2002
DOI: 10.1109/tvlsi.2002.807766
|View full text |Cite
|
Sign up to set email alerts
|

A network flow approach to memory bandwidth utilization in embedded DSP core processors

Abstract: This paper presents a network flow approach to solving the register binding and allocation problem for multiword memory access DSP processors. In recently announced DSP processors, 16-bit instructions which simultaneously access four words from memory are supported. A polynomial-time network flow methodology is used to allocate multiword accesses, including constant data-memory layout, while minimizing code size. Results show that improvements of up to 87% in terms of memory bandwidth are obtained compared to … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2002
2002
2023
2023

Publication Types

Select...
2
1
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(4 citation statements)
references
References 14 publications
(14 reference statements)
0
4
0
Order By: Relevance
“…The SPA-resistant ECC was implemented in both binary and prime fields. The algorithm was coded using both "C" and assembly (to take full advantage of the high memory bandwidth [Gebotys 2002] and complex functional units of Star*Core DSP processor core) using the methodology described in Section 3. In this section, small keys will be used to illustrate the design for security methodology, however, the developed ECC codes perform well in practical applications and have been fully verified.…”
Section: Methodsmentioning
confidence: 99%
See 1 more Smart Citation
“…The SPA-resistant ECC was implemented in both binary and prime fields. The algorithm was coded using both "C" and assembly (to take full advantage of the high memory bandwidth [Gebotys 2002] and complex functional units of Star*Core DSP processor core) using the methodology described in Section 3. In this section, small keys will be used to illustrate the design for security methodology, however, the developed ECC codes perform well in practical applications and have been fully verified.…”
Section: Methodsmentioning
confidence: 99%
“…All power traces were obtained by executing the cryptographic algorithms on the SC140 at 100 MHz (for illustration purposes, although 300 MHz power traces showed almost identical power variation), using a pattern generator and high speed oscilloscope to capture the power traces as described in Muresan et al [2001] and Muresan et al [2002]. The SC140 has four multiplier-accumulator units, high memory bandwidth [Gebotys 2002], and a VLIW architecture [Motorola/Lucent 1999] with a supply voltage of 2 V. It has a 16 bit instruction, 40 bit data registers, and a 128 bit data bus, where four 32 bit words can be loaded or stored from/to memory in one cycle. Matlab was used for signal analysis of the power waveforms and GAMS for solving the ILP.…”
Section: Methodsmentioning
confidence: 99%
“…To improve system performance and data efficiency, C.H. Gebotys' 2002 introduces a network flow-based strategy to optimize memory bandwidth utilization in embedded DSP core processors [10]. Donghoon et al [11] designed a robust 16-bit DSP with advanced features, including a 40-bit ALU, a six-level pipeline, and a 17 × 17 parallel multiplier.…”
Section: Existing Workmentioning
confidence: 99%
“…Based on the instruction types and the usage of the upper bank registers within an execution set the instructions are serially grouped or prefix grouped by the assembler [1]. Unlike other DSP processor cores, the SC140 can load or store eight sixteen bit words per cycle (providing a high data memory bandwidth [2]). In this paper we introduce a methodology for developing an empirical instructionbased model which is capable of estimating dynamic current, power or energy consumption for a DSP processor core.…”
Section: Introductionmentioning
confidence: 99%