Power Aware Techniques: Extensions to ISAs
نویسنده
چکیده
Mobile computing is heavily dependent on battery life. Although circuit designs already take advantage of microelectronics and microarchitecture-level optimization techniques, device longevity can be further extended through energy aware compilation techniques. This communication gives an overview of software-based power aware techniques, namely re-starters to make temporary processor state visible to software without clogging hardware exception management, exposed bypass latches to manage register file traffic and tag-unchecked loads and stores to improve cache access
منابع مشابه
Comparison of three different staining methods for the morphometric characterization of Alpaca (Vicugna pacos) sperm, using ISAS® CASA-Morph system
Sperm morphometry is a part of the semen analysis based on CASA technology and has shown a big role in the prediction of male fertility. This analysis implies the use of stain techniques, although it has been shown that staining can make dramatic changes in the cell morphometry in different species. The aim of the present work was to evaluate the differences in sperm morphometry in Alpaca, intr...
متن کاملDSP Extensions to the TRIPS ISA
In this paper, we propose a set of DSP extensions to the TRIPS ISA and evaluate their performance. By extending the TRIPS ISA with specialized DSP instructions, we offer an explorative look at the interaction conventional specialization techniques (such as SIMD instructions) have with EDGE ISAs. We discuss the implementation and its feasibility and provide non-intrusive compiler support through...
متن کاملEIDA: An Energy-Intrusion aware Data Aggregation Technique for Wireless Sensor Networks
Energy consumption is considered as a critical issue in wireless sensor networks (WSNs). Batteries of sensor nodes have limited power supply which in turn limits services and applications that can be supported by them. An efcient solution to improve energy consumption and even trafc in WSNs is Data Aggregation (DA) that can reduce the number of transmissions. Two main challenges for DA are: (i)...
متن کاملDistance-Aware Beamforming for Multiuser Secure Communication Systems
Typical cryptography schemes are not well suited for low complexity types of equipment, e.g., Internet of things (IoT) devices, as they may need high power or impose high computational complexity on the device. Physical (PHY) layer security techniques such as beamforming (in multiple antennas systems) are possible alternatives to provide security for such applications. In this paper, we consid...
متن کاملInternet-based Collaborative Software Development using Microsoft Tools
This paper describes solutions for distributed software project management, focusing on tools and techniques for effective project communication. Microsoft’s Internet collaboration tools are used for software development and to monitor and control project progress. Student programmers and supervisors at different physical locations collaborated to produce add-on tools for the Microsoft Office S...
متن کامل