Proceedings of the Companion Publication of the 2014 Annual Conference on Genetic and Evolutionary Computation 2014
DOI: 10.1145/2598394.2598430
|View full text |Cite
|
Sign up to set email alerts
|

Hybridization of NSGA-II with greedy re-assignment for variation tolerant logic mapping on nano-scale crossbar architectures

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0

Year Published

2016
2016
2018
2018

Publication Types

Select...
2

Relationship

1
1

Authors

Journals

citations
Cited by 2 publications
(6 citation statements)
references
References 4 publications
0
6
0
Order By: Relevance
“…We see that the proposed technique always gives the best result, which is 3-5% better than greedy from the literature [20] and 10-15% than random mapping. The reason is that the greedy mapping proposed in [20], and also used in [22], determines lb i 's by using sums of all delay values in a V M column. However, we select a minimum sum of T i delay values where T i is the number of 1's in the F M column to be mapped.…”
Section: Simulations For Vtlmmentioning
confidence: 75%
See 2 more Smart Citations
“…We see that the proposed technique always gives the best result, which is 3-5% better than greedy from the literature [20] and 10-15% than random mapping. The reason is that the greedy mapping proposed in [20], and also used in [22], determines lb i 's by using sums of all delay values in a V M column. However, we select a minimum sum of T i delay values where T i is the number of 1's in the F M column to be mapped.…”
Section: Simulations For Vtlmmentioning
confidence: 75%
“…In average, runtimes are generally much higher (×30 − 40) than ours. In order to improve runtimes, Zhong et al use a greedy reassignment technique [20], originally proposed in [21]. We also used this method as as an alternative to initial column mapping method and compared optimization results.…”
Section: Previous Workmentioning
confidence: 99%
See 1 more Smart Citation
“…This paper proposes one such operator, called defect-and variationaware local search (D/VALS). The key idea is inherited from the greedy reassignment (GR) local search operators for DTLM [18] and VTLM [21], which is to reassign the values of parts of the individual by taking advantage of the greedy information extracted from the problems. However, instead of individually utilizing defect information [18] or variation information [21], the D/VALS operator is capable of utilizing the combined information of both defect and variation.…”
Section: Take Down Policymentioning
confidence: 99%
“…Given a parent chromosome, the operator produces a child chromosome that is expected to outperform the parent. The key idea of the operator is inherited from the previous GR local search operators for DTLM [18] and VTLM [21]. However, instead of individually utilizing defect information [18] or variation information [21], the operator is capable of utilizing the combined information on both defect and variation.…”
Section: Defect/variation-aware Local Searchmentioning
confidence: 99%