2009 Conference Record of the Forty-Third Asilomar Conference on Signals, Systems and Computers 2009
DOI: 10.1109/acssc.2009.5470121
|View full text |Cite
|
Sign up to set email alerts
|

Analysis of twiddle factor memory complexity of radix-2<sup>i</sup> pipelined FFTs

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
9
0
1

Year Published

2010
2010
2021
2021

Publication Types

Select...
3
3
1
1

Relationship

2
6

Authors

Journals

citations
Cited by 9 publications
(10 citation statements)
references
References 12 publications
0
9
0
1
Order By: Relevance
“…In order to display results of the best performing implementations in more detail, measurements were sorted by number of cache misses separately for different transform lengths. The five best performing implementations are listed in Fig.9 for five different transform lengths between 2 8 and 2 24 . We notice that implementations relying on additional lookup tables (L) do not appear in any of the truncated lists.…”
Section: Ct Bi Gs Ct Bi S Ct Dr Ct Dr F Ct Dr S Mr Bi Mr Bi F mentioning
confidence: 99%
See 1 more Smart Citation
“…In order to display results of the best performing implementations in more detail, measurements were sorted by number of cache misses separately for different transform lengths. The five best performing implementations are listed in Fig.9 for five different transform lengths between 2 8 and 2 24 . We notice that implementations relying on additional lookup tables (L) do not appear in any of the truncated lists.…”
Section: Ct Bi Gs Ct Bi S Ct Dr Ct Dr F Ct Dr S Mr Bi Mr Bi F mentioning
confidence: 99%
“…We can see that when N is large enough, the results do not depend on the transform length. All branch predictor-related results discussed here are related to transforms of length 2 24 . The MR BI S implementation yields a value as low as 0.005 misses per sample.…”
Section: Ct Bi Gs Ct Bi S Ct Dr Ct Dr F Ct Dr S Mr Bi Mr Bi F mentioning
confidence: 99%
“…To exemplify these optimizations, suppose a generator must provide the sine and cosine of nφ in fixed-point notation with 8 fractional bits and no integer bits rounding to the nearest representable value. In this example, φ = 2π/2 11 = π/2 10 , that is, it is trigonometric binary and λ t (φ) = 2 11 is a multiple of 4, and hence, we first apply argument reduction and treat the case n = 2 8 separately as in the example of Section 2. A subgenerator still has to be subsequently implemented with an input space of size 2 8 (w = H t (φ) − 3 = 8).…”
Section: Leading Ones Of the Cosinementioning
confidence: 99%
“…Another example is given by the DFT engines required in applications such as required in Power Line Communications (PLC) [7], Digital Video Broadcasting-Terrestrial 2 (DVB-T2) [8], photon counting [9], and radio astronomy [10]. In those applications, the sequence can be as long as 2 13 , 2 15 , 2 27 , and 2 30 , respectively, and hence the coefficient tables are large in comparison with other elements of the DFT engine [11]. In this paper, we propose an innovative technique to reduce the resources required to implement a sine/cosine generator in application-specific integrated circuit (ASIC) and configurable logic.…”
Section: Introductionmentioning
confidence: 99%
“…(1) Nilai faktor pemutar yang telah didapatkan menggunakan persamaan (1), kemudian dihitung menggunakan metode kupu-kupu. Hasil dari proses perhitungan dengan metode kupukupu akan membagi data menjadi separuh dari jumlah cuplikan [5]. Apabila jumlah data belum memenuhi N/2 maka akan dihitung kembali dengan metode kupu-kupu.…”
Section: Gambar 2 Diagram Konseptual Rtl-sdr[4]unclassified