2003
DOI: 10.1049/ip-cdt:20030833
|View full text |Cite
|
Sign up to set email alerts
|

Exploiting loop-level parallelism on coarse-grained reconfigurable architectures using modulo scheduling

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

1
149
0
2

Year Published

2007
2007
2007
2007

Publication Types

Select...
5
2

Relationship

1
6

Authors

Journals

citations
Cited by 98 publications
(152 citation statements)
references
References 8 publications
1
149
0
2
Order By: Relevance
“…The algorithm is based on congestion negotiation and simulated annealing methods. Starting from an invalid schedule that overuses resources, it tries to reduce overuse over time until a valid schedule is found [11]. One main advantage of the DRESC framework is its flexibility: the tools are designed to be retargetable within the ADRES template.…”
Section: The Adres/dresc Frameworkmentioning
confidence: 99%
“…The algorithm is based on congestion negotiation and simulated annealing methods. Starting from an invalid schedule that overuses resources, it tries to reduce overuse over time until a valid schedule is found [11]. One main advantage of the DRESC framework is its flexibility: the tools are designed to be retargetable within the ADRES template.…”
Section: The Adres/dresc Frameworkmentioning
confidence: 99%
“…In essence, the DRESC tool performs the tasks of scheduling, placement, and routing simultaneously. An example from [16] illustrates the scheduling problem, and provides insight into the interconnect requirements in the reconfigurable fabric. Consider the implementation of the dataflow graph in Figure 2(a) on the fabric of Figure 2(b).…”
Section: B) Mapping Technologymentioning
confidence: 99%
“…In this example, the instruction executed by each CFU does not change over time, thus, one context is sufficient for storing the configuration of each multiplexer and functional unit control bits. In general, an architecture with II contexts are required to implement a schedule [16], where a context is a complete set of configuration bits needed to store the values of all multiplexer and functional unit select lines in the fabric. DRESC begins the scheduling task by attempting to schedule the dataflow graph on an architecture with II=1.…”
Section: B) Mapping Technologymentioning
confidence: 99%
See 2 more Smart Citations