The 20th Asia and South Pacific Design Automation Conference 2015
DOI: 10.1109/aspdac.2015.7058980
|View full text |Cite
|
Sign up to set email alerts
|

A novel approach using a minimum cost maximum flow algorithm for fault-tolerant topology reconfiguration in NoC architectures

Abstract: An approach using a minimum cost maximum flow algorithm is proposed for fault-tolerant topology reconfiguration in a Network-on-Chip system. Topology reconfiguration is converted into a network flow problem by constructing a directed graph with capacity constraints. A cost factor is considered to differentiate between processing elements. This approach maximizes the use of spare cores to repair faulty systems, with minimal impact on area, throughput and delay. It also provides a transparent virtual topology to… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2016
2016
2024
2024

Publication Types

Select...
3
2
1

Relationship

1
5

Authors

Journals

citations
Cited by 8 publications
(2 citation statements)
references
References 17 publications
0
2
0
Order By: Relevance
“…First, redundant resources could replace the faulty ones by transforming the mapping result equivalently. Thus, CGRAs can provide fault-tolerant designs against a low-yield process and physical failures [162][163][164][165], making it suitable for applications that have a high requirement for fault tolerance, such as aerospace and high-end servers. Second, the redundant resources can implement security check modules to avoid physical attacks and hardware trojans [166].…”
Section: Prospective Evolutions Of Applicationsmentioning
confidence: 99%
“…First, redundant resources could replace the faulty ones by transforming the mapping result equivalently. Thus, CGRAs can provide fault-tolerant designs against a low-yield process and physical failures [162][163][164][165], making it suitable for applications that have a high requirement for fault tolerance, such as aerospace and high-end servers. Second, the redundant resources can implement security check modules to avoid physical attacks and hardware trojans [166].…”
Section: Prospective Evolutions Of Applicationsmentioning
confidence: 99%
“…On the routing-based table algorithm, the path that a message will go through is determined by querying the routing tables [6]. This implementation is often used for irregular networks routing.…”
Section: Basics Of Sbr and Rbrmentioning
confidence: 99%