1998
DOI: 10.1007/978-1-4757-2849-1
|View full text |Cite
|
Sign up to set email alerts
|

Custom Memory Management Methodology

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
102
0

Year Published

2002
2002
2012
2012

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 348 publications
(102 citation statements)
references
References 0 publications
0
102
0
Order By: Relevance
“…In addition, several authors have addressed the problem of laying out scalar variables to make effective use of address generation units in embedded processors [10]. The IMEC group has used several transformations and advocated the use of special hardware for reducing the effect of address arithmetic overhead [4,6,13,14]. Gupta etl al.…”
Section: Related Workmentioning
confidence: 99%
“…In addition, several authors have addressed the problem of laying out scalar variables to make effective use of address generation units in embedded processors [10]. The IMEC group has used several transformations and advocated the use of special hardware for reducing the effect of address arithmetic overhead [4,6,13,14]. Gupta etl al.…”
Section: Related Workmentioning
confidence: 99%
“…In a typical ASDSP the power consumed by memory accesses is a substantial part of the total consumption. By memory management the number of accesses to large memories is reduced by rescheduling the arithmetic operations and utilizing memory hierarchies [5].…”
Section: B Memory Managementmentioning
confidence: 99%
“…For this scheduling to be as effective as possible, careful investigation of the memory access pattern for various algorithmic transformations is done [5].…”
Section: Hardware Mappingmentioning
confidence: 99%
“…Memory access pattern analysis has been also used for source code transformation or data layout optimization [10] [6]. Catthoor et al observed that the source code should be first optimized to generate the optimal memory access patterns for a given memory architecture.…”
Section: Related Workmentioning
confidence: 99%
“…They proposed several optimization techniques. For example, they pack the data structures according to their size and bit-width and allocate them into memory modules to minimize the memory cost [10]. They examine the memory access patterns in the source code to estimate the memory system performance and apply transformation techniques.…”
Section: Related Workmentioning
confidence: 99%