Dissertations / Theses on the topic 'Computer architecture; branch prediction'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 40 dissertations / theses for your research on the topic 'Computer architecture; branch prediction.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.
GAO, HONGLIANG. "IMPROVING BRANCH PREDICTION ACCURACY VIA EFFECTIVE SOURCE INFORMATION AND PREDICTION ALGORITHMS." Doctoral diss., University of Central Florida, 2008. http://digital.library.ucf.edu/cdm/ref/collection/ETD/id/3286.
Full textPh.D.
School of Electrical Engineering and Computer Science
Engineering and Computer Science
Computer Science PhD
Lind, Tobias. "Evaluation of Instruction Prefetch Methods for Coresonic DSP Processor." Thesis, Linköpings universitet, Datorteknik, 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-129128.
Full textZlatohlávková, Lucie. "Návrh a implementace prostředků pro zvýšení výkonu procesoru." Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2007. http://www.nusl.cz/ntk/nusl-412764.
Full textEgan, Colin. "Dynamic branch prediction in high performance superscalar processors." Thesis, University of Hertfordshire, 2000. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.340035.
Full textAlovisi, Pietro. "Static Branch Prediction through Representation Learning." Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-277923.
Full textMed avseende på kompilatorer, handlar branch probability prediction om att uppskatta sannolikheten att en viss förgrening kommer tas i ett program. Med avsaknad av profileringsinformation förlitar sig kompilatorer på statiskt upp- skattade branch probabilities och de främsta branch probability predictors är baserade på heuristiker. Den senaste maskininlärningsalgoritmerna lär sig direkt från källkod genom algoritmer för natural language processing. En algoritm baserad på representation learning word embedding byggs och utvärderas för branch probabilities prediction på LLVM’s intermediate language (IR). Förutsägaren är tränad och testad på SPEC’s CPU 2006 riktmärke och jämförd med de främsta branch probability heuristikerna. Förutsägaren erhåller en bättre frekvens av missar och träffsäkerhet i sin branch prediction har jämförts med alla utvärderade heuristiker, men producerar i genomsnitt ingen prestandaförbättring jämfört med LLVM’s branch predictor på riktmärket. Den här undersökningen visar att det är möjligt att förutsäga branch prediction probabilities med användande av representation learning, men att det behöver satsas mer på att få tag på en förutsägare som har praktiska övertag gentemot heuristiken.
Jiménez, Daniel Angel. "Delay-sensitive branch predictors for future technologies." Full text (PDF) from UMI/Dissertation Abstracts International, 2002. http://wwwlib.umi.com/cr/utexas/fullcit?p3081043.
Full textCarver, Jason W. "Architecture of a prediction economy." Thesis, Massachusetts Institute of Technology, 2008. http://hdl.handle.net/1721.1/45807.
Full textIncludes bibliographical references.
A design and implementation of a Prediction Economy is presented and compared to alternative designs. A Prediction Economy is composed of prediction markets, market managers, information brokers and automated trading agents. Two important goals of a Prediction Economy are to improve liquidity and information dispersal. Market managers automatically open and close appropriate markets, quickly giving traders access to the latest claims. Information brokers deliver parsed data to the trading agents. The agents execute trades on markets that might not otherwise have much trading action. Some preliminary results from a running Prediction Economy are presented, with binary markets based on football plays during a college football game. The most accurate agent chose to enter 8 of 32 markets, and was able to predict 7 of the 8 football play attempts correctly. Source code for the newly implemented tools is available, as are references to the existing open source tools used.
by Jason W. Carver.
M.Eng.
Tarlescu, Maria-Dana. "The Elastic History Buffer, a multi-hybrid branch prediction scheme using static classification." Thesis, National Library of Canada = Bibliothèque nationale du Canada, 1999. http://www.collectionscanada.ca/obj/s4/f2/dsk1/tape7/PQDD_0025/MQ50893.pdf.
Full textThankappan, Achary Retnamma Renjith. "Broadcast Mechanism for improving Conditional Branch Prediction in Speculative Multithreaded Processors." PDXScholar, 2010. https://pdxscholar.library.pdx.edu/open_access_etds/368.
Full textJothi, Komal. "Dynamic Task Prediction for an SpMT Architecture Based on Control Independence." PDXScholar, 2009. https://pdxscholar.library.pdx.edu/open_access_etds/1707.
Full textKim, Donglok. "Extended data cache prefetching using a reference prediction table /." Thesis, Connect to this title online; UW restricted, 1997. http://hdl.handle.net/1773/6127.
Full textSantos, Rafael Ramos dos. "DCE: the dynamic conditional execution in a multipath control independent architecture." reponame:Biblioteca Digital de Teses e Dissertações da UFRGS, 2003. http://hdl.handle.net/10183/5596.
Full textThis thesis presents DCE, or Dynamic Conditional Execution, as an alternative to reduce the cost of mispredicted branches. The basic idea is to fetch all paths produced by a branch that obey certain restrictions regarding complexity and size. As a result, a smaller number of predictions is performed, and therefore, a lesser number of branches are mispredicted. DCE fetches through selected branches avoiding disruptions in the fetch flow when these branches are fetched. Both paths of selected branches are executed but only the correct path commits. In this thesis we propose an architecture to execute multiple paths of selected branches. Branches are selected based on the size and other conditions. Simple and complex branches can be dynamically predicated without requiring a special instruction set nor special compiler optimizations. Furthermore, a technique to reduce part of the overhead generated by the execution of multiple paths is proposed. The performance achieved reaches levels of up to 12% when comparing a Local predictor used in DCE against a Global predictor used in the reference machine. When both machines use a Local predictor, the speedup is increased by an average of 3-3.5%.
Tsardakas, Renhuldt Nikos. "Protein contact prediction based on the Tiramisu deep learning architecture." Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-231494.
Full textAtt kunna bestämma proteiners struktur har tillämpningar inom både medicin och industri. Såväl experimentell bestämning av proteinstruktur som prediktion av densamma är svårt. Predicerad kontakt mellan olika delar av ett protein underlättar prediktion av proteinstruktur. Under senare tid har djupinlärning använts för att bygga bättre modeller för kontaktprediktion. Den här uppsatsen beskriver en ny djupinlärningsmodell för prediktion av proteinkontakter, TiramiProt. Modellen bygger på djupinlärningsarkitekturen Tiramisu. TiramiProt tränas och utvärderas på samma data som kontaktprediktionsmodellen PconsC4. Totalt tränades modeller med 228 olika hyperparameterkombinationer till konvergens. Mätt över ett flertal olika parametrar presterar den färdiga TiramiProt-modellen resultat i klass med state-of-the-art-modellerna PconsC4 och RaptorX-Contact. TiramiProt finns tillgängligt som ett Python-paket samt en Singularity-container via https://gitlab.com/nikos.t.renhuldt/TiramiProt.
Zhang, Xiushan. "L2 cache replacement based on inter-access time per access count prediction." Diss., Online access via UMI:, 2009.
Find full textJohn, Tobias. "Instruction Timing Analysis for Linux/x86-based Embedded and Desktop Systems." Master's thesis, Universitätsbibliothek Chemnitz, 2005. http://nbn-resolving.de/urn:nbn:de:swb:ch1-200501401.
Full textKhan, Salman. "Putting checkpoints to work in thread level speculative execution." Thesis, University of Edinburgh, 2010. http://hdl.handle.net/1842/4676.
Full textPrémillieu, Nathanaël. "Améliorer la performance séquentielle à l’ère des processeurs massivement multicœurs." Thesis, Rennes 1, 2013. http://www.theses.fr/2013REN1S071/document.
Full textComputers are everywhere and the need for always more computation power has pushed the processor architects to find new ways to increase performance. The today's tendency is to replicate execution core on the same die to parallelize the execution. If it goes on, processors will become manycores featuring hundred to a thousand cores. However, Amdahl's law reminds us that increasing the sequential performance will always be vital to increase global performance. A perfect way to increase sequential performance is to improve how branches are executed because they limit instruction level parallelism. The branch prediction is the most studied solution, its interest greatly depending on its accuracy. In the last years, this accuracy has been continuously improved up to reach a hardly exceeding limit. An other solution is to suppress the branches by replacing them with a construct based on predicated instructions. However, the execution of predicated instructions on out-of-order processors comes up with several problems like the multiple definition problem. This study investigates these two aspects of the branch treatment. The first part is about branch prediction. A way to improve it without increasing the accuracy is to reduce the coast of a branch misprediction. This is possible by exploiting control flow reconvergence and control independence. The work done on the wrong path on instructions common to the two paths is saved to be reused on the correct path. The second part is about predicated instructions. We propose a solution to the multiple definition problem by selectively predicting the predicate values. A selective replay mechanism is used to reduce the cost of a predicate misprediction
Li, Ying. "Interest management scheme and prediction model in intelligent transportation systems." Diss., Georgia Institute of Technology, 2012. http://hdl.handle.net/1853/45856.
Full textHarris, Erick Michael. "Amplifying the Prediction of Team Performance through Swarm Intelligence and Machine Learning." DigitalCommons@CalPoly, 2018. https://digitalcommons.calpoly.edu/theses/1964.
Full textWhite, Cory B. "A Neural Network Approach to Border Gateway Protocol Peer Failure Detection and Prediction." DigitalCommons@CalPoly, 2009. https://digitalcommons.calpoly.edu/theses/215.
Full textKalaitzidis, Kleovoulos. "Advanced speculation to increase the performance of superscalar processors." Thesis, Rennes 1, 2020. http://www.theses.fr/2020REN1S007.
Full textEven in the multicore era, making single cores faster is paramount to achieve high- performance computing, given the existence of programs that are either inherently sequential or expose non-negligible sequential parts. Sequential performance has been essentially improving with the scaling of the processor structures that enable instruction-level parallelism (ILP). However, as modern microarchitectures continue to extract more ILP by employing larger instruction windows, true data dependencies remain a major performance bottleneck. Value Prediction (VP) and Load-Address Prediction (LAP) are two developing techniques that allow to overcome this obstacle and harvest more ILP by enabling the execution of instructions in a data-wise speculative manner. This thesis proposes mechanisms that are related with VP and LAP and lead to effectively higher performance improvements. First, VP is examined in an ISA-aware manner, that discloses the impact of certain ISA particularities on the anticipated speedup. Second, a novel binary-based VP model is introduced, namely VSEP, that allows to exploit certain value patterns that although they are encountered frequently, they cannot be captured by previous works. VSEP improves the obtained speedup by 19% and also, by virtue of its structure, it mitigates the cost of predicting values wider than 64 bits. By adapting this approach to perform LAP allows to predict the memory addresses of 48% of the committed loads. Eventually, a microarchitecture that leverages carefully this LAP mechanism can execute 32% of the committed loads early
Luo, Meiling. "Indoor radio propagation modeling for system performance prediction." Phd thesis, INSA de Lyon, 2013. http://tel.archives-ouvertes.fr/tel-00961244.
Full textKhan, Taj Muhammad. "Processor design-space exploration through fast simulation." Phd thesis, Université Paris Sud - Paris XI, 2011. http://tel.archives-ouvertes.fr/tel-00691175.
Full textHassan, Ahmed. "Mining Software Repositories to Assist Developers and Support Managers." Thesis, University of Waterloo, 2004. http://hdl.handle.net/10012/1017.
Full textWang, Yaou. "Failure mechanism and reliability prediction for bonded layered structure due to cracks initiating at the interface." Columbus, Ohio : Ohio State University, 2009. http://rave.ohiolink.edu/etdc/view?acc%5Fnum=osu1236645979.
Full textVaswani, Kapil. "An Adaptive Recompilation Framework For Rotor And Architectural Support For Online Program Instrumentation." Thesis, Indian Institute of Science, 2003. http://hdl.handle.net/2005/174.
Full textAlthough runtime systems and the dynamic compilation model have revolutionized the process of application development and deployment, the associated performance overheads continue to be a cause for concern and much research. In the first part of this thesis, we describe the design and implementation of an adaptive recompilation framework for Rotor, a shared source implementation of the Common Language Infrastructure (CLI) that can increase program performance through intelligent recompilation decisions and optimizations based on the program's past behavior. Our extensions to Rotor include a low overhead runtime-stack based sampling profiler that identifies program hotspots. A recompilation controller oversees the recompilation process and generates recompilation requests. At the first-level of a multi-level optimizing compiler, code in the intermediate language is converted to an internal intermediate representation and optimized using a set of simple transformations. The compiler uses a fast yet effective linear scan algorithm for register allocation. Hot methods can be instrumented in order to collect basic-block, edge and call-graph profile information. Profile-guided optimizations driven by online profile information are used to further optimize heavily executed methods at the second level of recompilation. An evaluation of the framework using a set of test programs shows that performance can improve by a maximum of 42.3% and by 9% on average. Our results also show that the overheads of collecting accurate profile information through instrumentation to an extent outweigh the benefits of profile-guided optimizations in our implementation, suggesting the need for implementing techniques that can reduce such overheads. A flexible and extensible framework design implies that additional profiling and optimization techniques can be easily incorporated to further improve performance. As previously stated, fine-grained and accurate profile information must be available at low cost for advanced profile-guided optimizations to be effective in online environments. In this second part of this thesis, we propose a generic framework that makes it possible for instrumentation based profilers to collect profile data efficiently, a task that has traditionally been associated with high overheads. The essence of the scheme is to make the underlying hardware aware of instrumentation using a special set of profile instructions and tuned microarchitecture. This not only allows the hardware to provide the runtime with mechanisms to control the profiling activity, but also makes it possible for the hardware itself to optimize the process of profiling in a manner transparent to the runtime. We propose selective instruction dispatch as one possible controlling mechanism that can be used by the runtime to manage the execution of profile instructions and keep profiling overheads under check. We propose profile flag prediction, a hardware optimization that complements the selective dispatch mechanism by not fetching profile instructions when the runtime has turned profiling off. The framework is light-weight and flexible. It eliminates the need for expensive book-keeping, recompilation or code duplication. Our simulations with benchmarks from the SPEC CPU2000 suite show that overheads for call-graph and basic block profiling can be reduced by 72.7% and 52.4% respectively with a negligible loss in accuracy.
Valiukas, Tadas. "Kompiliatorių optimizavimas IA-64 architektūroje." Master's thesis, Lithuanian Academic Libraries Network (LABT), 2014. http://vddb.library.lt/obj/LT-eLABa-0001:E.02~2009~D_20140701_180746-19336.
Full textAfter performance optimization of traditional architectures began to reach their limits, Intel corporation started to develop new architecture based on EPIC – Explicitly Parallel Instruction Counting. This main feature allowed up to six instructions to be executed in single CPU cycle. Also this architecture includes more features, which allowed efficient solution of traditional architectures code optimization problems. However for long time code optimization algorithms have been improved for traditional architectures only, as a result those algorithms should be adopted to new architecture. One of the ways to do that – exploration of internal compilers parameters, which are responsible for code optimizations. That is the primary target of this work and in order to reach it the features of the IA-64 architecture and impact to execution performance must be explored using real-life code examples. Tests results may be used later for internal parameters selection and further exploration of these parameters values by using special compiler performance testing benchmarks. The set of those new values could be tested with real life applications in order to prove efficiency of IA-64 architecture features.
Li, Chong. "Un modèle de transition logico-matérielle pour la simplification de la programmation parallèle." Phd thesis, Université Paris-Est, 2013. http://tel.archives-ouvertes.fr/tel-00952082.
Full textChu, Yul. "Cache and branch prediction improvements for advanced computer architecture." Thesis, 2001. http://hdl.handle.net/2429/13689.
Full text"Extending branch prediction information to effective caching." Chinese University of Hong Kong, 1996. http://library.cuhk.edu.hk/record=b5888775.
Full textThesis (M.Phil.)--Chinese University of Hong Kong, 1996.
Includes bibliographical references (leaves 110-113).
Abstract --- p.i
Acknowledgement --- p.iii
Chapter 1 --- Introduction --- p.1
Chapter 1.1 --- Partial Basic Block Storing Mechanism --- p.1
Chapter 1.2 --- Data-Tagged Mechanism in Branch Target Buffer --- p.4
Chapter 1.3 --- Organization of the dissertation --- p.5
Chapter 2 --- Related Research --- p.7
Chapter 2.1 --- Branch Prediction --- p.7
Chapter 2.2 --- Branch History Table --- p.8
Chapter 2.2.1 --- Performance of Branch History Table in reducing the Branch Penalty --- p.10
Chapter 2.3 --- Branch Target Cache --- p.10
Chapter 2.4 --- Early Resolution of Branch --- p.11
Chapter 2.5 --- Software Inter-block Reorganization --- p.12
Chapter 2.6 --- Branch Target Buffer --- p.13
Chapter 2.7 --- Data Prefetching --- p.16
Chapter 2.7.1 --- Software-Directed Prefetching --- p.16
Chapter 2.7.2 --- Hardware-based prefetching --- p.17
Chapter 3 --- New Branch Target Buffer Design --- p.19
Chapter 3.1 --- Alternate Line Storing --- p.22
Chapter 3.2 --- Storing More Than One Line On Entering The Dynamic Basic Block --- p.27
Chapter 4 --- Simulation Environment for New Branch Target Buffer Design --- p.30
Chapter 4.1 --- Architectural Models and Assumptions --- p.30
Chapter 4.2 --- Memory Models --- p.33
Chapter 4.3 --- Evaluation Methodology and Measurement Criteria --- p.34
Chapter 4.4 --- Description of the Traces --- p.35
Chapter 4.5 --- Effect of the limitation of ATOM on the statistics of SPEC92 Bench- marks --- p.35
Chapter 4.6 --- Environments for collecting relevant statistics of SPEC92 Benchmarks --- p.36
Chapter 5 --- Results for New Branch Target Buffer Design --- p.38
Chapter 5.1 --- Statistical Results and Analysis for SPEC92 Benchmarks --- p.38
Chapter 5.2 --- Overall Performance --- p.39
Chapter 5.3 --- Bus Latency Effect --- p.42
Chapter 5.4 --- Effect of Cache Size --- p.45
Chapter 5.5 --- Effect of Line Size --- p.47
Chapter 5.6 --- Cache Set Associativity --- p.50
Chapter 5.7 --- Partial Hits --- p.50
Chapter 5.8 --- Prefetch Accuracy --- p.53
Chapter 5.9 --- Effect of Prefetch Buffer Size --- p.54
Chapter 5.10 --- Effect of Storing More Than One Line on Entry of New Dynamic Basic Block --- p.56
Chapter 6 --- Data References Tagged into Branch Target Buffer --- p.60
Chapter 6.1 --- Branch History Table Tagged Mechanism --- p.60
Chapter 6.2 --- Lookahead Technique --- p.65
Chapter 6.3 --- Default Prefetches Vs Data-tagged Prefetches --- p.71
Chapter 6.4 --- New Priority Scheme --- p.73
Chapter 7 --- Architectural Model for Data-Tagged References in Branch Target Buffer --- p.74
Chapter 7.1 --- Architectural Models and Assumptions --- p.76
Chapter 7.2 --- Memory Models --- p.79
Chapter 7.3 --- Evaluation Methodology and Measurement Criteria --- p.79
Chapter 7.4 --- Description of the Traces --- p.80
Chapter 7.5 --- Environments for collecting relevant statistics of SPEC92 Benchmarks --- p.80
Chapter 8 --- Results for Data References Tagged into Branch Target Buffer --- p.82
Chapter 8.1 --- Statistical Results and Analysis --- p.82
Chapter 8.2 --- Overall Performance --- p.83
Chapter 8.3 --- Effect of Branch Prediction --- p.85
Chapter 8.4 --- Effect of Number of Tagged Registers --- p.87
Chapter 8.5 --- Effect of Different Tagged Positions in Basic Block --- p.90
Chapter 8.6 --- Effect of Lookahead Size --- p.91
Chapter 8.7 --- Prefetch Accuracy --- p.93
Chapter 8.8 --- Cache Size --- p.95
Chapter 8.9 --- Line Size --- p.96
Chapter 8.10 --- Set Associativity --- p.97
Chapter 8.11 --- Size of Branch History Table --- p.99
Chapter 8.12 --- Set Associativity of Branch History Table --- p.99
Chapter 8.13 --- New Priority Scheme Vs Default Priority Scheme --- p.102
Chapter 8.14 --- Effect of Prefetch-On-Miss --- p.103
Chapter 8.15 --- Memory Latency --- p.104
Chapter 9 --- Conclusions and Future Research --- p.106
Chapter 9.1 --- Conclusions --- p.106
Chapter 9.2 --- Future Research --- p.108
Bibliography --- p.110
Appendix --- p.114
Chapter A --- Statistical Results - SPEC92 Benchmarks --- p.114
Chapter A.1 --- Definition of Abbreviations and Terms --- p.114
Sadooghi-Alvandi, Maryam. "Exploring Virtualization Techniques for Branch Outcome Prediction." Thesis, 2011. http://hdl.handle.net/1807/31424.
Full textDropsho, Steven George. "Enhancing branch prediction via on-line statistical analysis." 2002. https://scholarworks.umass.edu/dissertations/AAI3039351.
Full textLin, Chih-Ho, and 林志和. "A Study of Branch Prediction and Fetch Policy on Simultaneous Multithreading Architecture." Thesis, 2004. http://ndltd.ncl.edu.tw/handle/52310660014822550172.
Full text大同大學
資訊工程學系(所)
92
In the present computer architecture, speculation execution is the general and effective way to handle the branch problem that using a branch prediction mechanism predicts the result of the branch instructions. The performance improvement from the speculation execution relies on the prediction accuracy. However, it may have different prediction behavior in the simultaneous multithreading (SMT) architecture. The SMT is the computer architecture that combines hardware features of wide-issue superscalar and multithreaded architecture. Thus SMT can issue instructions from multiple threads each cycle. Both the instructions-level and thread-level parallelism are exploited by dynamically sharing the hardware resource in this architecture. The features of SMT architecture and branch prediction on the architecture are the primary focus of this study. In this thesis, we propose a branch prediction mechanism with biased branch filter and confidence estimator to reduce the competition for branch predictor between thread and classify conditional branches as biased or confident branches. And then fetch unit that plays an important role in the SMT architecture decides which threads to fetch instructions from each cycle according to the information from our proposed branch prediction mechanism. Simulation shows that our proposed scheme reduces about 51% fetched instructions from wrong path at most and raises the average prediction accuracy over 91%.
Jiménez, Daniel Angel 1969. "Delay-sensitive branch predictors for future technologies." 2002. http://hdl.handle.net/2152/11063.
Full textSharma, Saurabh. "Spectral prediction: a signals approach to computer architecture prefetching /." 2006. http://www.lib.ncsu.edu/theses/available/etd-08092006-112725/unrestricted/etd.pdf.
Full textHomayoun, Houman. "Using lazy instruction prediction to reduce processor wakeup power dissipation." 2005. http://hdl.handle.net/1828/581.
Full text"The design of PABX with LAN architecture." Chinese University of Hong Kong, 1992. http://library.cuhk.edu.hk/record=b5886985.
Full textDuplicate numbering of leave 67.
Thesis (M.Sc.)--Chinese University of Hong Kong, 1992.
Includes bibliographical references (leaves 71-72).
Chapter 1. --- INTRODUCTION --- p.1
Chapter 2. --- COMPARISONS OF LAN AND PABX --- p.3
Chapter 2.1 --- Typical LAN system --- p.3
Chapter 2.1.1 --- Characteristics of a LAN [1] --- p.3
Chapter 2.1.2 --- Transmission medium of LAN --- p.5
Chapter 2.1.3 --- LAN access control methods --- p.6
Chapter 2.1.4 --- Interfacing to the LAN --- p.8
Chapter 2.1.5 --- LAN topology --- p.8
Chapter 2.1.6 --- Switching techniques --- p.9
Chapter 2 .2 --- Applications of LAN --- p.11
Chapter 2.2.1 --- Small filestore LAN's --- p.12
Chapter 2.2.2 --- Wiring replacement LAN's --- p.12
Chapter 2.2.3 --- Personal computer networks --- p.13
Chapter 2.2.4 --- General purpose LAN's --- p.13
Chapter 2 .3 --- Typical PABX system --- p.14
Chapter 2.3.1 --- PABX topology --- p.15
Chapter 2.3.2 --- Circuit switching --- p.15
Chapter 2.3.3 --- Telephony signalling --- p.16
Chapter 2.3.3.1 --- Pulsing --- p.16
Chapter 2.3.3.2 --- Subscriber loop signaling [2] --- p.17
Chapter 2.3.4 --- ISDN (Integrated Services Digital Network) --- p.19
Chapter 2.4 --- Applications of PABX --- p.21
Chapter 2.5 --- Comparisons of LAN and PABX --- p.22
Chapter 3. --- INTEGRATION OF PABX WITH LAN --- p.25
Chapter 3.1 --- Advantages of integration of PABX with LAN --- p.25
Chapter 3.1.1. --- LAN-PABX Gateway --- p.28
Chapter 3.1.2. --- Problems in interconnecting PABX and LAN [6] --- p.29
Chapter 3.1.3. --- ISDN-PABX [7] --- p.30
Chapter 3.2 --- Architecture of Integrated LAN and PABX --- p.31
Chapter 3.3 --- Typical applications --- p.32
Chapter 4. --- CALL PROCESSING --- p.35
Chapter 4.1 --- Finite State Diagrams for voice calls --- p.37
Chapter 4.2 --- SDL representations of voice calls --- p.39
Chapter 4.3 --- Software implementations of SDL diagrams --- p.40
Chapter 4.3.1 --- PABX operating system --- p.40
Chapter 4.3.2 --- Trunk operating system --- p.43
Chapter 4.3.3 --- Message format --- p.43
Chapter 4.4 --- Pseudo codes for PABX --- p.45
Chapter 4.4 --- Pseudo codes for trunks --- p.52
Chapter 5. --- HARDWARE IMPLEMENTATION --- p.57
Chapter 5.1 --- TRUNK INTERFACE --- p.58
Chapter 5.1.1 --- PABX to CO call --- p.58
Chapter 5.1.2 --- CO to PABX call --- p.59
Chapter 5.2 --- Subscriber Interface Circuit --- p.59
Chapter 5.4 --- PSTN Trunk Interf ace --- p.60
Chapter 6. --- CONCLUSIONS --- p.62
Acknowledgements --- p.64
APPENDIX A --- p.65
CCITT SPECIFICATION AND DESCRIPTION LANGUAGE [15] --- p.65
APPENDIX B --- p.68
"SIGNALLING FOR SWITCHING SYSTEMS IN HK [16],[17]" --- p.68
Chapter B. 1 --- Tone plan --- p.68
Chapter B. 2 --- Tone levels --- p.68
Chapter B. 3 --- Ringing frequency and voltage --- p.68
Chapter B. 4 --- Dial pulse --- p.68
Chapter B. 5 --- DTMF (Dual-tone multi-frequency) --- p.69
Chapter B. 6 --- PCM coding --- p.69
REFERENCES --- p.71
"Computation of daylighting for architecture: the impact of computer-based design tools for daylighting simulation and prediction for a built environment." 2000. http://library.cuhk.edu.hk/record=b5890323.
Full textThesis (M.Phil.)--Chinese University of Hong Kong, 2000.
Includes bibliographical references (leaves 70-73).
Abstracts in English and Chinese.
Abstract --- p.i
Acknowledgement --- p.iii
Contents --- p.iv
Chapter 1 --- INTRODUCTION --- p.1
Chapter 1.1 --- DAYLIGHT --- p.1
Chapter 1.2 --- DAYLIGHTING DESIGN --- p.1
Chapter 1.3 --- COMPUTER SIMULATION AND RENDERING --- p.2
Chapter 1.4 --- COMPUTER-BASED DAYLIGHTING DESIGN --- p.3
Chapter 1.5 --- SCOPE --- p.3
Chapter 1.6 --- SIGNIFICANCE --- p.4
Chapter 2 --- LITERATURE REVIEW --- p.5
Chapter 2.1 --- COMPUTER-BASED DAYLIGHTING DESIGN TOOLS --- p.6
Chapter 2.1.1 --- Graphic User Interface and Pre-defined Scenarios --- p.6
Chapter 2.1.2 --- Performance-based Daylighting Simulation --- p.7
Chapter 2.2 --- RADIANCE VALIDATION AND COMPARISON WITH OTHER SYSTEMS --- p.8
Chapter 2.2.1 --- Validation and Accuracy of Radiance --- p.8
Chapter 2.2.2 --- Comparison of Radiance With Other Simulation Systems --- p.9
Chapter 2.2.3 --- Limitation on Geometry Input --- p.11
Chapter 2.2.4 --- Correctness of Scene Description --- p.11
Chapter 2.3 --- RADIANCE MODEL --- p.11
Chapter 3 --- METHODOLOGY --- p.15
Chapter 4 --- CLIMATIC AND URBAN CHARACTERISTIC OF HONG KONG --- p.18
Chapter 4.1 --- HONG KONG SKY CONDITION --- p.19
Chapter 4.2 --- HONG KONG URBAN CONTEXT --- p.22
Chapter 5 --- DAYLIGHTING SIMULATION FOR ARCHITECTURAL DESIGN --- p.25
Chapter 5.1 --- DAYLIGHTING DESIGN APPROACH --- p.26
Chapter 5.1.1 --- PHYSICAL MODEL --- p.26
Chapter 5.1.2 --- GRAPHIC TECHNIQUES --- p.27
Chapter 5.1.3 --- COMPUTATIONAL APPROACH --- p.28
Chapter 6 --- CASE STUDY l: ATRIUM DAYLIGHTING ARCHITECTURE 一 A FUTURE WORKPLACE --- p.30
Chapter 6.1 --- PROJECT INTRODUCTION --- p.30
Chapter 6.2 --- PROJECT APPROACH --- p.31
Chapter 6.2.1 --- GEOMETRY --- p.32
Chapter 6.2.2 --- IN-HOUSE SOFTWARE TOOL FOR MODELING --- p.32
Chapter 6.2.3 --- SKY CONDITION --- p.33
Chapter 6.2.4 --- MATERIALS --- p.33
Chapter 6.2.5 --- REFERENCE VIEWPOINT --- p.34
Chapter 6.2.6 --- RENDERING --- p.35
Chapter 6.3 --- PROJECT EXPERIMENT --- p.35
Chapter 6.3.1 --- ILLUMINANCE LEVEL --- p.36
Chapter 6.3.2 --- GLARE VISUAL COMFORT --- p.38
Chapter 6.3.3 --- IN-HOUSE SOFTWARE TOOL FOR ANIMATION --- p.39
Chapter 6.3.4 --- DAYLIGHTING DESIGN EVALUATION --- p.41
Chapter 7 --- CASE STUDY ll: BUILDING DESIGN EVALUATION AND PREDICTION -SENIOR CITIZENS HOUSING FACILITY --- p.42
Chapter 7.1 --- BUILDING DESIGN DATA AND FIELD MEASUREMENTS --- p.43
Chapter 7.1.1 --- SITE CONTEXT --- p.43
Chapter 7.1.2 --- BUILDING MATERIALS AND FINISHES FOR THE ATRIUM --- p.46
Chapter 7.1.3 --- OBSERVATIONS OF PATTERNS OF USE --- p.47
Chapter 7.1.4 --- LUMINANCE MEASUREMENTS --- p.48
Chapter 7.2 --- COMPUTATIONAL ANALYSIS --- p.50
Chapter 7.2.1 --- GEOMETRIC MODELING --- p.50
Chapter 7.2.2 --- COMPARISON OF FIELD MEASUREMENT AND COMPUTED LUMINANCE --- p.51
Chapter 7.2.3 --- VARIATION OF DESIGN PARAMETERS --- p.53
Chapter 7.2.4 --- VARIATION OF BEAM DEPTH --- p.53
Chapter 7.2.5 --- ADDITION OF LOUVERS --- p.56
Chapter 7.2.6 --- EFFECT OF INTER-BLOCK OBSTRUCTIONS --- p.58
Chapter 7.2.7 --- DAYLIGHTING DESIGN ALTERNATION --- p.60
Chapter 8 --- FINDINGS --- p.61
Chapter 8.1 --- CASE STUDY I: A FUTURE WORKPLACE --- p.61
Chapter 8.2 --- CASE STUDY II: SENIOR CITIZENS HOUSING --- p.63
Chapter 8.3 --- FUTURE WORKS --- p.64
Chapter 9 --- CONCLUSION --- p.66
REFERENCES --- p.67
BIBLIOGRAPHY --- p.70
APPENDIX A - Case study I (Atrium Daylighting Architecture - A Future Workplace) --- p.74
APPENDIX B - Case study II (senior citizens housing facility) --- p.115
Περγαντής, Μηνάς. "Μελέτη της διαχείρισης της κρυφής μνήμης σε πραγματικό περιβάλλον." Thesis, 2009. http://nemertes.lis.upatras.gr/jspui/handle/10889/2573.
Full textIn contemporary times the performance gap between the CPU and the main memory of a modern computer system grows larger. So it is important to find new ways to cover the inability of the main memory to cope with the CPU’s performance. Cache memory has always been a useful tool towards this goal. However the need arises for it to move beyond simplistic implementations and algorithms like LRU. The present end year project aims towards the study of cache memory in a real time environment and the analysis of the capability and usefulness of prediction of the memory access behaviour of a modern program. The thesis puts weight on the use of dynamic instrumentation techniques for the creation of a prediction mechanism of the reuse distance of a memory address, through the analysis and study of the behavior of the instruction that accessed this memory address. The function of such a mechanism is analyzed in depth and statistical measures are provided to prove the usefulness and accuracy of such a prediction.
Πετούμενος, Παύλος. "Διαχείριση κοινόχρηστων πόρων σε πολυεπεξεργαστικά συστήματα ενός ολοκληρωμένου." Thesis, 2011. http://nemertes.lis.upatras.gr/jspui/handle/10889/4712.
Full textThis dissertation proposes methodologies for the management of shared resources in chip multi-processors (CMP). Until recently, the design of a computing system had to satisfy the computational and storage needs of a single program during each time period. Now instead, the designer has to balance the, perhaps conflicting, needs of multiple programs competing for the same resources. But, in many cases, even this is not enough. Even if we could invent a perfect way to manage sharing, without optimizing the way that each processor uses the shared resource, the resource could not deal efficiently with the increased load. In order to handle the negative effects of resource sharing, this dissertation proposes three management mechanisms. The first one introduces a novel theoretical model of the sharing of the shared cache, which can be used at run-time. Furthermore, out methodology uses the model to control sharing and to achieve a sense of justice in the way the cache is shared among the processors. Our second methodology presents a new technique for predicting the locality of cache accesses. Since locality determines, almost entirely, the usefulness of cache data, our technique can be used to drive any management mechanism which strives to improve the efficiency of the cache. As part of our methodology, we present such a mechanism, a new cache replacement policy which tries to minimize cache misses by near-optimal replacement decisions. The last methodology presented in this dissertation, targets the energy consumption of the processor. To that end, our methodology shows that the key to reducing the power consumption of the Issue Queue, without disproportional performance degradation, lies at the interaction of the Issue Queue with the memory subsystem: as long as the management of the Issue Queue doesn’t reduce the utilization of the memory subsystem, the effects of the management on the processor’s performance will be minimal. Based on this conclusion, we introduce a new mechanism for dynamically resizing the Issue Queue, which achieves aggressive downsizing and energy savings with almost no performance degradation.