2014
DOI: 10.1016/j.compeleceng.2014.05.002
|View full text |Cite
|
Sign up to set email alerts
|

Communication storage optimization for static dataflow with access patterns under periodic scheduling and throughput constraint

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
10
0

Year Published

2016
2016
2022
2022

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 9 publications
(10 citation statements)
references
References 20 publications
0
10
0
Order By: Relevance
“…The initiation interval of the model execution is 12 cycles (i.e., T = 12), and the iteration latency is 13 cycles (i.e., IL = 13). Given a throughput constraint, a valid buffer-size for each model channel can be computed from the 1-periodic schedule [11] model provided that the system is bounded and deadlock-free. The throughput τ(a) of an actor a is defined as the average number of firings per unit time and is determined using τ(a) = (RV(a) • PR(c) or CR(c))/T.…”
Section: Buffer Size Computationmentioning
confidence: 99%
See 4 more Smart Citations
“…The initiation interval of the model execution is 12 cycles (i.e., T = 12), and the iteration latency is 13 cycles (i.e., IL = 13). Given a throughput constraint, a valid buffer-size for each model channel can be computed from the 1-periodic schedule [11] model provided that the system is bounded and deadlock-free. The throughput τ(a) of an actor a is defined as the average number of firings per unit time and is determined using τ(a) = (RV(a) • PR(c) or CR(c))/T.…”
Section: Buffer Size Computationmentioning
confidence: 99%
“…The correct functional operation of the implemented hardware design in accordance with First, the input registers of the source block X are connected to top-level entity ports and then followed by the instantiation of the HW blocks and FIFO channel. The interfacing of the HW blocks with the FIFO is a combinational assignment of output signals (lines [11][12][13][14]. The process implements the FSM that controls the flow of data to or from the FIFO and the details of how it is built are presented in Section 6.…”
Section: Hardware Designmentioning
confidence: 99%
See 3 more Smart Citations