Proceedings of the 13th ACM Great Lakes Symposium on VLSI 2003
DOI: 10.1145/764808.764812
|View full text |Cite
|
Sign up to set email alerts
|

A comprehensive high-level synthesis system for control-flow intensive behaviors

Abstract: In this paper, we describe a comprehensive high-level synthesis system for control-flow intensive as well as data-dominated behaviors. We propose a new control-data flow graph model to preserve the parallelism inherent in the application, as well as to facilitate high-level synthesis. Our algorithm, which is based on an iterative improvement strategy, performs clock selection, scheduling, module selection, resource allocation and assignment simultaneously to fully derive the benefits of design space exploratio… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
13
0

Year Published

2006
2006
2020
2020

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 20 publications
(13 citation statements)
references
References 9 publications
0
13
0
Order By: Relevance
“…Typical HLS tasks such as scheduling, resource allocation, module binding, module selection, register binding and clock selection are executed simultaneously in [13] so as to achieve better optimization in design energy, power and area. The scheduling algorithm utilized in [13] applies concurrent loop optimization and multi cycling and it is driven by resource constraints.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Typical HLS tasks such as scheduling, resource allocation, module binding, module selection, register binding and clock selection are executed simultaneously in [13] so as to achieve better optimization in design energy, power and area. The scheduling algorithm utilized in [13] applies concurrent loop optimization and multi cycling and it is driven by resource constraints.…”
Section: Related Workmentioning
confidence: 99%
“…The scheduling algorithm utilized in [13] applies concurrent loop optimization and multi cycling and it is driven by resource constraints. The tool generates RTL Verlog implementations.…”
Section: Related Workmentioning
confidence: 99%
“…The front-ends exchange information with the back-ends using intermediate formats, such as the Electronic Design Interchange Format (EDIF) [9,10], used by most E-CAD tools. Complex control flow optimization has been evaluated in [2,11,12], but for small parts of code and by no means complete application tests [13], discusses synthesis for distributed logic and memory [14] uses communicating processes as a system specification medium. HLS methods that include memory access management are outlined in [1], where digital signal processing (DSP) and streaming applications are synthesized using performance constraints [15], analyses mutually exclusive scheduling on extended data-flow graphs (EDFG) [16] synthesizes behavioural descriptions with time constraints, where complex operations are decomposed into simpler ones, and a similar set of decomposed fragments of operators, with the same pattern, are scheduled in a clock cycle.…”
Section: Existing Work In Intelligent Hls Techniquesmentioning
confidence: 99%
“…A recent study by Stitt et al [16] shows how words recently read from memory can be reused. 3) Access ordering and access scheduling: A huge body of work in HLS systems addresses the problem of static scheduling in memory-intensive applications [5], [6], [17]- [19]. Most of these efforts start with a control dataflow-graph specification, where memory references are explicitly marked (i.e., statically disambiguated).…”
Section: A Specification Supportmentioning
confidence: 99%
“…Although some HLS tools allow some type of memory abstraction, they all impose heavy restrictions on the use of these abstractions. For example, many HLS tools impose a fixed access latency for memory accesses [3], [5], [6]. This is usually the worst case (and often unacceptable) latency for a memory access, and, in general, all of the tools restrict the input specification to statically explicit memory dependences.…”
mentioning
confidence: 99%