On the Energy Consumption and Performance of Systems Software

Total Page:16

File Type:pdf, Size:1020Kb

On the Energy Consumption and Performance of Systems Software On the Energy Consumption and Performance of Systems Software Zhichao Li, Radu Grosu, Priya Sehgal, Scott A. Smolka, Scott D. Stoller, and Erez Zadok Department of Computer Science, Stony Brook University {zhicli,grosu,psehgal,sas,stoller,ezk}@cs.stonybrook.edu ABSTRACT issue in the design of computing systems [5, 14, 20, 22, 29, 33, 43]. Models of energy consumption and performance are necessary to The goals of energy-aware system design include saving energy understand and identify system behavior, prior to designing ad- without sacrificing performance, and supporting flexible, dynamic vanced controls that can balance out performance and energy use. trade-offs between energy consumption and performance. Accurate This paper considers the energy consumption and performance of models of energy consumption and performance provide a founda- servers running a relatively simple file-compression workload. We tion for the design of energy-aware systems. found that standard techniques for system identification do not pro- A large portion of the energy consumed by IT infrastructure is duce acceptable models of energy consumption and performance, due to desktop machines and commercial servers [8]. Moreover, due to the intricate interplay between the discrete nature of soft- the total amount of electronic data stored world-wide is rising ex- ware and the continuous nature of energy and performance. This ponentially. By 2020, that figure is expected to reach 35 Zetta motivated us to perform a detailed empirical study of the energy Bytes [16]; energy consumption is expected to grow just as rapidly. consumption and performance of this system with varying com- Thus, it is desirable to develop highly scalable solutions that are pression algorithms and compression levels, file types, persistent significantly better than today’s solutions. storage media, CPU DVFS levels, and disk I/O schedulers. Our In prior work, we analyzed the energy and performance profiles results identify and illustrate factors that complicate the system’s of server workloads, such as Web servers, email servers, database energy consumption and performance, including nonlinearity, in- servers, and file compression [24, 35]. We discovered large devia- stability, and multi-dimensionality. Our results provide a basis for tions for both performance and energy consumption—as much as future work on modeling energy consumption and performance to 10 times—suggesting that there are significant opportunities to save support principled design of controllable energy-aware systems. energy and improve performance. Our past work considered those systems only as black-boxes and reported their performance and energy consumption without a deeper understanding of the exact Categories and Subject Descriptors reasons for those deviations. H.3.4 [Information Storage and Retrieval]: Systems and Soft- Seeking a better understanding of the system internals of these ware—Performance evaluation (efficiency and effectiveness); C.4 workloads, we tried to identify their internal behavior, so we could [Performance of Systems]: Modeling techniques; I.2.8 [Artificial build advanced controllers to better manage both energy and perfor- Intelligence]: Problem Solving, Control Methods, and Search— mance. Unfortunately, our initial attempts to identify these systems Control theory using traditional linear-systems identification techniques resulted in poor models with low prediction accuracy (under 50%). General Terms In this paper, we shed considerable light on the complexities un- derlying systems-software energy consumption and performance. Measurement, Performance In particular, we present an in-depth experimental evaluation of the energy consumption and performance of a relatively simple yet fa- Keywords miliar file-compression workload as a representative workload in- Energy efficiency, System identification, Data compression volving both substantial CPU usage and disk I/O. We also analyze the effects of several input parameters, including choice of com- 1. INTRODUCTION pression algorithm, compression level, file type, persistent storage media (e.g., SATA, SAS, and SSD), CPU Dynamic Voltage and The carbon footprint of the IT industry, though only 2% of the Frequency Scaling (DVFS) level, and disk I/O scheduler—all un- world economy, is estimated to be equal to that of the entire avi- der the Linux operating system. ation industry [7]. Energy consumption is emerging as a critical Our experimental results show that energy consumption and per- formance are unexpectedly complex and cannot be easily modeled using standard system-identification techniques. We identify sev- Permission to make digital or hard copies of all or part of this work for eral factors that contribute to this complexity, in terms of nonlin- personal or classroom use is granted without fee provided that copies are earity, instability, and multi-dimensionality. Our results suggest not made or distributed for profit or commercial advantage and that copies that hybrid discrete-continuous models [1, 18] may provide a suit- bear this notice and the full citation on the first page. To copy otherwise, to able foundation for modeling and control of energy consumption republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. and performance in energy-aware systems software. SYSTOR’11, May 30–June 1, 2011, Haifa, Israel. The rest of the paper is organized as follows. Section 2 con- Copyright 2011 ACM 978-1-4503-0773-4/11/05 ...$10.00. siders related work. Section 3 provides the requisite background. 3.2 I/O Schedulers Section 4 provides the motivation for this work. Section 5 presents I/O scheduling has been studied aggressively [2, 4, 19, 23, 39] es- our experimental setup and benchmarks. Section 6 contains our ex- pecially since the speed of disk lags far behind the speed of CPU perimental results. We conclude in Section 7 and describe future and RAM. work in Section 8. Normally, a disk scheduler tries to maintain a balance between fairness, performance, and latency (or real time guarantees). Fair- 2. RELATED WORK ness guarantees that every process has fair share of the access to This section places our work in the context of past work. disk on a multi-user system. Performance requires the scheduler to serve requests predictably to save both time and energy. La- 2.1 Energy Efficiency tency means that any request must be served within a given time Many energy-saving techniques have been developed at both the limit. There are four main I/O schedulers in Linux systems: (1) hardware and software levels. For example, virtualization allows CFQ (the default), which emphasizes fairness; (2) ANTICIPATORY, multiple Operating Systems (OSs) to run on one server, sharing which emphasizes performance; (3) DEADLINE, which is designed most of the resources, thereby reducing energy consumption. More- for low latency and real time access; and (4) NOOP, which is a sim- over, there are energy-aware cache replacement algorithms [41], ple first-come-first-served scheduler. energy-aware task and interrupt management techniques [37], on- 3.3 Power and Energy Consumption line learning-based power management [10], predictive data group- ing and replication [14], and energy-aware file systems configura- In this subsection, we introduce the power and energy consump- tion pruning techniques [35]. Some modeling based approaches tion patterns for both CPU and disk, since our workload is both have been proposed by Isci, Sarikaya, and others [21, 34]. Some CPU-intensive and disk-intensive. of our own past studies show significant energy savings possible The power consumed in a processor consists of three portions: in commodity Linux servers running common workloads such as dynamic power Pdynamic, static power Pstatic, and short-circuit Web, email, database, compression, etc. [24, 35]. Generally, op- power [26]. For Complementary Metal Oxide Semiconductor (CM- timal use of energy-saving techniques requires accurate models of OS) chips, dynamic power refers to the energy consumption in system energy consumption with respect to appropriate parameters; switching transistors, while static power refers to the flowing leak- the work described in this paper is a step towards the development age current when a transistor is off. Short-circuit power is con- of such models. sumed only during signal transitions and is insignificant. The dy- namic power is calculated as follows: 2.2 Energy Consumption of Data Compression 2 Our prior work, conducted by Kothiyal et al., evaluated energy Pdynamic = C × V × f (1) consumption and performance of data compression on servers [24] and demonstrated that compression reduces energy consumption in where C is the capacitance per cycle, V is the supply voltage and some situations but not all. A careful application of compression f is the processor clock frequency. can save energy in some cases by a factor of 10×, but a careless ap- Although dynamic power is the primary source of power dissipa- plication of compression can easily waste energy and slow perfor- tion in CMOS chips, static power is becoming an important issue. mance by 200×. In contrast to the work described in this paper, our Static power is computed as follows: past study did not focus on accurate modeling of energy consump- tion and hence did not discuss system identification or analyze the Pstatic = V × Ith + Vbs × (Ijn + Ibn) (2) behavioral characteristics of energy consumption and performance that make accurate modeling difficult. where Ith is the sub-threshold leakage current, Vbs is the body bias voltage, and Ijn and Ibs are the drain and source to body junction 3. BACKGROUND leakage current, respectively. Processors with Dynamic Voltage and Frequency Scaling (DVFS) In this section, we describe background work in terms of com- are capable of operating at multiple frequency and voltage levels. pression algorithms (Section 3.1), I/O schedulers (Section 3.2), and Dynamic power is considered to be the dominant portion of the pro- power and energy consumption (Section 3.3). cessor’s energy consumption. As seen from Equation 1, Pdynamic 3.1 Compression Algorithms depends linearly on frequency and quadratically on voltage.
Recommended publications
  • Metadefender Core V4.12.2
    MetaDefender Core v4.12.2 © 2018 OPSWAT, Inc. All rights reserved. OPSWAT®, MetadefenderTM and the OPSWAT logo are trademarks of OPSWAT, Inc. All other trademarks, trade names, service marks, service names, and images mentioned and/or used herein belong to their respective owners. Table of Contents About This Guide 13 Key Features of Metadefender Core 14 1. Quick Start with Metadefender Core 15 1.1. Installation 15 Operating system invariant initial steps 15 Basic setup 16 1.1.1. Configuration wizard 16 1.2. License Activation 21 1.3. Scan Files with Metadefender Core 21 2. Installing or Upgrading Metadefender Core 22 2.1. Recommended System Requirements 22 System Requirements For Server 22 Browser Requirements for the Metadefender Core Management Console 24 2.2. Installing Metadefender 25 Installation 25 Installation notes 25 2.2.1. Installing Metadefender Core using command line 26 2.2.2. Installing Metadefender Core using the Install Wizard 27 2.3. Upgrading MetaDefender Core 27 Upgrading from MetaDefender Core 3.x 27 Upgrading from MetaDefender Core 4.x 28 2.4. Metadefender Core Licensing 28 2.4.1. Activating Metadefender Licenses 28 2.4.2. Checking Your Metadefender Core License 35 2.5. Performance and Load Estimation 36 What to know before reading the results: Some factors that affect performance 36 How test results are calculated 37 Test Reports 37 Performance Report - Multi-Scanning On Linux 37 Performance Report - Multi-Scanning On Windows 41 2.6. Special installation options 46 Use RAMDISK for the tempdirectory 46 3. Configuring Metadefender Core 50 3.1. Management Console 50 3.2.
    [Show full text]
  • Redalyc.A Lossy Method for Compressing Raw CCD Images
    Revista Mexicana de Astronomía y Astrofísica ISSN: 0185-1101 [email protected] Instituto de Astronomía México Watson, Alan M. A Lossy Method for Compressing Raw CCD Images Revista Mexicana de Astronomía y Astrofísica, vol. 38, núm. 2, octubre, 2002, pp. 233-249 Instituto de Astronomía Distrito Federal, México Available in: http://www.redalyc.org/articulo.oa?id=57138212 How to cite Complete issue Scientific Information System More information about this article Network of Scientific Journals from Latin America, the Caribbean, Spain and Portugal Journal's homepage in redalyc.org Non-profit academic project, developed under the open access initiative Revista Mexicana de Astronom´ıa y Astrof´ısica, 38, 233{249 (2002) A LOSSY METHOD FOR COMPRESSING RAW CCD IMAGES Alan M. Watson Instituto de Astronom´ıa Universidad Nacional Aut´onoma de M´exico, Campus Morelia, M´exico Received 2002 June 3; accepted 2002 August 7 RESUMEN Se presenta un m´etodo para comprimir las im´agenes en bruto de disposi- tivos como los CCD. El m´etodo es muy sencillo: cuantizaci´on con p´erdida y luego compresi´on sin p´erdida con herramientas de uso general como gzip o bzip2. Se convierten los archivos comprimidos a archivos de FITS descomprimi´endolos con gunzip o bunzip2, lo cual es una ventaja importante en la distribuci´on de datos com- primidos. El grado de cuantizaci´on se elige para eliminar los bits de bajo orden, los cuales sobre-muestrean el ruido, no proporcionan informaci´on, y son dif´ıciles o imposibles de comprimir. El m´etodo es con p´erdida, pero proporciona ciertas garant´ıas sobre la diferencia absoluta m´axima, la diferencia RMS y la diferencia promedio entre la imagen comprimida y la imagen original; tales garant´ıas implican que el m´etodo es adecuado para comprimir im´agenes en bruto.
    [Show full text]
  • Linux-Cookbook.Pdf
    LINUX COOKBOOK ™ Other Linux resources from O’Reilly Related titles Linux Device Drivers Exploring the JDS Linux Linux in a Nutshell Desktop Running Linux Learning Red Hat Enterprise Building Embedded Linux Linux and Fedora Systems Linux Pocket Guide Linux Security Cookbook Understanding the Linux Kernel Linux Books linux.oreilly.com is a complete catalog of O’Reilly’s books on Resource Center Linux and Unix and related technologies, including sample chapters and code examples. ONLamp.com is the premier site for the open source web plat- form: Linux, Apache, MySQL, and either Perl, Python, or PHP. Conferences O’Reilly brings diverse innovators together to nurture the ideas that spark revolutionary industries. We specialize in document- ing the latest tools and systems, translating the innovator’s knowledge into useful skills for those in the trenches. Visit conferences.oreilly.com for our upcoming events. Safari Bookshelf (safari.oreilly.com) is the premier online refer- ence library for programmers and IT professionals. Conduct searches across more than 1,000 books. Subscribers can zero in on answers to time-critical questions in a matter of seconds. Read the books on your Bookshelf from cover to cover or sim- ply flip to the page you need. Try it today with a free trial. LINUX COOKBOOK ™ Carla Schroder Beijing • Cambridge • Farnham • Köln • Paris • Sebastopol • Taipei • Tokyo Linux Cookbook™ by Carla Schroder Copyright © 2005 O’Reilly Media, Inc. All rights reserved. Printed in the United States of America. Published by O’Reilly Media, Inc., 1005 Gravenstein Highway North, Sebastopol, CA 95472. O’Reilly books may be purchased for educational, business, or sales promotional use.
    [Show full text]
  • Pipenightdreams Osgcal-Doc Mumudvb Mpg123-Alsa Tbb
    pipenightdreams osgcal-doc mumudvb mpg123-alsa tbb-examples libgammu4-dbg gcc-4.1-doc snort-rules-default davical cutmp3 libevolution5.0-cil aspell-am python-gobject-doc openoffice.org-l10n-mn libc6-xen xserver-xorg trophy-data t38modem pioneers-console libnb-platform10-java libgtkglext1-ruby libboost-wave1.39-dev drgenius bfbtester libchromexvmcpro1 isdnutils-xtools ubuntuone-client openoffice.org2-math openoffice.org-l10n-lt lsb-cxx-ia32 kdeartwork-emoticons-kde4 wmpuzzle trafshow python-plplot lx-gdb link-monitor-applet libscm-dev liblog-agent-logger-perl libccrtp-doc libclass-throwable-perl kde-i18n-csb jack-jconv hamradio-menus coinor-libvol-doc msx-emulator bitbake nabi language-pack-gnome-zh libpaperg popularity-contest xracer-tools xfont-nexus opendrim-lmp-baseserver libvorbisfile-ruby liblinebreak-doc libgfcui-2.0-0c2a-dbg libblacs-mpi-dev dict-freedict-spa-eng blender-ogrexml aspell-da x11-apps openoffice.org-l10n-lv openoffice.org-l10n-nl pnmtopng libodbcinstq1 libhsqldb-java-doc libmono-addins-gui0.2-cil sg3-utils linux-backports-modules-alsa-2.6.31-19-generic yorick-yeti-gsl python-pymssql plasma-widget-cpuload mcpp gpsim-lcd cl-csv libhtml-clean-perl asterisk-dbg apt-dater-dbg libgnome-mag1-dev language-pack-gnome-yo python-crypto svn-autoreleasedeb sugar-terminal-activity mii-diag maria-doc libplexus-component-api-java-doc libhugs-hgl-bundled libchipcard-libgwenhywfar47-plugins libghc6-random-dev freefem3d ezmlm cakephp-scripts aspell-ar ara-byte not+sparc openoffice.org-l10n-nn linux-backports-modules-karmic-generic-pae
    [Show full text]
  • Is It Time to Replace Gzip?
    bioRxiv preprint doi: https://doi.org/10.1101/642553; this version posted May 20, 2019. The copyright holder for this preprint (which was not certified by peer review) is the author/funder, who has granted bioRxiv a license to display the preprint in perpetuity. It is made available under aCC-BY 4.0 International license. Is it time to replace gzip? Comparison of modern compressors for molecular sequence databases Kirill Kryukov*, Mahoko Takahashi Ueda, So Nakagawa, Tadashi Imanishi Department of Molecular Life Science, Tokai University School of Medicine, Isehara, Kanagawa 259-1193, Japan. *Correspondence: [email protected] Abstract Nearly all molecular sequence databases currently use gzip for data compression. Ongoing rapid accumulation of stored data calls for more efficient compression tool. We systematically benchmarked the available compressors on representative DNA, RNA and Protein datasets. We tested specialized sequence compressors 2bit, BLAST, DNA-COMPACT, DELIMINATE, Leon, MFCompress, NAF, UHT and XM, and general-purpose compressors brotli, bzip2, gzip, lz4, lzop, lzturbo, pbzip2, pigz, snzip, xz, zpaq and zstd. Overall, NAF and zstd performed well in terms of transfer/decompression speed. However, checking benchmark results is necessary when choosing compressor for specific data type and application. Benchmark results database is available at: http://kirr.dyndns.org/sequence-compression-benchmark/. Keywords: compression; benchmark; DNA; RNA; protein; genome; sequence; database. Molecular sequence databases store and distribute DNA, RNA and protein sequences as compressed FASTA files. Currently, nearly all databases universally depend on gzip for compression. This incredible longevity of the 26-year-old compressor probably owes to multiple factors, including conservatism of database operators, wide availability of gzip, and its generally acceptable performance.
    [Show full text]
  • Rule Base with Frequent Bit Pattern and Enhanced K-Medoid Algorithm for the Evaluation of Lossless Data Compression
    Volume 3, No. 1, Jan-Feb 2012 ISSN No. 0976-5697 International Journal of Advanced Research in Computer Science RESEARCH PAPER Available Online at www.ijarcs.info Rule Base with Frequent Bit Pattern and Enhanced k-Medoid Algorithm for the Evaluation of Lossless Data Compression. Nishad P.M.* Dr. N. Nalayini Ph.D Scholar, Department Of Computer Science Associate professor, Department of computer science NGM NGM College, Pollachi, India College Pollachi, Coimbatore, India [email protected] [email protected] Abstract: This paper presents a study of various lossless compression algorithms; to test the performance and the ability of compression of each algorithm based on ten different parameters. For evaluation the compression ratios of each algorithm on different parameters are processed. To classify the algorithms based on the compression ratio, rule base is constructed to mine with frequent bit pattern to analyze the variations in various compression algorithms. Also, enhanced K- Medoid clustering is used to cluster the various data compression algorithms based on various parameters. The cluster falls dissentingly high to low after the enhancement. The framed rule base consists of 1,048,576 rules, which is used to evaluate the compression algorithm. Two hundred and eleven Compression algorithms are used for this study. The experimental result shows only few algorithm satisfies the range “High” for more number of parameters. Keywords: Lossless compression, parameters, compression ratio, rule mining, frequent bit pattern, K–Medoid, clustering. I. INTRODUCTION the maximum shows the peek compression ratio of algorithms on various parameters, for example 19.43 is the Data compression is a method of encoding rules that minimum compression ratio and the 76.84 is the maximum allows substantial reduction in the total number of bits to compression ratio for the parameter EXE shown in table-1 store or transmit a file.
    [Show full text]
  • Basic Guide to the Command Line
    Basic guide to the command line Outline Introduction Definitions Special Characters Filenames Pathnames and the Path Variable (Search Path) Wildcards Standard in, standards out, standard error, and redirections Here document (heredoc) Owners, groups, and permissions Commands Regular Expressions Introduction To utilize many of the programs in NMRbox you will need to at least have a rudimentary understanding of how to navigate around the command line. With some practice you may even find that the command line is easier than using a GUI based file browser – it is certainly much more powerful. In addition to navigating from the command line you will also need a rudimentary understanding of how to create and execute a shell script. This Guide may take a little bit to get through, but if you know most of the contents in this document you will be well served. (top) Definitions Terminal Emulator – A terminal emulator is a program that makes your computer act like an old fashion computer terminal. When running inside a graphical environment it is often called a “terminal window”, “terminal”, “term”, or “shell” (although it is actually not a shell – read on). I will refer to a “Terminal Emulator” as “Terminal” in this document. Shell – A shell is a program that acts as a command language interpreter that executes the commands sent to it from the keyboard or a file. It is not part of the operating system kernel, but acts to pass commands to the kernel and receives the output from those commands. When you run a Terminal Emulator from a graphical interface a shell is generally run from within the Terminal so your interaction is with the shell and the Terminal simply presents a place for the shell to run in the graphical interface.
    [Show full text]
  • Comparison and Model of Compression Techniques for Smart Cloud Log File Handling
    Copyright IEEE. The final publication is available at IEEExplore via https://doi.org/10.1109/CCCI49893.2020.9256609. Comparison and Model of Compression Techniques for Smart Cloud Log File Handling Josef Spillner Zurich University of Applied Sciences Winterthur, Switzerland [email protected] Abstract—Compression as data coding technique has seen tight pricing of offered cloud services. Increasing diversity and approximately 70 years of research and practical innovation. progress in generic compression tools and log-specific algo- Nowadays, powerful compression tools with good trade-offs exist rithms [4], [5], [6] leaves many operators without a systematic for a range of file formats from plain text to rich multimedia. Yet in the dilemma of cloud providers to reduce log data sizes as much framework to choose suitable and economic log compression as possible while having to keep as much as possible around for tools and respective configurations. This prevents a systematic regulatory reasons and compliance processes, many companies solution to exploit cost tradeoffs, such as increasing investment are looking for smarter solutions beyond brute compression. into better compression levels while saving long-term storage In this paper, comprehensive applied research setting around cost. In this paper, such a framework is constructed by giving network and system logs is introduced by comparing text com- pression ratios and performance. The benchmark encompasses a comprehensive overview with benchmark results of 30 to- 13 tools and 30 tool-configuration-search combinations. The tool tal combinations of compression tools, decompression/search and algorithm relationships as well as benchmark results are tools and associated configurations. modelled in a graph.
    [Show full text]
  • Vorlage Für Dokumente Bei AI
    OSS Disclosure Document Date: 27-Apr-2018 CM-AI/PJ-CC OSS Licenses used in Suzuki Project Page 1 Table of content 1 Overview ..................................................................................................................... 11 2 OSS Licenses used in the project ................................................................................... 11 3 Package details for OSS Licenses usage ........................................................................ 12 3.1 7 Zip - LZMA SDK ............................................................................................................. 12 3.2 ACL 2.2.51 ...................................................................................................................... 12 3.3 Alsa Libraries 1.0.27.2 ................................................................................................... 12 3.4 AES - Advanced Encryption Standard 1.0 ......................................................................... 12 3.5 Alsa Plugins 1.0.26 ........................................................................................................ 13 3.6 Alsa Utils 1.0.27.2 ......................................................................................................... 13 3.7 APMD 3.2.2 ................................................................................................................... 13 3.8 Atomic_ops .................................................................................................................... 13 3.9 Attr 2.4.46 ...................................................................................................................
    [Show full text]
  • Gnome-Session Gzip Less 1.63424124514 Lzop Lib64gpgme
    lib64boost_serialization1.42.0 lib64boost_regex1.42.0 lib64boost_wave1.42.0 lib64boost_math_tr1f1.42.0 popt-data rpm-helper 2.75282526804 1.05413105413 lib64boost_iostreams1.42.0 1.68067226891 chkconfig lib64boost_math_c99l1.42.0 1.1120615911 dmidecode 1.622718052740. 0.0562113546936 perl-File-FnMatch 0.0570287995438 3.04259634888 1.0152284264 tcb perl-String-ShellQuote 0.869313242538 1.33903133903 0. 0.507614213198 libdrakx-net 1.39720558882 1.0152284264 1.1120615911 0.855431993157 1.62271805274 lib64popt0 0. 0.0570287995438 lib64ldetect0.11 0. 3.64583333333 2.60416666667 1.62271805274 0. 3.125 1.1120615911 0. 0. 0.0570287995438 2.604166666670. lib64boost_wserialization1.42.0 3.64583333333 crda 0.0. 0.0. lib64dbnss4.8 1.39720558882 0. 0. 0. 0. 0.726712177934 lib64boost_program_options1.42.0 0. 1.65169516082 0.0440431622991 0. 0.0. 0.855431993157 1.39720558882 0.0285143997719 2.57896261953 drakxtools-backend 0. 0. 3.7037037037 shadow-utils0.880863245981 2.03045685279 0. 0.0. 0.855431993157 0.940975192472 1.62271805274 0. 0.0570613409415 1.1697574893 0. 0. 0.114122681883 wireless-regdb 0.660647434486 2.60416666667 1.62271805274 0. 0. 0.0570613409415 xz pam_tcb 0.0285143997719 0.0. 1.79658070125 0. 2.53807106599 1.45506419401 4.6875 0. 0.388632499393 0.0. 0. lib64cap2 1.1120615911 perl-Curses 1.62271805274 0.855920114123 lib64acl1 0.684764000978 lib64lzma2 lib64boost_math_tr1l1.42.0 0.0285143997719 1.60757542392 0. 0.940975192472 1.16714380092 2.60416666667 3.04568527919 0.0570287995438 1.05160185865 lib64gamin-1_0 0.171086398631 1.1120615911 1.62271805274 0.040338846309 0. 0.0220215811495 lib64boost_graph1.42.0 0.940975192472 0. 0.811359026369 0. coreutils 0.855188141391 0. 0.0570287995438 0.0570613409415findutils 1.92605711756 0.526955816782 0.
    [Show full text]
  • Model 1.1 User's Guide
    Model 1.1 User’s Guide Second Release – December 2015 TABLE OF CONTENTS Section 1: Introduction .................................................................................................................................. 1 About this User’s Guide .............................................................................................................................. 1 About ImageCue™ ....................................................................................................................................... 1 Connections and Controls ........................................................................................................................... 2 Control Channel Descriptions ..................................................................................................................... 4 Section 2: Setup ............................................................................................................................................. 7 Setting the DMX512 Starting Address ......................................................................................................... 7 Selecting the DMX Personality .................................................................................................................... 8 Setting the LCD Display Backlight Level and Disabling the LEDs ................................................................. 8 Changing the HDMI/DVI Output Resolution ............................................................................................... 9 Selecting
    [Show full text]
  • Performance and Energy Consumption of Lossless Compression/Decompression Utilities on Mobile Computing Platforms
    2013 IEEE 21st International Symposium on Modelling, Analysis & Simulation of Computer and Telecommunication Systems Performance and Energy Consumption of Lossless Compression/Decompression Utilities on Mobile Computing Platforms Aleksandar Milenkovi, Armen Dzhagaryan Martin Burtscher Department of Electrical and Computer Engineering Department of Computer Science The University of Alabama in Huntsville Texas State University-San Marcos Huntsville, AL, U.S.A. San Marcos, TX, U.S.A. {milenka, aad002}@uah.edu [email protected] Abstract—Data compression and decompression utilities can be are in use, including dictionaries of expected or recently critical in increasing communication throughput, reducing encountered “words,” sliding windows that assume that communication latencies, achieving energy-efficient communi- recently seen data patterns will repeat, which are used in the cation, and making effective use of available storage. This Lempel-Ziv approach [3], as well as reversibly sorting data paper experimentally evaluates several such utilities for mul- to bring similar values close together, which is the approach tiple compression levels on systems that represent current taken by the Burrows and Wheeler transform [4]. The data mobile platforms. We characterize each utility in terms of its compression algorithms used in practice combine different compression ratio, compression and decompression through- models and coders, thereby favoring different types of inputs put, and energy efficiency. We consider different use cases that and representing different tradeoffs between speed and com- are typical for modern mobile environments. We find a wide pression ratio. Moreover, they typically allow the user to variety of energy costs associated with data compression and decompression and provide practical guidelines for selecting select the dictionary, window, or block size through a com- the most energy efficient configurations for each use case.
    [Show full text]