首页 > 最新文献

2012 Ninth International Conference on Information Technology - New Generations最新文献

英文 中文
Defining Virtual Worlds Usability Heuristics 定义虚拟世界可用性启发式
R. Muñoz-Soto, Virgínia Chalegre
Virtual Worlds (VWs) are computer-simulated virtual environments accessed by multiple users through their avatars. VWs constitute a growing space for collaborative play, learning and work. Usability evaluation for VWs brings new challenges. There is a need for new evaluation methods or at least an extensive use of traditional evaluations in novel ways. The paper describes the development process of a new set of usability heuristics for VWs applications, including their early validation through two case studies. A usability checklist to use when applying VWs heuristics is also proposed.
虚拟世界(VWs)是由计算机模拟的虚拟环境,由多个用户通过他们的化身访问。大众汽车构成了一个不断增长的协作游戏、学习和工作空间。大众汽车的可用性评估带来了新的挑战。有必要采用新的评价方法,或者至少以新颖的方式广泛使用传统的评价。本文描述了一套新的大众汽车应用程序可用性启发法的开发过程,包括通过两个案例研究对其进行早期验证。本文还提出了一个可用性检查表,用于应用vw启发式方法。
{"title":"Defining Virtual Worlds Usability Heuristics","authors":"R. Muñoz-Soto, Virgínia Chalegre","doi":"10.1109/ITNG.2012.138","DOIUrl":"https://doi.org/10.1109/ITNG.2012.138","url":null,"abstract":"Virtual Worlds (VWs) are computer-simulated virtual environments accessed by multiple users through their avatars. VWs constitute a growing space for collaborative play, learning and work. Usability evaluation for VWs brings new challenges. There is a need for new evaluation methods or at least an extensive use of traditional evaluations in novel ways. The paper describes the development process of a new set of usability heuristics for VWs applications, including their early validation through two case studies. A usability checklist to use when applying VWs heuristics is also proposed.","PeriodicalId":117236,"journal":{"name":"2012 Ninth International Conference on Information Technology - New Generations","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121653638","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
XML Querying Using Data Logic Structures and Primitives 使用数据逻辑结构和原语的XML查询
J. U. Quevedo-Torrero, G. Erickson
There have been several proposals for transforming and querying XML structures, but very few of them offer a data logic approach. This article describes data structures and some primitives as a framework to efficiently manipulate XML well-formed documents. The implementation of the querying system, based on the proposed framework, is performed in the Prolog programming language. Results indicate that this approach allows the solution of both deductive and recursive queries from XML documents.
已经有几种转换和查询XML结构的建议,但是很少有建议提供数据逻辑方法。本文将数据结构和一些原语描述为有效操作XML格式良好文档的框架。基于提出的框架,查询系统在Prolog编程语言中实现。结果表明,这种方法允许解决来自XML文档的演绎查询和递归查询。
{"title":"XML Querying Using Data Logic Structures and Primitives","authors":"J. U. Quevedo-Torrero, G. Erickson","doi":"10.1109/ITNG.2012.119","DOIUrl":"https://doi.org/10.1109/ITNG.2012.119","url":null,"abstract":"There have been several proposals for transforming and querying XML structures, but very few of them offer a data logic approach. This article describes data structures and some primitives as a framework to efficiently manipulate XML well-formed documents. The implementation of the querying system, based on the proposed framework, is performed in the Prolog programming language. Results indicate that this approach allows the solution of both deductive and recursive queries from XML documents.","PeriodicalId":117236,"journal":{"name":"2012 Ninth International Conference on Information Technology - New Generations","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115249030","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A Unicast MANET Routing Protocol to Simultaneously Minimize the Stability-Hop Count Tradeoff and End-to-End Delay 一种同时最小化稳定跳数权衡和端到端延迟的单播MANET路由协议
N. Meghanathan
The high-level contribution of this paper is the design and development of a unicast routing protocol to effectively minimize the stability-hop count tradeoff observed in mobile ad hoc networks (MANETs) and thereby incur lower end-to-end delay per data packet. The proposed unicast routing protocol, referred to as SILET, uses the predicted link expiration times (LETs) as part of the link weights. SILET is a source-initiated on-demand routing protocol that initiates a global broadcast query-reply cycle to discover routes, the destination chooses the route with the lowest sum of the link weights, the weight assigned to a link is '1' plus the inverse of the LET of the link. The term '1' as part of the link weight minimizes the hop count per path and the term comprising of the inverse of the LET maximizes the lifetime of the routes. Through extensive simulations and comparison with contemporary minimum-hop based and stability-based routing protocols, we demonstrate that SILET discovers long-living stable routes with hop count close to that of the minimum, thus, minimizing the stability-hop count tradeoff. By virtue of incurring lower route discovery control overhead (due to long-living stable routes) and lower hop count per route, the end-to-end delay per data packet is also optimized and has been observed to be the lowest among all the routing protocols simulated in this paper.
本文的高级贡献是设计和开发了一种单播路由协议,以有效地减少移动自组织网络(manet)中观察到的稳定性跳数权衡,从而降低每个数据包的端到端延迟。提出的单播路由协议,称为SILET,使用预测的链路过期时间(let)作为链路权重的一部分。SILET是一种源发起的按需路由协议,它启动一个全局广播的查询-应答循环来发现路由,目的端选择链路权值总和最小的路由,分配给链路的权值为1 +链路的LET的倒数。作为链路权值的一部分,“1”项使每条路径的跳数最小化,而由LET的逆项组成的项使路由的生存期最大化。通过广泛的模拟和与当前基于最小跳数和基于稳定性的路由协议的比较,我们证明了SILET发现的长寿命稳定路由的跳数接近最小值,从而最大限度地减少了稳定跳数的权衡。由于路由发现控制开销较低(由于长时间的稳定路由)和每条路由的跳数较低,每个数据包的端到端延迟也得到了优化,并且在本文模拟的所有路由协议中观察到最低。
{"title":"A Unicast MANET Routing Protocol to Simultaneously Minimize the Stability-Hop Count Tradeoff and End-to-End Delay","authors":"N. Meghanathan","doi":"10.1109/ITNG.2012.17","DOIUrl":"https://doi.org/10.1109/ITNG.2012.17","url":null,"abstract":"The high-level contribution of this paper is the design and development of a unicast routing protocol to effectively minimize the stability-hop count tradeoff observed in mobile ad hoc networks (MANETs) and thereby incur lower end-to-end delay per data packet. The proposed unicast routing protocol, referred to as SILET, uses the predicted link expiration times (LETs) as part of the link weights. SILET is a source-initiated on-demand routing protocol that initiates a global broadcast query-reply cycle to discover routes, the destination chooses the route with the lowest sum of the link weights, the weight assigned to a link is '1' plus the inverse of the LET of the link. The term '1' as part of the link weight minimizes the hop count per path and the term comprising of the inverse of the LET maximizes the lifetime of the routes. Through extensive simulations and comparison with contemporary minimum-hop based and stability-based routing protocols, we demonstrate that SILET discovers long-living stable routes with hop count close to that of the minimum, thus, minimizing the stability-hop count tradeoff. By virtue of incurring lower route discovery control overhead (due to long-living stable routes) and lower hop count per route, the end-to-end delay per data packet is also optimized and has been observed to be the lowest among all the routing protocols simulated in this paper.","PeriodicalId":117236,"journal":{"name":"2012 Ninth International Conference on Information Technology - New Generations","volume":"71 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115926494","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Visualization of Digital Audio Watermarking Based on the Dyadic Wavelet Transform 基于二进小波变换的数字音频水印可视化
Teruya Minamoto, Yuji Ogata, Masahiro Sawai
We propose a blind digital audio watermarking method for embedding a binary logo in an audio signal. This method uses the two-dimensional Dyadic Wavelet Transform (DYWT). To apply the two-dimensional DYWT, we construct an image from an audio signal by dividing the original audio signal into several parts and arranging these parts in rows. Since the DYWT has a redundant representation, the amount of information that the watermark must carry is higher than in discrete-wavelet-transform -- based (DWT-based) methods, which are very popular. We describe our embedding and extracting procedures in detail and show experimental results demonstrating that our method gives watermarked signals that have better quality and that are robust against attacks such as clipping and some audio compressions.
提出了一种在音频信号中嵌入二进制标志的盲数字音频水印方法。该方法采用二维二进小波变换(DYWT)。为了应用二维DYWT,我们通过将原始音频信号分成几个部分并将这些部分成行排列来从音频信号中构建图像。由于DYWT具有冗余表示,因此水印必须携带的信息量比基于离散小波变换(DWT-based)的方法要高,后者非常流行。我们详细描述了我们的嵌入和提取过程,并展示了实验结果,表明我们的方法给出的水印信号具有更好的质量,并且对诸如剪切和某些音频压缩等攻击具有鲁棒性。
{"title":"Visualization of Digital Audio Watermarking Based on the Dyadic Wavelet Transform","authors":"Teruya Minamoto, Yuji Ogata, Masahiro Sawai","doi":"10.1109/ITNG.2012.84","DOIUrl":"https://doi.org/10.1109/ITNG.2012.84","url":null,"abstract":"We propose a blind digital audio watermarking method for embedding a binary logo in an audio signal. This method uses the two-dimensional Dyadic Wavelet Transform (DYWT). To apply the two-dimensional DYWT, we construct an image from an audio signal by dividing the original audio signal into several parts and arranging these parts in rows. Since the DYWT has a redundant representation, the amount of information that the watermark must carry is higher than in discrete-wavelet-transform -- based (DWT-based) methods, which are very popular. We describe our embedding and extracting procedures in detail and show experimental results demonstrating that our method gives watermarked signals that have better quality and that are robust against attacks such as clipping and some audio compressions.","PeriodicalId":117236,"journal":{"name":"2012 Ninth International Conference on Information Technology - New Generations","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132411720","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A Design of Mutual Exclusion Protocol in Cellular Wireless Networks 蜂窝无线网络中互斥协议的设计
Sunghoon Park, Seoun-Hyung Lee
The mutual exclusion (MX) paradigm can be used as a building block in many practical problems such as group communication, atomic commitment and replicated data management where the exclusive use of an object might be useful. The problem has been widely studied in the research community since one reason for this wide interest is that many distributed protocols need a mutual exclusion protocol. However, despite its usefulness, to our knowledge there is no work that has been devoted to this problem in a mobile computing environment. In this paper, we describe a solution to the mutual exclusion problem from mobile computing systems. This solution is based on the token-based mutual exclusion algorithm.
互斥(MX)范式可以作为构建块用于许多实际问题,例如组通信、原子提交和复制数据管理,在这些问题中,对象的排他性使用可能很有用。这个问题在研究界得到了广泛的研究,因为引起广泛兴趣的一个原因是许多分布式协议需要一个互斥协议。然而,尽管它很有用,但据我们所知,在移动计算环境中还没有专门研究这个问题的工作。本文描述了移动计算系统中互斥问题的一种解决方案。该解决方案基于基于令牌的互斥算法。
{"title":"A Design of Mutual Exclusion Protocol in Cellular Wireless Networks","authors":"Sunghoon Park, Seoun-Hyung Lee","doi":"10.1109/ITNG.2012.166","DOIUrl":"https://doi.org/10.1109/ITNG.2012.166","url":null,"abstract":"The mutual exclusion (MX) paradigm can be used as a building block in many practical problems such as group communication, atomic commitment and replicated data management where the exclusive use of an object might be useful. The problem has been widely studied in the research community since one reason for this wide interest is that many distributed protocols need a mutual exclusion protocol. However, despite its usefulness, to our knowledge there is no work that has been devoted to this problem in a mobile computing environment. In this paper, we describe a solution to the mutual exclusion problem from mobile computing systems. This solution is based on the token-based mutual exclusion algorithm.","PeriodicalId":117236,"journal":{"name":"2012 Ninth International Conference on Information Technology - New Generations","volume":"447 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131988355","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Rule-based Management of Large Unorganized Data Sets 基于规则的大型无组织数据集管理
D. Beatty, N. Lopez-Benitez
Rule-based systems have been studied for nearly two decades in applications such as geographical information systems (GIS) and metadata catalog systems. Recovering large data sets that are not well organized is a challenge that imposes constraints on applications. These constraints include utilizing huge amounts of memory, consuming excessive amounts of time, and the risk of exceeding these resources, thus causing instability. This work examines a novel approach to provide a large unorganized data set by deriving a rule-based system that regulates web page generation thereby improve cache performance and query generation. The trade-offs imposed by rule-based systems in terms of time to deliver content, memory consumption, and fault tolerance are also analyzed.
基于规则的系统已经在地理信息系统(GIS)和元数据编目系统等应用中进行了近二十年的研究。恢复组织不良好的大型数据集是一项挑战,对应用程序施加了限制。这些限制包括使用大量内存、消耗过多的时间,以及超出这些资源的风险,从而导致不稳定。这项工作研究了一种新的方法,通过导出一个基于规则的系统来提供大型无组织数据集,该系统可以调节网页生成,从而提高缓存性能和查询生成。还分析了基于规则的系统在交付内容的时间、内存消耗和容错性方面所施加的权衡。
{"title":"Rule-based Management of Large Unorganized Data Sets","authors":"D. Beatty, N. Lopez-Benitez","doi":"10.1109/ITNG.2012.66","DOIUrl":"https://doi.org/10.1109/ITNG.2012.66","url":null,"abstract":"Rule-based systems have been studied for nearly two decades in applications such as geographical information systems (GIS) and metadata catalog systems. Recovering large data sets that are not well organized is a challenge that imposes constraints on applications. These constraints include utilizing huge amounts of memory, consuming excessive amounts of time, and the risk of exceeding these resources, thus causing instability. This work examines a novel approach to provide a large unorganized data set by deriving a rule-based system that regulates web page generation thereby improve cache performance and query generation. The trade-offs imposed by rule-based systems in terms of time to deliver content, memory consumption, and fault tolerance are also analyzed.","PeriodicalId":117236,"journal":{"name":"2012 Ninth International Conference on Information Technology - New Generations","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128338834","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Development and Implementation of a Chat Bot in a Social Network 社交网络中聊天机器人的开发与实现
Salto Martínez Rodrigo, Jacques Abraham
This document describes how to implement a Chat Bot on the Twitter social network for entertainment and viral advertising using a database and a simple algorithm. Having as a main theme a successfully implementation of a Chat Bot preventing people classify it as SPAM, as a result of this a Twitter account (@DonPlaticador) that works without the intervention of a person and every day earns more followers was obtained.
本文档描述了如何在Twitter社交网络上实现聊天机器人,用于娱乐和病毒式广告,使用数据库和简单的算法。作为一个主题,成功地实现了一个聊天机器人,防止人们将其归类为垃圾邮件,因此,一个Twitter账户(@DonPlaticador)在没有人干预的情况下工作,每天都能获得更多的追随者。
{"title":"Development and Implementation of a Chat Bot in a Social Network","authors":"Salto Martínez Rodrigo, Jacques Abraham","doi":"10.1109/ITNG.2012.147","DOIUrl":"https://doi.org/10.1109/ITNG.2012.147","url":null,"abstract":"This document describes how to implement a Chat Bot on the Twitter social network for entertainment and viral advertising using a database and a simple algorithm. Having as a main theme a successfully implementation of a Chat Bot preventing people classify it as SPAM, as a result of this a Twitter account (@DonPlaticador) that works without the intervention of a person and every day earns more followers was obtained.","PeriodicalId":117236,"journal":{"name":"2012 Ninth International Conference on Information Technology - New Generations","volume":"12 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123727566","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
A Hardware-Software Integrated Design for a High-Performance Java Processor 高性能Java处理器的软硬件集成设计
A. Fong, C. Yau, Yijun Liu
Today object-oriented programming (OOP) is becoming more and more popular than ever, due to Internet and network computing, and need for resource sharing. Java becomes attractive because of its appealing features such as platform independence and code reusability. However, Java has lower performance than conventional programming languages due to its real-time execution overheads in the layer of Java Virtual Machine (JVM). With increasing performance through higher clock speed or multi-cores, software virtual machines are still needed to run on top of the operating system to execute Java, reducing the effect of the hardware performance improvements. This research proposes a high-performance computer architecture with hybrid system co-design for Java processing. Our FPGA model implemented in VHDL, jHISC, originates hardware support for object-oriented bytecodes, object referencing and method invocation. Moreover, baseline compiler is developed to construct the core structure and to ensure the architecture compatible to the JVM specifications. The project is at present version 4, which is target for mobile and embedded computing. Comparing with the products by Sun Microsystems through evaluation based on SPEC JVM98 benchmark, jHISC V4.0 provide overall performance gain of around 137% over HotSpot JVM and 102% to 1351% over picoJava II.
由于Internet和网络计算以及资源共享的需要,面向对象编程(OOP)正变得越来越流行。Java之所以具有吸引力,是因为它具有平台独立性和代码可重用性等吸引人的特性。然而,由于Java虚拟机(JVM)层的实时执行开销,Java的性能低于传统编程语言。虽然通过更高的时钟速度或多核来提高性能,但仍然需要在操作系统之上运行软件虚拟机来执行Java,从而降低了硬件性能改进的影响。本研究提出一种混合系统协同设计的高性能Java处理计算机体系结构。我们的FPGA模型在VHDL, jHISC中实现,为面向对象字节码,对象引用和方法调用提供了硬件支持。此外,开发了基线编译器来构造核心结构并确保体系结构与JVM规范兼容。该项目目前的版本是第4版,它的目标是移动和嵌入式计算。通过基于SPEC JVM98基准测试的评估,与Sun Microsystems的产品相比,jHISC V4.0比HotSpot JVM提供了约137%的整体性能提升,比picoJava II提供了102%至1351%的整体性能提升。
{"title":"A Hardware-Software Integrated Design for a High-Performance Java Processor","authors":"A. Fong, C. Yau, Yijun Liu","doi":"10.1109/ITNG.2012.174","DOIUrl":"https://doi.org/10.1109/ITNG.2012.174","url":null,"abstract":"Today object-oriented programming (OOP) is becoming more and more popular than ever, due to Internet and network computing, and need for resource sharing. Java becomes attractive because of its appealing features such as platform independence and code reusability. However, Java has lower performance than conventional programming languages due to its real-time execution overheads in the layer of Java Virtual Machine (JVM). With increasing performance through higher clock speed or multi-cores, software virtual machines are still needed to run on top of the operating system to execute Java, reducing the effect of the hardware performance improvements. This research proposes a high-performance computer architecture with hybrid system co-design for Java processing. Our FPGA model implemented in VHDL, jHISC, originates hardware support for object-oriented bytecodes, object referencing and method invocation. Moreover, baseline compiler is developed to construct the core structure and to ensure the architecture compatible to the JVM specifications. The project is at present version 4, which is target for mobile and embedded computing. Comparing with the products by Sun Microsystems through evaluation based on SPEC JVM98 benchmark, jHISC V4.0 provide overall performance gain of around 137% over HotSpot JVM and 102% to 1351% over picoJava II.","PeriodicalId":117236,"journal":{"name":"2012 Ninth International Conference on Information Technology - New Generations","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128130531","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Performance-Sensitivity-based Workload Tailoring for Effective Design Exploration 基于性能敏感性的有效设计探索的工作量裁剪
Jie Luo, Yilin Zhang, S. Vadlamani, Byeong Kil Lee
Early-stage design exploration requires the detailed simulation which is running applications on a cycle-level microprocessor simulator. Main objectives of simulation-level design exploration include understanding the architectural behaviors of target applications and finding optimal configurations to cover wide range of applications in terms of performance and power. However, full simulation of an industry standard benchmark suite (e.g., SPEC CPU 2006) takes several weeks to months to complete. This problem has motivated several research groups to come up with methodologies to reduce simulation time while maintaining a certain level of accuracy. Among many techniques for reducing simulation time, a tool called Sim Point is popularly used. However, simulation load even with the reduced workloads is still heavy, considering design complexity of modern microprocessors. Basic motivation of this research is started from how design exploration is actually performed. Designers will observe the performance impact from resource variations or configuration changes. If a simulation point shows low sensitivity to resource variations, designers would eliminate those simulation points from the simulation setup procedure. In this paper, we focus on identifying those simulation points which have high sensitivity or low sensitivity, by which overall simulation methodology can be effectively improved. We also performed the performance-sensitivity-based similarity analysis (grouping) among simulation points on specific performance metric which can be an overall performance metric or a component-level metric.
早期的设计探索需要在周期级微处理器模拟器上运行应用程序的详细仿真。仿真级设计探索的主要目标包括理解目标应用程序的体系结构行为,并在性能和功耗方面找到涵盖广泛应用程序的最佳配置。然而,一个行业标准基准套件(例如,SPEC CPU 2006)的完整模拟需要几周到几个月的时间才能完成。这个问题促使几个研究小组提出了一些方法来减少模拟时间,同时保持一定程度的准确性。在许多减少模拟时间的技术中,一种叫做Sim Point的工具被广泛使用。然而,考虑到现代微处理器的设计复杂性,即使减少了工作负载,仿真负载仍然很重。本研究的基本动机是从如何进行设计探索开始的。设计人员将观察资源变化或配置更改对性能的影响。如果一个模拟点对资源变化的敏感性较低,设计人员将从模拟设置程序中删除这些模拟点。本文的重点是识别高灵敏度或低灵敏度的仿真点,从而有效地改进整个仿真方法。我们还对特定性能指标(可以是整体性能指标或组件级指标)的模拟点进行了基于性能敏感性的相似性分析(分组)。
{"title":"Performance-Sensitivity-based Workload Tailoring for Effective Design Exploration","authors":"Jie Luo, Yilin Zhang, S. Vadlamani, Byeong Kil Lee","doi":"10.1109/ITNG.2012.112","DOIUrl":"https://doi.org/10.1109/ITNG.2012.112","url":null,"abstract":"Early-stage design exploration requires the detailed simulation which is running applications on a cycle-level microprocessor simulator. Main objectives of simulation-level design exploration include understanding the architectural behaviors of target applications and finding optimal configurations to cover wide range of applications in terms of performance and power. However, full simulation of an industry standard benchmark suite (e.g., SPEC CPU 2006) takes several weeks to months to complete. This problem has motivated several research groups to come up with methodologies to reduce simulation time while maintaining a certain level of accuracy. Among many techniques for reducing simulation time, a tool called Sim Point is popularly used. However, simulation load even with the reduced workloads is still heavy, considering design complexity of modern microprocessors. Basic motivation of this research is started from how design exploration is actually performed. Designers will observe the performance impact from resource variations or configuration changes. If a simulation point shows low sensitivity to resource variations, designers would eliminate those simulation points from the simulation setup procedure. In this paper, we focus on identifying those simulation points which have high sensitivity or low sensitivity, by which overall simulation methodology can be effectively improved. We also performed the performance-sensitivity-based similarity analysis (grouping) among simulation points on specific performance metric which can be an overall performance metric or a component-level metric.","PeriodicalId":117236,"journal":{"name":"2012 Ninth International Conference on Information Technology - New Generations","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121625560","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Generator Flow: An XML Configurable Design Pattern Used in NoGAP 生成器流:NoGAP中使用的XML可配置设计模式
Per Karlström, Wenbiao Zhou
A golden rule that must be followed when building any larger system, is to manage complexity. Without complexity management a system can only grow to a certain point before it collapses under its own complexity. One complexity management technique is the use of design patterns, which are architectural constructs that have proven their usefulness in handling certain design problems. This paper will describe Generator Flow, a design pattern used in No GAP an EDA tool developed at the department of EE, Linköping University. Generator Flow is a design pattern aimed at handling a succession of transformations performed on a number of data sets to reach some useful outputs. This paper also describes the XML based flow-configuration file, which is used to allow for runtime configuration of the transformation flow used in No GAP. No GAP is an EDA tool aimed at easing the design and verification of ASIP and programmable hardware accelerators. A problem faced when developing No GAP was how to handle the flow of transformations, from an input specification to useful outputs. It was in this context that the Generator Flow pattern was developed.
在构建任何大型系统时必须遵循的黄金法则是管理复杂性。没有复杂性管理,一个系统只能发展到一定程度,然后就会在自身的复杂性下崩溃。一种复杂性管理技术是使用设计模式,设计模式是一种架构结构,在处理某些设计问题时已被证明是有用的。本文描述了在Linköping大学电子工程系开发的EDA工具No GAP中使用的一种设计模式Generator Flow。Generator Flow是一种设计模式,旨在处理对许多数据集执行的一系列转换,以获得一些有用的输出。本文还描述了基于XML的流配置文件,该文件用于对No GAP中使用的转换流进行运行时配置。No GAP是一个EDA工具,旨在简化ASIP和可编程硬件加速器的设计和验证。开发No GAP时面临的一个问题是如何处理从输入规范到有用输出的转换流。正是在这种背景下,生成器流模式被开发出来。
{"title":"Generator Flow: An XML Configurable Design Pattern Used in NoGAP","authors":"Per Karlström, Wenbiao Zhou","doi":"10.1109/ITNG.2012.48","DOIUrl":"https://doi.org/10.1109/ITNG.2012.48","url":null,"abstract":"A golden rule that must be followed when building any larger system, is to manage complexity. Without complexity management a system can only grow to a certain point before it collapses under its own complexity. One complexity management technique is the use of design patterns, which are architectural constructs that have proven their usefulness in handling certain design problems. This paper will describe Generator Flow, a design pattern used in No GAP an EDA tool developed at the department of EE, Linköping University. Generator Flow is a design pattern aimed at handling a succession of transformations performed on a number of data sets to reach some useful outputs. This paper also describes the XML based flow-configuration file, which is used to allow for runtime configuration of the transformation flow used in No GAP. No GAP is an EDA tool aimed at easing the design and verification of ASIP and programmable hardware accelerators. A problem faced when developing No GAP was how to handle the flow of transformations, from an input specification to useful outputs. It was in this context that the Generator Flow pattern was developed.","PeriodicalId":117236,"journal":{"name":"2012 Ninth International Conference on Information Technology - New Generations","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114886294","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2012 Ninth International Conference on Information Technology - New Generations
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1