2010 15th Asia and South Pacific Design Automation Conference (ASP-DAC) 2010
DOI: 10.1109/aspdac.2010.5419801
|View full text |Cite
|
Sign up to set email alerts
|

Statistical time borrowing for pulsed-latch circuit designs

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
5
0

Year Published

2011
2011
2023
2023

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 13 publications
(5 citation statements)
references
References 5 publications
0
5
0
Order By: Relevance
“…The paths that constrain the design the most are those between pairs of same polarity FFs, because paths from PETF to NETF allow time borrowing and paths from NETF to PETF cannot be generated by Algorithm 2. This is why in (14) we consider the maximum between the two FF types, rather than the sum.…”
Section: B Area Comparisonmentioning
confidence: 99%
“…The paths that constrain the design the most are those between pairs of same polarity FFs, because paths from PETF to NETF allow time borrowing and paths from NETF to PETF cannot be generated by Algorithm 2. This is why in (14) we consider the maximum between the two FF types, rather than the sum.…”
Section: B Area Comparisonmentioning
confidence: 99%
“…As an intermediate between latch and flip-flop based designs, pulsed-latch schemes have also been proposed [7,8]. These rely on an edge-triggered pulse generator to provide a short transparency window to all latches.…”
Section: Introductionmentioning
confidence: 99%
“…Recent research endeavors have been devoted to EDA solutions for pulsed-latch-based circuits [4][5][6][7][8][9][10][11][12][13]. Most of these works adopt the generic pulsed-latch structure illustrated in Figure 1(a) and flip-flop-like timing analysis.…”
Section: Introductionmentioning
confidence: 99%
“…Most of these works adopt the generic pulsed-latch structure illustrated in Figure 1(a) and flip-flop-like timing analysis. To minimize clock period, Lee et al in [5] [6] and Paik et al in [7] apply aggressive time borrowing techniques, e.g., clock skew scheduling, pulse width allocation, and retiming. These skews, retimed values and widths are derived based on a logic synthesized netlist instead of placement.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation