2009 17th IFIP International Conference on Very Large Scale Integration (VLSI-SoC) 2009
DOI: 10.1109/vlsisoc.2009.6041331
|View full text |Cite
|
Sign up to set email alerts
|

FSM-controlled architectures for linear invasion

Abstract: Abstract-Invasive computing is a novel concept in multiprocessor architecture and programming. Invasion will become an important step towards self-organizing behavior which will be needed in the next generation of massively parallel MPSoCs with unrivaled performance and resource efficiency numbers as one of the main challenges for MPSoC apart from their programming. In this paper we introduce and model a finite state machine for controlling the invasive process in different architectural granularities. The app… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2011
2011
2020
2020

Publication Types

Select...
3
2

Relationship

2
3

Authors

Journals

citations
Cited by 5 publications
(3 citation statements)
references
References 16 publications
0
3
0
Order By: Relevance
“…In previous work [14], a basic FSM-based invasion controller was proposed. This controller was targeting linear arrays of PEs and was able to acquire one PE in every cycle during the invasion phase.…”
Section: Invasion Controllermentioning
confidence: 99%
“…In previous work [14], a basic FSM-based invasion controller was proposed. This controller was targeting linear arrays of PEs and was able to acquire one PE in every cycle during the invasion phase.…”
Section: Invasion Controllermentioning
confidence: 99%
“…The implementation of such a controller may vary according to the architectural requirements and constraints from a simple FSM-based implementation for arealimited architectures, as introduced in [6], to a programmable co-processor. Here, despite of the work in [6] where the controller was designed just for one-dimensional processor arrays, we have extended the controller to support exploration and reservation of a linear chain of connected PEs on general multi-dimensional architectures. The next section proposes different approaches for gathering resource explorations and for informing a configuration loader for infecting sets of captured PEs.…”
Section: Distributed Resource Reservationmentioning
confidence: 99%
“…We call this information a "claim". In [6], a simple integer is incremented and rippled back to the master PE as the number of captured PEs after a successful exploration process. This mechanism could work perfectly for a simple linear array of processing elements, but for more complex architectures, like two dimensional coarse-grained reconfigurable arrays (CGRAs) [4], [7], such results should reflect not only the amount of captured PEs, but also their locations.…”
Section: Claim Collectionmentioning
confidence: 99%