The document provides an overview of the Gaspard2 modeling language and framework for modeling dataflow-oriented applications, with an emphasis on signal processing systems. It describes the key concepts in Gaspard2 including its component-based design, support for parallelism, use of UML profiles, and ability to model applications and hardware. The document also outlines the MARTE standards used in Gaspard2 and provides examples of modeling constructs for tasks, dataflow and allocation.
Google Talk: DOs and DON'Ts of Mobile StrategyJason Grigsby
Presented at Google on October 8, 2010 as part of the Google Talks series.
Updated from previous presentations to talk about legacy content management systems and more ways our iPhone lens skews our perception of the world.
Google Talk: DOs and DON'Ts of Mobile StrategyJason Grigsby
Presented at Google on October 8, 2010 as part of the Google Talks series.
Updated from previous presentations to talk about legacy content management systems and more ways our iPhone lens skews our perception of the world.
Resultados sobre Policultivo de Tilápias e Camarões de Água Doce Agricultura Sao Paulo
Ciclo de palestras sobre policultivo de peixes e camarões de água doce
Resultados sobre Policultivo de Tilápias e Camarões de Água Doce realizado em Passo - MG. - Dra. Helenice Pereira de Barros - Pesquisadora Científica do Centro do Pescado Continental do Instituto de Pesca - APTA - SAA.
Get me a mobile strategy or you're fired web 2Jason Grigsby
Learn the DOs and DON’Ts of a Successful Mobile Strategy.
Mobile continues to be the hottest technology sector. The iPhone has reached 3 billion downloads. Android devices are now available on every major carrier in the United States. And the mobile web once again doubled last year.
People and businesses are waking up to the reality that mobile is the next big thing.
With this realization comes another pressing question: What should our mobile strategy be?
Similar to the early days of the Internet, we’re seeing companies answer this fundamental question in many different ways.
Learn from both the outstanding success and cringe-worthy failures of others as you begin to formulate your plans for navigating the mobile landscape.
Finally, we’ll look at methods for evaluating mobile strategies based on demographics, mobile context, and the unique characteristics of mobile devices.
Get Me a Mobile Strategy or You're FIRED!Jason Grigsby
Pitching in to help cover for a speaker who was unable to make it to Design4Mobile so I've modified a version of my Mobile Strategy slides for the afternoon session.
Covers DOs and DONTs of Mobile Strategy for businesses.
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
Elevating Tactical DDD Patterns Through Object CalisthenicsDorra BARTAGUIZ
After immersing yourself in the blue book and its red counterpart, attending DDD-focused conferences, and applying tactical patterns, you're left with a crucial question: How do I ensure my design is effective? Tactical patterns within Domain-Driven Design (DDD) serve as guiding principles for creating clear and manageable domain models. However, achieving success with these patterns requires additional guidance. Interestingly, we've observed that a set of constraints initially designed for training purposes remarkably aligns with effective pattern implementation, offering a more ‘mechanical’ approach. Let's explore together how Object Calisthenics can elevate the design of your tactical DDD patterns, offering concrete help for those venturing into DDD for the first time!
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Tobias Schneck
As AI technology is pushing into IT I was wondering myself, as an “infrastructure container kubernetes guy”, how get this fancy AI technology get managed from an infrastructure operational view? Is it possible to apply our lovely cloud native principals as well? What benefit’s both technologies could bring to each other?
Let me take this questions and provide you a short journey through existing deployment models and use cases for AI software. On practical examples, we discuss what cloud/on-premise strategy we may need for applying it to our own infrastructure to get it to work from an enterprise perspective. I want to give an overview about infrastructure requirements and technologies, what could be beneficial or limiting your AI use cases in an enterprise environment. An interactive Demo will give you some insides, what approaches I got already working for real.
Neuro-symbolic is not enough, we need neuro-*semantic*Frank van Harmelen
Neuro-symbolic (NeSy) AI is on the rise. However, simply machine learning on just any symbolic structure is not sufficient to really harvest the gains of NeSy. These will only be gained when the symbolic structures have an actual semantics. I give an operational definition of semantics as “predictable inference”.
All of this illustrated with link prediction over knowledge graphs, but the argument is general.
Accelerate your Kubernetes clusters with Varnish CachingThijs Feryn
A presentation about the usage and availability of Varnish on Kubernetes. This talk explores the capabilities of Varnish caching and shows how to use the Varnish Helm chart to deploy it to Kubernetes.
This presentation was delivered at K8SUG Singapore. See https://feryn.eu/presentations/accelerate-your-kubernetes-clusters-with-varnish-caching-k8sug-singapore-28-2024 for more details.
6. Application Domain of Gaspard2:
intensive signal processing
"Gaspard" stands for
Graphical array specification for parallel and
distributed computing
7. Hypotheses
component-based
massive
parallelism
regular
applications and
hardware
no complex flow of
control
static scheduling,
no RTOS
8. MARTE packages used in Gaspard2
Foundations
Non Functional Properties
Generic Component Model
Flow ports
Allocation
Detailed Resource Modeling
Hardware Resource Modeling::HwLogical
Repetitive Structure Modeling
20. 2
!
@
441H*)5$*#$*0043H*)31#$545:5#)$)1$*#$0,1H5((3#I$04*)21,:$
545:5#)
7523#5$*$I5#5,*4$545:5#)$3#)1$1#5$1,$(565,*4$:1,5$(05H323H$
545:5#)($
C!C
AB
0 ! +
J*#$1#4=$*441H*)5$*0043H*)31#$)1$55HQ)31#$04*)21,:
J*#$*))*HD$WVZ$H1#(),*3#)($)1$)D5$*441H*)31#
A
@
?
hhb
21. !
0
xD*)$H*#$5$*441H*)5+S$
)D5$41I3H*4$635F-
$(),QH)Q,5$1,$5D*631, xD*)$H*#$(5,65$*($*$
)*,I5)$12$*#$*441H*)31#S$
)D5$0D=(3H*4$635F-
C!C
$*$,5(1Q,H5$1,$*$
(5,63H5G
AB
#
A
@
?
hhc
22. -
!
79;
P7
r 3#H4Q+5 s
!
- , -.
r 5)5#+ s
r 3#H4Q+5 s
C!C
! ; -.
! ,
AB
-.
r 3#H4Q+5 s r 3#H4Q+5 s
# -.
A
;
@
_$Q(5$H*(5($v$_$45654($12$+5)*34(
?
had
26. -
!
-
LQHH5((365$ $4*=5,(
$I5#5,3H$H1#H50)($M'7843n5O
,) % - ,)' *- ,) .
$(05H323H$*#+$+5)*345+$,5(1Q,H5(
C!C
,) - ,)# - ,) - ,)''/- ,)# - ,)# % - ,) ' .
AB
44$P7$H1#H50)($*,5$,) 0 1
iGGh 0,163+5+L5,63H5(
F G hGGy F G
iGGy - ,5mQ3,5+L5,63H5( - ! ,
A
1F#5+75(1Q,H5( iGGy
9F1 635F(
+ 1
@
?
hbh
27. - 88 +
!
, 2Q#H)31#*4
@ =
G$$$$$$PFJ1:0Q)3#I$$$$$$ G$$$$$ G$$$$$$PFL)1,*I5$$$$$$ G$$$$$
C!C
r PFZ,1H5((1, sS$r PFZ/X sS r PFJ*HD5 sS$r PF7 sS$ r PF. sS
r PFLKJ s r PF7% sS$r PFX,365 s r PFX s
AB
G$$$$$$ PFX563H5$$$$$$ G$$$$$ G$$$$$$PF93:3#I$$$$$$ G$$$$$
G$$$$$$ PFJ1::Q#3H*)31#$$$$$$ G$$$$$
A
r PFX563H5 sS r PFKE% s r PF[,3+I5 s r PFJ41Hn sS
r PFLQ001,) s
r PF93:5, s
r PF,3)5, s
@
r PF5+3* sS$r PF[Q( s
?
hb
28. - 88
!
, 0D=(3H*4
@
PF/*=1Q)
V1,:(-$JD30S$J*,+S$JD*##54o
X3:5#(31#(S$*,5*$*#+$*,,*#I5:5#)$:5HD*#3(:$F3)D3#$,5H)343#5*,$I,3+(
C!C
;#63,1#:5#)*4$H1#+3)31#(-$5GIG$)5:05,*)Q,5S$63,*)31#S$DQ:3+3)=o
PFZ1F5,
AB
Z1F5,$H1#(Q:0)31#$*#+$D5*)$+3((30*)31#
G$$$$$$ PF/*=1Q)$$$$$$ G$$$$$ G$$$$$$PFZ1F5,$$$$$$ G$$$$$
A
r PFZ1F5,LQ004= s r PFJ1143#ILQ004=s
r PFJ1:01#5#) s
n3#+$-$zJ*,+S$JD*##54S$JD30S$Z1,){
@
?
hb_
29. - , ,
!
F G F + G
== ==+ ==@ 9 K
r 3:01,) s r 3:01,) s
F G
-
F G F G
- + -
C!C
- -
AB
- !
- )
- +
-
A
- )
- ! -
@
- - # ,
?
hba
30. - 88 -
!
F G F + G
== ==+ ==@ 9 K
r 3:01,) s r 3:01,) s
F G
-
F G F G
- + -
C!C
- -
AB
- !
- )
- +
-
A
- )
- ! -
@
- - # ,
?
hbb
31. - 88 -
!
-
F G F G
== ==! -
r +*)*9=05 s
F G
-
:5:1,=L3R5$-$WVZYX*)*L3R5 #1)*)31#$-$WVZYL),3#I
*++,5((L3R5$-$WVZYX*)*L3R5 +5(H,30)31#$-$WVZYL),3#I
)3:3#I($-$93:3#I$tyu 6*4Q5$-$WVZYXQ,*)31#
C!C
AB
F G F G F G F G
- ) - - - # ,
45654$-$WVZYW*)Q,*4$v$h 1,I*#3R*)31#$-$5:1,=%,I*#3R*)31# )=05$-$7%Y9=05 (5H)1,L3R5$-$WVZYX*)*L3R5
)=05$-$J*HD59=05 3(L=#HD,1#1Q($-$WVZY[1145*# 1,I*#3R*)31#$-$5:1,=%,I*#3R*)31#
(),QH)Q,5$-$J*HD5L),QH)Q,5 3(L)*)3H$ -WVZY[1145*#
,504YZ143H=$-$7504YZ143H= 3(W1#`14*)345$ -$WVZY[1145*# iGGh
F,3)5Z143H=$-$x,3)5Z143H= ,504YZ143H=$ -$7504YZ143H=
Q225,
F,3)5Z143H=$-$x,3)5Z143H=
z(Q(5)($1F#5+Px{
A
r 5#Q:5,*)31# s r 5#Q:5,*)31# s r 5#Q:5,*)31# s r +*)*9=05 s r +*)*9=05 s r 5#Q:5,*)31# s
K . ) ) ! ; K
/7. x,3)5[*Hn X*)* #L5)($-$WVZYW*)Q,*4 #71F($-$WVZYW*)Q,*4 *(n5+7%
WV. x,3)59D,1QID K#(),QH)31# 41HL3R5$-$WVZYX*)*L3R5 #J14Q:#($-$WVZYW*)Q,*4 ;Z7%
VKV% %)D5, .#3235+ *((1H3*)363)=$ -$WVZYW*)Q,*4 #[*#n($-$WVZYW*)Q,*4 %9ZY;Z7%
7*#+1: .#+523#5+ %)D5, F1,+L3R5$-$WVZYX*)*L3R5 ;;Z7%
@
%)D5, .#+523#5+ V4*(D
.#+523#5+ %)D5,
.#+523#5+
?
hbc
32. - 88 - 88 - )
!
F G PFJ*HD5$3($*$0,1H5((3#I$:5:1,=$FD5,5$
- )
2,5mQ5#)4=$Q(5+$+*)*$H*#$5$()1,5+$21,$,*03+$
*HH5((
45654$-$WVZYW*)Q,*4$v$h
)=05$-$J*HD59=05
(),QH)Q,5$-$J*HD5L),QH)Q,5
,504YZ143H=$-$7504YZ143H= X5)*345+$+5(H,30)31#$12$)D5$PFJ*HD5$3($
C!C
F,3)5Z143H=$-$x,3)5Z143H= #5H5((*,=$21,$05,21,:*#H5$*#*4=(3($*#+$
(3:Q4*)31#$
AB
r 5#Q:5,*)31# s r 5#Q:5,*)31# s r 5#Q:5,*)31# s r +*)*9=05 s
K . ) ) !
/7. x,3)5[*Hn X*)* #L5)($-$WVZYW*)Q,*4
A
WV. x,3)59D,1QID K#(),QH)31# 41HL3R5$ -$WVZYX*)*L3R5
VKV% %)D5, .#3235+ *((1H3*)363)=$ -$WVZYW*)Q,*4
7*#+1: .#+523#5+ %)D5,
%)D5, .#+523#5+
.#+523#5+
@
?
hbd
33. - 88 - 88 - )
!
F G
- )
45654$-$WVZYW*)Q,*4$v$h
)=05$-$J*HD59=05 L05H3235($)D5$H*HD5$45654G
(),QH)Q,5$-$J*HD5L),QH)Q,5
,504YZ143H=$-$7504YZ143H= X52*Q4)$6*4Q5$3($h
C!C
F,3)5Z143H=$-$x,3)5Z143H=
AB
r 5#Q:5,*)31# s r 5#Q:5,*)31# s r 5#Q:5,*)31# s r +*)*9=05 s
K . ) ) !
/7. x,3)5[*Hn X*)* #L5)($-$WVZYW*)Q,*4
A
WV. x,3)59D,1QID K#(),QH)31# 41HL3R5$-$WVZYX*)*L3R5
VKV% %)D5, .#3235+ *((1H3*)363)=$ -$WVZYW*)Q,*4
7*#+1: .#+523#5+ %)D5,
%)D5, .#+523#5+
.#+523#5+
@
?
hbf
34. - 88 - 88 - )
!
F G L05H3235($)D5$PFJ*HD5$(),QH)Q,5
- ) PFJ*HD5$3($1,I*#3R5+$Q#+5,$(5)($12$41Hn(G
((1H3*)363)=$3($)D5$#Q:5,$12$41Hn($F3)D3#$5*HD$(5)G
45654$-$WVZYW*)Q,*4$v$h
K2$*((1H3*)363)=$v$hS$H*HD5$3($+3,5H)$:*005+
)=05$-$J*HD59=05
(),QH)Q,5$-$J*HD5L),QH)Q,5 K2$#L5)($v$hS$H*HD5$3($2Q44=$*((1H3*)365G
,504YZ143H=$-$7504YZ143H= %J/$,Q45
C!C
F,3)5Z143H=$-$x,3)5Z143H= *! + 2 ! !+ *
AB
r 5#Q:5,*)31# s r 5#Q:5,*)31# s r 5#Q:5,*)31# s r +*)*9=05 s
K . ) ) !
/7. x,3)5[*Hn X*)* #L5)($-$WVZYW*)Q,*4
A
WV. x,3)59D,1QID K#(),QH)31# 41HL3R5$ -$WVZYX*)*L3R5
VKV% %)D5, .#3235+ *((1H3*)363)=$ -$WVZYW*)Q,*4
7*#+1: .#+523#5+ %)D5,
%)D5, .#+523#5+
.#+523#5+
@
?
hbg
35. - 88 - 88 - )
!
F G L05H3235($)D5$H*HD5$F,3)5$0143H=$
- ) x,3)5[*Hn-$J*HD5$F,3)5$3($#1)$3::5+3*)54=$
,5245H)5+$)1$)D5$*Hn3#I$:5:1,=G
45654$-$WVZYW*)Q,*4$v$h
)=05$-$J*HD59=05 x,3)59D,1QID-$x,3)5($*,5$3::5+3*)54=$
(),QH)Q,5$-$J*HD5L),QH)Q,5 :3,,1,5+G
,504YZ143H=$-$7504YZ143H=
C!C
F,3)5Z143H=$-$x,3)5Z143H=
AB
r 5#Q:5,*)31# s r 5#Q:5,*)31# s r 5#Q:5,*)31# s r +*)*9=05 s
K . ) ) !
/7. x,3)5[*Hn X*)* #L5)($-$WVZYW*)Q,*4
A
WV. x,3)59D,1QID K#(),QH)31# 41HL3R5$ -$WVZYX*)*L3R5
VKV% %)D5, .#3235+ *((1H3*)363)=$ -$WVZYW*)Q,*4
7*#+1: .#+523#5+ %)D5,
%)D5, .#+523#5+
.#+523#5+
@
?
hci
37. , !
!
,
%
W5()5+$4110(
Q4)30,1H5((1,$L=()5:(
C!C
AB
0043H*)31#
P*,+F*,5$04*)21,:
((1H3*)31#
A
@
W5F$#1)*)31#$E$()5,51)=05(
?
hdc
38. ) , !
!
J1#H50)(
! $M5)5#(31#$12$ *O
91$:1+54$:Q4)3+3:5#(31#*4$*,,*=(
+ $M5)5#(31#$12$ $*#+$ O
91$:1+54$)D5$)10141I=$12$)D5$43#n($5)F55#$:Q4)3+3:5#(31#*4$*,,*=(
Z*))5,#8*(5+$,5IQ4*,$)10141I35(
C!C
AB
@ =
8
75IQ4*,$(0*H3#I$12$013#)($3#(3+5$*$
A
)345
75IQ4*,$(0*H3#I$12$)345(
K#D5,3)($2,1:$)D5$,,*=8%/$4*#IQ*I5
@
?
hdd
39. !
!
9
F G
! 7523#5:5#)$12$)D5$:Q4)3043H3)=$
#1)*)31#
`5H)1,$12$.#43:3)5+W*)Q,*4(
F G
C!C
? +==
hc$‘$zaSa{
AB
y$‘$zbhShfSy{
F G
! F G
F G
A
(D*05$-$LD*05L05H323H*)31#$thu zH1445H)31#)),3$v$(3R5{
! !
(3R5$-$.#43:3)5+W*)Q,*4$tiGGyu
@
?
hdf
40. +
!
F G
!
F G F G
? +==) ? +==)
F G
# +
F G
C!C
* !
AB
F G
0
,505)3)31#L0*H5X505#+5#H5$-$K#)5I5,`5H)1,$thu
3(1+Q41$-$[1145*#$v$2*4(5
A
F G
F G
1,3I3#$-$K#)5I5,`5H)1,
@
0*))5,#LD*05$-$LD*05L05H323H*)31#$thu 0*63#I$-$K#)5I5,*),3
,505)3)31#L0*H5$-$LD*05L05H323H*)31#$thu 23))3#I$-$K#)5I5,*),3
)345,$-$9345,L05H323H*)31#
?
hdg
42. !
F G
9
,,*=$(D*05
1,3I3#$-$K#)5I5,`5H)1,
Z*))5,#$(D*05
0*63#I$-$K#)5I5,*),3 7505)3)31#$(0*H5$(D*05
23))3#I$-$K#)5I5,*),3
)345,$-$9345,L05H323H*)31#
C!C
3 %-$,5IQ4*,$(0*H3#I$12$)D5$013#)($12$
F G )D5$)345(
AB
F G K#+5$
!
LH*##3#I$)D5$0*))5,#
1,3I3#$-$K#)5I5,`5H)1,
%-$,5IQ4*,$(0*H3#I$12$)D5$)345(
0*63#I$-$K#)5I5,*),3$thu
A
23))3#I$-$K#)5I5,*),3 K#+5$
LH*##3#I$)D5$,505)3)31#$(0*H5
@
1,3I3#M0*63#I$23))3#IOG M$O $*,,*=G(D*05
?
hfh
46. #
!
F G
!
!
F G
==
C!C
9343#I$1)D$5#+(
AB
F G 9F1$)345,(
#
x3)D$)D5$(*:5$)345(
0*))5,#LD*05$-$LD*05L05H323H*)31#$thu
%#5$0*))5,#$(D*05
,505)3)31#L0*H5$-$LD*05L05H323H*)31#$thu
%#5$,505)3)31#$(0*H5
A
2,1:9345,$-$9345,L05H323H*)31#$thu
)19345,$-$9345,L05H323H*)31#$ thu
)$45*()$*44$PZV$+*)*$
@
+3(),3Q)31#(
?
hfb
47. #
!
C!C
AB
# !0 #
W1$(0*)3*4$+3(),3Q)31#$12$)D5$3#23#3)5$+3:5#(31#$M)3:5$()50(O
A
[41H$+3(),3Q)31#$12$)D5$bh$VV9($21,$5*HD$)3:5$()50
L3R5$12$)D5$41H$v$_
@
%#$)D5$hc$545:5#)*,=$0,1H5((1,(
?
hfc
64. RSM Semantics Summary
DSL for systematic signal processing
First order pure functional language
Multidimensional toroidal arrays
Pattern based data acess
Data parallel repetition
∀r, 0 ≤ r srepetition
∀i, 0 ≤ i spattern
r
t(r, i) = o + (P F) · mod sarray
i
69. Co-model for co-design
Marte and Gaspard Metamodels
High level data parallel constructions
Hierarchical
Repetitive
Application, architecture and association models
Iterative dependency expression
Data flow and control flow mixing
Gaspard2 UML profile available
With MagicDraw and Papyrus
70. Optimization and compilation techniques
•Data parallel code transformations
•Mapping and multi-objective hierarchical scheduling
heuristics
•Compilation from high-level models down to simulation,
execution and synthesis
•Eclipse integration
•Model transformation techniques
•ModTransf, Momote, Mocode, QVTO
71. HP-SoC simulation and synthesis
•Simulation for architecture/application/association exploration
•SystemC simulation framework at PVT and CABA level
•Performance and power consumption evaluation
•Synthesis for large and reconfigurable FPGA
•VHDL code generation
•Network on Chip and SIMD design for MppSoC
•MppSoC implementation in FPGA (16-64 PE “à la Maspar”)
•OpenMP execution on SMP
•Synchronous code generation
72. Downscaler application
Horizontal filter:
8/3
CIF video frame:
352x288
Vertical filter:
9/4
Resized video
frame
87. Papyrus modeling editor
Open source
UML2 specification compliant
Afull Eclipse project such as EMF, etc.
Support all UML2 diagrams and profile
MARTE, SysML, CCM
OCL verification
Java and C++ code generation
Developed and supported by CEA and LIFL (DaRT)
www.papyrusuml.org
88. Technology bases of Gaspard2
Model driven engineering
metamodels
model transformations
Eclipse platform
metamodeling language: Ecore
integration framework based on plugins
transformation chains
90. Polyhedron model
Information given by the distribution in the high MPSoC model
A polyhedron is generated for each task repetition
Parameterized by a processor number (p0) and the task indexes
91. Loop model
Scanning the polyhedron
Corresponding loop generation
Task repetition space
Using the CLoog tool
92. Pattern accurate (PA) TLM level
Allocation
Processor 1
Instruction memory TA
Task A
Not used
Task B TB
Processor 0
NoC
Task C Task D TC TD
Data memory Allocation
Task E TE
Array0 Array1
Application execution graph
Fast simulation
Data transfer observation
Hardware/Software simulation before the processor
component is available