Outline. Pipeline, Pipelined datapath Dependences, Hazards. Control Hazards Branch prediction. Structural, Data - Stalling, Forwarding
|
|
- Rolf Maxwell
- 5 years ago
- Views:
Transcription
1 Control Hazard
2 Outline Pipeline, Pipelined datapath Dependences, Hazards Structural, Data - Stalling, Forwarding Control Hazards Branch prediction
3 Control Hazard Arise from the pipelining of branches and other instructions that change the PC
4 Control Hazard Arise from the pipelining of branches and other instructions that change the PC Also called Branch Hazards
5 Branch Evaluation
6 beq beq $1, $1, $3, $3, and and $12, $2, $2, $5 $5 or or $13, $6, $6, $2 $2 add add $14, $2, $2, $2 $ lw lw $4, $4, 50($7) Control Hazard
7 beq Control Hazard beq beq $1, $1, $3, $3, and and $12, $2, $2, $5 $5 or or $13, $6, $6, $2 $2 add add $14, $2, $2, $2 $ lw Time lw $4, $4, 50($7) (clock cycles)
8 Control Hazard beq beq $1, $1, $3, $3, and and $12, $2, $2, $5 $5 or or $13, $6, $6, $2 $2 add add $14, $2, $2, $2 $ lw Time lw $4, $4, 50($7) (clock cycles) beq IF and
9 Control Hazard beq beq $1, $1, $3, $3, and and $12, $2, $2, $5 $5 or or $13, $6, $6, $2 $2 add add $14, $2, $2, $2 $ lw Time lw $4, $4, 50($7) (clock cycles) beq IF ID EX and or IF ID IF
10 beq beq $1, $1, $3, $3, and and $12, $2, $2, $5 $5 or or $13, $6, $6, $2 $2 add add $14, $2, $2, $2 $2 Control Hazard Branch Taken lw Time lw $4, $4, 50($7) (clock cycles) beq IF ID EX and or IF ID IF
11 beq beq $1, $1, $3, $3, and and $12, $2, $2, $5 $5 or or $13, $6, $6, $2 $2 add add $14, $2, $2, $2 $2 Control Hazard NPC Updates lw Time lw $4, $4, 50($7) (clock cycles) beq and IF ID EX MEM IF ID EX or add IF ID IF
12 beq beq $1, $1, $3, $3, and and $12, $2, $2, $5 $5 or or $13, $6, $6, $2 $2 add add $14, $2, $2, $2 $2 Control Hazard NPC Updates lw Time lw $4, $4, 50($7) (clock cycles) beq and IF ID EX MEM IF ID EX or add IF ID IF Insert NOP NOP
13 Control Hazard beq beq $1, $1, $3, $3, and and $12, $2, $2, $5 $5 or or $13, $6, $6, $2 $2 Branch add add $14, $2, $2, $2 target $2 enters the the pipeline lw Time lw $4, $4, 50($7) (clock cycles) beq and or IF ID EX MEM WB IF ID EX MEM IF ID EX add IF ID Target: lw IF
14 Control Hazard beq beq $1, $1, $3, $3, and and $12, $2, $2, $5 $5 or or $13, $6, $6, $2 $2 add add $14, $2, $2, $2 $ lw Time lw $4, $4, 50($7) (clock cycles) beq and or add IF ID EX MEM WB IF ID EX MEM WB IF ID EX MEM IF ID EX Target: lw IF ID Target+1 IF
15 Control Hazard beq beq $1, $1, $3, $3, and and $12, $2, $2, $5 $5 or or $13, $6, $6, $2 $2 add add $14, $2, $2, $2 $ lw Time lw $4, $4, 50($7) (clock cycles) beq IF ID EX MEM WB and IF ID EX MEM WB or IF ID EX MEM WB add IF ID EX MEM WB Target: lw IF ID EX MEM WB Target+1 IF ID EX MEM
16 Control Hazard beq beq $1, $1, $3, $3, and and $12, $2, $2, $5 $5 or or $13, $6, $6, $2 $2 add add $14, $2, $2, $2 $ lw Time lw $4, $4, 50($7) (clock cycles) Target: beq and or add lw IF ID EX MEM WB IF ID EX MEM WB IF ID EX MEM WB IF ID EX MEM WB IF ID EX MEM WB Branch Penalty = 3 cycles
17 Control Hazard Branch evaluation occurs in EX stage. PC updates in MEM stage. Branch target loads in the next cycle The delay in determining the proper instruction to fetch is called a Control Hazard or Branch Hazard.
18 Reducing Pipeline Branch Penalties
19 Reducing Pipeline Branch Penalties Freeze the pipeline
20 Reducing Pipeline Branch Penalties Freeze the pipeline Time (clock cycles) beq nop nop nop lw IF ID EX MEM WB IF ID EX MEM WB IF ID EX MEM WB IF ID EX MEM WB IF ID EX MEM WB
21 Reducing Branch Delay
22 Reducing Branch Delay Most branches rely on simple tests (equality or sign) Move the branch decision up
23 Reducing Branch Delay Most branches rely on simple tests (equality or sign) Move the branch decision up Compute NPC earlier Evaluate branch at the earliest
24 Reducing Branch Delay
25 NPC Reducing Branch Delay
26 Reducing Branch Delay NPC Branch Delay: Delay between Branch instruction fetch and Branch Target fetch of of a taken branch.
27 Branch Delay ADD BEQ SUB... R2, R3,R4 R2, R4, loop R5, R5,R4 Time (clock cycles) ADD BEQ IF ID IF
28 Branch Delay ADD BEQ SUB... R2, R3,R4 R2, R4, loop R5, R5,R4 Time (clock cycles) ADD IF ID EX BEQ IF ID SUB IF
29 Branch Delay ADD BEQ SUB... R2, R3,R4 R2, R4, loop R5, R5,R4 Time (clock cycles) ADD IF ID EX BEQ IF ID SUB IF PC = PC + Offset
30 Branch Delay ADD BEQ SUB... R2, R3,R4 R2, R4, loop R5, R5,R4 Time (clock cycles) ADD IF ID EX MEM BEQ IF ID EX SUB IF NOP ID Branch Target IF
31 Branch Delay ADD BEQ SUB... R2, R3,R4 R2, R4, loop R5, R5,R4 Time (clock cycles) ADD IF ID EX MEM WB BEQ IF ID EX MEM SUB IF NOP ID NOP EX Branch Target IF ID
32 Branch Delay ADD BEQ SUB... R2, R3,R4 R2, R4, loop R5, R5,R4 Time (clock cycles) ADD IF ID EX MEM WB BEQ IF ID EX MEM WB SUB IF NOP ID NOP EX MEM NOP NOP WB Branch Target IF ID EX MEM WB
33 Branch Delay Slot Time (clock cycles) Branch IF ID EX MEM WB Instruction i + 1 Branch Target Branch Target + 1 IF ID EX MEM WB IF ID EX MEM WB IF ID EX MEM WB Branch Delay Slot
34 Branch Hazards Time (clock cycles) Branch IF ID EX MEM WB Instruction i + 1 Branch Target Branch Target + 1 IF ID EX MEM WB IF ID EX MEM WB IF ID EX MEM WB Branch Target IF IF ID EX MEM WB 1 stall cycle for every branch yields a performance loss of 10% to 30%!
35 Example Branch Taken
36
37
38 Branch Evaluation in ID Steps Are beq inputs ready?
39 Branch Evaluation in ID Steps Decode the instruction
40 Branch Evaluation in ID Steps Decode the instruction Decide whether to bypass/forward to the equality unit Forwarding Logic has to be modfied
41 Branch Evaluation in ID Steps Decode the instruction Decide whether to bypass/forward to the equality unit Forwarding Logic has to be modfied Complete the comparison
42 Branch Evaluation in ID Steps Decode the instruction Decide whether to bypass/forward to the equality unit Forwarding Logic has to be modfied Complete the comparison If branch taken, set the PC to the branch target address.
43 Branch Evaluation Forwarding New forwarding logic required Source operands can come from ALU/MEM or MEM/WB add add beq beq $1, $1,$2, $2,$2 $2 $1, $1,$3, $3,28 28
44 Branch Evaluation Forwarding New forwarding logic required Source operands can come from ALU/MEM or MEM/WB If source operands are not ready, data hazard can occur and a stall will be needed add add $1, $1, $2, $2, $2 $2 beq beq $1, $1, $3, $3,
45 Reducing Pipeline Branch Penalties Freeze the pipeline Static Prediction Predict Untaken, Predict Taken Delayed Branch Fill Branch Delay Slot
46 Predict Untaken Scheme Time (clock cycles) Untaken Branch IF ID EX MEM WB Instruction i + 1 Instruction i + 2 Instruction i + 3 IF ID EX MEM WB IF ID EX MEM WB IF ID EX MEM WB
47 Predict Untaken Scheme Time (clock cycles) Untaken Branch IF ID EX MEM WB Instruction i + 1 Instruction i + 2 Instruction i + 3 IF ID EX MEM WB IF ID EX MEM WB IF ID EX MEM WB Time (clock cycles) Taken Branch IF ID EX MEM WB Instruction i + 1 Branch Target Branch Target + 1 IF ID EX MEM WB IF ID EX MEM WB IF ID EX MEM WB
48 Static Prediction Predict Taken
49 Reducing Pipeline Branch Penalties Fill the branch delay slot sll sll srl srl beq beq and and $14, $14,$2, $2,$2 $2 $1, $1,$3, $3,28 28 $12, $12,$2, $2,$5 $5
50 Reducing Pipeline Branch Penalties Fill the branch delay slot sll sll srl srl $14, $14, $2, $2, $2 $2 beq beq $1, $1, $3, $3, and and $12, $12, $2, $2, $5 $ Time (clock cycles) beq srl IF ID EX MEM WB IF ID EX MEM WB branch target IF ID EX MEM WB
51 Branch Delay Slot
52 Branch Delay Slot
53 Branch Delay Slot
54 Branch Delay Slot Predict taken
55 Branch Delay Slot Predict taken
56 Branch Delay Slot Predict taken Predict untaken
57 Static Branch Prediction
58 Static Branch Prediction Reduce mispredictions?
59 Dynamic Branch Prediction 0x0100 0x0100 while(1) {{ for(i=0; i<count; i++) i++) {{ }} BRANCH BRANCH }}
60 Dynamic Branch Prediction 0x0100 0x0100 while(1) {{ for(i=0; i<count; i++) i++) {{ }} BRANCH BRANCH }} BRANCH TARGET BUFFER PC Prediction Target 0x x128 0x x080 0x x Addresses of branches in the program
61 Dynamic Branch Prediction Branch Target Buffer Single bit predictors (1-bit bimodal predictor) Change prediction with branch behaviour No. of wrong predictions? 0x0100 0x0100 while(1) {{ for(i=0; i<count; i++) i++) {{ }} BRANCH BRANCH }} BRANCH TARGET BUFFER PC Prediction Target 0x x128 0x x080 0x x Addresses of branches in the program
62 Dynamic Branch Prediction Branch Target Buffer Single bit predictors (1-bit bimodal predictor) Change prediction with branch behaviour No. of wrong predictions? 0x0100 0x0100 while(1) {{ for(i=0; i<count; i++) i++) {{ }} BRANCH BRANCH }} Branch instruction behaviour T T T T N T T T T T T T T T T T T Wrong Predictions BRANCH TARGET BUFFER PC Prediction Target 0x x128 0x x080 0x x Addresses of branches in the program
63 Dynamic Branch Prediction Branch Target Buffer Single bit predictors (1-bit bimodal predictor) Change prediction with branch behaviour No. of wrong predictions? 0x0100 0x0100 while(1) {{ for(i=0; i<count; i++) i++) {{ }} BRANCH BRANCH }} Branch instruction behaviour T T T T N T T T T T T T T T T T T Wrong Predictions BRANCH TARGET BUFFER PC Prediction Target 0x x128 0x x080 0x x Addresses of branches in the program Can Can we we do do better?
64 Dynamic Branch Prediction 0010 Branch Prediction Bits
65 Dynamic Branch Prediction 2-bit predictors Branch Prediction Bits 2-bit Bimodal Saturating Counter
66 Dynamic Branch Prediction 2-bit predictors Branch Prediction Bits 2-bit Bimodal Saturating Counter
67 Dynamic Branch Prediction 2-bit predictors... T T T N T T T T T T T T...
68 Dynamic Branch Prediction 2-bit predictors... T T T N T T T T T T T T...
69 Dynamic Branch Prediction 2-bit predictors... T T T N T T T T T T T T...
70 Dynamic Branch Prediction 2-bit predictors... T T T N T T T T T T T T...
71 Dynamic Branch Prediction 2-bit predictors... T T T N T T T T T T T T...
72 Dynamic Branch Prediction 2-bit predictors... T T T N T T T T T T T T...
73 Dynamic Branch Prediction 2-bit predictors T T T N T T T T T T T T...
74 Dynamic Branch Prediction n-bit saturating counters
75 Branch Predictors Without Branch Predictor
76 Branch Predictors Without Branch Predictor With With Branch Predictor
77 Dynamic Branch Prediction
78 Dynamic Branch Prediction
79 Observations? Dynamic Branch Prediction
80 Correlating Branch Predictors eqntott code code if (aa == 2) aa = 0; if (bb == 2) bb = 0; if (aa!=bb) {
81 Correlating Branch Predictors eqntott code code if (aa == 2) aa = 0; if (bb == 2) bb = 0; if (aa!=bb) { Outcome of the previous branch X 0010 Branch Prediction Buffer
82 Correlating Branch Predictors eqntott code code if (aa == 2) aa = 0; if (bb == 2) bb = 0; if (aa!=bb) { Two-level predictors (1,2) predictor Outcome of the previous branch X 0010 Branch Prediction Buffer
83 Correlating Branch Predictors eqntott code code if (aa == 2) aa = 0; if (bb == 2) bb = 0; if (aa!=bb) { Two-level predictors (1,2) predictor Outcome of the previous branch X 0010 Branch Prediction Buffer Yeh and Patt, Alternative implementations of two-level adaptive branch prediction, ISCA, 1992.
84 Correlating Branch Predictors if (aa == 2) aa = 0; Outcomes of the previous 2 branches Branch Prediction Buffer if (bb == 2) bb = 0; if (aa!=bb) { XX 0010 A 4096 bit, (2,2) buffer supports how many branch instructions? Yeh and Patt, Alternative implementations of two-level adaptive branch prediction, ISCA, 1992.
85 Correlating Branch Predictors if (aa == 2) aa = 0; Outcomes of the previous 2 branches Branch Prediction Buffer if (bb == 2) bb = 0; if (aa!=bb) { XX 0010 A 4096 bit, (2,2) buffer supports how many branch instructions? (m,n) BPB bits=2 m n No. of prediction entries Yeh and Patt, Alternative implementations of two-level adaptive branch prediction, ISCA, 1992.
86 Correlating Branch Predictors Yeh and Patt, ISCA, 1992.
87 Local Predictors Previous outcomes of the same branch Branch Prediction Buffer XXXXXXXXXX K entries
88 Local Predictors A history of branch behaviour is recorded Previous outcomes of the same branch Branch Prediction Buffer XXXXXXXXXX K entries
89 Local Predictors A history of branch behaviour is recorded One for each possible combination of outcomes for the last n occurrences of this branch Previous outcomes of the same branch Branch Prediction Buffer XXXXXXXXXX K entries
90 Local Predictors Example 0x0100 0x0100 while(1) {{ for(i=0; i<count; i++) i++) {{ }} BRANCH BRANCH }} Branch instruction behaviour T T N T T T T N T T T T N T T
91 Local Predictors Example 0x0100 0x0100 while(1) {{ for(i=0; i<count; i++) i++) {{ }} BRANCH BRANCH }} Branch instruction behaviour T T N T T T T N T T T T N T T Local History Prediction NT NT T T T T T T T T NT NT
92 Tournament Predictors
93 Tournament Predictors Branch PC PC Local predictor Global predictor Predictor Selector Prediction
94 Tournament Predictors Use multiple predictors: Global, local or mix Branch PC PC Local predictor Global predictor Predictor Selector Prediction
95 Tournament Predictors Use multiple predictors: Global, local or mix Combine them with a selector 2 bit saturating counter to select the right predictor for the branch (global vs. local) Branch PC PC Local predictor Global predictor Predictor Selector Prediction
96 Tournament Predictors
97 Outline Pipeline, Pipelined datapath Dependences, Hazards Structural, Data - Stalling, Forwarding Control Hazards Branch prediction
98 Xtra Slides
99 Pipelined vs. Nonpipelined Implementation Ratio of execution times between the two? For 10 6 instructions? Pipelining increases the instruction throughput opposed to individual instruction execution time. IF ID EX MEM WB
100 Throughput of the Pipeline Number of tasks completed in unit time (one second) w=η f f: frequency of operation
101 Efficiency of the Pipeline Percentage of stages accomplishing tasks related to the instruction in execution η= No. of Instructions Instruction Execution Time η= n k+(n 1) n: number of instructions in the program. k: number of pipeline stages
102 Reducing Pipeline Branch Penalties Freeze the pipeline Predict Taken Predict Untaken Fill Branch Delay Slot Time (clock cycles) i BEQ IF ID EX MEM WB i-1 AND IF ID EX MEM WB i+16 Branch Successor IF ID EX MEM WB i+17 Branch Successor + 1 IF ID EX MEM WB
103 Control Hazard Branch Penalty = 3 cycles
104 Branch Prediction Buffer BIMODAL PREDICTOR Branch PC PC A 12 bits Counter Target PC PC Branch PC PC B Two Two different branch PCs PCs may may map map to to the the same same entry entry in in the the BPB BPB Given limited buffer space, how can can one maximize buffer entries while minimizing aliases? entries
105 BPB Global Predictor GLOBAL PREDICTOR Branch PC PC A Counter Target PC PC 10 bits 2 bits Concatenate 12 bits Global History Aliases may may appear entries
106 BPB Aliases GLOBAL PREDICTOR Branch PC PC A 12 bits XOR Counter Target PC PC 12 bits Global History May May reduce aliases entries
107 BPB Local Predictor LOCAL PREDICTOR 12 bits Branch PC PC A Counter Target PC PC 6 bits 12b 12b entries May May reduce aliases entries
108 Control Hazard beq beq $1, $1, $3, $3, and and $12, $2, $2, $5 $5 WRONG!!! or or $13, $6, $6, $2 $2 add add $14, $2, $2, $2 $ lw Time lw $4, $4, 50($7) (clock cycles) beq and or add IF ID EX MEM WB IF ID EX MEM WB IF ID EX MEM IF ID EX Target: lw IF ID Target+1 IF
109 Control Hazard beq beq $1, $1, $3, $3, and and $12, $2, $2, $5 $5 or or $13, $6, $6, $2 $2 add add $14, $2, $2, $2 $ lw Time lw $4, $4, 50($7) (clock cycles) beq IF ID EX MEM WB and IF ID EX MEM WB or IF ID EX MEM WB add IF ID EX MEM WB Target: lw IF ID EX MEM WB Target+1 IF ID EX MEM
110 Early Branch Evaluation Evaluate branch at the earliest beq beq $1, $1, $3, $3, When are the source operands available? After Register Read
111 BPB Local Predictor LOCAL PREDICTOR Branch PC PC A Counter Target PC PC 6 bits 12b 12b entries entries
Outline Pipeline, Pipelined datapath Dependences, Hazards Structural, Data - Stalling, Forwarding Control Hazards Branch prediction
Control Hazard Outline Pipeline, Pipelined datapath Dependences, Hazards Structural, Data - Stalling, Forwarding Control Hazards Branch prediction Control Hazard Arise from the pipelining of branches and
More informationConsider executing this sequence of instructions in the pipeline:
Branch Hazards Handling Branches 1 Consider executing this sequence of instructions in the pipeline: address instruction ---------------------------- Issue: 36: sub $10, $4, $8 40: beq $1, $3, 72 44: and
More informationControl Hazards. EE 457 Unit 6c. Option 1: Stalling. An Opening Example. Control Hazards
Hazas EE 7 6c Hazas (branch) hazas are named such because they deal with issues related to program control instructions (branch, jump, subroutine call, etc) There is some delay in determining a branch
More informationComputer Architecture ELEC2401 & ELEC3441
Last Time Pipeline Computer Architecture ELEC2401 & ELEC3441 Lecture 6 Pipelining (2) Dr. Hayden Kwok-Hay So Department of Electrical and Electronic Engineering Structural Control n On every cycle, the
More informationEE457 Lab 6 Design of a Pipelined CPU Lab 6 Part 4 Questions 10/29/2006. Lecture by Gandhi Puvvada. University of Southern California
EE45 Lab 6 Design of a Pipelined CPU Lab 6 Part 4 Questions 0/29/06 Lecture by Gandhi Puvvada University of Southern California 0/29/06 / 32 C Copyright 06 Gandhi Puvvada Thanks to Ray Madani and Binh
More informationFlorida State University Libraries
Florida State University Libraries Electronic Theses, Treatises and Dissertations The Graduate School 2008 Historical Study of the Development of Branch Predictors Yuval Peress Follow this and additional
More informationAn Analysis of Correlation and Predictability: What Makes Two-Level Branch Predictors Work
An Analysis of Correlation and Predictability: What Makes Two-Level Branch Predictors Work Marius Evers Sanjay J. Patel Robert S. Chappell Yale N. Patt Department of Electrical Engineering and Computer
More informationChapter 8 Multioperand Addition
Chapter 8 Multioperand Addition Using Two-Operand Adders Carry-Save Adders Wallace and Dadda Trees Parallel Counters Generalized Parallel Counters Adding Multiple Signed Numbers Ch 8. Multioperand Addition
More informationConfidence Estimation for Speculation Control
Confidence Estimation for Speculation Control Dirk Grunwald and Artur Klauser Department of Computer Science Campus Box 430 University of Colorado Boulder, CO 80309 fgrunwald,klauserg@cs.colorado.edu Srilatha
More informationAbstract. 1 Introduction
Composite Confidence Estimators for Enhanced Speculation Control Daniel A. Jiménez Calvin Lin Department of Computer Sciences The University of Texas at Austin Austin, TX 78712 djimenez,lin @cs.utexas.edu
More informationInstruction latencies and throughput for AMD and Intel x86 processors
Instruction latencies and throughput for AMD and Intel x86 processors Torbjörn Granlund 2017-04-24 13:20Z Copyright Torbjörn Granlund 2005 2017. Verbatim copying and distribution of this entire article
More informationKINGS COLLEGE OF ENGINEERING DEPARTMENT OF MECHANICAL ENGINEERING QUESTION BANK. Subject Name: ELECTRONICS AND MICRIPROCESSORS UNIT I
KINGS COLLEGE OF ENGINEERING DEPARTMENT OF MECHANICAL ENGINEERING QUESTION BANK Subject Name: ELECTRONICS AND MICRIPROCESSORS UNIT I Year/Sem:II / IV PART-A(2 MARKS) SEMICONDUCTORS AND RECTIFIERS 1. What
More informationInterrupts in Detail. A hardware and software look at interrupts
Interrupts in Detail A hardware and software look at interrupts Blackfin MASKS and Latches Same hardware in concept as previous slides The standard instruction cycle RESET THE PROCESSOR RESET* (ACTIVE
More informationConfidence Estimation for Speculation Control
Confidence Estimation for Speculation Control Dirk Grunwald and Artur Klauser Department of Computer Science Campus Box 430 University of Colorado Boulder, CO 80309 grunwald,klauser @cs.colorado.edu Srilatha
More informationReducing Power Requirements of Instruction Scheduling Through Dynamic Allocation of Multiple Datapath Resources*
Reducing Power Requirements of Instruction Scheduling Through Dynamic Allocation of Multiple Datapath Resources* Dmitry Ponomarev, Gurhan Kucuk, Kanad Ghose Department of Computer Science State University
More informationThe Significance of Affectors and Affectees Correlations for Branch Prediction
he Significance of Affectors and Affectees Correlations for Branch Prediction Yiannakis Sazeides 1, Andreas Moustakas 2,, Kypros Constantinides 2,, and Marios Kleanthous 1 1 University of Cyprus, icosia,
More informationImproving Branch Prediction by considering Affectors and Affectees Correlations
Improving Branch Prediction by considering Affectors and Affectees Correlations Yiannakis Sazeides 1, Andreas Moustakas 2,, Kypros Constantinides 2,, and Marios Kleanthous 1 1 University of Cyprus, Nicosia,
More informationAdaptive Mode Control: A Static-Power-Efficient Cache Design
Adaptive Mode Control: A Static-Power-Efficient Cache Design Huiyang Zhou, Mark Toburen, Eric Rotenberg, Tom Conte Center for Embedded Systems Research (CESR) Department of Electrical & Computer Engineering
More informationMultiCycle MIPS. Motivation
lticycle IPS otivation New path von Nemann instrction cycle Revisiting instrctions State diagram of processor Galen Sasaki EE 6 University of Hawaii otivation Instrctions take variable amont of processing,
More informationLogic Model. When do you create a Logic Model? Create your LM at the beginning of an evaluation and review and update it periodically.
RRC Evaluation Tool Basket: Logic Model 1 Logic Model What is a Logic Model? A logic model is a series of if-then statements that outlines what you expect to happen in your program. For example, If these
More informationCHAPTER 4 CONTENT LECTURE 1 November :28 AM
CHAPTER 4 By Radu Muresan University of Guelph Page 1 CHAPTER 4 CONTENT LECTURE 1 November 07 12 10:28 AM UNIPROCESSOR SCHEDULING Real Time Task Model Concepts Types of Real Time Tasks and Their Characteristics
More informationDräger Alcotest 8610
Dräger Alcotest 8610 The Dräger Alcotest 8610 Kit includes the Dräger Alcotest 7510, encased with the Dräger Mobile Printer, keyboard, mag card reader, mouthpieces, batteries, and printer paper. The Alcotest
More informationSNJB College of Engineering Department of Computer Engineering
1. Intel s programmable device (8253) facilitates the generation of accurate time delays. a) counter b) timer c) both a & b d) none of these 2. The programmable timer device (8253) contains three independent
More informationRational Agents (Ch. 2)
Rational Agents (Ch. 2) Extra credit! Occasionally we will have in-class activities for extra credit (+3%) You do not need to have a full or correct answer to get credit, but you do need to attempt the
More informationOECD QSAR Toolbox v.4.2. An example illustrating RAAF scenario 6 and related assessment elements
OECD QSAR Toolbox v.4.2 An example illustrating RAAF scenario 6 and related assessment elements Outlook Background Objectives Specific Aims Read Across Assessment Framework (RAAF) The exercise Workflow
More informationDräger Alcotest Hard protective case Robust and weatherproof. All case components power on when the case is opened.
Dräger Alcotest 8610 The Dräger Alcotest 8610 Kit includes the Dräger Alcotest 7510, encased with the Dräger Mobile Printer, keyboard, mag card reader, mouthpieces, batteries, and printer paper. The Alcotest
More information40 GbE and 100 GbE PCS Considerations Key Questions to be Answered concerning OTN mapping for MLD (CTBI) architecture
40 GbE and 100 GbE PCS Considerations Key Questions to be Answered concerning OTN mapping for MLD (CTBI) architecture Stephen J. Trowbridge Alcatel-Lucent 40 GbE and 100 GbE PCS considerations Supporters
More informationFully Automated IFA Processor LIS User Manual
Fully Automated IFA Processor LIS User Manual Unless expressly authorized, forwarding and duplication of this document is not permitted. All rights reserved. TABLE OF CONTENTS 1 OVERVIEW... 4 2 LIS SCREEN...
More informationPost-Silicon Bug Diagnosis with Inconsistent Executions
Post-Silicon Bug Diagnosis with Inconsistent Executions Andrew DeOrio Daya Shanker Khudia Valeria Bertacco University of Michigan ICCAD 11 9 November 2011 Functional bugs 17 Jan 1995 Electrical failures
More informationRational Agents (Ch. 2)
Rational Agents (Ch. 2) Rational agent An agent/robot must be able to perceive and interact with the environment A rational agent is one that always takes the best action (possibly expected best) Agent
More informationADVANCED VBA FOR PROJECT FINANCE Near Future Ltd. Registration no
ADVANCED VBA FOR PROJECT FINANCE f i n a n c i a l f o r e c a s t i n G 2017 Near Future Ltd. Registration no. 10321258 www.nearfuturefinance.com info@nearfuturefinance.com COURSE OVERVIEW This course
More informationIntelligent Agents. Soleymani. Artificial Intelligence: A Modern Approach, Chapter 2
Intelligent Agents CE417: Introduction to Artificial Intelligence Sharif University of Technology Spring 2016 Soleymani Artificial Intelligence: A Modern Approach, Chapter 2 Outline Agents and environments
More informationInstitutional Review Boards and Human Subjects Protection
Institutional Review Boards and Human Subjects Protection Professor Ron Fricker! Naval Postgraduate School! Monterey, California! 6/25/12 1 Goals for this Lecture! A nasty little bit of history! The Belmont
More informationSporting Capital Resource Sheet 1 1 Sporting Capital what is it and why is it important to sports policy and practice?
Sporting Capital Resource Sheet 1 1 Sporting Capital what is it and why is it important to sports policy and practice? Introduction This Resource Sheet i introduces a new theory of Sporting Capital and
More informationEnhancing LTP-Driven Cache Management Using Reuse Distance Information
Journal of Instruction-Level Parallelism 11 (2009) 1-24 Submitted 10/08; published 4/09 Enhancing LTP-Driven Cache Management Using Reuse Distance Information Wanli Liu Donald Yeung Department of Electrical
More informationSection 2 8. Section 2. Instructions How To Get The Most From This Program Dr. Larry Van Such.
Section 2 8 Section 2 Instructions How To Get The Most From This Program Section 2 9 INSTRUCTIONS To ensure the greatest amount of your success with this program please read through this section very carefully
More informationAUTOMATED DEBUGGING. Session Leader: Zongxu Mu
AUTOMATED DEBUGGING Session Leader: Zongxu Mu THE FIRST COMPUTER BUG Source: https://plus.google.com/107048744275438760860/posts/twfceqadsld 10/22/2013 Automated Debugging - Zongxu Mu 2 A RANDOM COMPUTER
More informationUNIVERSITY of PENNSYLVANIA CIS 520: Machine Learning Midterm, 2016
UNIVERSITY of PENNSYLVANIA CIS 520: Machine Learning Midterm, 2016 Exam policy: This exam allows one one-page, two-sided cheat sheet; No other materials. Time: 80 minutes. Be sure to write your name and
More informationDATE 2006 Session 5B: Timing and Noise Analysis
DATE 2006 Session 5B: Timing and Noise Analysis Bus Stuttering : An Encoding Technique To Reduce Inductive Noise In Off-Chip Data Transmission Authors: Brock J. LaMeres, Agilent Technologies Sunil P. Khatri,
More informationA Better World for Women: Moving Forward
A Better World for Women: Moving Forward 2 0 0 5-2 0 1 0 WOLD FO WOMEN: MOVING FOWAD 2005-2010 Published by: Province of New Brunswick P.O. Box 6000 Fredericton NB E3B 5H1 CANADA ISBN 1-55396-600-7 Printed
More informationReport on the Transplantation Transmission Sentinel Network (TTSN)
Report on the Transplantation Transmission Sentinel Network (TTSN) CATB Session - AATB s 31st Annual Meeting, Boston September 15, 2007 Scott Brubaker, CTBS AATB Representative, TTSN Advisory Group TTSN
More informationAgents. This course is about designing intelligent agents Agents and environments. Rationality. The vacuum-cleaner world
This course is about designing intelligent agents and environments Rationality The vacuum-cleaner world The concept of rational behavior. Environment types Agent types 1 An agent is an entity that perceives
More informationAUDIT OUTLINE INFORMATION SUMMARY
AUDIT OUTLINE INFORMATION SUMMARY 1. External QA Each DAFNE centre will undergo an external audit visit every 3 years. The external audit visit will take place during a week that the centre being audited
More informationLECTURE 5: REACTIVE AND HYBRID ARCHITECTURES
Reactive Architectures LECTURE 5: REACTIVE AND HYBRID ARCHITECTURES An Introduction to MultiAgent Systems http://www.csc.liv.ac.uk/~mjw/pubs/imas There are many unsolved (some would say insoluble) problems
More informationUnderstanding Models (chapter 1) Information (chapter 2)
Understanding Models (chapter 1) Information (chapter 2) 2 Healthcare is based on concepts about Human body Disease Treatment Nature--plants, chemicals, physics Ideas from observation of the physical world
More informationIntelligent Agents. BBM 405 Fundamentals of Artificial Intelligence Pinar Duygulu Hacettepe University. Slides are mostly adapted from AIMA
1 Intelligent Agents BBM 405 Fundamentals of Artificial Intelligence Pinar Duygulu Hacettepe University Slides are mostly adapted from AIMA Outline 2 Agents and environments Rationality PEAS (Performance
More informationEnhancing LTP-Driven Cache Management Using Reuse Distance Information
University of Maryland Technical Report UMIACS-TR-2007-33 Enhancing LTP-Driven Cache Management Using Reuse Distance Information Wanli Liu and Donald Yeung Department of Electrical and Computer Engineering
More informationVoice Switch Manual. InvoTek, Inc Riverview Drive Alma, AR USA (479)
Voice Switch Manual InvoTek, Inc. 1026 Riverview Drive Alma, AR 72921 USA (479) 632-4166 www.invotek.org info@invotek.org Voice Switch DESCRIPTION OF FUNCTION The Voice Switch is designed to provide a
More informationMRSH-MEM: Approximate Matching on Raw Memory Dumps
Lorenz Liebler MRSH-MEM / IMF 218 - Hamburg, 218-5-8 1/31 MRSH-MEM: Approximate Matching on Raw Memory Dumps Lorenz Liebler, Frank Breitinger University of Applied Sciences University of New Haven Darmstadt,
More informationChapter 25. Paired Samples and Blocks. Copyright 2010 Pearson Education, Inc.
Chapter 25 Paired Samples and Blocks Copyright 2010 Pearson Education, Inc. Paired Data Data are paired when the observations are collected in pairs or the observations in one group are naturally related
More informationCourse Syllabus. Operating Systems, Spring 2016, Meni Adler, Danny Hendler and Amnon Meisels 1 3/14/2016
Course Syllabus. Introduction - History; Views; Concepts; Structure 2. Process Management - Processes; State + Resources; Threads; Unix implementation of Processes 3. Scheduling Paradigms; Unix; Modeling
More informationDiagnosis via Model Based Reasoning
Diagnosis via Model Based Reasoning 1 Introduction: Artificial Intelligence and Model Based Diagnosis 1.1 Diagnosis via model based reasoning 1.2 The diagnosis Task: different approaches Davies example
More informationAI: Intelligent Agents. Chapter 2
AI: Intelligent Agents Chapter 2 Outline Agents and environments Rationality PEAS (Performance measure, Environment, Actuators, Sensors) Environment types Agent types Agents An agent is anything
More informationBiosecurity Logical, Implementable Biosecurity Plans for Horseshows
Biosecurity Logical, Implementable Biosecurity Plans for Horseshows Dr. Katie Flynn California Department of Food and Agriculture Animal Health Branch The Perfect Storm at a Show Entry and Movement of
More informationVIEW AS Fit Page! PRESS PgDn to advance slides!
VIEW AS Fit Page! PRESS PgDn to advance slides! UNDERSTAND REALIZE CHANGE WHY??? CHANGE THE PROCESSES OF YOUR BUSINESS CONNECTING the DOTS Customer Focus (W s) Customer Focused Metrics Customer Focused
More informationAutomatic Fault Tree Derivation from Little-JIL Process Definitions
Automatic Fault Tree Derivation from Little-JIL Process Definitions Bin Chen, George S. Avrunin, Lori A. Clarke, and Leon J. Osterweil Laboratory for Advanced Software Engineering Research (LASER) University
More informationEnhancing Regulators Confidence in your Quality Risk Management Work Products
Enhancing Regulators Confidence in your Quality Risk Management Work Products Stephen Reich Quality Systems Director Pfizer Andover PDA New England Meeting Burlington, MA November 14, 2012 Background Today
More informationTrio Motion Technology Ltd. Shannon Way, Tewkesbury, Gloucestershire. GL20 8ND United Kingdom Tel: +44 (0) Fax: +44 (0)
www.triomotion.com Trio Motion Technology Ltd. Shannon Way, Tewkesbury, Gloucestershire. GL20 8ND United Kingdom Tel: +44 (0)1684 292333 Fax: +44 (0)1684 297929 1000 Gamma Drive Suite 206 Pittsburgh, PA
More informationModeling Sentiment with Ridge Regression
Modeling Sentiment with Ridge Regression Luke Segars 2/20/2012 The goal of this project was to generate a linear sentiment model for classifying Amazon book reviews according to their star rank. More generally,
More informationin North East Lincolnshire Care Trust Plus Implementation Plan Executive Summary
North East Lincolnshire Care Trust Plus Living Well with Dementia in North East Lincolnshire Implementation Plan 2011-2014 Executive Summary Our vision is for all Individuals with Dementia and their carers
More informationGENETICS - CLUTCH CH.2 MENDEL'S LAWS OF INHERITANCE.
!! www.clutchprep.com CONCEPT: MENDELS EXPERIMENTS AND LAWS Mendel s Experiments Gregor Mendel was an Austrian monk who studied Genetics using pea plants Mendel used pure lines meaning that all offspring
More informationSystem. Humeral Nail. Surgical Technique
System Humeral Nail Surgical Technique Contents IMPLANT FEATURES 2 1. INDICATIONS 3 2. PRE-OPERATIVE PLANNING 3 3. PATIENT POSITIONING & FRACTURE REDUCTION 3 4. INCISION 4 5. ENTRY POINT 4-6 6. PROXIMAL
More informationPrincess Nora University Faculty of Computer & Information Systems ARTIFICIAL INTELLIGENCE (CS 370D) Computer Science Department
Princess Nora University Faculty of Computer & Information Systems 1 ARTIFICIAL INTELLIGENCE (CS 370D) Computer Science Department (CHAPTER-3) INTELLIGENT AGENTS (Course coordinator) CHAPTER OUTLINE What
More informationPoint of Care testing refers to all laboratory testing that is done outside of the walls of the clinical laboratory in the proximity of the patient.
1 2 Point of Care testing refers to all laboratory testing that is done outside of the walls of the clinical laboratory in the proximity of the patient. All such tests are considered lab tests and are
More informationOther Major Component Inspection II
Other Major Component Inspection II Ultrasonic Inspection Technique for BWR Shroud Support Plate Access Hole Covers S.W. Glass III, B. Thigpen, Areva, France BACKGROUND Access hole covers (AHC) are found
More informationIntelligent Agents. CmpE 540 Principles of Artificial Intelligence
CmpE 540 Principles of Artificial Intelligence Intelligent Agents Pınar Yolum pinar.yolum@boun.edu.tr Department of Computer Engineering Boğaziçi University 1 Chapter 2 (Based mostly on the course slides
More informationForward Error Control System Performance of Maximum Free Distance Convolutional Codes with Different Modulation Schemes
International Journal of New Technology and Research (IJNTR) Forward Error Control System Performance of Maximum Free Distance Convolutional Codes with Different Modulation Schemes MSC. Amjad Ali Jassim,
More informationQB365 Important Questions - Principles of Inheritance and Variation
QB36 Important Questions - Principles of Inheritance and Variation th Standard CBSE Biology Reg.No. : Time : 0:00:00 Hrs Section - A ) Heterozygous purple flower is crossed with recessive white flower.
More informationGenes and Inheritance (11-12)
Genes and Inheritance (11-12) You are a unique combination of your two parents We all have two copies of each gene (one maternal and one paternal) Gametes produced via meiosis contain only one copy of
More informationAgents and Environments
Agents and Environments Berlin Chen 2004 Reference: 1. S. Russell and P. Norvig. Artificial Intelligence: A Modern Approach. Chapter 2 AI 2004 Berlin Chen 1 What is an Agent An agent interacts with its
More informationDräger Alcotest Handheld Product Suite
Dräger Alcotest Handheld Product Suite D-7404-2014 Roadside alcohol testing can be challenging and unpredictable. That s why Dräger designed Alcotest handheld breath testers to be accurate and easy to
More informationAbout This Chapter. Skeletal muscle Mechanics of body movement Smooth muscle Cardiac muscle Pearson Education, Inc.
About This Chapter Skeletal muscle Mechanics of body movement Smooth muscle Cardiac muscle Skeletal Muscle Usually attached to bones by tendons Origin: closest to the trunk or to more stationary bone Insertion:
More informationINTERTAN Nails Geared for Stability
Geared for stability The TRIGEN INTERTAN nail brings advanced TRIGEN nail technology to hip fractures. With a unique integrated, interlocking screw construct, TRIGEN INTERTAN nail provides all the benefits
More information- Conduct effective follow up visits when missing children return home ensuring intelligence is shared with appropriate partners.
Job title: Grade: Role code: Status: Main responsibilities: Missing and Child Exploitation PCSO Grade D SDV027 Police Staff Main purpose of the role: Conduct enquiries to locate missing children as directed
More informationTIMS Lab 1: Phase-Locked Loop
TIMS Lab 1: Phase-Locked Loop Modules: VCO, Multiplier, Quadrature Utilities, Wideband True RMS Meter, Tuneable LPF, Digital Utilities, Noise Generator, Speech, Headphones 0 Pre-Laboratory Reading Phase-locked
More informationThe knowledge and skills involved in clinical audit
The knowledge and skills involved in clinical A list of possible knowledge and skills related to clinical is in the box. Knowledge and skills involved in clinical Knowledge Skills The clinical process
More informationCnvlutin: Ineffectual-Neuron-Free Deep Neural Network Computing
Cnvlutin: Ineffectual--Free Deep Neural Network Computing Jorge Albericio 1 Patrick Judd 1 Tayler Hetherington 2 Tor Aamodt 2 Natalie Enright Jerger 1 Andreas Moshovos 1 1 University of Toronto 2 University
More informationChapter 2: Intelligent Agents
Chapter 2: Intelligent Agents Outline Last class, introduced AI and rational agent Today s class, focus on intelligent agents Agent and environments Nature of environments influences agent design Basic
More informationData processing software for TGI/TGE series
1/19 1. Overview Used with TGI or TGE series tensile and compression testing machines, the software enables efficient static strength testing in single tests, cyclical tests, or controlled (customized)
More informationImplications of Longitudinal Data in Machine Learning for Medicine and Epidemiology
Implications of Longitudinal Data in Machine Learning for Medicine and Epidemiology Billy Heung Wing Chang, Yanxian Chen, Mingguang He Zhongshan Ophthalmic Center, Sun Yat-sen University Biostatistics
More informationFoundations of software engineering
Foundations of software engineering Test Driven Development Dr. Julie Greensmith G51 Overview Test Driven Development in Context A recap of XP and Agile development Test First Design What it is and what
More informationPocket Reference Chart
Pocket Reference Chart Rings and Plates Half Rings (SST) Internal 10-1317 80 mm Internal 10-1300 100 mm 10-1301 110 mm 10-1306 160 mm 10-1302 120 mm 10-1307 180 mm 10-1303 130 mm 10-1308 200 mm 10-1304
More informationAnalog Devices Welcomes Hittite Microwave Corporation NO CONTENT ON THE ATTACHED DOCUMENT HAS CHANGED
Analog Devices Welcomes Hittite Microwave Corporation NO CONTENT ON THE ATTACHED DOCUMENT HAS CHANGED www.analog.com www.hittite.com THIS PAGE INTENTIONALLY LEFT BLANK Frequency Hopping with Hittite PLLVCOs
More informationCS 771 Artificial Intelligence. Intelligent Agents
CS 771 Artificial Intelligence Intelligent Agents What is AI? Views of AI fall into four categories 1. Thinking humanly 2. Acting humanly 3. Thinking rationally 4. Acting rationally Acting/Thinking Humanly/Rationally
More informationCopyright Strengthworks International Publishing. All rights are reserved. Updated
Copyright 2016. Strengthworks International Publishing. All rights are reserved. Updated 03.21.16 THE V-TAPER SOLUTION FINAL PHASE SUPPLEMENT GUIDE By Brad Pilon 2 The V-Taper Solution THE V-TAPER SOLUTION
More informationScalable PLC AC500 Communication AC500 PROFIBUS DP S500- I/Os Basic module
Scalable PLC AC500 Communication AC500 PROFIBUS DP S500- I/Os Basic module Contents PROFIBUS: General Information Configuration with PS501 Configuration with SYCON.net: PROFIBUS Master Configuration with
More informationEnhancing Glenoid Placement. Bigliani/Flatow The Complete Shoulder Solution Cannulated Instruments Surgical Technique
Enhancing Glenoid Placement Bigliani/Flatow The Complete Shoulder Solution Cannulated Instruments Surgical Technique Bigliani/Flatow The Complete Shoulder Solution Cannulated Instruments 11 Bigliani/Flatow
More informationSUB-REGIONAL SEMINAR: THE ROLE OF RESEARCH IN
SUB-REGIONAL SEMINAR: THE ROLE OF RESEARCH IN THE DEVELOPMENT OF EFFECTIVE POLICY IN THE FIELD OF DRUG ABUSE PREVENTION GROUP #3 School based prevention in Barbados, Jamaica and Trinidad & Tobago: From
More informationProgress Report. Flood Hazard Mapping in Thailand
Progress Report Flood Hazard Mapping in Thailand Prepared By: Mr. Somchit Amnatsan Chief of Water management Branch Regional Irrigation Office 2 Royal Irrigation Department THAILAND E-mail: somnatsan@yahoo.com,
More information2010 University of South Africa. All rights reserved. Printed and published by the University of South Africa Muckleneuk, Pretoria PYC1501/1/
2010 University of South Africa All rights reserved Printed and published by the University of South Africa Muckleneuk, Pretoria PYC1501/1/2011 2012 98624660 InDesign WORKBOOK-Style Contents Study programme
More informationWINSTA-R. Distal Radius System
Distal Radius System Table of Contents Introduction WINSTA-R System 2 Indication 2 Surgical Technique Palmar Access for Radius Plate 3 Dorsal Access for Radius Plate 3 Positioning of the Radius Plate
More informationDosimeter Setting Device
Instruction Manual Dosimeter Setting Device For Electronic Personal Dosimeter Dose-i (Unit:Sv, Version:1.05 English) WTA529748 a 1 / 38 Foreword Thank you for purchasing the Dosimeter Setting Device; a
More informationOpen Range Software, LLC
Comprehensive Tracking System CTS User Manual CTS IH/Medical Surveillance Interface Open Range Software, LLC Revised: 09/04/2013 CONTENTS Introduction...3 WHAT IS THE CTS IH/MEDICAL SURVEILLANCE INTERFACE?...3
More informationPOTENTIAL FOR MERGER: THE BRAIN TUMOUR CHARITY SECTOR
POTENTIAL FOR MERGER: THE BRAIN TUMOUR CHARITY SECTOR The brain tumour charity landscape is moving from fragmentation to greater coordination Brain tumour charities support people who have or had brain
More informationDesign Methodology for Fine-Grained Leakage Control in MTCMOS
Abstract Design Methodology for Fine-Grained Leakage Control in MTCMOS Benton H. Calhoun, Frank A. Honore, and Anantha Chandrakasan Massachusetts Institute of Technology, Cambridge, MA, 239 {bcalhoun,honore,anantha}@mtl.mit.edu
More information22c:145 Artificial Intelligence
22c:145 Artificial Intelligence Fall 2005 Intelligent Agents Cesare Tinelli The University of Iowa Copyright 2001-05 Cesare Tinelli and Hantao Zhang. a a These notes are copyrighted material and may not
More informationEPON over Coax. TDD Open Items and Checklist. Steve Shellhammer and Andrea Garavaglia (Qualcomm)
TDD Open Items and Checklist Steve Shellhammer and Andrea Garavaglia (Qualcomm) 1 Abstract This presentation is for program management of the TDD sub-task Force It captures all the items that need to be
More informationA SAS sy Study of ediary Data
A SAS sy Study of ediary Data ABSTRACT PharmaSUG 2017 - Paper BB14 A SAS sy Study of ediary Data Amie Bissonett, inventiv Health Clinical, Minneapolis, MN Many sponsors are using electronic diaries (ediaries)
More informationCOMPONENTS OF FITNESS
COMPONENTS OF FITNESS CV Endurance: the ability of the heart, lung, and blood vessels to deliver adequate amount of O2 to working cells to meet the demand of prolonged exercise. Muscular Strength: the
More informationVLSI Design, Fall Design of Adders Design of Adders. Jacob Abraham
8. Design of Adders 1 8. Design of Adders Jacob Abraham Department of Electrical and Computer Engineering The University of Texas at Austin VLSI Design Fall 2017 September 27, 2017 ECE Department, University
More information