Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

530 C Secure h blackboard.olemiss.edu /bbcswebdav/pid-401211-dt content-rid-1922349 1/cours es/Csci 530 Section JANG 2016-2017 SPRG/project1.pdf project1 2/19/2017 Due: Midnight Sunday 2/26/2017 Submission 1. PDF document that

image text in transcribedimage text in transcribed

530 C Secure h blackboard.olemiss.edu /bbcswebdav/pid-401211-dt content-rid-1922349 1/cours es/Csci 530 Section JANG 2016-2017 SPRG/project1.pdf project1 2/19/2017 Due: Midnight Sunday 2/26/2017 Submission 1. PDF document that contains two graphs and explains how you generated the graphs 2. Raw data file generated from your gem5 runs Task: This project is to characterize the use of x86 instructions using the gem5 architectural simulator that you have installed earlier. For this project, rebuild your gem5 simulator using "scons /build/x86 MESI Two Level/gen5.opt You are asked to generate two graphs in this project. The first graph shows the percentage of the use of machine instruction types (i.e., ALU, memory, control-flow, etc) for each benchmark program (total 4 programs). The second graph shows the percentage of the use of top 10 most frequently used ALU instructions. In order to complete this project, you need to familiarize yourself with gem5 statistics. Please read http:// rg/statist. and reference the code in src/base/statistics.hh. Also reading the code in src/cpu/simple/base.cc function PostExecute and src/cpu/simple/base.hh would help you understand how statistics asesimplecPU are generated. Also http:// will give you the overview of the baseline CPU model. Benchmark programs to use The 4 programs provided are adopted from the University of Virginia Computer Science department. Below are the description and command-line argument for each benchmark. Below are the description of benchmarks. If the program takes command-line arguments, you should pass the arguments blocked-natmul: a 2x2 register-blocked matrix multiplication of two 84x84 matrices. The matrices are pseudorandomly generated and all sizes are hard-coded. Source code for this benchmark is in blocked matmul.c. The suggested command-line for this program is /blocked-matmul It takes no command-line arguments. BES: computes a breadth-first search problem. This is taken from the Problem Based Benchmark Suite Source code for this benchmark is in the breadthFirstSearch directory. A example graph data is supplied i the inputs directory. Our suggested command-line for this program is /BFS inputs /RL3k graph where path/to/RL3k.graph is the full path to the RL3k.graph supplied in the inputs directory of the Ask me anything 2:09 AM

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Beyond Big Data Using Social MDM To Drive Deep Customer Insight

Authors: Martin Oberhofer, Eberhard Hechler

1st Edition

0133509796, 9780133509793

More Books

Students also viewed these Databases questions