1989
DOI: 10.1109/43.31534
|View full text |Cite
|
Sign up to set email alerts
|

Algorithms for hardware allocation in data path synthesis

Abstract: Abstract-The most creative step in synthesizing data paths executing software descriptions is the hardware allocation process. New algorithms for the simultaneous costlresource constrained allocation of registers, arithmetic units, and interconnect in a data path have been developed. The entire allocation process can be formulated as a twodimensional placement problem of microinstructions in space and time. This formulation readily lends itself to the use of a variety of heuristics for solving the allocation p… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
51
0
4

Year Published

1992
1992
2023
2023

Publication Types

Select...
5
3
1

Relationship

0
9

Authors

Journals

citations
Cited by 204 publications
(55 citation statements)
references
References 28 publications
0
51
0
4
Order By: Relevance
“…number of floating-point operators) and partitioning the nodes based on locality using a high-quality partitioner MLPart [23]. We then provision the number of hardware operators of each type according to instruction frequency and allocate them to partitions using need-proportional distribution [24], [25]. Each partition can process operations of a single operator type.…”
Section: B Tool Flowmentioning
confidence: 99%
“…number of floating-point operators) and partitioning the nodes based on locality using a high-quality partitioner MLPart [23]. We then provision the number of hardware operators of each type according to instruction frequency and allocate them to partitions using need-proportional distribution [24], [25]. Each partition can process operations of a single operator type.…”
Section: B Tool Flowmentioning
confidence: 99%
“…A related methodology, based on simulated annealing, has also been published [18]. The synthesis methodology is outlined in this paper and the parts that deal with incorporating fault-security are detailed.…”
Section: Behavioral Synthesis Frameworkmentioning
confidence: 99%
“…Any equation of form (18) in n variables, with each having a range of fHY IY F F F Y P x À Ig, which is not an identity, will have at most p à P xnÀI solutions. To see this, we can simply fix the values of all but one of the variables and solve for the remaining one variable.…”
Section: Faults In Registers and Multiplexersmentioning
confidence: 99%
“…[5], have developed an integer programming model which can perform optimisation on the whole datapath synthesis problem. Devadas and Newton [2] use simulated annealing to perform global datapath optimisation. However, neither of these systems are designed to take physical domain effects into account during synthesis.…”
Section: Previous Workmentioning
confidence: 99%