614 research outputs found

    Analysis of memory use for improved design and compile-time allocation of local memory

    Get PDF
    Trace analysis techniques are used to study memory referencing behavior for the purpose of designing local memories and determining how to allocate them for data and instructions. In an attempt to assess the inherent behavior of the source code, the trace analysis system described here reduced the effects of the compiler and host architecture on the trace by using a technical called flattening. The variables in the trace, their associated single-assignment values, and references are histogrammed on the basis of various parameters describing memory referencing behavior. Bounds are developed specifying the amount of memory space required to store all live values in a particular histogram class. The reduction achieved in main memory traffic by allocating local memory is specified for each class

    Efficient computation of matched solutions of the Kapchinskij-Vladimirskij envelope equations for periodic focusing lattices

    Full text link
    A new iterative method is developed to numerically calculate the periodic, matched beam envelope solution of the coupled Kapchinskij-Vladimirskij (KV) equations describing the transverse evolution of a beam in a periodic, linear focusing lattice of arbitrary complexity. Implementation of the method is straightforward. It is highly convergent and can be applied to all usual parameterizations of the matched envelope solutions. The method is applicable to all classes of linear focusing lattices without skew couplings, and also applies to all physically achievable system parameters -- including where the matched beam envelope is strongly unstable. Example applications are presented for periodic solenoidal and quadrupole focusing lattices. Convergence properties are summarized over a wide range of system parameters.Comment: 20 pages, 5 figures, Mathematica source code provide

    Flexible Timing Simulation of Multiple-Cache Configurations

    Get PDF
    Abstract As the gap between processor and memory speeds increases, cache performance becomes more critical to overall system performance. Behavioral cache simulation is typically used early in the design cycle of new processor/cache configurations to determine the performance of proposed cache configurations on target workloads. However, behavioral cache simulation does not account for the latency seen by each memory access. The Latency-Effects (LE) cache model presented in this paper accounts this nominal latency as well as the additional latencies due to trailing-edge effects, bus width considerations, port conflicts, and the number of outstanding accesses that a cache allows before it blocks. We also extend the LE cache model to handle the latency effects of moving data among multiple caches. mlcache, a new, easily configurable and extensible tool, has been built based on the extended LE model. We show the use of mlcache in estimating the performance of traditional and novel cache configurations, including odd/even, 2-level, Assist, Victim, and NTS caches. We also show how the LE cache timing model provides more useful, realistic performance estimates than other possible behavioral-level cache timing models. Keywords: cache timing simulation model evaluation Introduction Cache performance becomes ever more critical to overall system performance as the gap between processor and memory speed increases. The performance of a particular cache configuration depends not only on the miss ratio incurred during the execution of a particular workload but also on where in the program's execution the misses occur and the latency of each miss. However, useful timing simulation of caches is typically unavailable until late in the design stage. Using today's behavioral simulators, simple, traditional caches are evaluated early in the design cycle; however, novel cache designs are often not considered since they are difficult to model. The issue of providing more useful cache timing simulation analysis early in the design cycle has been addressed by the Latency-Effects (LE) cache model [Tam96], which incorporates latency-adding effects into a behavioral-level simulation, particularly trailing-edge effects, bus width considerations, the effects of port conflicts, and the number of outstanding accesses that a cache can handle before blocking. Existing methods of modifying behavioral cache simulators to incorporate timing effects include adjusting the total cycle count reported by a perfect cache simulation by adding an estimated number of cycles due to cache misses (the adjusted model) or assigning a nominal leading-edge penalty to each miss as it occurs (a model we will refer to as LEnominal). To illustrate the advantages of the LE cache model, we will compare the LE cache model's results to the results of using these other models. 1. This research was funded in part by a gift from IBM

    Development of a risk assessment framework to predict invasive species establishment for multiple taxonomic groups and vectors of introduction

    Get PDF
    A thorough assessment of aquatic nonindigenous species’ risk facilitates successful monitoring and prevention activities. However, species- and vector-specific information is often limited and difficult to synthesize across a single risk framework. To address this need, we developed an assessment framework capable of estimating the potential for introduction, establishment, and impact by aquatic nonindigenous species from diverse spatial origins and taxonomic classification, in novel environments. Our model builds on previous approaches, while taking on a new perspective for evaluation across species, vectors and stages to overcome the limitations imposed by single species and single vector assessments. We applied this globally-relevant framework to the Laurentian Great Lakes to determine its ability to evaluate risk across multiple taxa and vectors. This case study included 67 aquatic species, identified as “watchlist species” in NOAA’s Great Lakes Aquatic Nonindigenous Species Information System (GLANSIS). Vectors included shipping, hitchhiking/fouling, unauthorized intentional release, escape from recreational or commercial culture, and natural dispersal. We identified potential invaders from every continent but Africa and Antarctica. Of the 67 species, more than a fifth (21%) had a high potential for introduction and greater than 60% had a moderate potential for introduction. Shipping (72%) was the most common potential vector of introduction, followed by unauthorized intentional release (25%), hitchhiking/fouling (21%), dispersal (19%), stocking/planting/escape from recreational culture (13%), and escape from commercial culture. The ability to assess a variety of aquatic nonindigenous species from an array of potential vectors using a consistent methodology is essential for comparing likelihoods of introduction, establishment, and impact. The straightforward design of this framework will allow its application and modification according to policy priorities by natural resource managers. The ability to use a variety of information sources facilitates completion of assessments despite the paucity of data that often plagues aquatic nonindigenous species management

    On the reheating stage after inflation

    Full text link
    We point out that inflaton decay products acquire plasma masses during the reheating phase following inflation. The plasma masses may render inflaton decay kinematicaly forbidden, causing the temperature to remain frozen for a period at a plateau value. We show that the final reheating temperature may be uniquely determined by the inflaton mass, and may not depend on its coupling. Our findings have important implications for the thermal production of dangerous relics during reheating (e.g., gravitinos), for extracting bounds on particle physics models of inflation from Cosmic Microwave Background anisotropy data, for the production of massive dark matter candidates during reheating, and for models of baryogenesis or leptogensis where massive particles are produced during reheating.Comment: 8 pages, 2 figures. Submitted for publication in Phys. Rev.

    Comparison of quantum mechanical and classical trajectory calculations of cross sections for ion-atom impact ionization of negative - and positive -ions for heavy ion fusion applications

    Full text link
    Stripping cross sections in nitrogen have been calculated using the classical trajectory approximation and the Born approximation of quantum mechanics for the outer shell electrons of 3.2GeV I^{-} and Cs+^{+} ions. A large difference in cross section, up to a factor of six, calculated in quantum mechanics and classical mechanics, has been obtained. Because at such high velocities the Born approximation is well validated, the classical trajectory approach fails to correctly predict the stripping cross sections at high energies for electron orbitals with low ionization potential.Comment: submitted to Phys. Rev.

    ‘Scotland's different’: Narratives of Scotland's distinctiveness in the post-Brexit-vote era

    Get PDF
    While Scotland has been portrayed as an outlier in the context of Brexit, we know relatively little about how ordinary people in Scotland, including a growing migrant population, make sense of this (political and media) narrative. In order to address this gap, in this article I look at everyday narratives of Scotland's distinctiveness in the post-Brexit-vote era among the long-settled population and Polish – and to a lesser degree other European Union – migrants in the East End of Glasgow. By drawing upon scholarship on everyday nationalism and imagined communities, I explore discursive claims which romanticise Scotland as different and ‘welcoming’ of immigration and position it in binary opposition to England. How is Scotland produced as different in the context of Brexit? How are these stories used to re-imagine increasingly diverse Scottish society? In what ways are they being employed by migrant communities

    Reopening the window on charged dark matter

    Full text link
    We reexamine the limits on charged dark matter particles. We show that if their mass and charge fall in the range 100(q_X/e)^2< m_X < 10^8(q_X/e) TeV, then magnetic fields prevent particles in the halo from entering the galactic disk, while those initially trapped inside are accelerated through the Fermi mechanism and ejected within about 0.1-1 Gyrs. Consequently, previous constraints on charged dark matter based on terrestrial non-observation are invalid within that range. Further, we find that charged massive particles may simultaneously solve several long-standing astrophysical problems, including the underabundance of dwarf galaxies, the shallow density profiles in the cores of the LSB galaxies, the absence of cooling flows in the cores of galaxy clusters, and several others.Comment: 9 pages, 1 figure, accepted for publication in JCA
    corecore