2018 IEEE International Symposium on Information Theory (ISIT) 2018
DOI: 10.1109/isit.2018.8437451
|View full text |Cite
|
Sign up to set email alerts
|

Low-Power Cooling Codes with Efficient Encoding and Decoding

Abstract: A class of low-power cooling (LPC) codes, to control simultaneously both the peak temperature and the average power consumption of interconnects, was introduced recently. An (n, t, w)-LPC code is a coding scheme over n wires that (A) avoids state transitions on the t hottest wires (cooling), and (B) limits the number of transitions to w in each transmission (low-power).A few constructions for large LPC codes that have efficient encoding and decoding schemes, are given. In particular, when w is fixed, we constr… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
7
0

Year Published

2018
2018
2019
2019

Publication Types

Select...
2

Relationship

1
1

Authors

Journals

citations
Cited by 2 publications
(7 citation statements)
references
References 12 publications
0
7
0
Order By: Relevance
“…, y n ) such that y j = 0 for all j ∈ S. The cooling codes of [2] provide an elegant solution to this problem using spreads or partial spreads [4,12]. Domination mappings were introduced in [3] in order to simultaneously achieve both of these desirable properties. Given a subset S of [n], one can follow the edges of the domination graph G to find a subset S of [m] so that every position in S is dominated by some position in S .…”
Section: Applications To Coding For Interconnectsmentioning
confidence: 99%
See 4 more Smart Citations
“…, y n ) such that y j = 0 for all j ∈ S. The cooling codes of [2] provide an elegant solution to this problem using spreads or partial spreads [4,12]. Domination mappings were introduced in [3] in order to simultaneously achieve both of these desirable properties. Given a subset S of [n], one can follow the edges of the domination graph G to find a subset S of [m] so that every position in S is dominated by some position in S .…”
Section: Applications To Coding For Interconnectsmentioning
confidence: 99%
“…If ϕ is a G-dominating mapping from {0, 1} m into B(n, w), the transmitted word y = ϕ(x) satisfies wt(y) w and y j = 0 for all j ∈ S. Since ϕ is injective, x can be recovered from y at the receiver. For more details on this encoding/decoding procedure, we refer the reader to [2,3].…”
Section: Applications To Coding For Interconnectsmentioning
confidence: 99%
See 3 more Smart Citations