首页 > 最新文献

2014 Design, Automation & Test in Europe Conference & Exhibition (DATE)最新文献

英文 中文
Standard cell library tuning for variability tolerant designs 标准单元库调整可变性容忍设计
Pub Date : 2014-03-24 DOI: 10.7873/DATE.2014.242
Sebastien Fabrie, J. Echeverri, M. Vertregt, J. P. D. Gyvez
In today's semiconductor industry we see a move towards smaller technology feature sizes. These smaller feature sizes pose a problem due to mismatch between identical cells on a single die known as local variation. In this paper a library tuning method is proposed which makes a smart selection of cells in a standard cell library to reduce the design's sensitivity to local variability. This results in a robust IC design with an identifiable behavior towards local variations. Experimental results performed on a widely used microprocessor design synthesized for a high performance timing show that we can achieve a timing spread reduction of 37% at an area increase cost of 7%.
在今天的半导体工业中,我们看到技术特征尺寸朝着更小的方向发展。这些较小的特征尺寸造成了一个问题,因为在一个模具上相同的细胞之间不匹配,称为局部变异。本文提出了一种库调优方法,在标准单元库中对单元进行智能选择,以降低设计对局部变异性的敏感性。这导致了对局部变化具有可识别行为的稳健IC设计。在一种广泛应用的高性能定时合成微处理器设计上进行的实验结果表明,我们可以在增加7%的面积成本的情况下实现37%的定时扩展减小。
{"title":"Standard cell library tuning for variability tolerant designs","authors":"Sebastien Fabrie, J. Echeverri, M. Vertregt, J. P. D. Gyvez","doi":"10.7873/DATE.2014.242","DOIUrl":"https://doi.org/10.7873/DATE.2014.242","url":null,"abstract":"In today's semiconductor industry we see a move towards smaller technology feature sizes. These smaller feature sizes pose a problem due to mismatch between identical cells on a single die known as local variation. In this paper a library tuning method is proposed which makes a smart selection of cells in a standard cell library to reduce the design's sensitivity to local variability. This results in a robust IC design with an identifiable behavior towards local variations. Experimental results performed on a widely used microprocessor design synthesized for a high performance timing show that we can achieve a timing spread reduction of 37% at an area increase cost of 7%.","PeriodicalId":6550,"journal":{"name":"2014 Design, Automation & Test in Europe Conference & Exhibition (DATE)","volume":"24 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2014-03-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73740409","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Physical vulnerabilities of Physically Unclonable Functions 物理不可克隆函数的物理漏洞
Pub Date : 2014-03-24 DOI: 10.7873/DATE.2014.363
Clemens Helfmeier, C. Boit, Dmitry Nedospasov, Shahin Tajik, Jean-Pierre Seifert
In recent years one of the most popular areas of research in hardware security has been Physically Unclonable Functions (PUF). PUFs provide primitives for implementing tamper detection, encryption and device fingerprinting. One particularly common application is replacing Non-volatile Memory (NVM) as key storage in embedded devices like smart cards and secure microcontrollers. Though a wide array of PUF have been demonstrated in the academic literature, vendors have only begun to roll out PUFs in their end-user products. Moreover, the improvement to overall system security provided by PUFs is still the subject of much debate. This work reviews the state of the art of PUFs in general, and as a replacement for key storage in particular. We review also techniques and methodologies which make the physical response characterization and physical/digital cloning of PUFs possible.
物理不可克隆功能(PUF)是近年来硬件安全研究中最热门的领域之一。puf提供了实现篡改检测、加密和设备指纹的基本要素。一个特别常见的应用是取代非易失性存储器(NVM)作为智能卡和安全微控制器等嵌入式设备的密钥存储。尽管在学术文献中已经展示了大量的PUF,但供应商才刚刚开始在其最终用户产品中推出PUF。此外,puf提供的整体系统安全性的改进仍然是许多争论的主题。本文概述了puf技术的总体现状,特别是作为密钥存储的替代品。我们还回顾了使puf的物理响应表征和物理/数字克隆成为可能的技术和方法。
{"title":"Physical vulnerabilities of Physically Unclonable Functions","authors":"Clemens Helfmeier, C. Boit, Dmitry Nedospasov, Shahin Tajik, Jean-Pierre Seifert","doi":"10.7873/DATE.2014.363","DOIUrl":"https://doi.org/10.7873/DATE.2014.363","url":null,"abstract":"In recent years one of the most popular areas of research in hardware security has been Physically Unclonable Functions (PUF). PUFs provide primitives for implementing tamper detection, encryption and device fingerprinting. One particularly common application is replacing Non-volatile Memory (NVM) as key storage in embedded devices like smart cards and secure microcontrollers. Though a wide array of PUF have been demonstrated in the academic literature, vendors have only begun to roll out PUFs in their end-user products. Moreover, the improvement to overall system security provided by PUFs is still the subject of much debate. This work reviews the state of the art of PUFs in general, and as a replacement for key storage in particular. We review also techniques and methodologies which make the physical response characterization and physical/digital cloning of PUFs possible.","PeriodicalId":6550,"journal":{"name":"2014 Design, Automation & Test in Europe Conference & Exhibition (DATE)","volume":"33 1","pages":"1-4"},"PeriodicalIF":0.0,"publicationDate":"2014-03-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75235305","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 31
Property directed invariant refinement for program verification 用于程序验证的属性定向不变精化
Pub Date : 2014-03-24 DOI: 10.7873/DATE.2014.127
Tobias Welp, A. Kuehlmann
We present a novel, sound, and complete algorithm for deciding safety properties in programs with static memory allocation. The new algorithm extends the program verification paradigm using loop invariants presented in [1] with a counterexample guided abstraction refinement (CEGAR) loop [2] where the refinement is achieved by strengthening loop invariants using the QFBV generalization of Property Directed Reachability (PDR) discussed in [3, 4]. We compare the algorithm with other approaches to program verification and report experimental results.
我们提出了一种新的、健全的、完整的算法来决定静态内存分配程序的安全属性。新算法使用[1]中提出的循环不变量扩展了程序验证范式,并使用反例引导抽象细化(CEGAR)循环[2],其中细化是通过使用[3,4]中讨论的属性定向可达性(PDR)的QFBV泛化来加强循环不变量来实现的。我们将该算法与其他方法进行了程序验证,并报告了实验结果。
{"title":"Property directed invariant refinement for program verification","authors":"Tobias Welp, A. Kuehlmann","doi":"10.7873/DATE.2014.127","DOIUrl":"https://doi.org/10.7873/DATE.2014.127","url":null,"abstract":"We present a novel, sound, and complete algorithm for deciding safety properties in programs with static memory allocation. The new algorithm extends the program verification paradigm using loop invariants presented in [1] with a counterexample guided abstraction refinement (CEGAR) loop [2] where the refinement is achieved by strengthening loop invariants using the QFBV generalization of Property Directed Reachability (PDR) discussed in [3, 4]. We compare the algorithm with other approaches to program verification and report experimental results.","PeriodicalId":6550,"journal":{"name":"2014 Design, Automation & Test in Europe Conference & Exhibition (DATE)","volume":"27 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2014-03-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74771297","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Brisk and limited-impact NoC routing reconfiguration 快速和有限影响的NoC路由重新配置
Pub Date : 2014-03-24 DOI: 10.7873/DATE2014.319
Doowon Lee, Ritesh Parikh, V. Bertacco
The expected low reliability of the silicon substrate at upcoming technology nodes presents a key challenge for digital system designers. Networks-on-chip (NoCs) are especially concerning because they are often the only communication infrastructure for the chips in which they are deployed. Recently, routing reconfiguration solutions have been proposed to address this problem. However, they come at a high silicon cost, and often require suspending the normal network activity while executing a centralized, resource-hungry reconfiguration algorithm. This paper proposes a novel, fast and minimalistic routing reconfiguration algorithm, called BLINC. BLINC utilizes pre-computed routing metadata to quickly evaluate localized detours upon each fault manifestation. We showcase the efficacy of our algorithm by deploying it in a novel NoC fault detection and reconfiguration solution, where BLINC enables uninterrupted NoC operation during aggressive online testing. If a fault seems likely to occur, we circumvent it in advance with the aid of our BLINC reconfiguration algorithm. Experimental results show an 80% reduction in the average number of routers affected by a reconfiguration event, compared to state-of-the-art techniques. BLINC enables negligible performance degradation in our detection and reconfiguration solution, while solutions based on current techniques suffer a 17-fold latency increase.
在即将到来的技术节点上,硅衬底的低可靠性对数字系统设计人员提出了一个关键挑战。片上网络(noc)尤其令人担忧,因为它们通常是部署它们的芯片的唯一通信基础设施。最近,路由重新配置解决方案被提出来解决这个问题。然而,它们的硅成本很高,并且通常需要在执行集中的、资源密集型的重新配置算法时暂停正常的网络活动。本文提出了一种新颖、快速、简约的路由重构算法BLINC。BLINC利用预先计算的路由元数据来快速评估每个故障表现的局部弯路。通过将该算法部署到一种新的NoC故障检测和重新配置解决方案中,我们展示了该算法的有效性,其中BLINC可以在积极的在线测试期间不间断地运行NoC。如果故障似乎很可能发生,我们可以借助BLINC重构算法提前规避故障。实验结果表明,与最先进的技术相比,受重新配置事件影响的路由器平均数量减少了80%。在我们的检测和重新配置解决方案中,BLINC使性能下降可以忽略不计,而基于当前技术的解决方案的延迟增加了17倍。
{"title":"Brisk and limited-impact NoC routing reconfiguration","authors":"Doowon Lee, Ritesh Parikh, V. Bertacco","doi":"10.7873/DATE2014.319","DOIUrl":"https://doi.org/10.7873/DATE2014.319","url":null,"abstract":"The expected low reliability of the silicon substrate at upcoming technology nodes presents a key challenge for digital system designers. Networks-on-chip (NoCs) are especially concerning because they are often the only communication infrastructure for the chips in which they are deployed. Recently, routing reconfiguration solutions have been proposed to address this problem. However, they come at a high silicon cost, and often require suspending the normal network activity while executing a centralized, resource-hungry reconfiguration algorithm. This paper proposes a novel, fast and minimalistic routing reconfiguration algorithm, called BLINC. BLINC utilizes pre-computed routing metadata to quickly evaluate localized detours upon each fault manifestation. We showcase the efficacy of our algorithm by deploying it in a novel NoC fault detection and reconfiguration solution, where BLINC enables uninterrupted NoC operation during aggressive online testing. If a fault seems likely to occur, we circumvent it in advance with the aid of our BLINC reconfiguration algorithm. Experimental results show an 80% reduction in the average number of routers affected by a reconfiguration event, compared to state-of-the-art techniques. BLINC enables negligible performance degradation in our detection and reconfiguration solution, while solutions based on current techniques suffer a 17-fold latency increase.","PeriodicalId":6550,"journal":{"name":"2014 Design, Automation & Test in Europe Conference & Exhibition (DATE)","volume":"222 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2014-03-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75640317","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 30
Mapping mixed-criticality applications on multi-core architectures 在多核架构上映射混合关键应用程序
Pub Date : 2014-03-24 DOI: 10.7873/DATE.2014.111
G. Giannopoulou, N. Stoimenov, Pengcheng Huang, L. Thiele
A common trend in real-time embedded systems is to integrate multiple applications on a single platform. Such systems are known as mixed-criticality (MC) systems when the applications are characterized by different criticality levels. Nowadays, multicore platforms are promoted due to cost and performance benefits. However, certification of multicore MC systems is challenging as concurrently executed applications of different criticalities may block each other when accessing shared platform resources. Most of the existing research on multicore MC scheduling ignores the effects of resource sharing on the response times of applications. Recently, a MC scheduling strategy was proposed, which explicitly accounts for these effects. This paper discusses how to combine this policy with an optimization method for the partitioning of tasks to cores as well as the static mapping of memory blocks, i.e., task data and communication buffers, to the banks of a shared memory architecture. Optimization is performed at design time targeting at minimizing the worst-case response times of tasks and achieving efficient resource utilization. The proposed optimization method is evaluated using an industrial application.
实时嵌入式系统的一个共同趋势是在单个平台上集成多个应用程序。当应用程序具有不同临界水平的特征时,这种系统被称为混合临界系统。如今,由于成本和性能优势,多核平台得到了推广。然而,多核MC系统的认证具有挑战性,因为不同关键程度的并发执行应用程序在访问共享平台资源时可能会相互阻塞。现有的多核MC调度研究大多忽略了资源共享对应用程序响应时间的影响。最近,提出了一种MC调度策略,明确地考虑了这些影响。本文讨论了如何将该策略与一种优化方法相结合,以将任务划分到核心,以及将内存块(即任务数据和通信缓冲区)静态映射到共享内存体系结构的库。优化在设计时执行,目标是最小化任务的最坏情况响应时间,并实现有效的资源利用。通过工业应用对所提出的优化方法进行了评价。
{"title":"Mapping mixed-criticality applications on multi-core architectures","authors":"G. Giannopoulou, N. Stoimenov, Pengcheng Huang, L. Thiele","doi":"10.7873/DATE.2014.111","DOIUrl":"https://doi.org/10.7873/DATE.2014.111","url":null,"abstract":"A common trend in real-time embedded systems is to integrate multiple applications on a single platform. Such systems are known as mixed-criticality (MC) systems when the applications are characterized by different criticality levels. Nowadays, multicore platforms are promoted due to cost and performance benefits. However, certification of multicore MC systems is challenging as concurrently executed applications of different criticalities may block each other when accessing shared platform resources. Most of the existing research on multicore MC scheduling ignores the effects of resource sharing on the response times of applications. Recently, a MC scheduling strategy was proposed, which explicitly accounts for these effects. This paper discusses how to combine this policy with an optimization method for the partitioning of tasks to cores as well as the static mapping of memory blocks, i.e., task data and communication buffers, to the banks of a shared memory architecture. Optimization is performed at design time targeting at minimizing the worst-case response times of tasks and achieving efficient resource utilization. The proposed optimization method is evaluated using an industrial application.","PeriodicalId":6550,"journal":{"name":"2014 Design, Automation & Test in Europe Conference & Exhibition (DATE)","volume":"10 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2014-03-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74001210","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 48
Mixed allocation of adjustable delay buffers combined with buffer sizing in clock tree synthesis of multiple power mode designs 多功率模式时钟树综合设计中可调延迟缓冲器的混合分配与缓冲器大小
Pub Date : 2014-03-24 DOI: 10.7873/DATE.2014.276
Kitae Park, Geunho Kim, Taewhan Kim
Recently, many works have shown that adjustable delay buffer (ADB) whose delay is adjustable dynamically can effectively solve the clock skew variation problem in the designs with multiple power modes. However, all the previous works of ADB allocation inherently entail two critical limitations, which are the adjusted delays by ADB are always increments and the low cost buffer sizing has never been or not been primarily taken into account. To demonstrate how much overcoming the two limitations is effective in resolving the clock skew constraint, we characterize the two types of ADBs called CADB (capacitor based ADB) and IADB (inverter based ADB) and show that the adjusted delays by IADB can be decremented, and show that the clock skew violation in some clock trees of multiple power modes can be resolved by applying buffer sizing together with using only a small number of IADBs and CADBs.
近年来,许多研究表明,延迟可动态调节的可调延迟缓冲器(ADB)可以有效地解决多功率模式设计中的时钟偏差变化问题。然而,以往所有的ADB分配工作都固有地存在两个关键的局限性,即ADB调整后的延迟始终是增量的,而低成本的缓冲区大小从未或没有被主要考虑。为了证明克服这两个限制在多大程度上有效地解决了时钟倾斜约束,我们对两种类型的ADBs进行了表征,称为CADB(基于电容器的ADB)和IADB(基于逆变器的ADB),并表明IADB调整的延迟可以减少,并表明在一些多功率模式的时钟树中,时钟倾斜违反可以通过应用缓冲大小以及仅使用少量的IADB和CADB来解决。
{"title":"Mixed allocation of adjustable delay buffers combined with buffer sizing in clock tree synthesis of multiple power mode designs","authors":"Kitae Park, Geunho Kim, Taewhan Kim","doi":"10.7873/DATE.2014.276","DOIUrl":"https://doi.org/10.7873/DATE.2014.276","url":null,"abstract":"Recently, many works have shown that adjustable delay buffer (ADB) whose delay is adjustable dynamically can effectively solve the clock skew variation problem in the designs with multiple power modes. However, all the previous works of ADB allocation inherently entail two critical limitations, which are the adjusted delays by ADB are always increments and the low cost buffer sizing has never been or not been primarily taken into account. To demonstrate how much overcoming the two limitations is effective in resolving the clock skew constraint, we characterize the two types of ADBs called CADB (capacitor based ADB) and IADB (inverter based ADB) and show that the adjusted delays by IADB can be decremented, and show that the clock skew violation in some clock trees of multiple power modes can be resolved by applying buffer sizing together with using only a small number of IADBs and CADBs.","PeriodicalId":6550,"journal":{"name":"2014 Design, Automation & Test in Europe Conference & Exhibition (DATE)","volume":"28 1","pages":"1-4"},"PeriodicalIF":0.0,"publicationDate":"2014-03-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73118234","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Scalability bottlenecks discovery in MPSoC platforms using data mining on simulation traces 在模拟轨迹上使用数据挖掘发现MPSoC平台的可扩展性瓶颈
Pub Date : 2014-03-24 DOI: 10.7873/DATE.2014.199
S. Lagraa, A. Termier, F. Pétrot
Nowadays, a challenge faced by many developers is the profiling of parallel applications so that they can scale over more and more cores. This is especially critical for embedded systems powered by Multi-Processor System-on-Chip (MPSoC), where ever demanding applications have to run smoothly on numerous cores, each with modest power budget. The reasons for the lack of scalability of parallel applications are numerous, and it can be time consuming for a developer to pinpoint the correct one. In this paper, we propose a fully automatic method which detects the instructions of the code which lead to a lack of scalability. The method is based on data mining techniques exploiting low level execution traces produced by MPSoC simulators. Our experiments show the accuracy of the proposed technique on five different kinds of applications, and how the information reported can be exploited by application developers.
如今,许多开发人员面临的挑战是对并行应用程序进行分析,以便它们可以扩展到越来越多的核心。这对于由多处理器片上系统(MPSoC)驱动的嵌入式系统尤其重要,因为要求很高的应用程序必须在多个核心上平稳运行,每个核心的功耗预算都很有限。并行应用程序缺乏可伸缩性的原因有很多,对于开发人员来说,找出正确的原因可能需要花费大量时间。在本文中,我们提出了一种完全自动化的方法来检测导致缺乏可扩展性的代码指令。该方法基于数据挖掘技术,利用MPSoC模拟器产生的低级执行轨迹。我们的实验显示了所提出的技术在五种不同类型的应用程序上的准确性,以及应用程序开发人员如何利用所报告的信息。
{"title":"Scalability bottlenecks discovery in MPSoC platforms using data mining on simulation traces","authors":"S. Lagraa, A. Termier, F. Pétrot","doi":"10.7873/DATE.2014.199","DOIUrl":"https://doi.org/10.7873/DATE.2014.199","url":null,"abstract":"Nowadays, a challenge faced by many developers is the profiling of parallel applications so that they can scale over more and more cores. This is especially critical for embedded systems powered by Multi-Processor System-on-Chip (MPSoC), where ever demanding applications have to run smoothly on numerous cores, each with modest power budget. The reasons for the lack of scalability of parallel applications are numerous, and it can be time consuming for a developer to pinpoint the correct one. In this paper, we propose a fully automatic method which detects the instructions of the code which lead to a lack of scalability. The method is based on data mining techniques exploiting low level execution traces produced by MPSoC simulators. Our experiments show the accuracy of the proposed technique on five different kinds of applications, and how the information reported can be exploited by application developers.","PeriodicalId":6550,"journal":{"name":"2014 Design, Automation & Test in Europe Conference & Exhibition (DATE)","volume":"86 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2014-03-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80012912","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Signature indexing of design layouts for hotspot detection 用于热点检测的设计布局签名索引
Pub Date : 2014-03-24 DOI: 10.7873/DATE.2014.371
Cristian Andrades, Michael A. Rodriguez, C. Chiang
This work presents a new signature for 2D spatial configurations that is useful for the optimization of a hotspot detection process. The signature is a string of numbers representing changes along the horizontal and vertical slices of a configuration, which serves as the key of an inverted index that groups layout' windows with the same signature. The method extracts signatures from a compact specification of similar exact patterns with a fixed size. Then, these signatures are used as search keys of the inverted index to retrieve candidate windows that can match the patterns. Experimental results show that this simple type of signature has 100% recall and, in average, over 85% of precision in terms of the area effectively covered by the pattern and the retrieved area of the layout. In addition, the signature shows a good discriminate quality, since around 99% of the extracted signatures match each of them with a single pattern.
这项工作提出了一个新的二维空间配置签名,这对热点检测过程的优化是有用的。签名是一串数字,表示配置的水平和垂直切片的变化,它作为倒排索引的键,该索引将具有相同签名的布局窗口分组。该方法从具有固定大小的相似精确模式的紧凑规范中提取签名。然后,将这些签名用作倒排索引的搜索键,以检索与模式匹配的候选窗口。实验结果表明,这种简单类型的签名具有100%的召回率,在图案有效覆盖的面积和布局的检索面积方面,平均准确率超过85%。此外,该签名显示出良好的区分质量,因为大约99%的提取签名与每个签名都匹配一个单一的模式。
{"title":"Signature indexing of design layouts for hotspot detection","authors":"Cristian Andrades, Michael A. Rodriguez, C. Chiang","doi":"10.7873/DATE.2014.371","DOIUrl":"https://doi.org/10.7873/DATE.2014.371","url":null,"abstract":"This work presents a new signature for 2D spatial configurations that is useful for the optimization of a hotspot detection process. The signature is a string of numbers representing changes along the horizontal and vertical slices of a configuration, which serves as the key of an inverted index that groups layout' windows with the same signature. The method extracts signatures from a compact specification of similar exact patterns with a fixed size. Then, these signatures are used as search keys of the inverted index to retrieve candidate windows that can match the patterns. Experimental results show that this simple type of signature has 100% recall and, in average, over 85% of precision in terms of the area effectively covered by the pattern and the retrieved area of the layout. In addition, the signature shows a good discriminate quality, since around 99% of the extracted signatures match each of them with a single pattern.","PeriodicalId":6550,"journal":{"name":"2014 Design, Automation & Test in Europe Conference & Exhibition (DATE)","volume":"20 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2014-03-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88944037","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Optimization of standard cell based detailed placement for 16 nm FinFET process 基于标准电池的16nm FinFET工艺细节布局优化
Pub Date : 2014-03-24 DOI: 10.7873/DATE2014.370
Yuelin Du, Martin D. F. Wong
FinFET transistors have great advantages over traditional planar MOSFET transistors in high performance and low power applications. Major foundries are adopting the Fin-FET technology for CMOS semiconductor device fabrication in the 16 nm technology node and beyond. Edge device degradation is among the major challenges for the FinFET process. To avoid such degradation, dummy gates are needed on device edges, and the dummy gates have to be tied to power rails in order not to introduce unconnected parasitic transistors. This requires that each dummy gate must abut at least one source node after standard cell placement. If the drain nodes at two adjacent cell boundaries abut each other, additional source nodes must be inserted in between for dummy gate power tying, which costs more placement area. Usually there is some flexibility during detailed placement to horizontally flip the cells or switch the positions of adjacent cells, which has little impact on the global placement objectives, such as timing conditions and net congestion. This paper proposes a detailed placement optimization strategy for the standard cell based designs. By flipping a subset of cells in a standard cell row and switching pairs of adjacent cells, the number of drain to drain abutments between adjacent cell boundaries can be optimally minimized, which saves additional source node insertion and reduces the length of the standard cell row. In addition, the proposed graph model can be easily modified to consider more complicated design rules. The experimental results show that the optimization of 100k cells is completed within 0.1 second, verifying the efficiency of the proposed algorithm.
FinFET晶体管在高性能和低功耗应用方面比传统的平面MOSFET晶体管有很大的优势。主要的晶圆代工厂正在采用Fin-FET技术制造16纳米及以上的CMOS半导体器件。边缘器件退化是FinFET工艺面临的主要挑战之一。为了避免这种退化,在器件边缘需要假门,并且假门必须绑在电源轨上,以避免引入未连接的寄生晶体管。这要求在标准单元放置后,每个虚拟门必须至少有一个源节点。如果漏极节点位于相邻的两个单元边界上,则必须在两者之间插入额外的源极节点以进行虚拟栅极功率连接,这将占用更多的放置面积。通常在详细放置过程中有一定的灵活性,可以水平翻转单元或切换相邻单元的位置,这对全局放置目标(如定时条件和网络拥塞)的影响很小。本文提出了一种基于标准单元设计的布局优化策略。通过翻转标准单元行中的单元子集并切换相邻单元对,可以最大限度地减少相邻单元边界之间的排水基台数量,从而节省了额外的源节点插入并减少了标准单元行的长度。此外,所提出的图模型可以很容易地修改,以考虑更复杂的设计规则。实验结果表明,在0.1秒内完成了100k cell的优化,验证了所提算法的有效性。
{"title":"Optimization of standard cell based detailed placement for 16 nm FinFET process","authors":"Yuelin Du, Martin D. F. Wong","doi":"10.7873/DATE2014.370","DOIUrl":"https://doi.org/10.7873/DATE2014.370","url":null,"abstract":"FinFET transistors have great advantages over traditional planar MOSFET transistors in high performance and low power applications. Major foundries are adopting the Fin-FET technology for CMOS semiconductor device fabrication in the 16 nm technology node and beyond. Edge device degradation is among the major challenges for the FinFET process. To avoid such degradation, dummy gates are needed on device edges, and the dummy gates have to be tied to power rails in order not to introduce unconnected parasitic transistors. This requires that each dummy gate must abut at least one source node after standard cell placement. If the drain nodes at two adjacent cell boundaries abut each other, additional source nodes must be inserted in between for dummy gate power tying, which costs more placement area. Usually there is some flexibility during detailed placement to horizontally flip the cells or switch the positions of adjacent cells, which has little impact on the global placement objectives, such as timing conditions and net congestion. This paper proposes a detailed placement optimization strategy for the standard cell based designs. By flipping a subset of cells in a standard cell row and switching pairs of adjacent cells, the number of drain to drain abutments between adjacent cell boundaries can be optimally minimized, which saves additional source node insertion and reduces the length of the standard cell row. In addition, the proposed graph model can be easily modified to consider more complicated design rules. The experimental results show that the optimization of 100k cells is completed within 0.1 second, verifying the efficiency of the proposed algorithm.","PeriodicalId":6550,"journal":{"name":"2014 Design, Automation & Test in Europe Conference & Exhibition (DATE)","volume":"136 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2014-03-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88949095","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 26
DCM: An IP for the autonomous control of optical and electrical reconfigurable NoCs DCM:用于自主控制光和电可重构noc的IP
Pub Date : 2014-03-24 DOI: 10.7873/DATE.2014.322
Wolfgang Büter, Christof Osewold, Daniel Gregorek, A. Ortiz
The increasing requirements for bandwidth and quality-of-service motivate the use of parallel interconnect architectures with several degrees of reconfiguration. This paper presents an IP, called Distributed Channel Management (DCM), to extend existing packet-switched NoCs with a reconfigurable point-to-point network seamlessly, i.e., without the need for any modification on the routers. The configuration of the reconfigurable network takes place dynamically and autonomously, so that the topology can be changed at run time. Furthermore, the architecture is scalable due to the autonomous decentralized administration of the links. The Paper reports a thorough experimental analysis of the overhead of the approach at the gate level that considers different network parameters such as flit size and timing constraints.
对带宽和服务质量日益增长的需求促使人们使用具有不同程度重构的并行互连体系结构。本文提出了一种称为分布式通道管理(DCM)的IP,它可以无缝地扩展现有的分组交换noc,使其具有可重构的点对点网络,即无需对路由器进行任何修改。可重构网络的配置是动态和自主地进行的,因此可以在运行时更改拓扑。此外,由于链路的自治分散管理,该体系结构是可伸缩的。本文报告了在考虑不同网络参数(如飞行大小和时序约束)的门级方法开销的彻底实验分析。
{"title":"DCM: An IP for the autonomous control of optical and electrical reconfigurable NoCs","authors":"Wolfgang Büter, Christof Osewold, Daniel Gregorek, A. Ortiz","doi":"10.7873/DATE.2014.322","DOIUrl":"https://doi.org/10.7873/DATE.2014.322","url":null,"abstract":"The increasing requirements for bandwidth and quality-of-service motivate the use of parallel interconnect architectures with several degrees of reconfiguration. This paper presents an IP, called Distributed Channel Management (DCM), to extend existing packet-switched NoCs with a reconfigurable point-to-point network seamlessly, i.e., without the need for any modification on the routers. The configuration of the reconfigurable network takes place dynamically and autonomously, so that the topology can be changed at run time. Furthermore, the architecture is scalable due to the autonomous decentralized administration of the links. The Paper reports a thorough experimental analysis of the overhead of the approach at the gate level that considers different network parameters such as flit size and timing constraints.","PeriodicalId":6550,"journal":{"name":"2014 Design, Automation & Test in Europe Conference & Exhibition (DATE)","volume":"6 1","pages":"1-4"},"PeriodicalIF":0.0,"publicationDate":"2014-03-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84589470","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
期刊
2014 Design, Automation & Test in Europe Conference & Exhibition (DATE)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1