Proceedings IEEE International Conference on Application-Specific Systems, Architectures and Processors
DOI: 10.1109/asap.1997.606813
|View full text |Cite
|
Sign up to set email alerts
|

Array placement for storage size reduction in embedded multimedia systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
45
0

Publication Types

Select...
6

Relationship

0
6

Authors

Journals

citations
Cited by 38 publications
(45 citation statements)
references
References 18 publications
0
45
0
Order By: Relevance
“…This condition is checked line 6, by comparing 1.0 (the edge density of a clique) with the edge density of the subgraph of G formed by the remaining vertices in C. To this purpose nb edge , the number of edges of this subgraph, is decremented line 9 by the number of edges in E linking the removed vertex v * to vertices in C. Lines 10 to 12, the costs of the remaining vertices are updated for the next iteration. -Clique maximization (lines [14][15][16][17][18][19]: This last part of the algorithm ensures that the clique C is maximal by adding neighbor vertices to it. To become a member of the clique, a vertex must be adjacent to all its members.…”
Section: Methods 3 To Compute a Lower Bound -Heuristic For The Maximummentioning
confidence: 99%
See 1 more Smart Citation
“…This condition is checked line 6, by comparing 1.0 (the edge density of a clique) with the edge density of the subgraph of G formed by the remaining vertices in C. To this purpose nb edge , the number of edges of this subgraph, is decremented line 9 by the number of edges in E linking the removed vertex v * to vertices in C. Lines 10 to 12, the costs of the remaining vertices are updated for the next iteration. -Clique maximization (lines [14][15][16][17][18][19]: This last part of the algorithm ensures that the clique C is maximal by adding neighbor vertices to it. To become a member of the clique, a vertex must be adjacent to all its members.…”
Section: Methods 3 To Compute a Lower Bound -Heuristic For The Maximummentioning
confidence: 99%
“…Indeed, the identification of the "memory wall" problem in 1995 [35] revealed memory issues as a major concern for developers of embedded systems. Memory issues strongly impact the quality and performance of an embedded system, as the area occupied by the memory can be as large as 80% of a chip and may be responsible for a major part of its power consumption [35,14]. Despite the large silicon area allocated to memory banks, the amount of internal memory available on most embedded Multiprocessor Systems-on-Chips (MPSoCs) is still limited.…”
Section: Introductionmentioning
confidence: 99%
“…Our technique of characterizing the times at which tokens are written and read differs from the lifetimebased approach used by many HLL compilers [18,19], SDF compilers [6], and high level synthesis tools [20,21]. Briefly, the lifetime-based approaches try to determine the first time the token is written (buffer start time) and the time it is read (buffer stop time).…”
Section: Related Workmentioning
confidence: 99%
“…We have shown [7] that modeling the lifetimes of individual tokens in a multirate SDF graph can have prohibitive complexity that would preclude polynomial time solutions. Indeed, the algorithms that DeGreef et al present have a worst case complexity that is exponential in the size of the input program [21]. Informally, the worst case exponential complexity arises in our dataflow model because the number of tokens that have to be allocated is exponential in the size of the input dataflow specification, and it is not clear whether it would be possible to somehow model all of the tokens implicitly, using a structure of size polynomial in the size of the SDF graph, while still retaining the ability to exploit the differing lifetimes of each token.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation