Conference Proceedings of the 2000 IEEE International Performance, Computing, and Communications Conference (Cat. No.00CH37086)最新文献

筛选
英文 中文
Tighten the computation of worst-case execution-time by detecting feasible paths 通过检测可行路径,缩短了最坏情况下执行时间的计算
H. Aljifri, A. Pons, M. Tapia
{"title":"Tighten the computation of worst-case execution-time by detecting feasible paths","authors":"H. Aljifri, A. Pons, M. Tapia","doi":"10.1109/PCCC.2000.830347","DOIUrl":"https://doi.org/10.1109/PCCC.2000.830347","url":null,"abstract":"The time to compute the Worst-Case Execution-Time (WCET) of a real-time program depends greatly on the technique used to generate paths. A method that is not able to distinguish between executable- and dead-paths could result in overestimation of the WCET. This paper addresses the issues of determining automatically the feasible paths. The algorithm targets the assembly code representation of a super-scalar processor program so that its hardware features can be accounted for during WCET estimation. The method attempts to identify constant values in a real-time program to reduce the amount of user provided information using the concept of partially-known variables.","PeriodicalId":387201,"journal":{"name":"Conference Proceedings of the 2000 IEEE International Performance, Computing, and Communications Conference (Cat. No.00CH37086)","volume":"136 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2000-02-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129270314","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Self-similarity in a multi-stage queueing ATM switch fabric 多阶段排队ATM交换结构中的自相似性
Adam Lange-Pearson
{"title":"Self-similarity in a multi-stage queueing ATM switch fabric","authors":"Adam Lange-Pearson","doi":"10.1109/PCCC.2000.830312","DOIUrl":"https://doi.org/10.1109/PCCC.2000.830312","url":null,"abstract":"Recent studies of digital network traffic have shown that arrival processes can be more accurately modeled as a statistically self-similar process than as a Poisson-based process. We present a simulation of a combination shared-output queueing ATM switch fabric, sourced by two models of self-similar input, namely, Pareto-distributed interarrival times and a Poisson-Zeta ON-OFF process. The effect of self-similarity on the average queue length and cell loss probability for this multi-stage queue is examined for varying load, buffer size, and internal speedup. The results using two self-similar input models are compared with each other and with Poisson interarrival times and an ON-OFF bursty traffic source with geometrically distributed burst lengths. The results show that at a high utilization and at a high degree of self-similarity, cell loss probability declines slowly with increasing buffer size and speedup, as compared to the decline using Poisson-based traffic.","PeriodicalId":387201,"journal":{"name":"Conference Proceedings of the 2000 IEEE International Performance, Computing, and Communications Conference (Cat. No.00CH37086)","volume":"67 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2000-02-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126307821","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
On the dynamic quality of service in wireless computing environments 无线计算环境下的动态服务质量研究
C. Ben Ahmed, N. Boudriga, M. Obaidat
{"title":"On the dynamic quality of service in wireless computing environments","authors":"C. Ben Ahmed, N. Boudriga, M. Obaidat","doi":"10.1109/PCCC.2000.830322","DOIUrl":"https://doi.org/10.1109/PCCC.2000.830322","url":null,"abstract":"This paper considers adaptive and reliable quality of service in a dynamic wireless computing environment. We first develop a quality of service architecture that spans the networking and end-to-end systems software layers. Then, we design resource management algorithms for adaptively sharing the networking resources among applications. Finally, we develop a seamless networking infrastructure integrating the underlying networks.","PeriodicalId":387201,"journal":{"name":"Conference Proceedings of the 2000 IEEE International Performance, Computing, and Communications Conference (Cat. No.00CH37086)","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2000-02-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127087476","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
On fault location in networks by passive testing 基于被动测试的网络故障定位研究
R.E. Miller, K. A. Arisha
{"title":"On fault location in networks by passive testing","authors":"R.E. Miller, K. A. Arisha","doi":"10.1109/PCCC.2000.830329","DOIUrl":"https://doi.org/10.1109/PCCC.2000.830329","url":null,"abstract":"In this paper, we employ a variant of the communicating finite state machine (CFSM) model for networks to investigate fault detection and location using passive testing. First, we introduce the concept of passive testing, then we introduce the model with necessary assumptions and justification. Then, the model for the observer process is described and a 3-node case is studied to show how fault location information can be deduced. Extending this result, we propose a multiple node-cut approach for a general network, applying our technique for fault detection and location. An abstraction of a node-cut shows how the 3-node case can be used in the general case. We then illustrate our technique through a simulation of a practical X.25 example. Finally future extensions and potential trends are-discussed.","PeriodicalId":387201,"journal":{"name":"Conference Proceedings of the 2000 IEEE International Performance, Computing, and Communications Conference (Cat. No.00CH37086)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2000-02-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132925053","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 37
Transport architecture for UMTS/IMT-2000 cellular networks UMTS/IMT-2000蜂窝网络的传输体系结构
Barani Subbiah, Y. Raivio
{"title":"Transport architecture for UMTS/IMT-2000 cellular networks","authors":"Barani Subbiah, Y. Raivio","doi":"10.1109/PCCC.2000.830320","DOIUrl":"https://doi.org/10.1109/PCCC.2000.830320","url":null,"abstract":"In this paper we discuss the transport architecture options for the UMTS/IMT-2000, or 3G (3rd Generation), cellular networks. The interfaces between access nodes in a cellular network and the changes incorporated to support packet data services are described. Challenges in selecting one transport technology over another are outlined with reasoning. Requirements to support mobile telephony as well as Internet services in a cellular network are explained. The new ATM standard, ATM Adaptation Layer type 2 (AAL2) and its applicability for transporting compressed speech in an ATM based cellular network is described. A similar approach in IF, multiplexing in Real-Time Transport Protocol (RTP) payload to transport compressed speech on selective interfaces of 3G network, is introduced. Transport network architecture evolution within four different scenarios is evaluated.","PeriodicalId":387201,"journal":{"name":"Conference Proceedings of the 2000 IEEE International Performance, Computing, and Communications Conference (Cat. No.00CH37086)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2000-02-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127385237","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Entity-centric scalable concurrency control for distributed interactive applications 用于分布式交互式应用程序的以实体为中心的可扩展并发控制
Dongman Lee, Jeonghwa Yang, H. Youn, Chansu Yu, S. Hyun
{"title":"Entity-centric scalable concurrency control for distributed interactive applications","authors":"Dongman Lee, Jeonghwa Yang, H. Youn, Chansu Yu, S. Hyun","doi":"10.1109/PCCC.2000.830361","DOIUrl":"https://doi.org/10.1109/PCCC.2000.830361","url":null,"abstract":"This paper proposes a prediction based concurrency control scheme which satisfies the needs on interactive performance in large scale distributed interactive applications. The prediction based concurrency control allows users real time interactions like the optimistic approaches, while it requires no repair like the pessimistic approaches. We exploit an entity-centric multicast, where only the users surrounding a target entity multicast the requests for ownership. Ownership prediction of an entity is made by using the information of only the users requesting that entity. The experimental results show that the proposed concurrency control scheme provides an efficient, scalable serialization of concurrent ownership requests in large-scale distributed interactive applications.","PeriodicalId":387201,"journal":{"name":"Conference Proceedings of the 2000 IEEE International Performance, Computing, and Communications Conference (Cat. No.00CH37086)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2000-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124296522","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Dynamic and adaptive cache prefetch policies 动态预取和自适应预取策略
R. Oliver, P. Teller
{"title":"Dynamic and adaptive cache prefetch policies","authors":"R. Oliver, P. Teller","doi":"10.1109/PCCC.2000.830357","DOIUrl":"https://doi.org/10.1109/PCCC.2000.830357","url":null,"abstract":"This paper begins an exploration of the applicability of traditional prefetching policies in multiprocessor architectures. In particular, the effectiveness of prefetching policies as a function of both the quality of the prefetching and the consumption of processor to memory bandwidth is an issue of interest. Addressing this issue, the concept of a dynamic and adaptive cache (DAC), two new prefetch policies, and the design of an instruction DAC, called the DAC/sup 3/, which dynamically changes its prefetch policy at runtime, in response to process execution characteristics, are introduced. In addition, a detailed performance analysis of the DAC/sup 3/ and two new prefetch policies, which the DAC/sup 3/ uses, are presented; the performance of the DAC/sup 3/ is compared to that of the SSB prefetch instruction cache, which is based on Jouppi's sequential stream buffer design. This performance analysis is based on a new metric called CompositeCPI, which captures the usefulness of prefetches and their cost in terms of consumed memory bandwidth. The performance analysis indicates that, for the cache configurations and multiprogram workloads studied, the DAC/sup 3/ is superior to the SSB instruction prefetch cache.","PeriodicalId":387201,"journal":{"name":"Conference Proceedings of the 2000 IEEE International Performance, Computing, and Communications Conference (Cat. No.00CH37086)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134062646","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Execution characteristics of multimedia applications on a Pentium II processor 多媒体应用程序在Pentium II处理器上的执行特性
D. Talla, L. John
{"title":"Execution characteristics of multimedia applications on a Pentium II processor","authors":"D. Talla, L. John","doi":"10.1109/PCCC.2000.830358","DOIUrl":"https://doi.org/10.1109/PCCC.2000.830358","url":null,"abstract":"With the widespread use of 3D graphics, animation, speech recognition, and other media applications, general-purpose processors are increasingly spending their cycles on video and audio processing. However, the characteristics of media applications when executed on general purpose processors are not well understood. Such knowledge is extremely important in guiding the design of future microprocessors and development of media applications. In this paper we characterize the performance of multimedia applications on art Intel Pentium II processor based system. Six different commercial multimedia applications belonging to 3D graphics, streaming video or streaming audio categories are executed on an Intel Pentium II processor and performance is measured. Architectural data pertaining to utilization of various hardware resources on the chip are collected using on-chip performance monitoring counters. Multimedia applications are seen to have fewer branch instructions than SPECint benchmarks, however more than SPECfp benchmarks. Despite a regular control flow and more available parallelism, the average number of cycles taken to execute an instruction is seen to be higher than that of SPECint. In many aspects, media applications exhibit a behavior between that of SPECint and SPECfp.","PeriodicalId":387201,"journal":{"name":"Conference Proceedings of the 2000 IEEE International Performance, Computing, and Communications Conference (Cat. No.00CH37086)","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125468799","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 22
Epidemic quorums for managing replicated data 用于管理复制数据的流行quorum
J. Holliday, R. Steinke, D. Agrawal, A. El, AbbadiDepartment
{"title":"Epidemic quorums for managing replicated data","authors":"J. Holliday, R. Steinke, D. Agrawal, A. El, AbbadiDepartment","doi":"10.1109/PCCC.2000.830306","DOIUrl":"https://doi.org/10.1109/PCCC.2000.830306","url":null,"abstract":"In the epidemic model an update is initiated on a single site and is propagated to other sites in a lazy manner. When combined with version vectors and event logs, this propagation mechanism delivers updates in causal order despite communication failures. We integrate quorums into the epidemic model to process transactions on replicated data while ensuring global serializability. We present a detailed simulation of a distributed replicated database and demonstrate the performance improvements.","PeriodicalId":387201,"journal":{"name":"Conference Proceedings of the 2000 IEEE International Performance, Computing, and Communications Conference (Cat. No.00CH37086)","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126520885","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 32
Analyzing instruction prefetching techniques via a cache performance model: effectiveness and limitations 通过缓存性能模型分析指令预取技术:有效性和局限性
G. Park, T. Han, Shin-Dug Kim
{"title":"Analyzing instruction prefetching techniques via a cache performance model: effectiveness and limitations","authors":"G. Park, T. Han, Shin-Dug Kim","doi":"10.1109/PCCC.2000.830356","DOIUrl":"https://doi.org/10.1109/PCCC.2000.830356","url":null,"abstract":"Instruction prefetching methods are analyzed using a cache performance model. Improvement in performance achieved by using an instruction prefetching method is classified into two factors: the number of cache misses reduced by prefetching and the average amount of miss penalty reduced by successful prefetches. Conventional instruction prefetching methods are analyzed based on these two factors. Results show that the amount of miss penalty reduced by successful prefetches, called prefetch efficiency, is more crucial in obtaining a significant improvement in performance than the number of cache misses reduced by a given prefetching method. The effectiveness and limitations of conventional methods used to increase prefetch efficiency are examined using the analytical model and simulation. The analysis reveals that any effective instruction prefetching technique should be designed by utilizing the architectural characteristics of the underlying memory system as an important fundamental direction to achieve significant performance improvement required for future high performance systems.","PeriodicalId":387201,"journal":{"name":"Conference Proceedings of the 2000 IEEE International Performance, Computing, and Communications Conference (Cat. No.00CH37086)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130859722","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信