Network Processor Design 2005
DOI: 10.1016/b978-012088476-6/50014-9
|View full text |Cite
|
Sign up to set email alerts
|

Application analysis and resource mapping for heterogeneous network processor architectures

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
17
0

Year Published

2006
2006
2010
2010

Publication Types

Select...
6
2

Relationship

0
8

Authors

Journals

citations
Cited by 14 publications
(17 citation statements)
references
References 21 publications
0
17
0
Order By: Relevance
“…Shah et al [8] present a technique for task allocation, also for network processors. Further work was presented by Ramaswami, et al [9], who used a randomized algorithm to assign task graphs to processing elements. However, none of the techniques presented in these works consider process transformation such as replication or merging which are essential (as we show later) for exploiting the full performance potential of SMP architectures.…”
Section: Problem Descriptionmentioning
confidence: 99%
“…Shah et al [8] present a technique for task allocation, also for network processors. Further work was presented by Ramaswami, et al [9], who used a randomized algorithm to assign task graphs to processing elements. However, none of the techniques presented in these works consider process transformation such as replication or merging which are essential (as we show later) for exploiting the full performance potential of SMP architectures.…”
Section: Problem Descriptionmentioning
confidence: 99%
“…Ramaswamy et al [19] and Weng et al [20] presented randomization algorithms for task allocation on network processors with an objective of minimizing latency (not throughput) without considering multi-threading or process transformations. Ramamurthi et al [21] presented heuristic techniques for mapping applications to block multi-threaded multiprocessor architectures.…”
Section: Previous Workmentioning
confidence: 99%
“…To emulate pipelining, we employ a previously-proposed graph-clustering method that greedily clusters instructions with the highest control and data flow affinity [35] to 2 Except dh which is not packet based nor ssl because of its inlined console output.…”
Section: Udhcpmentioning
confidence: 99%