teaching CS 3410 by Professors Weatherspoon, Bala, Bracy, and Sirer. Complex question How fast is the

More information

CS429: Computer Organization and Architecture

CS429: Computer Organization and Architecture CS429: Computer Organization and Architecture Warren Hunt, Jr. and Bill Young epartment of Computer Sciences University of Texas at Austin Last updated: November 5, 2014 at 11:25 CS429 Slideset 16: 1 Control

More information

CSE Lecture 13/14 In Class Handout For all of these problems: HAS NOT CANNOT Add Add Add must wait until $5 written by previous add;

CSE Lecture 13/14 In Class Handout For all of these problems: HAS NOT CANNOT Add Add Add must wait until $5 written by previous add; CSE 30321 Lecture 13/14 In Class Handout For the sequence of instructions shown below, show how they would progress through the pipeline. For all of these problems: - Stalls are indicated by placing the

More information

TDT4255 Lecture 7: Hazards and exceptions

TDT4255 Lecture 7: Hazards and exceptions TDT4255 Lecture 7: Hazards and exceptions Donn Morrison Department of Computer Science 2 Outline Section 4.7: Data hazards: forwarding and stalling Section 4.8: Control hazards Section 4.9: Exceptions

More information

EXERCISES ON PERFORMANCE EVALUATION

EXERCISES ON PERFORMANCE EVALUATION EXERCISES ON PERFORMANCE EVALUATION Exercise 1 A program is executed for 1 sec, on a processor with a clock cycle of 50 nsec and Throughput 1 = 15 MIPS. 1. How much is the CPI 1, for the program? T CLOCK

More information

Why know about performance

Why know about performance 1 Performance Today we ll discuss issues related to performance: Latency/Response Time/Execution Time vs. Throughput How do you make a reasonable performance comparison? The 3 components of CPU performance

More information

Chapter 7. Registers & Register Transfers. J.J. Shann. J. J. Shann

Chapter 7. Registers & Register Transfers. J.J. Shann. J. J. Shann Chapter 7 Registers & Register Transfers J. J. Shann J.J. Shann Chapter Overview 7-1 Registers and Load Enable 7-2 Register Transfers 7-3 Register Transfer Operations 7-4 A Note for VHDL and Verilog Users

More information

EC 413 Computer Organization

EC 413 Computer Organization EC 413 Computer Organzaton CPU Performance Evaluaton Prof. Mchel A. Knsy Performance Measurement Processor performance: Executon tme Area Logc complexty Power Tme = Instructons Cycles Tme Program Program

More information

Lecture 8: Skew Tolerant Design (including Dynamic Circuit Issues)

Lecture 8: Skew Tolerant Design (including Dynamic Circuit Issues) Lecture 8: Skew Tolerant Design (including Dynamic Circuit Issues) Computer Systems Laboratory Stanford University horowitz@stanford.edu Copyright 2007 by Mark Horowitz w/ material from David Harris 1

More information

CS 230 Winter 2013 Tutorial 7 Monday, March 4, 2013

CS 230 Winter 2013 Tutorial 7 Monday, March 4, 2013 CS 230 Winter 2013 Tutorial 7 Monday, March 4, 2013 1. This question is based on one from the text book Computer Organization and Design (Patterson/Hennessy): Consider two different implementations of

More information

Mark Redekopp, All rights reserved. EE 357 Unit 12. Performance Modeling

Mark Redekopp, All rights reserved. EE 357 Unit 12. Performance Modeling EE 357 Unit 12 Performance Modeling An Opening Question An Intel and a Sun/SPARC computer measure their respective rates of instruction execution on the same application written in C Mark Redekopp, All

More information

Lecture 20: Sequential Circuits. Sequencing

Lecture 20: Sequential Circuits. Sequencing Lecture 20: Sequential Circuits Sequencing Elements Simple /FF Timing efinitions Source: Ch 7 (W&H) Sequencing Use flip-flops to delay fast tokens so they move through exactly one stage each cycle. Inevitably

More information

Lecture 8: Skew Tolerant Domino Clocking

Lecture 8: Skew Tolerant Domino Clocking Lecture 8: Skew Tolerant Domino Clocking Computer Systems Laboratory Stanford University horowitz@stanford.edu Copyright 2001 by Mark Horowitz (Original Slides from David Harris) 1 Introduction Domino

More information

MEMORY SYSTEM. Mahdi Nazm Bojnordi. CS/ECE 3810: Computer Organization. Assistant Professor School of Computing University of Utah

MEMORY SYSTEM. Mahdi Nazm Bojnordi. CS/ECE 3810: Computer Organization. Assistant Professor School of Computing University of Utah MEMORY SYSTEM Mahdi Nazm Bojnordi Assistant Professor School of Computing University of Utah CS/ECE 3810: Computer Organization Overview Notes Homework 9 (deadline Apr. 9 th ) n Verify your submitted file

More information

Accelerating Financial Computation

Accelerating Financial Computation Accelerating Financial Computation Wayne Luk Department of Computing Imperial College London HPC Finance Conference and Training Event Computational Methods and Technologies for Finance 13 May 2013 1 Accelerated

More information

A t S + b r t T B (h i + 1) (t S + t T ) C h i (t S + t T ) + t S + b t T D (h i + n) (t S + t T )

A t S + b r t T B (h i + 1) (t S + t T ) C h i (t S + t T ) + t S + b t T D (h i + n) (t S + t T ) Suppose we have a primary B+-tree index where the leaves contain search keys and RIDs, and the RIDs point to the records in a file that is ordered on the index search key. Assume that the blocks in the

More information

ECSE 425 Lecture 5: Quan2fying Computer Performance

ECSE 425 Lecture 5: Quan2fying Computer Performance ECSE 425 Lecture 5: Quan2fying Computer Performance H&P Chapter 1 Vu, Meyer; Textbook figures 2007 Elsevier Science Last Time Trends in Dependability Quan2ta2ve Principles of Computer Design 2 Today Quan2fying

More information

Aggregation of an FX order book based on complex event processing

Aggregation of an FX order book based on complex event processing Aggregation of an FX order book based on complex event processing AUTHORS ARTICLE INFO JOURNAL Barret Shao Greg Frank Barret Shao and Greg Frank (2012). Aggregation of an FX order book based on complex

More information

BCN1043. By Dr. Mritha Ramalingam. Faculty of Computer Systems & Software Engineering

BCN1043. By Dr. Mritha Ramalingam. Faculty of Computer Systems & Software Engineering BCN1043 By Dr. Mritha Ramalingam Faculty of Computer Systems & Software Engineering mritha@ump.edu.my http://ocw.ump.edu.my/ authors Dr. Mohd Nizam Mohmad Kahar (mnizam@ump.edu.my) Jamaludin Sallim (jamal@ump.edu.my)

More information

TEPZZ 858Z 5A_T EP A1 (19) (11) EP A1 (12) EUROPEAN PATENT APPLICATION. (43) Date of publication: Bulletin 2015/15

TEPZZ 858Z 5A_T EP A1 (19) (11) EP A1 (12) EUROPEAN PATENT APPLICATION. (43) Date of publication: Bulletin 2015/15 (19) TEPZZ 88Z A_T (11) EP 2 88 02 A1 (12) EUROPEAN PATENT APPLICATION (43) Date of publication: 08.04. Bulletin / (1) Int Cl.: G06Q /00 (12.01) (21) Application number: 13638.6 (22) Date of filing: 01..13

More information

Solutions - Final Exam (December 7:30 am) Clarity is very important! Show your procedure!

Solutions - Final Exam (December 7:30 am) Clarity is very important! Show your procedure! DPARTMNT OF LCTRICAL AND COMPUTR NGINRING, TH UNIVRSITY OF NW MXICO C-238L: Computer Logic Deign Fall 23 Solution - Final am (December th @ 7:3 am) Clarity i very important! Show your procedure! PROBLM

More information

EE115C Spring 2013 Digital Electronic Circuits. Lecture 19: Timing Analysis

EE115C Spring 2013 Digital Electronic Circuits. Lecture 19: Timing Analysis EE115C Spring 2013 Digital Electronic Circuits Lecture 19: Timing Analysis Outline Timing parameters Clock nonidealities (skew and jitter) Impact of Clk skew on timing Impact of Clk jitter on timing Flip-flop-

More information

Systems Engineering. Engineering 101 By Virgilio Gonzalez

Systems Engineering. Engineering 101 By Virgilio Gonzalez Systems Engineering Engineering 101 By Virgilio Gonzalez Systems process What is a System? What is your definition? A system is a construct or collection of different elements that together produce results

More information

Testing Systematic Code Coverage Techniques

Testing Systematic Code Coverage Techniques Testing Systematic Code Coverage Techniques By Linda Westfall www.westfallteam.com When performing structural testing of the code, the term paths refer to control flow sequences through the internal structure

More information

Ultimate Control. Maxeler RiskAnalytics

Ultimate Control. Maxeler RiskAnalytics Ultimate Control Maxeler RiskAnalytics Analytics Risk Financial markets are rapidly evolving. Data volume and velocity are growing exponentially. To keep ahead of the competition financial institutions

More information

Online Algorithms SS 2013

Online Algorithms SS 2013 Faculty of Computer Science, Electrical Engineering and Mathematics Algorithms and Complexity research group Jun.-Prof. Dr. Alexander Skopalik Online Algorithms SS 2013 Summary of the lecture by Vanessa

More information

Week 5. Remainder of chapter 9: the complete real model Chapter 10: money Copyright 2008 Pearson Addison-Wesley. All rights reserved.

Week 5. Remainder of chapter 9: the complete real model Chapter 10: money Copyright 2008 Pearson Addison-Wesley. All rights reserved. Week 5 Remainder of chapter 9: the complete real model Chapter 10: money 10-1 A Decrease in the Current Capital Stock This could arise due to a war or natural disaster. Output may rise or fall, depending

More information

Legend. Extra options used in the different configurations slow Apache (all default) svnserve (all default) file: (all default) dump (all default)

Legend. Extra options used in the different configurations slow Apache (all default) svnserve (all default) file: (all default) dump (all default) Legend Environment Computer VM on XEON E5-2430 2.2GHz; assigned 2 cores, 4GB RAM OS Windows Server 2012, x64 Storage iscsi SAN, using spinning SCSI discs Tests log $repo/ -v --limit 50000 export $ruby/trunk

More information

14.54 International Trade Lecture 13: Heckscher-Ohlin Model of Trade (I)

14.54 International Trade Lecture 13: Heckscher-Ohlin Model of Trade (I) 14.54 International Trade Lecture 13: Heckscher-Ohlin Model of Trade (I) 14.54 Week 9 Fall 2016 14.54 (Week 9) Heckscher-Ohlin Model Fall 2016 1 / 19 Today s Plan 1 2 3 HO model: Main Assumptions HO model:

More information

Analytics in 10 Micro-Seconds Using FPGAs. David B. Thomas Imperial College London

Analytics in 10 Micro-Seconds Using FPGAs. David B. Thomas Imperial College London Analytics in 10 Micro-Seconds Using FPGAs David B. Thomas dt10@imperial.ac.uk Imperial College London Overview 1. The case for low-latency computation 2. Quasi-Random Monte-Carlo in 10us 3. Binomial Trees

More information

Instruction Selection: Preliminaries. Comp 412

Instruction Selection: Preliminaries. Comp 412 COMP 412 FALL 2018 Instruction Selection: Preliminaries Comp 412 source code IR Front End Optimizer Back End IR target code Copyright 2018, Keith D. Cooper & Linda Torczon, all rights reserved. Students

More information

A New Redundancy Strategy for High-Availability Power Systems

A New Redundancy Strategy for High-Availability Power Systems Kevin Covi IBM STG High-End Server Development A New Redundancy Strategy for High-Availability Power Systems Outline RAS Philosophy Review Power 6 Traditional approach Power 7 Hybrid approach Load lines

More information

Assessing Solvency by Brute Force is Computationally Tractable

Assessing Solvency by Brute Force is Computationally Tractable O T Y H E H U N I V E R S I T F G Assessing Solvency by Brute Force is Computationally Tractable (Applying High Performance Computing to Actuarial Calculations) E D I N B U R M.Tucker@epcc.ed.ac.uk Assessing

More information

COMP417 Introduction to Robotics and Intelligent Systems. Reinforcement Learning - 2

COMP417 Introduction to Robotics and Intelligent Systems. Reinforcement Learning - 2 COMP417 Introduction to Robotics and Intelligent Systems Reinforcement Learning - 2 Speaker: Sandeep Manjanna Acklowledgement: These slides use material from Pieter Abbeel s, Dan Klein s and John Schulman

More information

Report for Prediction Processor Graduate Computer Architecture I

Report for Prediction Processor Graduate Computer Architecture I Report for Prediction Processor Graduate Computer Architecture I Qian Wan Washington University in St. Louis, St. Louis, MO 63130 QW2@cec.wustl.edu Abstract This report is to fulfill the partial requirement

More information

1) S = {s}; 2) for each u V {s} do 3) dist[u] = cost(s, u); 4) Insert u into a 2-3 tree Q with dist[u] as the key; 5) for i = 1 to n 1 do 6) Identify

1) S = {s}; 2) for each u V {s} do 3) dist[u] = cost(s, u); 4) Insert u into a 2-3 tree Q with dist[u] as the key; 5) for i = 1 to n 1 do 6) Identify CSE 3500 Algorithms and Complexity Fall 2016 Lecture 17: October 25, 2016 Dijkstra s Algorithm Dijkstra s algorithm for the SSSP problem generates the shortest paths in nondecreasing order of the shortest

More information

McKesson Radiology 12.0 Web Push

McKesson Radiology 12.0 Web Push McKesson Radiology 12.0 Web Push The scenario Your institution has radiologists who interpret studies using various personal computers (PCs) around and outside your enterprise. The PC might be in one of

More information

Automatic Generation and Optimisation of Reconfigurable Financial Monte-Carlo Simulations

Automatic Generation and Optimisation of Reconfigurable Financial Monte-Carlo Simulations Automatic Generation and Optimisation of Reconfigurable Financial Monte-Carlo s David B. Thomas, Jacob A. Bower, Wayne Luk {dt1,wl}@doc.ic.ac.uk Department of Computing Imperial College London Abstract

More information

Unparalleled Performance, Agility and Security for NSE

Unparalleled Performance, Agility and Security for NSE white paper Intel Xeon and Intel Xeon Scalable Processor Family Financial Services Unparalleled Performance, Agility and Security for NSE The latest Intel Xeon processor platform provides new levels of

More information

1 No capital mobility

1 No capital mobility University of British Columbia Department of Economics, International Finance (Econ 556) Prof. Amartya Lahiri Handout #7 1 1 No capital mobility In the previous lecture we studied the frictionless environment

More information

COS 318: Operating Systems. CPU Scheduling. Jaswinder Pal Singh Computer Science Department Princeton University

COS 318: Operating Systems. CPU Scheduling. Jaswinder Pal Singh Computer Science Department Princeton University COS 318: Operating Systems CPU Scheduling Jaswinder Pal Singh Computer Science Department Princeton University (http://www.cs.princeton.edu/courses/cos318/) Today s Topics u CPU scheduling basics u CPU

More information

High throughput implementation of the new Secure Hash Algorithm through partial unrolling

High throughput implementation of the new Secure Hash Algorithm through partial unrolling High throughput implementation of the new Secure Hash Algorithm through partial unrolling Konstantinos Aisopos Athanasios P. Kakarountas Haralambos Michail Costas E. Goutis Dpt. of Electrical and Computer

More information

Reconfigurable Acceleration for Monte Carlo based Financial Simulation

Reconfigurable Acceleration for Monte Carlo based Financial Simulation Reconfigurable Acceleration for Monte Carlo based Financial Simulation G.L. Zhang, P.H.W. Leong, C.H. Ho, K.H. Tsoi, C.C.C. Cheung*, D. Lee**, Ray C.C. Cheung*** and W. Luk*** The Chinese University of

More information

Liangzi AUTO: A Parallel Automatic Investing System Based on GPUs for P2P Lending Platform. Gang CHEN a,*

Liangzi AUTO: A Parallel Automatic Investing System Based on GPUs for P2P Lending Platform. Gang CHEN a,* 2017 2 nd International Conference on Computer Science and Technology (CST 2017) ISBN: 978-1-60595-461-5 Liangzi AUTO: A Parallel Automatic Investing System Based on GPUs for P2P Lending Platform Gang

More information

Algorithmic Differentiation of a GPU Accelerated Application

Algorithmic Differentiation of a GPU Accelerated Application of a GPU Accelerated Application Numerical Algorithms Group 1/31 Disclaimer This is not a speedup talk There won t be any speed or hardware comparisons here This is about what is possible and how to do

More information

Chapter 2 The Measurement of Income, Prices, and Unemployment

Chapter 2 The Measurement of Income, Prices, and Unemployment Chapter 2 The Measurement of Income, Prices, and Unemployment Chapter Outline 2-1 Why We Care About Income 2-2 The Circular Flow of Income and Expenditure 2-3 What GDP Is, and What GDP Is Not a. Defining

More information

Enhanced Shell Sorting Algorithm

Enhanced Shell Sorting Algorithm Enhanced ing Algorithm Basit Shahzad, and Muhammad Tanvir Afzal Abstract Many algorithms are available for sorting the unordered elements. Most important of them are Bubble sort, Heap sort, Insertion sort

More information

Finite state machines (cont d)

Finite state machines (cont d) Finite state machines (cont d)! Another type of shift register " Linear-feedback shift register (LFSR)! Used to generate pseudo-random numbers! Some FSM examples Autumn 2014 CSE390C - VIII - Finite State

More information

Washems2019! Basic Required Fields for Each Line in the Input file

Washems2019! Basic Required Fields for Each Line in the Input file Washems2019! is a standalone pc-based program designed to calculate disallowed losses resulting from the buying and selling of stocks and options. It was written to satisfy the stringent reporting requirement

More information

GOVERNMENT AND FISCAL POLICY IN JUNE 16, 2010 THE CONSUMPTION-SAVINGS MODEL (CONTINUED) ADYNAMIC MODEL OF THE GOVERNMENT

GOVERNMENT AND FISCAL POLICY IN JUNE 16, 2010 THE CONSUMPTION-SAVINGS MODEL (CONTINUED) ADYNAMIC MODEL OF THE GOVERNMENT GOVERNMENT AND FISCAL POLICY IN THE CONSUMPTION-SAVINGS MODEL (CONTINUED) JUNE 6, 200 A Government in the Two-Period Model ADYNAMIC MODEL OF THE GOVERNMENT So far only consumers in our two-period world

More information

Answers to Text Questions and Problems to Chapter 5

Answers to Text Questions and Problems to Chapter 5 Answers to Text Questions and Problems to Chapter 5 Answers to Review Questions 1. Using market values permits economists to add together different goods and services to get a measure of total output.

More information

Barrier Option. 2 of 33 3/13/2014

Barrier Option. 2 of 33 3/13/2014 FPGA-based Reconfigurable Computing for Pricing Multi-Asset Barrier Options RAHUL SRIDHARAN, GEORGE COOKE, KENNETH HILL, HERMAN LAM, ALAN GEORGE, SAAHPC '12, PROCEEDINGS OF THE 2012 SYMPOSIUM ON APPLICATION

More information

ATOP-DOWN APPROACH TO ARCHITECTING CPI COMPONENT PERFORMANCE COUNTERS

ATOP-DOWN APPROACH TO ARCHITECTING CPI COMPONENT PERFORMANCE COUNTERS ... ATOP-DOWN APPROACH TO ARCHITECTING CPI COMPONENT PERFORMANCE COUNTERS... SOFTWARE DEVELOPERS CAN GAIN INSIGHT INTO SOFTWARE-HARDWARE INTERACTIONS BY DECOMPOSING PROCESSOR PERFORMANCE INTO INDIVIDUAL

More information

NEC Asia Pacific Users Group Workshop 2014 Keeping the Programme Up to Date

NEC Asia Pacific Users Group Workshop 2014 Keeping the Programme Up to Date NEC Asia Pacific Users Group Workshop 2014 Keeping the Programme Up to Date Workshop Agenda Programme requirements within ECC contract Types of float + critical path Time risk allowance Issues associated

More information

Cost Slope Analysis 1

Cost Slope Analysis 1 Cost Slope Analysis 1 Running head: Cost Slope Analysis Cost Slope Analysis Technique Summary Su-Cheng Wu Cost Slope Analysis 2 Abstract: Cost Slope Analysis considers the following: direct, indirect cost,

More information

Problem set 1 ECON 4330

Problem set 1 ECON 4330 Problem set ECON 4330 We are looking at an open economy that exists for two periods. Output in each period Y and Y 2 respectively, is given exogenously. A representative consumer maximizes life-time utility

More information

Applications of Dataflow Computing to Finance. Florian Widmann

Applications of Dataflow Computing to Finance. Florian Widmann Applications of Dataflow Computing to Finance Florian Widmann Overview 1. Requirement Shifts in the Financial World 2. Case 1: Real Time Margin 3. Case 2: FX Option Monitor 4. Conclusions Market Context

More information

performance counter architecture for computing CPI components

performance counter architecture for computing CPI components A Performance Counter Architecture for Computing Accurate CPI Components Stijn Eyerman Lieven Eeckhout ELIS, Ghent University, Belgium {seyerman,leeckhou}@elis.ugent.be Tejas Karkhanis James E. Smith ECE,

More information

Max Registers, Counters and Monotone Circuits

Max Registers, Counters and Monotone Circuits James Aspnes 1 Hagit Attiya 2 Keren Censor 2 1 Yale 2 Technion Counters Model Collects Our goal: build a cheap counter for an asynchronous shared-memory system. Two operations: increment and read. Read

More information

Lecture 14: Basic Fixpoint Theorems (cont.)

Lecture 14: Basic Fixpoint Theorems (cont.) Lecture 14: Basic Fixpoint Theorems (cont) Predicate Transformers Monotonicity and Continuity Existence of Fixpoints Computing Fixpoints Fixpoint Characterization of CTL Operators 1 2 E M Clarke and E

More information

Optimal Irreducible Polynomials for GF(2 m ) arithmetic. Michael Scott School of Computing Dublin City University

Optimal Irreducible Polynomials for GF(2 m ) arithmetic. Michael Scott School of Computing Dublin City University Optimal Irreducible Polynomials for GF(2 m ) arithmetic Michael Scott School of Computing Dublin City University GF(2 m ) polynomial representation A polynomial with coefficients either 0 or 1 (m is a

More information

CHILD SUPPORT REBUTTAL WORKSHEET OAR oregonchildsupport.gov

CHILD SUPPORT REBUTTAL WORKSHEET OAR oregonchildsupport.gov CHILD SUPPORT REBUTTAL WORKSHEET OAR 137-050-0760 oregonchildsupport.gov This worksheet is presented in support of a finding that the guideline support amount is unjust or inappropriate. It is not the

More information

SWITCHBACK (FOREX) V1.4

SWITCHBACK (FOREX) V1.4 SWITCHBACK (FOREX) V1.4 User Manual This manual describes all the parameters in the ctrader cbot. Please read the Switchback Strategy Document for an explanation on how it all works. Last Updated 11/11/2017

More information

HW 1 Reminder. Principles of Programming Languages. Lets try another proof. Induction. Induction on Derivations. CSE 230: Winter 2007

HW 1 Reminder. Principles of Programming Languages. Lets try another proof. Induction. Induction on Derivations. CSE 230: Winter 2007 CSE 230: Winter 2007 Principles of Programming Languages Lecture 4: Induction, Small-Step Semantics HW 1 Reminder Due next Tue Instructions about turning in code to follow Send me mail if you have issues

More information

MACROECONOMICS. Economic Growth II: Technology, Empirics, and Policy. N. Gregory Mankiw. PowerPoint Slides by Ron Cronovich

MACROECONOMICS. Economic Growth II: Technology, Empirics, and Policy. N. Gregory Mankiw. PowerPoint Slides by Ron Cronovich 9 : Technology, Empirics, and Policy MACROECONOMICS N. Gregory Mankiw Modified for EC 204 by Bob Murphy PowerPoint Slides by Ron Cronovich 2013 Worth Publishers, all rights reserved IN THIS CHAPTER, YOU

More information

Economics 302 Intermediate Macroeconomic Theory and Policy (Fall 2009) Lecture Nov , 2009

Economics 302 Intermediate Macroeconomic Theory and Policy (Fall 2009) Lecture Nov , 2009 Economics 302 Intermediate Macroeconomic Theory and Policy (Fall 2009) Lecture 21-22 Nov. 12-17, 2009 Outline: Investment Fluctuations in investment spending How firms make investment decisions The investment

More information

Efficient Reconfigurable Design for Pricing Asian Options

Efficient Reconfigurable Design for Pricing Asian Options Efficient Reconfigurable Design for Pricing Asian Options Anson H.T. Tse, David B. Thomas, K.H. Tsoi, Wayne Luk Department of Computing Imperial College London, UK {htt08,dt10,khtsoi,wl}@doc.ic.ac.uk ABSTRACT

More information

Chapter 8. Economic Growth II: Technology, Empirics and Policy 10/6/2010. Introduction. Technological progress in the Solow model

Chapter 8. Economic Growth II: Technology, Empirics and Policy 10/6/2010. Introduction. Technological progress in the Solow model Chapter 8 : Technology, Empirics and Policy Introduction In the Solow of Chapter 7, the production technology is held constant. income per capita is constant in the steady state. Neither point is true

More information

Project Management Chapter 13

Project Management Chapter 13 Lecture 12 Project Management Chapter 13 Introduction n Managing large-scale, complicated projects effectively is a difficult problem and the stakes are high. n The first step in planning and scheduling

More information

Washems! Please Note: You must be running Excel 2007 or later in order to use this version of Washems!.

Washems! Please Note: You must be running Excel 2007 or later in order to use this version of Washems!. Washems! is a standalone pc-based program designed to calculate disallowed losses resulting from the buying and selling of stocks and options. It was written to satisfy the stringent reporting requirement

More information

TECHNOLOGICAL PROGRESS AND ECONOMIC GROWTH. Dongpeng Liu Department of Economics Nanjing University

TECHNOLOGICAL PROGRESS AND ECONOMIC GROWTH. Dongpeng Liu Department of Economics Nanjing University TECHNOLOGICAL PROGRESS AND ECONOMIC GROWTH Dongpeng Liu Department of Economics Nanjing University ROADMAP INCOME EXPENDITURE LIQUIDITY PREFERENCE IS CURVE LM CURVE SHORT-RUN IS-LM MODEL AGGREGATE DEMAND

More information

SPEED UP OF NUMERIC CALCULATIONS USING A GRAPHICS PROCESSING UNIT (GPU)

SPEED UP OF NUMERIC CALCULATIONS USING A GRAPHICS PROCESSING UNIT (GPU) SPEED UP OF NUMERIC CALCULATIONS USING A GRAPHICS PROCESSING UNIT (GPU) NIKOLA VASILEV, DR. ANATOLIY ANTONOV Eurorisk Systems Ltd. 31, General Kiselov str. BG-9002 Varna, Bulgaria Phone +359 52 612 367

More information

FPGA ACCELERATION OF MONTE-CARLO BASED CREDIT DERIVATIVE PRICING

FPGA ACCELERATION OF MONTE-CARLO BASED CREDIT DERIVATIVE PRICING FPGA ACCELERATION OF MONTE-CARLO BASED CREDIT DERIVATIVE PRICING Alexander Kaganov, Paul Chow Department of Electrical and Computer Engineering University of Toronto Toronto, ON, Canada M5S 3G4 email:

More information

Application of Earned Value Management (EVM) for Effective Project Control

Application of Earned Value Management (EVM) for Effective Project Control Application of Earned Value Management (EVM) for Effective Project Control Course No: B02-012 Credit: 2 PDH Boris Shvartsberg, Ph.D., P.E., P.M.P. Continuing Education and Development, Inc. 9 Greyridge

More information

Stock investing became all the rage during the late 1990s. Even tennis

Stock investing became all the rage during the late 1990s. Even tennis In This Chapter Knowing the essentials Doing your own research Recognizing winners Exploring investment strategies Chapter 1 Exploring the Basics Stock investing became all the rage during the late 1990s.

More information

Ward Group Insurance Property and Casualty 2017 Survey Codes and Job Descriptions

Ward Group Insurance Property and Casualty 2017 Survey Codes and Job Descriptions Aon Hewitt Ward Group Ward Group Insurance Property and Casualty 2017 Survey Codes and Job Descriptions Version 12.0 This document contains proprietary information belonging to Ward Group and is intended

More information

ITM1010 Computer and Communication Technologies

ITM1010 Computer and Communication Technologies ITM omputer and ommunication Technologies Lecture #5 Part I: Introduction to omputer Technologies K-Map, ombination and Sequential Logic ircuits ITM 計算機與通訊技術 2 Product Product-Of Of-Sum onfiguration Sum

More information

DUALITY AND SENSITIVITY ANALYSIS

DUALITY AND SENSITIVITY ANALYSIS DUALITY AND SENSITIVITY ANALYSIS Understanding Duality No learning of Linear Programming is complete unless we learn the concept of Duality in linear programming. It is impossible to separate the linear

More information

MACROECONOMICS II INVESTMENT DEMAND (SPENDING)

MACROECONOMICS II INVESTMENT DEMAND (SPENDING) MACROECONOMICS II INVESTMENT DEMAND (SPENDING) Macroeconomics 2 Lecture Material Prepared by Dr. Emmanuel Codjoe 1 In macroeconomics, Investment Demand is important for two reasons: 1) Volatile and hence

More information

Issues on Time synchronization in Financial Markets

Issues on Time synchronization in Financial Markets Issues on Time synchronization in Financial Markets Wen-Hung Tseng and Huang-Tien Lin National Time and Frequency standard Lab, Telecommunication Laboratories, Chunghwa Telecom Co., Ltd., Taiwan APMP 2018

More information

Recap First-Price Revenue Equivalence Optimal Auctions. Auction Theory II. Lecture 19. Auction Theory II Lecture 19, Slide 1

Recap First-Price Revenue Equivalence Optimal Auctions. Auction Theory II. Lecture 19. Auction Theory II Lecture 19, Slide 1 Auction Theory II Lecture 19 Auction Theory II Lecture 19, Slide 1 Lecture Overview 1 Recap 2 First-Price Auctions 3 Revenue Equivalence 4 Optimal Auctions Auction Theory II Lecture 19, Slide 2 Motivation

More information

x-intercepts, asymptotes, and end behavior together

x-intercepts, asymptotes, and end behavior together MA 2231 Lecture 27 - Sketching Rational Function Graphs Wednesday, April 11, 2018 Objectives: Explore middle behavior around x-intercepts, and the general shapes for rational functions. x-intercepts, asymptotes,

More information

Topic 3: Endogenous Technology & Cross-Country Evidence

Topic 3: Endogenous Technology & Cross-Country Evidence EC4010 Notes, 2005 (Karl Whelan) 1 Topic 3: Endogenous Technology & Cross-Country Evidence In this handout, we examine an alternative model of endogenous growth, due to Paul Romer ( Endogenous Technological

More information

Project planning and creating a WBS

Project planning and creating a WBS 37E01500 Project Management and Consulting Practice Project planning and creating a WBS Matti Rossi Lecture 3, Tue 28.2.2017 Learning objectives Describe the project time management planning tasks, and

More information

Econ 302 Fall Don t forget to download a copy of the Homework Cover Sheet. Mark the location where you handed in your work.

Econ 302 Fall Don t forget to download a copy of the Homework Cover Sheet. Mark the location where you handed in your work. Econ 302 Fall 2005 Don t forget to download a copy of the Homework Cover Sheet. Mark the location where you handed in your work. Homework #1; Chapter 1. This homework has three parts (A, B, C). Each part

More information

Standard Development Timeline

Standard Development Timeline PRC 012 2 Remedial Action Schemes Standard Development Timeline This section is maintained by the drafting team during the development of the standard and will be removed when the standard becomes effective.

More information

THE COMMUNIQUE MARCH 2016

THE COMMUNIQUE MARCH 2016 THE COMMUNIQUE MARCH 2016 MAJOR INDICES CLOSE MTD QTD YTD S&P 500 1932.23-0.41-5.47-5.47 Dow Jones Industrials 16516.50 0.31-5.21-5.21 NASDAQ Composite 4557.95-1.21-8.98-8.98 U.S. TREASURIES YEILD 5-yr

More information

The Solow Growth Model

The Solow Growth Model The Solow Growth Model Seyed Ali Madanizadeh Sharif U. of Tech. April 25, 2017 Seyed Ali Madanizadeh Sharif U. of Tech. () The Solow Growth Model April 25, 2017 1 / 46 Economic Growth Facts 1 In the data,

More information

1.010 Uncertainty in Engineering Fall 2008

1.010 Uncertainty in Engineering Fall 2008 MIT OpenCourseWare http://ocw.mit.edu 1.010 Uncertainty in Engineering Fall 2008 For information about citing these materials or our Terms of Use, visit: http://ocw.mit.edu/terms. Application Example 18

More information

Trade and Manage Wealth with Deep RL and Memory

Trade and Manage Wealth with Deep RL and Memory Trade and Manage Wealth with Deep RL and Memory NVIDIA GTC 2018 March 26, 2018 Daniel Egloff, Founder, CEO, Head R&D Problem Retail investor customer demands Manage portfolio more actively Get additional

More information

Economics 325 (Section 020*) Intermediate Macroeconomic Analysis 1. Syllabus Professor Sanjay Chugh Fall 2009

Economics 325 (Section 020*) Intermediate Macroeconomic Analysis 1. Syllabus Professor Sanjay Chugh Fall 2009 Department of Economics University of Maryland Economics 325 (Section 020*) Intermediate Macroeconomic Analysis Syllabus Professor Sanjay Chugh Lectures: Tuesdays and Thursdays, 2:00pm-2:50pm, Tydings

More information

Efficient Reconfigurable Design for Pricing Asian Options

Efficient Reconfigurable Design for Pricing Asian Options Efficient Reconfigurable Design for Pricing Asian Options Anson H.T. Tse, David B. Thomas, K.H. Tsoi, Wayne Luk Department of Computing Imperial College London, UK (htt08,dtl O,khtsoi,wl)@doc.ic.ac.uk

More information

Characterizing Microprocessor Benchmarks. Towards Understanding the Workload Design Space

Characterizing Microprocessor Benchmarks. Towards Understanding the Workload Design Space Characterizing Microprocessor Benchmarks Towards Understanding the Workload Design Space by Michael Arunkumar, B.E. Report Presented to the Faculty of the Graduate School of the University of Texas at

More information

Monetary and Fiscal Policy During the Great Recession: Old Challenges and New Insights

Monetary and Fiscal Policy During the Great Recession: Old Challenges and New Insights Monetary and Fiscal Policy During the Great Recession: Old Challenges and New Insights Ken Kuttner Oberlin College Japanese Monetary Policy: Experience and Future Economic and Social Research Institute

More information

Lecture 2: The Neoclassical Growth Model

Lecture 2: The Neoclassical Growth Model Lecture 2: The Neoclassical Growth Model Florian Scheuer 1 Plan Introduce production technology, storage multiple goods 2 The Neoclassical Model Three goods: Final output Capital Labor One household, with

More information

International Monetary Policy

International Monetary Policy International Monetary Policy 11 Balance of Payments and National Accounting 1 Michele Piffer London School of Economics 1 Course prepared for the Shanghai Normal University, College of Finance, April

More information

Models of Money Demand & Theories of Interest Rate Determination International Monetary Economics, Lecture 7

Models of Money Demand & Theories of Interest Rate Determination International Monetary Economics, Lecture 7 Models of Money Demand & Theories of Interest Rate Determination International Monetary Economics, Lecture 7 Stephen Kinsella March 16, 2009 1 Introduction Last week we saw three functions central banks

More information

How to Strategically Manage Your Debt

How to Strategically Manage Your Debt Debt. Funny how four little letters can feel so dirty. Most of us have it in one shape or another, but none of us like to talk about it. Debt can get us into trouble, especially if it is unplanned and

More information

11/1/2018. Overview PERT / CPM. Network representation. Network representation. Project Scheduling. What is a path?

11/1/2018. Overview PERT / CPM. Network representation. Network representation. Project Scheduling. What is a path? PERT / CPM BSD Dave Novak Fall Overview Introduce Discuss what a critical path is Discuss critical path algorithm Example Source: nderson et al., 1 Quantitative Methods for Business 1 th edition some slides

More information

The Big Picture. Macro Principles. Lecture 1

The Big Picture. Macro Principles. Lecture 1 What is Macroeconomics? GDP Other Measures The Big Picture Macro Principles Lecture 1 Growth Fluctuations Today s Topics The main ideas in this lecture What do we mean by macroeconomics? What are the major

More information