Error Handling and Energy Estimation Framework for Error Resilient Near-Threshold Computing Rengarajan Ragavan

Total Page:16

File Type:pdf, Size:1020Kb

Error Handling and Energy Estimation Framework for Error Resilient Near-Threshold Computing Rengarajan Ragavan Error Handling and Energy Estimation Framework For Error Resilient Near-Threshold Computing Rengarajan Ragavan To cite this version: Rengarajan Ragavan. Error Handling and Energy Estimation Framework For Error Resilient Near- Threshold Computing. Embedded Systems. Rennes 1, 2017. English. tel-01636803 HAL Id: tel-01636803 https://hal.inria.fr/tel-01636803 Submitted on 17 Nov 2017 HAL is a multi-disciplinary open access L’archive ouverte pluridisciplinaire HAL, est archive for the deposit and dissemination of sci- destinée au dépôt et à la diffusion de documents entific research documents, whether they are pub- scientifiques de niveau recherche, publiés ou non, lished or not. The documents may come from émanant des établissements d’enseignement et de teaching and research institutions in France or recherche français ou étrangers, des laboratoires abroad, or from public or private research centers. publics ou privés. No d’ordre : ANNÉE 2017 THÈSE / UNIVERSITÉ DE RENNES 1 sous le sceau de l’Université Bretagne Loire pour le grade de DOCTEUR DE L’UNIVERSITÉ DE RENNES 1 Mention : Traitement du Signal et Télécommunications École doctorale MATISSE présentée par Rengarajan RAGAVAN préparée à l’unité de recherche UMR6074 IRISA Institut de recherche en informatique et systèmes aléatoires - CAIRN École Nationale Supérieure des Sciences Appliquées et de Technologie Thèse soutenue à Lannion le 22 septembre 2017 devant le jury composé de : Edith BEIGNÉ Error Handling and Directrice de Recherche à CEA Leti / rapporteur Energy Estimation Patrick GIRARD Directrice de Recherche à CNRS, LIRMM / rappor- teur Framework For Lorena ANGHEL Error Resilient Professeur à Grenoble INP, TIMA / examinateur Daniel MÉNARD Near-Threshold Professeur à INSA Rennes, IETR / examinateur Olivier SENTIEYS Computing Professeur à l’Université de Rennes 1 / directeur de thèse Cédric KILLIAN Maître de Conférences à l’Université de Rennes 1 / co-directeur de thèse To My Parents, My Brother, and My Teachers iii Acknowledgements I sincerely express my gratitude to my thesis supervisor Prof. Olivier Sentieys who gave me the opportunity to work him in prestigious INRIA/IRISA labs. His guidance and confidence in me gave extra boost and cultivated more interest in me to do this research work in a better way. His feedback and comments refined the quality of my research contributions and this thesis dissertation. I am very grateful to my thesis co-supervisor Dr. C´edricKillian for his encour- agement and support. He was inspirational to me throughout my Ph.D. tenure. His suggestions and critical evaluation helped me to innovatively address various bottlenecks in this thesis work. I register my special thanks to C´edricfor his efforts in translating the long abstract of this thesis to French. I would like to thank my colleague Philippe Qu´emerais,Research Engineer, IRISA labs for his extensive support in configuring and tutoring various CAD tools. I acknowl- edge my fellow research student Benjamin Barrois for his help in modelling approximate arithmetic operators. I'm thankful to Mme. Laurence Gallas for her French lessons that helped me a lot during my stay in Lannion. Also, I would like to thank all the faculty members, researchers, and colleagues of ENSSAT who made my stay in Lannion most cherishable. This thesis work has seen the light of the day thanks to Universit´ede Rennes 1, and IRISA laboratory for funding and facilitating this thesis work. Thanks are due to Nadia, Joelle, and Angelique for their support in administrative matters and during my missions abroad. I also express my gratitude to the entire jury panel for reading my thesis dissertation and taking part in the thesis defense. Also, special thanks to the reviewers for their valuable review comments that improved the quality of this dissertation. I offer my sincere thanks to all my friends and well-wishers who were supporting me all these years and looking for my betterment. Last but not least, I express my everlasting gratitude to my parents, my brother and almighty without them I cannot be what I am today. 10th October 2017 Rengarajan Lannion, France v Abstract Advancement in CMOS IC technology has improved the way in which integrated circuits are designed and fabricated over decades. Scaling down the size of transistors from micrometers to few nanometers has given the capability to place more tinier transistors in a unit of chip area that upheld Moore's law over the years. On the other hand, feature size scaling imposed various challenges like physical, material, power-thermal, technological, and economical that hinder the trend of scaling. To improve energy efficiency, Dynamic Voltage Scaling (DVS) is employed in most of the Ultra-Low Power (ULP) designs. In near-threshold region (NTR), the supply voltage of the transistor is slightly more than the threshold voltage of the transistor. In this region, the delay and energy both are roughly linear with the supply voltage. The Ion/Ioff ratio is higher compared to the sub-threshold region, which improves the speed and minimizes the leakage. Due to the reduced supply voltage, the circuits operating in NTR can achieve a 10× reduction in energy per operation at the cost of the same magnitude of reduction in the operating frequency. In the present trend of sub-nanometer designs, inherent low-leakage technologies like FD-SOI (Fully Depleted Silicon On Insulator), enhance the benefits of voltage scaling by utilizing techniques like Back-Biasing. However reduction in Vdd augments the impact of variability and timing errors in sub-nanometer designs. The main objective of this work is to handle timing errors and to formulate a framework to estimate energy consumption of error resilient applications in the context of near-threshold computing. It is highly beneficial to design a digital system by taking advantage of NTR, DVS, and FD-SOI. In spite of the advantages, the impact of vari- ability and timing errors outweighs the above-mentioned benefits. There are existing methods that can predict and prevent errors, or detect and correct errors. But there is a need for a unified approach to handle timing errors in the near-threshold regime. In this thesis, Dynamic Speculation based error detection and correction is explored in the context of adaptive voltage and clock overscaling. Apart from error detection and correction, some errors can also be tolerated or, in other words, circuits can be pushed beyond their limits to compute incorrectly to achieve higher energy efficiency. The proposed error detection and correction method achieves 71% overclocking with 2% additional hardware cost. This work involves extensive study of design at gate level to understand the behaviour of gates under overscaling of supply voltage, bias voltage and clock frequency (collectively called as operating triads). A bottom-up approach is taken: by studying trends of energy vs. error of basic arithmetic operators at transistor level. Based on profiling of the arithmetic operators, a tool flow is formulated to estimate energy and error metrics for different operating triads. We achieve maximum energy efficiency of 89% for arithmetic operators like 8-bit and 16-bit adders at the cost of 20% faulty bits by operating in NTR. A statistical model is developed for the arithmetic operators to represent the behaviour of the operators for different variability impacts. This model is used for approximate computing of error resilient applications that can tolerate acceptable margin of errors. This method is further explored for execution unit of a VLIW processor. The proposed framework provides a quick estimation of energy and error metrics of benchmark programs by simple compilation in using C compiler. In the proposed energy estimation framework, characterization of arithmetic operators is done at transistor level, and the energy estimation is done at functional level. This hybrid approach makes energy estimation faster and accurate for different operating triads. The proposed framework estimates energy for different benchmark programs with 98% accuracy compared to SPICE simulation. Abbreviations AVS Adaptive Voltage sscaling BER Bit Error Rate BKA Brent-Kung Adder BOX Buried OXide CCS Conditional Carry Select CDM Critical Delay Margin CGRA Coarse-Grained Reconfigurable Architecture CMF Common Mode Failure CMOS Complementary Metal-Oxide-Semiconductor DDMR Diverse Double Modular Redundancy DMR Double Modular Redundancy DSP Digital Signal Processor DVFS Dynamic Voltage Frequency sscaling DVS Dynamic Voltage sscaling EDAP Energy Delay Area Product EDP Energy Delay Product FBB Forward Body Biasing FEHM Flexible Error Handling Module FF Flip-Flop FIR Finite Impulse Response FPGA Field-Programming Gate Array FDSOI Fully Depleted Silicon on Insulator FU Functional Unit GRAAL Global Reliability Architecture Approach for Logic HFM High Frequency Mode ix HPM Hardware Herformance Monitor IC Integrated Chip ILA Integrated Logic Analyzer ILEP Instruction Level Power Estimation ILP Instruction Level Parallelism IoT Internet of Things ISA Instruction Set Architecture LFBFF Linear Feed Back Flip Flop LFM Low Frequency Mode LFSR Linear Feedbacl Shift Register LSB Least Significant Bit LUT Look-Up Table LVDS Low-Voltage Differential Signaling LVT Low VT MMCM Mixed Mode Clock Manager MSB Most Significant Bit MSFF Master Slave Flip Flop NOP No OPeration NTR Near-Threshold Region PE Processing Element POFF Point of First Failure PUM Path Under Monitoring RBB Reverse Body Biasing RCA Ripple Carry Adder RTL Resistor- Transistor Logic RVT Regular VT SET Single Event Transients SEU Single Event Upset SNR Signal to Noise Ratio SNW Single N-Well SOI Silicon on Insulator SPICE Simulation Program with Integrated Circuit Emphasis SPW Single P-Well STA Static Timing Analysis STR Sub-Threshold Region SW Single Well TFD Timing Fault Detector TMR Triple Modular Redundancy UTBB Ultra-Thin Body and Box VEX ISA VEX Instruction Set Architecture VLIW Very Large Instruction Word VOS Voltage Over-Scaling Contents Acknowledgementsv Abstract vii Abbreviations ix Contents 1 List of Figures5 List of Tables9 1 R´esum´e´etendu 11 1.1 Introduction................................... 11 1.2 Contributions.................................
Recommended publications
  • Computer Service Technician- CST Competency Requirements
    Computer Service Technician- CST Competency Requirements This Competency listing serves to identify the major knowledge, skills, and training areas which the Computer Service Technician needs in order to perform the job of servicing the hardware and the systems software for personal computers (PCs). The present CST COMPETENCIES only address operating systems for Windows current version, plus three older. Included also are general common Linux and Apple competency information, as proprietary service contracts still keep most details specific to in-house service. The Competency is written so that it can be used as a course syllabus, or the study directed towards the education of individuals, who are expected to have basic computer hardware electronics knowledge and skills. Computer Service Technicians must be knowledgeable in the following technical areas: 1.0 SAFETY PROCEDURES / HANDLING / ENVIRONMENTAL AWARENESS 1.1 Explain the need for physical safety: 1.1.1 Lifting hardware 1.1.2 Electrical shock hazard 1.1.3 Fire hazard 1.1.4 Chemical hazard 1.2 Explain the purpose for Material Safety Data Sheets (MSDS) 1.3 Summarize work area safety and efficiency 1.4 Define first aid procedures 1.5 Describe potential hazards in both in-shop and in-home environments 1.6 Describe proper recycling and disposal procedures 2.0 COMPUTER ASSEMBLY AND DISASSEMBLY 2.1 List the tools required for removal and installation of all computer system components 2.2 Describe the proper removal and installation of a CPU 2.2.1 Describe proper use of Electrostatic Discharge
    [Show full text]
  • Computer Architectures an Overview
    Computer Architectures An Overview PDF generated using the open source mwlib toolkit. See http://code.pediapress.com/ for more information. PDF generated at: Sat, 25 Feb 2012 22:35:32 UTC Contents Articles Microarchitecture 1 x86 7 PowerPC 23 IBM POWER 33 MIPS architecture 39 SPARC 57 ARM architecture 65 DEC Alpha 80 AlphaStation 92 AlphaServer 95 Very long instruction word 103 Instruction-level parallelism 107 Explicitly parallel instruction computing 108 References Article Sources and Contributors 111 Image Sources, Licenses and Contributors 113 Article Licenses License 114 Microarchitecture 1 Microarchitecture In computer engineering, microarchitecture (sometimes abbreviated to µarch or uarch), also called computer organization, is the way a given instruction set architecture (ISA) is implemented on a processor. A given ISA may be implemented with different microarchitectures.[1] Implementations might vary due to different goals of a given design or due to shifts in technology.[2] Computer architecture is the combination of microarchitecture and instruction set design. Relation to instruction set architecture The ISA is roughly the same as the programming model of a processor as seen by an assembly language programmer or compiler writer. The ISA includes the execution model, processor registers, address and data formats among other things. The Intel Core microarchitecture microarchitecture includes the constituent parts of the processor and how these interconnect and interoperate to implement the ISA. The microarchitecture of a machine is usually represented as (more or less detailed) diagrams that describe the interconnections of the various microarchitectural elements of the machine, which may be everything from single gates and registers, to complete arithmetic logic units (ALU)s and even larger elements.
    [Show full text]
  • Open Access Proceedings Journal of Physics: Conference Series
    IOP Conference Series: Earth and Environmental Science PAPER • OPEN ACCESS Issues of compatibility of processor command architectures To cite this article: T R Zmyzgova et al 2020 IOP Conf. Ser.: Earth Environ. Sci. 421 042006 View the article online for updates and enhancements. This content was downloaded from IP address 85.143.35.46 on 13/02/2020 at 06:53 AGRITECH-II-2019 IOP Publishing IOP Conf. Series: Earth and Environmental Science 421 (2020) 042006 doi:10.1088/1755-1315/421/4/042006 Issues of compatibility of processor command architectures T R Zmyzgova, A V Solovyev, A G Rabushko, A A Medvedev and Yu V Adamenko Kurgan State University, 62 Proletarskaya street, Kurgan, 640002, Russia E-mail: [email protected] Abstract. Modern computers and computing devices are based on the principle of open architecture, according to which the computer consists of several sufficiently independent devices that perform a certain function. These devices must meet certain standards of interaction with each other. Existing standards relate to both the technical characteristics of the devices and the content of the signals exchanged between them. The article considers the issue of creating a universal architecture of processor commands. The brief analysis of the components of devices and interrelations between them (different hardware features of processors, architecture of memory models and registers of peripheral devices, mechanisms of operand processing, the number of registers and processed data types, interruptions, exceptions, etc.) is carried out. The problem of architecture standardization, which generalizes the capabilities of the most common architectures and is suitable for high-performance emulation on most computer architectures, is put.
    [Show full text]
  • Comptia A+ Complete Study Guide A+ Essentials (220-601) Exam Objectives
    4830bperf.fm Page 1 Thursday, March 8, 2007 10:03 AM CompTIA A+ Complete Study Guide A+ Essentials (220-601) Exam Objectives OBJECTIVE CHAPTER Domain 1.0 Personal Computer Components 1.1 Identify the fundamental principles of using personal computers 1 1.2 Install, configure, optimize and upgrade personal computer components 2 1.3 Identify tools, diagnostic procedures and troubleshooting techniques for personal computer components 2 1.4 Perform preventative maintenance on personal computer components 2 Domain 2.0 Laptops and Portable Devices 2.1 Identify the fundamental principles of using laptops and portable devices 3 2.2 Install, configure, optimize and upgrade laptops and portable devices 3 2.3 Identify tools, basic diagnostic procedures and troubleshooting techniques for laptops and portable devices 3 2.4 Perform preventative maintenance on laptops and portable devices 3 Domain 3.0 Operating Systems 3.1 Identify the fundamentals of using operating systems 4 3.2 Install, configure, optimize and upgrade operating systems 5 3.3 Identify tools, diagnostic procedures and troubleshooting techniques for operating systems 6 3.4 Perform preventative maintenance on operating systems 6 Domain 4.0 Printers and Scanners 4.1 Identify the fundamental principles of using printers and scanners 7 4.2 Identify basic concepts of installing, configuring, optimizing and upgrading printers and scanners 7 4.3 Identify tools, basic diagnostic procedures and troubleshooting techniques for printers and scanners 7 Domain 5.0 Networks 5.1 Identify the fundamental
    [Show full text]
  • Overclocking Assistant for the Intel® Desktop Board DZ87KLT-75K
    Overclocking Assistant for the Intel® Desktop Board DZ87KLT-75K June 2013 Overclocking Assistant for the Intel® Desktop Board DZ87KLT-75K WARNING Altering clock frequency and/or voltage may (i) reduce system stability and useful life of the system and processor; (ii) cause the processor and other system components to fail; (iii) cause reductions in system performance; (iv) cause additional heat or other damage; and (v) affect system data integrity. Intel has not tested and does not warranty the operation of the processor beyond its specifications. WARNING Altering PC memory frequency and/or voltage may (i) reduce system stability and useful life of the system, memory and processor; (ii) cause the processor and other system components to fail; (iii) cause reductions in system performance; (iv) cause additional heat or other damage; and (v) affect system data integrity. Intel assumes no responsibility that the memory included, if used with altered clock frequencies and/or voltages, will be fit for any particular purpose. Check with the memory manufacturer for warranty and additional details. INFORMATION IN THIS DOCUMENT IS PROVIDED IN CONNECTION WITH INTEL® PRODUCTS. NO LICENSE, EXPRESS OR IMPLIED, BY ESTOPPEL OR OTHERWISE, TO ANY INTELLECTUAL PROPERTY RIGHTS IS GRANTED BY THIS DOCUMENT. EXCEPT AS PROVIDED IN INTEL’S TERMS AND CONDITIONS OF SALE FOR SUCH PRODUCTS, INTEL ASSUMES NO LIABILITY WHATSOEVER, AND INTEL DISCLAIMS ANY EXPRESS OR IMPLIED WARRANTY, RELATING TO SALE AND/OR USE OF INTEL PRODUCTS INCLUDING LIABILITY OR WARRANTIES RELATING TO FITNESS FOR A PARTICULAR PURPOSE, MERCHANTABILITY, OR INFRINGEMENT OF ANY PATENT, COPYRIGHT OR OTHER INTELLECTUAL PROPERTY RIGHT. Intel products are not intended for use in medical, life saving, or life sustaining applications.
    [Show full text]
  • Temperature Adaptive Computing in a Real PC
    TEAPC: Temperature Adaptive Computing in a Real PC Augustus K. Uht and Richard J. Vaccaro University of Rhode Island Microarchitecture Research Institute Department of Electrical and Computer Engineering 4 East Alumni Ave. Kingston, RI 02864, USA {[email protected], [email protected]} Abstract* Herein we present an adaptive prototype, TEAPC, based on the standard IBM/Intel PC architecture and TEAPC is an IBM/Intel-standard PC realization realizing underclocking, that is, operating the system of a CPU temperature-adaptive feedback-control greatly below its specified frequency. We have system. The control system adjusts the CPU frequency implemented the entire TEAPC control system in and/or voltage to maintain a constant set-point software, in a Windows application. It runs in a temperature. TEAPC dynamically adapts to changing normal application mode on Windows 2000, CPU computation loads, as well as any other system multitasking normally with other applications. CPU phenomenon that affects the CPU temperature. For frequency and core voltage are changed dynamically, example, with the specific TEAPC hardware, should based on the output of a feedback control system using the CPU cooling fan fail, the control system detects the CPU chip temperature as its input. The control the increase in CPU temperature and automatically loop and underclocking models should be usable for reduces the CPU frequency and voltage to keep the any PC to be built, as well as many that already exist. CPU from overheating. In such a circumstance the This paper’s contributions are as follows: system continues to operate. All of the adaptation is Demonstration of temperature control of a COTS done dynamically, at runtime, on an unmodified (Commercial Off-The-Shelf) based PC via a modern standard operating system (Windows 2000) with a feedback control system; On-demand reliability and purely software-implemented feedback-control system.
    [Show full text]
  • Background Optimization in Full System Binary Translation
    Background Optimization in Full System Binary Translation Roman A. Sokolov Alexander V. Ermolovich MCST CJSC Intel CJSC Moscow, Russia Moscow, Russia Email: [email protected] Email: [email protected] Abstract—Binary translation and dynamic optimization are architecture codes fully utilizing all architectural features widely used to provide compatibility between legacy and promis- introduced to support binary translation. Besides, dynamic ing upcoming architectures on the level of executable binary optimization can benefit from utilization of actual information codes. Dynamic optimization is one of the key contributors to dynamic binary translation system performance. At the same about executables behavior which static compilers usually time it can be a major source of overhead, both in terms of don’t possess. CPU cycles and whole system latency, as long as optimization At the same time dynamic optimization can imply sig- time is included in the execution time of the application under nificant overhead as long as optimization time is included translation. One of the solutions that allow to eliminate dynamic in the execution time of application under translation. Total optimization overhead is to perform optimization simultaneously with the execution, in a separate thread. In the paper we present optimization time can be significant but will not necessarily implementation of this technique in full system dynamic binary be compensated by the translated codes speed-up if application translator. For this purpose, an infrastructure for multithreaded run time is too short. execution was implemented in binary translation system. This Also, the operation of optimizing translator can worsen the allowed running dynamic optimization in a separate thread latency (i.e., increase pause time) of interactive application or independently of and concurrently with the main thread of execution of binary codes under translation.
    [Show full text]
  • Comptia A+ Certification Exam Prep
    Course 445 CompTIA A+ Certification Exam Prep 445/CN/H.3/709/H.2 Acknowledgments The author would like to thank the following people for their valuable help with this course: Teresa Shinn Carl Waldron Tim Watts Esteban Delgado Dave O’Neal Shirley Auguste Alicia Richardson © Learning Tree International, Inc. All rights reserved. Not to be reproduced without prior written consent. © LEARNING TREE INTERNATIONAL, INC. All rights reserved. All trademarked product and company names are the property of their respective trademark holders. No part of this publication may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, electronic, mechanical, photocopying, recording or otherwise, or translated into any language, without the prior written permission of the publisher. Copying software used in this course is prohibited without the express permission of Learning Tree International, Inc. Making unauthorized copies of such software violates federal copyright law, which includes both civil and criminal penalties. Introduction and Overview Course Objectives The main objective of this course is to Prepare you to pass the CompTIA A+ 220-901 and 220-902 exams To accomplish this goal, you will learn how to Safely disassemble and reassemble a complete PC system Install and configure common PC motherboards and adapter cards Use an organized strategy to identify and troubleshoot common PC problems Select and install the correct type of RAM memory needed to upgrade a PC system Install and configure data storage systems, including hard disks, solid state drives (SSD), CD, and DVD-ROM drives Identify fundamental components of laptops and mobile devices and describe how to troubleshoot common problems © Learning Tree International, Inc.
    [Show full text]
  • Oral History of Boris Babayan
    Oral History of Boris Babayan Interviewed by: Alex Bochannek Recorded: May 16, 2012 Moscow, Russia CHM Reference number: X6507.2012 © 2013 Computer History Museum Oral History of Boris Babayan Boris Babayan, May 16, 2012 Alex Bochannek: I’m Alex Bochannek; Curator and Senior Manager at the Computer History Museum in Mountain View, California. Today is Wednesday, May 16th and we are at Intel in Moscow, Russia to conduct the oral history with Boris Babayan. Also present in the room are Lubov Gladkikh his assistant and Yuri Merling [ph?] the videographer. Thank you both for agreeing to do this oral history for the archive at the Computer History Museum today. Let’s start about talking about your childhood and would you give us your full name, where you were born, and tell us a little bit about your parents, if there are any siblings and what your childhood was like. Boris Babayan: I was born in 1933 in Baku, Azerbaijan, now it’s an independent state. My father was a technician, he was an electrical engineer, and my mother worked in the kindergarten. I finished 10 year secondary school in Baku and then moved in Moscow, where I entered the Moscow Institute of Physics and Technology. It seems to me that in Russia I definitely was the first student in computer science. Bochannek: Now, what made you want to go to Moscow to that institute? Were you interested in technical things? Babayan: Because I was interested in the technical education and some people told me that the Moscow Institute of Physics and Technology is a very good institute, like MIT in the United States; it was established just after World War II, specially for education in the high tech.
    [Show full text]
  • Experience of Building and Deployment Debian on Elbrus Architecture
    Experience of Building and Deployment Debian on Elbrus Architecture Andrey Kuyan, Sergey Gusev, Andrey Kozlov, Zhanibek Kaimuldenov, Evgeny Kravtsunov Moscow Center of SPARC Technologies (ZAO MCST) Vavilova street, 24, Moscow, Russia fkuyan a, gusev s, kozlov a, kajmul a, kravtsunov [email protected] Abstract—This article describe experience of porting Debian II. Debian package managment system Linux distribution on Elbrus architecture. Authors suggested Debian is built from a large number of open-source projects effective method of building Debian distribution for architecture which is not supported by community. which maintained by different groups of developers around the world. Debian uses the package term. There are 2 types of packages: source and binary. Common source package I. Introduction consists of *.orig.tar.gz file, *.diff.gz file and *.dsc file. *.orig.tar.gz file contains upstream code of a project, MCST (ZAO ”MCST”) is a Russian company specializing maintained by original developers. *.diff.gz file contains in the development of general purpose CPU with Elbrus- a Debian patch with some information about project, such 2000 (e2k) ISA [1] and computing platforms based on it as build-dependencies, build rules, etc. *.dsc file holds an [2].Also in the company are being developed optimizing information about *.orig.tar.gz and *.diff.gz. Some and binary compilers, operating systems. General purpose of source packages, maintained by Debian developers (for ex- microprocessors and platforms assume that users have the ample dpkg) may not comprise *.diff.gz file because they ability to solve any problems of system integration with its already have a Debian information inside.
    [Show full text]
  • Chronologie De L'informatique Scientifique
    Chronologie de l’Informatique Scientifique Gérard Sookahet (août 2021) Voici une chronologie simplifiée des différents faits qui balisent le parcours de l'activité de l'Informatique Scientifique . S'entrecroisent à la fois les progrès réalisés dans les domaines tels que l'Analyse Numérique, l'Informatique, l'Algorithmique, l'Infographie, etc .... ndlr: Certains événements ont parfois un rapport assez lointain avec l'Informatique Scientifique, mais ils permettent de mieux situer le contexte scientifique de l'époque. Certains autres événements ont une importance toute relative selon votre grille de lecture. Nomenclature Mathématiques, analyse numérique, calcul numérique, algorithmique Eléments Finis, calcul de structure, mécanique, CFD CAO, infographie, cartographie Informatique, calcul intensif Programmation, calcul formel et symbolique, intelligence artificielle, cryptographie - 2000 Tables numériques babyloniennes de carrés et cubes - 1800 Algorithme de Babylone (approximation des racines carrées) - 220 Calcul de la circonférence de la Terre par Eratosthène de Cyrène - 225 Approximation de π par Archimèdes de Syracuse - 150 Hipparque de Rhodes utilise des interpolations linéaires pour calculer la position des corps célestes - 87 Machine d'Anticythère pour calculer les positions astronomiques (Grèce) 200 Abaques chinois 263 Première méthode d'élimination de Gauss par Liu Hui (Chine) 450 Calcul de π avec 6 décimales par Tsu Chung-Chih et Tsu Keng-Chih 550 Apparition du zéro et de la numération de position (Inde) 600 Liu
    [Show full text]
  • Dynamic Voltage and Frequency Scaling with Multi-Clock Distribution Systems on SPARC Core" (2009)
    Rochester Institute of Technology RIT Scholar Works Theses Thesis/Dissertation Collections 5-1-2009 Dynamic voltage and frequency scaling with multi- clock distribution systems on SPARC core Michael Nasri Michael Follow this and additional works at: http://scholarworks.rit.edu/theses Recommended Citation Michael, Michael Nasri, "Dynamic voltage and frequency scaling with multi-clock distribution systems on SPARC core" (2009). Thesis. Rochester Institute of Technology. Accessed from This Thesis is brought to you for free and open access by the Thesis/Dissertation Collections at RIT Scholar Works. It has been accepted for inclusion in Theses by an authorized administrator of RIT Scholar Works. For more information, please contact [email protected]. Dynamic Voltage and Frequency Scaling with Multi-Clock Distribution Systems on SPARC Core by Michael Nasri Michael A Thesis Submitted in Partial Fulfillment of the Requirements for the Degree of Master of Science in Computer Engineering Supervised by Dr. Dhireesha Kudithipudi Department of Computer Engineering Kate Gleason College of Engineering Rochester Institute of Technology Rochester, NY May 2009 Approved By: Dr. Dhireesha Kudithipudi Assistant Professor, RIT Department of Computer Engineering Primary Advisor Dr. Ken Hsu Professor, RIT Department of Computer Engineering Dr. Muhammad Shaaban Associate Professor, RIT Department of Computer Engineering Thesis Release Permission Form Rochester Institute of Technology Kate Gleason College of Engineering Title: Dynamic Voltage and Frequency Scaling with Multi-Clock Distribution Systems on SPARC Core I, Michael Nasri Michael, hereby grant permission to the Wallace Memorial Library to reproduce my thesis in whole or part. Michael Nasri Michael Date Dedication To my parents for their pride and encouragement To my brother and sisters for their love and support Acknowledgements Thanks to Dr.
    [Show full text]