IEEE Computer Society Annual Symposium on VLSI, 2003. Proceedings.
DOI: 10.1109/isvlsi.2003.1183476
|View full text |Cite
|
Sign up to set email alerts
|

Automated dynamic memory data type implementation exploration and optimization

Abstract: Abstract

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
8
0

Publication Types

Select...
3
3
1

Relationship

0
7

Authors

Journals

citations
Cited by 9 publications
(8 citation statements)
references
References 5 publications
0
8
0
Order By: Relevance
“…Note that we are removing one of the main issues for designers (and clear benefit on our side in the first set of experiments), because the coding and debugging of all variations of DDT implementations is already a very time-consuming process in the overall exploration time. Second, as Table 2 depicts, we have also compared our algorithm with state-of-the-art pruning and optimization methods for DDT implementations presented in [11,12,2].…”
Section: Resultsmentioning
confidence: 99%
See 1 more Smart Citation
“…Note that we are removing one of the main issues for designers (and clear benefit on our side in the first set of experiments), because the coding and debugging of all variations of DDT implementations is already a very time-consuming process in the overall exploration time. Second, as Table 2 depicts, we have also compared our algorithm with state-of-the-art pruning and optimization methods for DDT implementations presented in [11,12,2].…”
Section: Resultsmentioning
confidence: 99%
“…Second, it includes an access component, which can refer to two different basic access patterns: sequential or iteratorbased and random access. In our case we have classified the DDT implementations in basic DDT and multi-layer implementations relevant for embedded multimedia applications, Table 1: Analytical characterization of DDT implementations considered in the exploration as proposed in [11,8]. The basic DDTs are the following ones:…”
Section: Analytical Modeling Of Ddt Implementationsmentioning
confidence: 99%
“…Since we want to automate the process of pinpointing these DDTs (without wasting the valuable time of the designer), we choose to do an exhaustive exploration of the search space of the available DDT solutions. To assist and automate this exploration step, we developed a library-based exploration framework similar to [18,26]. We attach to each candidate DDT of the network application a profile object and run the application for one typical input trace.…”
Section: Ddt Exploration At Application-levelmentioning
confidence: 99%
“…Apart from the memory used to store the data records, the internal mechanisms of the DDTs add memory overhead to create their own internal structures and access mechanisms. Nevertheless, they can achieve great memory footprint gains in comparison to a statically allocated, compile-time memory solution [18].…”
Section: Introductionmentioning
confidence: 99%
“…Conversely, MPARM simulator is particularly effective, especially in analyzing the communication infrastructure among computing nodes. Finally, several authors have explored the way to optimize the utilization of MPSoC memory hierarchy by exploring software mapping techniques [11,12,13], which are complementary approaches to the ideas proposed in this paper.…”
Section: Introduction and Related Workmentioning
confidence: 99%