§1 1 1. Introduction. This Program Is the Heart of The

Total Page:16

File Type:pdf, Size:1020Kb

§1 1 1. Introduction. This Program Is the Heart of The §1 MMIX-PIPE INTRODUCTION 1 1. Introduction. This program is the heart of the meta-simulator for the ultra-configurable MMIX pipeline: It defines the MMIX run routine, which does most of the work. Another routine, MMIX init , is also defined here, and so is a header file called mmix_pipe.h. The header file is used by the main routine and by other routines like MMIX config , which are compiled separately. Readers of this program should be familiar with the explanation of MMIX architecture as presented in the main program module for MMMIX. A lot of subtle things can happen when instructions are executed in parallel. Therefore this simulator ranks among the most interesting and instructive programs in the author’s experience. The author has tried his best to make everything correct ... but the chances for error are great. Anyone who discovers a bug is therefore urged to report it as soon as possible; please see http://mmix.cs.hm.edu/bugs/ for instructions. It sort of boggles the mind when one realizes that the present program might someday be translated by a C compiler for MMIX and used to simulate itself. 2 INTRODUCTION MMIX-PIPE §2 2. This high-performance prototype of MMIX achieves its efficiency by means of “pipelining,” a technique of overlapping that is explained for the related DLX computer in Chapter 3 of Hennessy & Patterson’s book Computer Architecture (second edition). Other techniques such as “dynamic scheduling” and “multiple issue,” explained in Chapter 4 of that book, are used too. One good way to visualize the procedure is to imagine that somebody has organized a high-tech car repair shop according to similar principles. There are eight independent functional units, which we can think of as eight groups of auto mechanics, each specializing in a particular task; each group has its own workspace with room to deal with one car at a time. Group F (the “fetch” group) is in charge of rounding up customers and getting them to enter the assembly-line garage in an orderly fashion. Group D (the “decode and dispatch” group) does the initial vehicle inspection and writes up an order that explains what kind of servicing is required. The vehicles go next to one of the four “execution” groups: Group X handles routine maintenance, while groups XF, XM, and XD are specialists in more complex tasks that tend to take longer. (The XF people are good at floating the points, while the XM and XD groups are experts in multilink suspensions and differentials.) When the relevant X group has finished its work, cars drive to M station, where they send or receive messages and possibly pay money to members of the “memory” group. Finally all necessary parts are installed by members of group W, the “write” group, and the car leaves the shop. Everything is tightly organized so that in most cases the cars move in synchronized fashion from station to station, at regular 100-nanocentury intervals. In a similar way, most MMIX instructions can be handled in a five-stage pipeline, F–D–X–M–W, with X replaced by XF for floating-point addition or conversion, or by XM for multiplication, or by XD for division or square root. Each stage ideally takes one clock cycle, although XF, XM, and (especially) XD are slower. If the instructions enter in a suitable pattern, we might see one instruction being fetched, another being decoded, and up to four being executed, while another is accessing memory, and yet another is finishing up by writing new information into registers; all this is going on simultaneously during one clock cycle. Pipelining with eight separate stages might therefore make the machine run up to 8 times as fast as it could if each instruction were being dealt with individually and without overlap. (Well, perfect speedup turns out to be impossible, because of the shared M and W stages; the theory of knapsack programming, to be discussed in Section 7.7 of The Art of Computer Programming, tells us that the maximal achievable speedup is at most 8 − 1/p − 1/q − 1/r when XF, XM, and XD have delays bounded by p, q, and r cycles. But we can achieve a factor of more than 7 if we are very lucky.) Consider, for example, the ADD instruction. This instruction enters the computer’s processing unit in F stage, taking only one clock cycle if it is in the cache of instructions recently seen. Then the D stage recognizes the command as an ADD and acquires the current values of $Y and $Z; meanwhile, of course, another instruction is being fetched by F. On the next clock cycle, the X stage adds the values together. This prepares the way for the M stage to watch for overflow and to get ready for any exceptional action that might be needed with respect to the settings of special register rA. Finally, on the fifth clock cycle, the sum is either written into $X or the trip handler for integer overflow is invoked. Although this process has taken five clock cycles (that is, 5υ), the net increase in running time has been only 1υ. Of course congestion can occur, inside a computer as in a repair shop. For example, auto parts might not be readily available; or a car might have to sit in D station while waiting to move to XM, thereby blocking somebody else from moving from F to D. Sometimes there won’t necessarily be a steady stream of customers. In such cases the employees in some parts of the shop will occasionally be idle. But we assume that they always do their jobs as fast as possible, given the sequence of customers that they encounter. With a clever person setting up appointments—translation: with a clever programmer and/or compiler arranging MMIX instructions—the organization can often be expected to run at nearly peak capacity. In fact, this program is designed for experiments with many kinds of pipelines, potentially using additional functional units (such as several independent X groups), and potentially fetching, dispatching, and executing several nonconflicting instructions simultaneously. Such complications make this program more difficult than a simple pipeline simulator would be, but they also make it a lot more instructive because we can get a better understanding of the issues involved if we are required to treat them in greater generality. §3 MMIX-PIPE INTRODUCTION 3 3. Here’s the overall structure of the present program module. #include <stdio.h> #include <stdlib.h> #include <math.h> #include "abstime.h" h Preprocessor definitions i h Header definitions 6 i h Type definitions 11 i h Global variables 20 i h External variables 4 i h Internal prototypes 13 i h External prototypes 9 i h Subroutines 14 i h External routines 10 i 4. The identifier Extern is used in MMIX-PIPE to declare variables that are accessed in other modules. Actually all appearances of ‘Extern’ are defined to be blank here, but ‘Extern’ will become ‘extern’ in the header file. #define Extern /∗ blank for us, extern for them ∗/ format Extern extern h External variables 4 i ≡ Extern int verbose; /∗ controls the level of diagnostic output ∗/ See also sections 29, 59, 60, 66, 69, 77, 86, 87, 98, 115, 136, 150, 168, 207, 211, 214, 242, 247, 284, and 349. This code is used in sections 3 and 5. 5. The header file repeats the basic definitions and declarations. h mmix−pipe.h 5 i ≡ #define Extern extern h Header definitions 6 i h Type definitions 11 i h External variables 4 i h External prototypes 9 i 6. Subroutines of this program are declared first with a prototype, as in ANSI C, then with an old-style C function definition. The following preprocessor commands make this work correctly with both new-style and old-style compilers. h Header definitions 6 i ≡ #ifdef __STDC__ #define ARGS(list ) list #else #define ARGS(list )() #endif See also sections 7, 8, 52, 57, 129, and 166. This code is used in sections 3 and 5. 4 INTRODUCTION MMIX-PIPE §7 7. Some of the names that are natural for this program are in conflict with library names on at least one of the host computers in the author’s tests. So we bypass the library names here. h Header definitions 6 i +≡ #define random my random #define fsqrt my fsqrt #define div my div 8. The amount of verbosity depends on the following bit codes. h Header definitions 6 i +≡ #define issue bit (1 ¿ 0) /∗ show control blocks when issued, deissued, committed ∗/ #define pipe bit (1 ¿ 1) /∗ show the pipeline and locks on every cycle ∗/ #define coroutine bit (1 ¿ 2) /∗ show the coroutines when started on every cycle ∗/ #define schedule bit (1 ¿ 3) /∗ show the coroutines when scheduled ∗/ #define uninit mem bit (1 ¿ 4) /∗ complain when reading from an uninitialized chunk of memory ∗/ #define interactive read bit (1 ¿ 5) /∗ prompt user when reading from I/O location ∗/ #define show spec bit (1 ¿ 6) /∗ display special read/write transactions as they happen ∗/ #define show pred bit (1 ¿ 7) /∗ display branch prediction details ∗/ #define show wholecache bit (1 ¿ 8) /∗ display cache blocks even when their key tag is invalid ∗/ 9. The MMIX init ( ) routine should be called exactly once, after MMIX config ( ) has done its work but before the simulator starts to execute any programs. Then MMIX run( ) can be called as often as the user likes. h External prototypes 9 i ≡ Extern void MMIX init ARGS((void)); Extern void MMIX run ARGS((int cycs , octa breakpoint )); See also sections 38, 161, 175, 178, 180, 209, 212, and 252.
Recommended publications
  • Donald Knuth Fletcher Jones Professor of Computer Science, Emeritus Curriculum Vitae Available Online
    Donald Knuth Fletcher Jones Professor of Computer Science, Emeritus Curriculum Vitae available Online Bio BIO Donald Ervin Knuth is an American computer scientist, mathematician, and Professor Emeritus at Stanford University. He is the author of the multi-volume work The Art of Computer Programming and has been called the "father" of the analysis of algorithms. He contributed to the development of the rigorous analysis of the computational complexity of algorithms and systematized formal mathematical techniques for it. In the process he also popularized the asymptotic notation. In addition to fundamental contributions in several branches of theoretical computer science, Knuth is the creator of the TeX computer typesetting system, the related METAFONT font definition language and rendering system, and the Computer Modern family of typefaces. As a writer and scholar,[4] Knuth created the WEB and CWEB computer programming systems designed to encourage and facilitate literate programming, and designed the MIX/MMIX instruction set architectures. As a member of the academic and scientific community, Knuth is strongly opposed to the policy of granting software patents. He has expressed his disagreement directly to the patent offices of the United States and Europe. (via Wikipedia) ACADEMIC APPOINTMENTS • Professor Emeritus, Computer Science HONORS AND AWARDS • Grace Murray Hopper Award, ACM (1971) • Member, American Academy of Arts and Sciences (1973) • Turing Award, ACM (1974) • Lester R Ford Award, Mathematical Association of America (1975) • Member, National Academy of Sciences (1975) 5 OF 44 PROFESSIONAL EDUCATION • PhD, California Institute of Technology , Mathematics (1963) PATENTS • Donald Knuth, Stephen N Schiller. "United States Patent 5,305,118 Methods of controlling dot size in digital half toning with multi-cell threshold arrays", Adobe Systems, Apr 19, 1994 • Donald Knuth, LeRoy R Guck, Lawrence G Hanson.
    [Show full text]
  • Tug2007-Slides-2X2.Pdf
    Dedication ÅEÌ Professor Donald Knuth (Stanford) Extending TEX and Professor William Kahan (Berkeley) ÅEÌAFÇÆÌ with Floating-Point Arithmetic AF Nelson H. F. Beebe ÇÆÌ X and Department of Mathematics University of Utah E T Salt Lake City, UT 84112-0090 USA TEX Users Group Conference 2007 talk. – p. 1/30 TEX Users Group Conference 2007 talk. – p. 2/30 ÅEÌAFÇÆÌ Arithmetic in TEX and Arithmetic in ÅEÌAFÇÆÌ ÅEÌ ÅEÌ Binary integer arithmetic with 32 bits (T X \count ÅEÌAFÇÆÌ restricts input numbers to 12 integer bits: ≥ E registers) % mf expr Fixed-point arithmetic with sign bit, overflow bit, 14 gimme an expr: 4095 >> 4095 ≥ gimme an expr: 4096 integer bits, and 16 fractional bits (T X \dimen, E ! Enormous number has been reduced. \muskip, and \skip registers) AF >> 4095.99998 AF Overflow detected on division and multiplication but not gimme an expr: infinity >> 4095.99998 on addition (flaw (NHFB), feature (DEK)) gimme an expr: epsilon >> 0.00002 gimme an expr: 1/epsilon Gyrations sometimes needed in ÅEÌAFÇÆÌ to work ÇÆÌ ! Arithmetic overflow. ÇÆÌ Xwith and fixed-point numbers X and >> 32767.99998 Uh, oh.E A little while ago one of the quantities gimmeE an expr: 1/3 >> 0.33333 that I was computing got too large, so I’m afraid gimme an expr: 3*(1/3) >> 0.99998 T T your answers will be somewhat askew. You’ll gimme an expr: 1.2 • 2.3 >> •1.1 probably have to adopt different tactics next gimme an expr: 1.2 • 2.4 >> •1.2 time. But I shall try to carry on anyway.
    [Show full text]
  • Typeset MMIX Programs with TEX Udo Wermuth Abstract a TEX Macro
    TUGboat, Volume 35 (2014), No. 3 297 Typeset MMIX programs with TEX Example: In section 9 the lines \See also sec- tion 10." and \This code is used in section 24." are given. Udo Wermuth No such line appears in section 10 as it only ex- tends the replacement code of section 9. (Note that Abstract section 10 has in its headline the number 9.) In section 24 the reference to section 9 stands for all of ATEX macro package is presented as a literate pro- the eight code lines stated in sections 9 and 10. gram. It can be included in programs written in the If a section is not used in any other section then languages MMIX or MMIXAL without affecting the it is a root and during the extraction of the code a assembler. Such an instrumented file can be pro- file is created that has the name of the root. This file cessed by TEX to get nicely formatted output. Only collects all the code in the sequence of the referenced a new first line and a new last line must be entered. sections from the code part. The collection process And for each end-of-line comment a flag is set to for all root sections is called tangle. A second pro- indicate that the comment is written in TEX. cess is called weave. It outputs the documentation and the code parts as a TEX document. How to read the following program Example: The following program has only one The text that starts in the next chapter is a literate root that is defined in section 4 with the headline program [2, 1] written in a style similar to noweb [7].
    [Show full text]
  • RISC-V Instructioninstruction Setset
    PortingPorting HelenOSHelenOS toto RISC-VRISC-V http://d3s.mff.cuni.cz Martin Děcký [email protected] CHARLES UNIVERSITY IN PRAGUE FacultyFaculty ofof MathematicsMathematics andand PhysicsPhysics IntroductionIntroduction Two system-level projects RISC-V is an instruction set architecture, HelenOS is an operating system Martin Děcký, FOSDEM, January 30th 2016 Porting HelenOS to RISC-V 2 IntroductionIntroduction Two system-level projects RISC-V is an instruction set architecture, HelenOS is an operating system Both originally started in academia But with real-world motivations and ambitions Both still in the process of maturing Some parts already fixed, other parts can be still affected Martin Děcký, FOSDEM, January 30th 2016 Porting HelenOS to RISC-V 3 IntroductionIntroduction Two system-level projects RISC-V is an instruction set architecture, HelenOS is an operating system Both originally started in academia But with real-world motivations and ambitions Both still in the process of maturing Some parts already fixed, other parts can be still affected → Mutual evaluation of fitness Martin Děcký, FOSDEM, January 30th 2016 Porting HelenOS to RISC-V 4 IntroductionIntroduction Martin Děcký Computer science researcher Operating systems Charles University in Prague Co-author of HelenOS (since 2004) Original author of the PowerPC port Martin Děcký, FOSDEM, January 30th 2016 Porting HelenOS to RISC-V 5 RISC-VRISC-V inin aa NutshellNutshell Free (libre) instruction set architecture BSD license, in development since 2014 Goal: No royalties for
    [Show full text]
  • Implementation of a MIX Emulator: a Case Study of the Scala Programming Language Facilities
    ISSN 2255-8691 (online) Applied Computer Systems ISSN 2255-8683 (print) December 2017, vol. 22, pp. 47–53 doi: 10.1515/acss-2017-0017 https://www.degruyter.com/view/j/acss Implementation of a MIX Emulator: A Case Study of the Scala Programming Language Facilities Ruslan Batdalov1, Oksana Ņikiforova2 1, 2 Riga Technical University, Latvia Abstract – Implementation of an emulator of MIX, a mythical synchronous manner, possible errors in a program may remain computer invented by Donald Knuth, is used as a case study of unnoticed. In the authors’ opinion, these checks are useful in the features of the Scala programming language. The developed mastering how to write correct programs because similar emulator provides rich opportunities for program debugging, such as tracking intermediate steps of program execution, an errors often occur in a modern program despite all changes in opportunity to run a program in the binary or the decimal mode hardware and software technologies. Therefore, it would be of MIX, verification of correct synchronisation of input/output helpful if an emulator supported running programs in different operations. Such Scala features as cross-compilation, family modes and allowed checking that the execution result was the polymorphism and support for immutable data structures have same in all cases. proved to be useful for implementation of the emulator. The The programming language chosen by the authors for the authors of the paper also propose some improvements to these features: flexible definition of family-polymorphic types, implementation of an emulator supporting these features is integration of family polymorphism with generics, establishing Scala. This choice is arbitrary to some extent and rather full equivalence between mutating operations on mutable data dictated by the authors’ interest in the features of this types and copy-and-modify operations on immutable data types.
    [Show full text]
  • Processor Architectures
    CS143 Handout 18 Summer 2008 30 July, 2008 Processor Architectures Handout written by Maggie Johnson and revised by Julie Zelenski. Architecture Vocabulary Let’s review a few relevant hardware definitions: register: a storage location directly on the CPU, used for temporary storage of small amounts of data during processing. memory: an array of randomly accessible memory bytes each identified by a unique address. Flat memory models, segmented memory models, and hybrid models exist which are distinguished by the way locations are referenced and potentially divided into sections. instruction set: the set of instructions that are interpreted directly in the hardware by the CPU. These instructions are encoded as bit strings in memory and are fetched and executed one by one by the processor. They perform primitive operations such as "add 2 to register i1", "store contents of o6 into memory location 0xFF32A228", etc. Instructions consist of an operation code (opcode) e.g., load, store, add, etc., and one or more operand addresses. CISC: Complex instruction set computer. Older processors fit into the CISC family, which means they have a large and fancy instruction set. In addition to a set of common operations, the instruction set has special purpose instructions that are designed for limited situations. CISC processors tend to have a slower clock cycle, but accomplish more in each cycle because of the sophisticated instructions. In writing an effective compiler back-end for a CISC processor, many issues revolve around recognizing how to make effective use of the specialized instructions. RISC: Reduced instruction set computer. Many modern processors are in the RISC family, which means they have a relatively lean instruction set, containing mostly simple, general-purpose instructions.
    [Show full text]
  • The Art of Computer Programming, Vol. 4A
    THE ART OF COMPUTER PROGRAMMING Missing pages from select printings of Knuth, The Art of Computer Programming, Volume 4A (ISBN-13: 9780201038040 / ISBN-10: 0201038048). Copyright © 2011 Pearson Education, Inc. All rights reserved. DONALD E. KNUTH Stanford University 6 77 ADDISON–WESLEY Missing pages from select printings of Knuth, The Art of Computer Programming, Volume 4A (ISBN-13: 9780201038040 / ISBN-10: 0201038048). Copyright © 2011 Pearson Education, Inc. All rights reserved. Volume 4A / Combinatorial Algorithms, Part 1 THE ART OF COMPUTER PROGRAMMING Boston · Columbus · Indianapolis · New York · San Francisco Amsterdam · Cape Town · Dubai · London · Madrid · Milan Munich · Paris · Montréal · Toronto · Mexico City · São Paulo Delhi · Sydney · Hong Kong · Seoul · Singapore · Taipei · Tokyo Missing pages from select printings of Knuth, The Art of Computer Programming, Volume 4A (ISBN-13: 9780201038040 / ISBN-10: 0201038048). Copyright © 2011 Pearson Education, Inc. All rights reserved. The poem on page 437 is quoted from The Golden Gate by Vikram Seth (New York: Random House, 1986), copyright ⃝c 1986 by Vikram Seth. The author and publisher have taken care in the preparation of this book, but make no expressed or implied warranty of any kind and assume no responsibility for errors or omissions. No liability is assumed for incidental or consequential damages in connection with or arising out of the use of the information or programs contained herein. The publisher offers excellent discounts on this book when ordered in quantity forbulk purposes or special sales, which may include electronic versions and/or custom covers and content particular to your business, training goals, marketing focus, and branding interests. For more information, please contact: U.S.
    [Show full text]
  • Rewriting the Bible in 0?
    Technology Review - Rewriting the Bible in 0’s and 1’s Home Search Login Register My Profile Site Map Channels Infotech Biotech Nanotech Extra Rewriting the Bible in 0’s and 1’s September/October 1999 Inside By Steve Ditlea Magazine Forums Since the 1960s, Donald Knuth has been writing the sacred text of Newsletter computer programming. He’s a little behind schedule, but he has an excuse: he took time out to reinvent digitial typography. Scorecards Special Events Panel Series Nominate the When you write about Donald Next TR100! Knuth, it’s natural to sound scriptural. For nearly 40 years, the now-retired Stanford University professor has been writing the gospel of computer science, an epic Enter your email to called The Art of Computer receive our weekly Programming. The first three newsletter. volumes already constitute the Good Book for advanced software devotees, selling a million copies around the world in a dozen languages. His approach to code permeates the software culture. And lo, interrupting his calling for nine years, Donald Knuth wandered the wilderness of computer typography, creating a program that has become the Word in digital typesetting for scientific publishing. He called his software TeX, and offered it to all believers, rejecting the attempt by one tribe (Xerox) to assert ownership over its mathematical formulas. “Mathematics belongs to God,” he declared. But Knuth’s God is not above tricks on the faithful. In his TeX guide, The TeXbook, he writes that it “doesn’t always tell the truth” because the “technique of deliberate lying will actually make it easier for you to learn the ideas.” Now intent on completing his scriptures, the 61-year-old Knuth (ka- NOOTH) leads what he calls a hermit-like existence (with his wife) in the hills surrounding the university, having taken early retirement from teaching.
    [Show full text]
  • Gnu Assembler
    Using as The gnu Assembler (Sourcery G++ Lite 2010q1-188) Version 2.19.51 The Free Software Foundation Inc. thanks The Nice Computer Company of Australia for loaning Dean Elsner to write the first (Vax) version of as for Project gnu. The proprietors, management and staff of TNCCA thank FSF for distracting the boss while they gotsome work done. Dean Elsner, Jay Fenlason & friends Using as Edited by Cygnus Support Copyright c 1991, 92, 93, 94, 95, 96, 97, 98, 99, 2000, 2001, 2002, 2006, 2007, 2008, 2009 Free Software Foundation, Inc. Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation License, Version 1.3 or any later version published by the Free Software Foundation; with no Invariant Sections, with no Front-Cover Texts, and with no Back-Cover Texts. A copy of the license is included in the section entitled \GNU Free Documentation License". i Table of Contents 1 Overview :::::::::::::::::::::::::::::::::::::::: 1 1.1 Structure of this Manual :::::::::::::::::::::::::::::::::::::: 14 1.2 The GNU Assembler :::::::::::::::::::::::::::::::::::::::::: 15 1.3 Object File Formats::::::::::::::::::::::::::::::::::::::::::: 15 1.4 Command Line ::::::::::::::::::::::::::::::::::::::::::::::: 15 1.5 Input Files :::::::::::::::::::::::::::::::::::::::::::::::::::: 16 1.6 Output (Object) File:::::::::::::::::::::::::::::::::::::::::: 16 1.7 Error and Warning Messages :::::::::::::::::::::::::::::::::: 16 2 Command-Line Options::::::::::::::::::::::: 19 2.1 Enable Listings: `-a[cdghlns]'
    [Show full text]
  • Donald E. Knuth Papers SC0097
    http://oac.cdlib.org/findaid/ark:/13030/kt2k4035s1 Online items available Guide to the Donald E. Knuth Papers SC0097 Daniel Hartwig & Jenny Johnson Department of Special Collections and University Archives August 2018 Green Library 557 Escondido Mall Stanford 94305-6064 [email protected] URL: http://library.stanford.edu/spc Note This encoded finding aid is compliant with Stanford EAD Best Practice Guidelines, Version 1.0. Guide to the Donald E. Knuth SC00973411 1 Papers SC0097 Language of Material: English Contributing Institution: Department of Special Collections and University Archives Title: Donald E. Knuth papers Creator: Knuth, Donald Ervin, 1938- source: Knuth, Donald Ervin, 1938- Identifier/Call Number: SC0097 Identifier/Call Number: 3411 Physical Description: 39.25 Linear Feet Physical Description: 4.3 gigabyte(s)email files Date (inclusive): 1962-2018 Abstract: Papers reflect his work in the study and teaching of computer programming, computer systems for publishing, and mathematics. Included are correspondence, notes, manuscripts, computer printouts, logbooks, proofs, and galleys pertaining to the computer systems TeX, METAFONT, and Computer Modern; and to his books THE ART OF COMPUTER PROGRAMMING, COMPUTERS & TYPESETTING, CONCRETE MATHEMATICS, THE STANFORD GRAPHBASE, DIGITAL TYPOGRAPHY, SELECTED PAPERS ON ANALYSIS OF ALGORITHMS, MMIXWARE : A RISC COMPUTER FOR THE THIRD MILLENNIUM, and THINGS A COMPUTER SCIENTIST RARELY TALKS ABOUT. Special Collections and University Archives materials are stored offsite and must be paged 36-48 hours in advance. For more information on paging collections, see the department's website: http://library.stanford.edu/depts/spc/spc.html. Immediate Source of Acquisition note Gift of Donald Knuth, 1972, 1980, 1983, 1989, 1996, 1998, 2001, 2014, 2015, 2019.
    [Show full text]
  • Arxiv:1811.04035V1 [Cs.CR] 3 Nov 2018 Generated Random Numbers for Various Purposes
    A Search for Good Pseudo-random Number Generators : Survey and Empirical Studies a a a, Kamalika Bhattacharjee , Krishnendu Maity , Sukanta Das ∗ aDepartment of Information Technology, Indian Institute of Engineering Science and Technology, Shibpur, West Bengal, India 711103 Abstract In today’s world, several applications demand numbers which appear random but are generated by a background algorithm; that is, pseudo-random num- bers. Since late 19th century, researchers have been working on pseudo-random number generators (PRNGs). Several PRNGs continue to develop, each one de- manding to be better than the previous ones. In this scenario, this paper targets to verify the claim of so-called good generators and rank the existing genera- tors based on strong empirical tests in same platforms. To do this, the genre of PRNGs developed so far has been explored and classified into three groups – linear congruential generator based, linear feedback shift register based and cellular automata based. From each group, well-known generators have been chosen for empirical testing. Two types of empirical testing has been done on each PRNG – blind statistical tests with Diehard battery of tests, TestU01 library and NIST statistical test-suite and graphical tests (lattice test and space- time diagram test). Finally, the selected 29 PRNGs are divided into 24 groups and are ranked according to their overall performance in all empirical tests. Keywords: Pseudo-random number generator (PRNG), Diehard, TestU01, NIST, Lattice Test, Space-time Diagram I. Introduction History of human race gives evidence that, since the ancient times, people has arXiv:1811.04035v1 [cs.CR] 3 Nov 2018 generated random numbers for various purposes.
    [Show full text]
  • Proposal for a Tutorial at Iticse 2003 Teaching Computer Science Using MMIX
    Proposal for a tutorial at ITiCSE 2003 Teaching Computer Science Using MMIX Title Teaching Computer Science Using MMIX Organizer Prof. Dr. Heidi Anlauff, Prof. Dr. Axel B¨ottcher, and Prof. Dr. Martin Ruckert Fachhochschule Munc¨ hen Fachbereich Informatik/Mathematik Lothstr. 34 D-80335 Munc¨ hen GERMANY [email protected] +49-89-1265-1601 Category Half-day (three hours) Description Introduction MMIX is the successor of Donald Knuth's famous MIX-processor introduced in \The Art of Computer Programming\. Its clean RISC-design and easy to use tools (as- sembler and simulator) make it extremely suitable for use in introductory computer science courses. For advanced courses in Assembly Programming and Computer Ar- chitecture, a widely configurable pipeline simulator allows the inspection of internal details of a working RISC processor that are usually hidden by high level languages taught today. Furthermore, as MMIX will be a basis for demonstration of the algorithms presen- ted in \The Art of Computer Programming\, a thorough understanding will open the door to that wonderful series of books. Activities Introduction to Architecture and Programming of MMIX: We will present the fundamental architectural concepts of this very cleanly designed RISC machine: Register Set, Instruction Set, and Memory Layout. We will give hints on the critical points when using MMIX in class and share our experiences regarding teaching schedule and sequence of topics. This part includes usage of the assembler mmixal and standard simulator mmix with its built-in debugging features. Student Projects: We report on possible student projects that were tested in practice at our institution covering the basic features of MMIX.
    [Show full text]