首页 > 最新文献

2014 51st ACM/EDAC/IEEE Design Automation Conference (DAC)最新文献

英文 中文
Parasitic-aware sizing and detailed routing for binary-weighted capacitors in charge-scaling DAC 电荷缩放DAC中二元加权电容器的寄生感知尺寸和详细布线
Pub Date : 2014-06-01 DOI: 10.1145/2593069.2593179
Mark Po-Hung Lin, V. Hsiao, Chun-Yu Lin
Capacitor sizing is a crucial step when designing a charge-scaling digital-to-analog converter. Larger capacitor size can achieve better circuit accuracy and performance due to less impact from random, systematic, and parasitic mismatch. However, it also results in much larger chip area and even more power consumption. In addition to minimizing random and systematic mismatch during common-centroid capacitor placement, this paper presents the first problem formulation in the literature which simultaneously considers capacitor sizing and parasitic matching during common-centroid capacitor layout generation such that the power consumption is minimized while the circuit accuracy/performance is also satisfied. Experimental results show that the proposed approach can achieve very significant chip area and power reductions compared with the state of the art.
电容尺寸是设计电荷缩放数模转换器的关键步骤。较大的电容尺寸可以获得更好的电路精度和性能,因为随机、系统和寄生失配的影响较小。然而,它也导致更大的芯片面积和更多的功耗。除了最大限度地减少共质心电容器布局过程中的随机和系统失配外,本文还提出了文献中第一个同时考虑电容器尺寸和共质心电容器布局生成过程中的寄生匹配的问题公式,从而在满足电路精度/性能的同时最小化功耗。实验结果表明,与目前的技术相比,该方法可以实现非常显着的芯片面积和功耗降低。
{"title":"Parasitic-aware sizing and detailed routing for binary-weighted capacitors in charge-scaling DAC","authors":"Mark Po-Hung Lin, V. Hsiao, Chun-Yu Lin","doi":"10.1145/2593069.2593179","DOIUrl":"https://doi.org/10.1145/2593069.2593179","url":null,"abstract":"Capacitor sizing is a crucial step when designing a charge-scaling digital-to-analog converter. Larger capacitor size can achieve better circuit accuracy and performance due to less impact from random, systematic, and parasitic mismatch. However, it also results in much larger chip area and even more power consumption. In addition to minimizing random and systematic mismatch during common-centroid capacitor placement, this paper presents the first problem formulation in the literature which simultaneously considers capacitor sizing and parasitic matching during common-centroid capacitor layout generation such that the power consumption is minimized while the circuit accuracy/performance is also satisfied. Experimental results show that the proposed approach can achieve very significant chip area and power reductions compared with the state of the art.","PeriodicalId":433816,"journal":{"name":"2014 51st ACM/EDAC/IEEE Design Automation Conference (DAC)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132217672","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 22
Aspect-oriented modeling of attacks in automotive Cyber-Physical Systems 汽车网络物理系统中面向方面的攻击建模
Pub Date : 2014-06-01 DOI: 10.1145/2593069.2593095
Armin Wasicek, P. Derler, Edward A. Lee
This paper introduces aspect-oriented modeling (AOM) as a powerful, model-based design technique to assess the security of Cyber-Physical Systems (CPS). Particularly in safety-critical CPS such as automotive control systems, the protection against malicious design and interaction faults is paramount to guaranteeing correctness and reliable operation. Essentially, attack models are associated with the CPS in an aspect-oriented manner to evaluate the system under attack. This modeling technique requires minimal changes to the model of the CPS. Using application-specific metrics, the designer can gain insights into the behavior of the CPS under attack.
本文介绍了面向方面建模(AOM)作为一种强大的、基于模型的设计技术来评估网络物理系统(CPS)的安全性。特别是在汽车控制系统等安全关键CPS中,防止恶意设计和交互故障对于保证正确性和可靠运行至关重要。从本质上讲,攻击模型以面向方面的方式与CPS相关联,以评估受到攻击的系统。这种建模技术只需要对CPS的模型进行最小的更改。使用特定于应用程序的指标,设计人员可以深入了解受到攻击的CPS的行为。
{"title":"Aspect-oriented modeling of attacks in automotive Cyber-Physical Systems","authors":"Armin Wasicek, P. Derler, Edward A. Lee","doi":"10.1145/2593069.2593095","DOIUrl":"https://doi.org/10.1145/2593069.2593095","url":null,"abstract":"This paper introduces aspect-oriented modeling (AOM) as a powerful, model-based design technique to assess the security of Cyber-Physical Systems (CPS). Particularly in safety-critical CPS such as automotive control systems, the protection against malicious design and interaction faults is paramount to guaranteeing correctness and reliable operation. Essentially, attack models are associated with the CPS in an aspect-oriented manner to evaluate the system under attack. This modeling technique requires minimal changes to the model of the CPS. Using application-specific metrics, the designer can gain insights into the behavior of the CPS under attack.","PeriodicalId":433816,"journal":{"name":"2014 51st ACM/EDAC/IEEE Design Automation Conference (DAC)","volume":"71 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133061399","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 75
User-centric energy-efficient scheduling on multi-core mobile devices 多核移动设备上以用户为中心的节能调度
Pub Date : 2014-06-01 DOI: 10.1145/2593069.2593239
Po-Hsien Tseng, P. Hsiu, Chin-Chiang Pan, Tei-Wei Kuo
Mobile devices will provide improved computing resources to sustain progressively more complicated applications. However, the design concept of fair scheduling and governing borrowed from legacy operating systems cannot be applied seamlessly in mobile systems, thereby degrading user experience or reducing energy efficiency. In this paper, we posit that mobile applications should be treated unfairly. To this end, we exploit the concept of application sensitivity and devise a user-centric scheduler and governor that allocate computing resources to applications according to their sensitivity. Furthermore, we integrate our design into the Android operating system. The results of extensive experiments on a commercial smartphone with real-world mobile apps demonstrate that the proposed design can achieve significant energy efficiency gains while improving the quality of user experience.
移动设备将提供改进的计算资源,以支持日益复杂的应用程序。然而,从传统操作系统中借鉴的公平调度和治理的设计概念不能无缝地应用于移动系统,从而降低用户体验或降低能源效率。在本文中,我们假设移动应用程序应该受到不公平对待。为此,我们利用应用程序敏感性的概念,设计了一个以用户为中心的调度器和调控器,根据应用程序的敏感性为它们分配计算资源。此外,我们将我们的设计整合到Android操作系统中。在商用智能手机上进行的大量实验结果表明,该设计可以在提高用户体验质量的同时显著提高能源效率。
{"title":"User-centric energy-efficient scheduling on multi-core mobile devices","authors":"Po-Hsien Tseng, P. Hsiu, Chin-Chiang Pan, Tei-Wei Kuo","doi":"10.1145/2593069.2593239","DOIUrl":"https://doi.org/10.1145/2593069.2593239","url":null,"abstract":"Mobile devices will provide improved computing resources to sustain progressively more complicated applications. However, the design concept of fair scheduling and governing borrowed from legacy operating systems cannot be applied seamlessly in mobile systems, thereby degrading user experience or reducing energy efficiency. In this paper, we posit that mobile applications should be treated unfairly. To this end, we exploit the concept of application sensitivity and devise a user-centric scheduler and governor that allocate computing resources to applications according to their sensitivity. Furthermore, we integrate our design into the Android operating system. The results of extensive experiments on a commercial smartphone with real-world mobile apps demonstrate that the proposed design can achieve significant energy efficiency gains while improving the quality of user experience.","PeriodicalId":433816,"journal":{"name":"2014 51st ACM/EDAC/IEEE Design Automation Conference (DAC)","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115127568","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 35
A rigorous graphical technique for predicting sub-harmonic injection locking in LC oscillators 一种预测LC振荡器次谐波注入锁定的严格图形技术
Pub Date : 2014-06-01 DOI: 10.1145/2593069.2593076
Palak Bhushan
We develop methods for simply yet rigorously analyzing sub-harmonic injection locking (SHIL) in LC oscillators. Our method respects nonlinearities while offering intuition and design insights into the underlying mechanisms of different modes of locking. It can predict the presence/absence, number, stability and oscillation amplitudes of locks, as well as lock ranges. We use practical LC oscillator topologies from integrated RF and UHF applications for demonstration, validating our technique against SPICE-level simulations while being 1-2 orders of magnitude faster. To our knowledge, this is the first technique/tool for SHIL general enough to treat any kind of nonlinearity in LC oscillators.
我们开发了简单而严格地分析LC振荡器中的次谐波注入锁定(SHIL)的方法。我们的方法尊重非线性,同时提供对不同锁模式的潜在机制的直觉和设计见解。它可以预测锁的存在/不存在、锁的数量、锁的稳定性和振荡幅度以及锁的范围。我们使用来自集成RF和UHF应用的实用LC振荡器拓扑进行演示,在spice级模拟中验证我们的技术,同时速度快1-2个数量级。据我们所知,这是SHIL的第一个技术/工具,足以处理LC振荡器中的任何非线性。
{"title":"A rigorous graphical technique for predicting sub-harmonic injection locking in LC oscillators","authors":"Palak Bhushan","doi":"10.1145/2593069.2593076","DOIUrl":"https://doi.org/10.1145/2593069.2593076","url":null,"abstract":"We develop methods for simply yet rigorously analyzing sub-harmonic injection locking (SHIL) in LC oscillators. Our method respects nonlinearities while offering intuition and design insights into the underlying mechanisms of different modes of locking. It can predict the presence/absence, number, stability and oscillation amplitudes of locks, as well as lock ranges. We use practical LC oscillator topologies from integrated RF and UHF applications for demonstration, validating our technique against SPICE-level simulations while being 1-2 orders of magnitude faster. To our knowledge, this is the first technique/tool for SHIL general enough to treat any kind of nonlinearity in LC oscillators.","PeriodicalId":433816,"journal":{"name":"2014 51st ACM/EDAC/IEEE Design Automation Conference (DAC)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114489975","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A swap-based cache set index scheme to leverage both superpage and page coloring optimizations 基于交换的缓存集索引方案,可同时利用超页和页面着色优化
Pub Date : 2014-06-01 DOI: 10.1145/2593069.2593078
Zehan Cui, Licheng Chen, Yungang Bao, Mingyu Chen
We propose a novel cache set index scheme called SWAP (swap-based cache set index). SWAP introduces a pseudo-physical address space that is used by the operating system. The real physical address used for cache and main memory access is obtained by simply swapping some of superpage number bits with cache set index bits from the pseudo-physical address. By adding a level of indirection to the physical memory management, we simultaneously support both page coloring and superpage optimizations. These work together to improve TLB and shared LLC performance with negligible cost. Our results show that SWAP can improve performance by an average of 15.1% (by up to 25.2%) compared to 7.34% and 8.26% for superpage and page coloring, respectively.
我们提出了一种新的缓存集索引方案SWAP(基于交换的缓存集索引)。SWAP引入了一个由操作系统使用的伪物理地址空间。用于缓存和主存访问的真实物理地址是通过简单地用伪物理地址中的缓存集索引位交换一些超页号位来获得的。通过在物理内存管理中添加一个间接级别,我们同时支持页面着色和超页面优化。这些共同工作,以微不足道的成本提高TLB和共享LLC性能。我们的结果表明,SWAP可以将性能平均提高15.1%(最多提高25.2%),而超级页面和页面着色分别为7.34%和8.26%。
{"title":"A swap-based cache set index scheme to leverage both superpage and page coloring optimizations","authors":"Zehan Cui, Licheng Chen, Yungang Bao, Mingyu Chen","doi":"10.1145/2593069.2593078","DOIUrl":"https://doi.org/10.1145/2593069.2593078","url":null,"abstract":"We propose a novel cache set index scheme called SWAP (swap-based cache set index). SWAP introduces a pseudo-physical address space that is used by the operating system. The real physical address used for cache and main memory access is obtained by simply swapping some of superpage number bits with cache set index bits from the pseudo-physical address. By adding a level of indirection to the physical memory management, we simultaneously support both page coloring and superpage optimizations. These work together to improve TLB and shared LLC performance with negligible cost. Our results show that SWAP can improve performance by an average of 15.1% (by up to 25.2%) compared to 7.34% and 8.26% for superpage and page coloring, respectively.","PeriodicalId":433816,"journal":{"name":"2014 51st ACM/EDAC/IEEE Design Automation Conference (DAC)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114601739","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Computer-aided design of machine learning algorithm: Training fixed-point classifier for on-chip low-power implementation 机器学习算法的计算机辅助设计:片上低功耗实现的定点分类器训练
Pub Date : 2014-06-01 DOI: 10.1145/2593069.2593110
H. Albalawi, Yuanning Li, Xin Li
In this paper, we propose a novel linear discriminant analysis algorithm, referred to as LDA-FP, to train on-chip classifiers that can be implemented with low-power fixed-point arithmetic with extremely small word length. LDA-FP incorporates the non-idealities (i.e., rounding and overflow) associated with fixed-point arithmetic into the training process so that the resulting classifiers are robust to these non-idealities. Mathematically, LDA-FP is formulated as a mixed integer programming problem that can be efficiently solved by a novel branch-and-bound method proposed in this paper. Our numerical experiments demonstrate that LDA-FP substantially outperforms the conventional approach for the emerging biomedical application of brain computer interface.
在本文中,我们提出了一种新的线性判别分析算法,称为LDA-FP,用于训练片上分类器,该分类器可以用极小字长的低功耗定点算法实现。LDA-FP将与定点算法相关的非理想性(即舍入和溢出)纳入到训练过程中,以便得到的分类器对这些非理想性具有鲁棒性。在数学上,LDA-FP被表述为一个混合整数规划问题,本文提出了一种新的分支定界方法,可以有效地求解该问题。我们的数值实验表明,对于新兴的生物医学应用脑机接口,LDA-FP实质上优于传统方法。
{"title":"Computer-aided design of machine learning algorithm: Training fixed-point classifier for on-chip low-power implementation","authors":"H. Albalawi, Yuanning Li, Xin Li","doi":"10.1145/2593069.2593110","DOIUrl":"https://doi.org/10.1145/2593069.2593110","url":null,"abstract":"In this paper, we propose a novel linear discriminant analysis algorithm, referred to as LDA-FP, to train on-chip classifiers that can be implemented with low-power fixed-point arithmetic with extremely small word length. LDA-FP incorporates the non-idealities (i.e., rounding and overflow) associated with fixed-point arithmetic into the training process so that the resulting classifiers are robust to these non-idealities. Mathematically, LDA-FP is formulated as a mixed integer programming problem that can be efficiently solved by a novel branch-and-bound method proposed in this paper. Our numerical experiments demonstrate that LDA-FP substantially outperforms the conventional approach for the emerging biomedical application of brain computer interface.","PeriodicalId":433816,"journal":{"name":"2014 51st ACM/EDAC/IEEE Design Automation Conference (DAC)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129314197","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Detecting reliability attacks during split fabrication using test-only BEOL stack 使用仅测试BEOL堆栈检测分裂制造过程中的可靠性攻击
Pub Date : 2014-06-01 DOI: 10.1145/2593069.2593123
Kaushik Vaidyanathan, B. P. Das, L. Pileggi
Split fabrication, the process of splitting an IC into an untrusted and trusted tier, facilitates access to the most advanced semiconductor manufacturing capabilities available in the world without requiring disclosure of design intent. While obfuscation techniques have been proposed to prevent malicious circuit insertion or modifications in the untrusted tier, detecting a pernicious reliability attack induced in the offshore foundry is more elusive. We describe a methodology for exhaustive testing of components in the untrusted tier using a specialized test-only metal stack for selected sacrificial dies.
拆分制造,即将IC拆分为不受信任层和受信任层的过程,有助于在不披露设计意图的情况下访问世界上最先进的半导体制造能力。虽然已经提出了混淆技术来防止在不可信层中恶意插入或修改电路,但检测离岸代工厂中引起的恶性可靠性攻击更加难以捉摸。我们描述了一种方法,对不可信层中的组件进行详尽的测试,使用专门的只测试金属堆栈来选择牺牲模具。
{"title":"Detecting reliability attacks during split fabrication using test-only BEOL stack","authors":"Kaushik Vaidyanathan, B. P. Das, L. Pileggi","doi":"10.1145/2593069.2593123","DOIUrl":"https://doi.org/10.1145/2593069.2593123","url":null,"abstract":"Split fabrication, the process of splitting an IC into an untrusted and trusted tier, facilitates access to the most advanced semiconductor manufacturing capabilities available in the world without requiring disclosure of design intent. While obfuscation techniques have been proposed to prevent malicious circuit insertion or modifications in the untrusted tier, detecting a pernicious reliability attack induced in the offshore foundry is more elusive. We describe a methodology for exhaustive testing of components in the untrusted tier using a specialized test-only metal stack for selected sacrificial dies.","PeriodicalId":433816,"journal":{"name":"2014 51st ACM/EDAC/IEEE Design Automation Conference (DAC)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122050982","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 42
BMF-BD: Bayesian model fusion on Bernoulli distribution for efficient yield estimation of integrated circuits 基于伯努利分布的贝叶斯模型融合集成电路成品率估计
Pub Date : 2014-06-01 DOI: 10.1145/2593069.2593099
Chenlei Fang, Fan Yang, Xuan Zeng, Xin Li
Accurate yield estimation is one of the important yet challenging tasks for both pre-silicon verification and post-silicon validation. In this paper, we propose a novel method of Bayesian model fusion on Bernoulli distribution (BMF-BD) for efficient yield estimation at the late stage by borrowing the prior knowledge from an early stage. BMF-BD is particularly developed to handle the cases where the pre-silicon simulation and/or post-silicon measurement results are binary: either “pass” or “fail”. The key idea is to model the binary simulation/measurement outcome as a Bernoulli distribution and then encode the prior knowledge as a Beta distribution based on the theory of conjugate prior. As such, the late-stage yield can be accurately estimated through Bayesian inference with very few late-stage samples. Several circuit examples demonstrate that BMF-BD achieves up to 10× cost reduction over the conventional estimator without surrendering any accuracy.
准确的产率估计是硅前验证和硅后验证的重要而又具有挑战性的任务之一。在本文中,我们提出了一种新的贝叶斯模型融合贝努利分布(BMF-BD)方法,通过借鉴早期的先验知识,在后期进行有效的产量估计。BMF-BD专门用于处理硅前模拟和/或硅后测量结果为二元的情况:要么“通过”,要么“失败”。关键思想是将二值模拟/测量结果建模为伯努利分布,然后基于共轭先验理论将先验知识编码为Beta分布。因此,后期产量可以通过贝叶斯推理在很少的后期样本中准确估计。几个电路实例表明,BMF-BD在不牺牲任何精度的情况下,比传统估计器实现了高达10倍的成本降低。
{"title":"BMF-BD: Bayesian model fusion on Bernoulli distribution for efficient yield estimation of integrated circuits","authors":"Chenlei Fang, Fan Yang, Xuan Zeng, Xin Li","doi":"10.1145/2593069.2593099","DOIUrl":"https://doi.org/10.1145/2593069.2593099","url":null,"abstract":"Accurate yield estimation is one of the important yet challenging tasks for both pre-silicon verification and post-silicon validation. In this paper, we propose a novel method of Bayesian model fusion on Bernoulli distribution (BMF-BD) for efficient yield estimation at the late stage by borrowing the prior knowledge from an early stage. BMF-BD is particularly developed to handle the cases where the pre-silicon simulation and/or post-silicon measurement results are binary: either “pass” or “fail”. The key idea is to model the binary simulation/measurement outcome as a Bernoulli distribution and then encode the prior knowledge as a Beta distribution based on the theory of conjugate prior. As such, the late-stage yield can be accurately estimated through Bayesian inference with very few late-stage samples. Several circuit examples demonstrate that BMF-BD achieves up to 10× cost reduction over the conventional estimator without surrendering any accuracy.","PeriodicalId":433816,"journal":{"name":"2014 51st ACM/EDAC/IEEE Design Automation Conference (DAC)","volume":"452 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125781024","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 23
A design methodology for compositional high-level synthesis of communication-centric SoCs 以通信为中心的soc的高阶合成设计方法
Pub Date : 2014-06-01 DOI: 10.1145/2593069.2593071
G. D. Guglielmo, C. Pilato, L. Carloni
Systems-on-chip are increasingly designed at the system level by combining synthesizable IP components that operate concurrently while interacting through communication channels. CAD-tool vendors support this System-Level Design approach with high-level synthesis tools and libraries of interface primitives implementing the communication protocols. These interfaces absorb timing differences in the hardware-component implementations, thus enabling compositional design. However, they introduce also new challenges in terms of functional correctness and performance optimization. We propose a methodology that combines performance analysis and optimization algorithms to automatically address the issues that SoC designers may accidentally introduce when assembling components that are specified at the system level.
片上系统越来越多地在系统级设计,通过组合可合成的IP组件,这些组件在通过通信通道交互时并发操作。cad工具供应商使用高级合成工具和实现通信协议的接口原语库来支持这种系统级设计方法。这些接口吸收硬件组件实现中的时间差异,从而支持组合设计。然而,它们在功能正确性和性能优化方面也带来了新的挑战。我们提出了一种结合性能分析和优化算法的方法,以自动解决SoC设计人员在组装系统级指定组件时可能意外引入的问题。
{"title":"A design methodology for compositional high-level synthesis of communication-centric SoCs","authors":"G. D. Guglielmo, C. Pilato, L. Carloni","doi":"10.1145/2593069.2593071","DOIUrl":"https://doi.org/10.1145/2593069.2593071","url":null,"abstract":"Systems-on-chip are increasingly designed at the system level by combining synthesizable IP components that operate concurrently while interacting through communication channels. CAD-tool vendors support this System-Level Design approach with high-level synthesis tools and libraries of interface primitives implementing the communication protocols. These interfaces absorb timing differences in the hardware-component implementations, thus enabling compositional design. However, they introduce also new challenges in terms of functional correctness and performance optimization. We propose a methodology that combines performance analysis and optimization algorithms to automatically address the issues that SoC designers may accidentally introduce when assembling components that are specified at the system level.","PeriodicalId":433816,"journal":{"name":"2014 51st ACM/EDAC/IEEE Design Automation Conference (DAC)","volume":"113 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124689796","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Post-silicon validation of the IBM POWER8 processor IBM POWER8处理器的硅后验证
Pub Date : 2014-06-01 DOI: 10.1145/2593069.2593183
Amir Nahir, Manoj Dusanapudi, Shakti Kapoor, K. Reick, W. Roesner, Klaus-Dieter Schubert, Keith Sharp, Greg Wetli
The post-silicon validation phase in a processor's design life cycle is geared towards finding all remaining bugs in the system. It is, in fact, our last opportunity to find functional and electrical bugs in the design before shipping it to customers. In this paper, we provide a high-level overview of the methodology and technologies put into use as part of the POWER8 post-silicon functional validation phase. We describe the results and list the primary factors that contributed to this highly successful bring-up.
处理器设计生命周期中的后硅验证阶段旨在发现系统中所有剩余的错误。事实上,这是我们在交付给客户之前发现设计中功能和电气缺陷的最后机会。在本文中,我们提供了作为POWER8后硅功能验证阶段的一部分而投入使用的方法和技术的高级概述。我们描述了结果,并列出了促成这种非常成功的教养的主要因素。
{"title":"Post-silicon validation of the IBM POWER8 processor","authors":"Amir Nahir, Manoj Dusanapudi, Shakti Kapoor, K. Reick, W. Roesner, Klaus-Dieter Schubert, Keith Sharp, Greg Wetli","doi":"10.1145/2593069.2593183","DOIUrl":"https://doi.org/10.1145/2593069.2593183","url":null,"abstract":"The post-silicon validation phase in a processor's design life cycle is geared towards finding all remaining bugs in the system. It is, in fact, our last opportunity to find functional and electrical bugs in the design before shipping it to customers. In this paper, we provide a high-level overview of the methodology and technologies put into use as part of the POWER8 post-silicon functional validation phase. We describe the results and list the primary factors that contributed to this highly successful bring-up.","PeriodicalId":433816,"journal":{"name":"2014 51st ACM/EDAC/IEEE Design Automation Conference (DAC)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125561279","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 24
期刊
2014 51st ACM/EDAC/IEEE Design Automation Conference (DAC)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1