Proceedings of the 1998 IEEE/ACM International Conference on Computer-Aided Design - ICCAD '98 1998
DOI: 10.1145/288548.289050
|View full text |Cite
|
Sign up to set email alerts
|

A general approach for regularity extraction in datapath circuits

Abstract: Inmajority ojhigh-performance custom ICdesigns, designers tuke advantage of the high degTee of Regularitypresent in circuits to generate eficient layouts in terms area and perfomance aswellas to Teducethe design effort. Inthis paper, we present a general and comprehensive approach to extTact functional regularity for datapath ciTcuits from their behavioralor structural HDL descn.ptions. The fundamental step is the generation ofa large set of templates, where a template as a subcircuit with multiple instances i… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
11
0

Year Published

2001
2001
2013
2013

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 22 publications
(11 citation statements)
references
References 14 publications
0
11
0
Order By: Relevance
“…The generic regularity extraction problem consists of identifying large existing templates with many instances and covering the graph by the identified templates. Note that this problem was addressed in many different research areas such as in CAD circuit design [2,10,11] or graph mining [5]. For our purposes, regularity extraction consists of identifying the templates with the maximum number of vertices that have got at least two separate instances in the true and the phishing DOM-Trees, allowing some structural differences of the trees.…”
Section: Similarity Assessmentmentioning
confidence: 99%
See 2 more Smart Citations
“…The generic regularity extraction problem consists of identifying large existing templates with many instances and covering the graph by the identified templates. Note that this problem was addressed in many different research areas such as in CAD circuit design [2,10,11] or graph mining [5]. For our purposes, regularity extraction consists of identifying the templates with the maximum number of vertices that have got at least two separate instances in the true and the phishing DOM-Trees, allowing some structural differences of the trees.…”
Section: Similarity Assessmentmentioning
confidence: 99%
“…In order to polynomially bind the complexity of the templates generation phase, as also assumed by [2], we assign for every vertex v ∈ G by a function k : E → 1, . .…”
Section: Formulation and Application Of The Regularity Extraction Promentioning
confidence: 99%
See 1 more Smart Citation
“…1.9. This is an iterative procedure, similar to the methods in Cadambi (1999), Chowdhary (1998), Rao (1993. At each round, after computing an approximate solution for the MISs within each subset, out of all templates in Ω, the heuristic approach selects a template T with a maximum value of the objective function, depending on the weights and approximate solutions for the MISs.…”
Section: The Template Selection Algorithmmentioning
confidence: 99%
“…The algorithms in Cadambi (1999), Chowdhary (1998) provide all templates of a CDFG. The complete set of tree templates and single-PO (single principle output) templates are generated in Chowdhary (1998) and all the single-sink templates (possibly multiple outputs) are found by the configuration profiling tool in Cadambi (1999).…”
Section: Related Workmentioning
confidence: 99%