Proceedings of the 28th Conference on ACM/IEEE Design Automation Conference - DAC '91 1991
DOI: 10.1145/127601.127729
|View full text |Cite
|
Sign up to set email alerts
|

Incremental techniques for the identification of statically sensitizable critical paths

Abstract: Thispaper describes new algorithms forjinding the K-most critical paths, checking static sensitizability of these paths, and performing incremental timing verijcation on combinational circuits.The static sensitization method uses binary decision diagraw to avoid costly backtracking operation used in other path analysis programs.The speed and efjciency of the techniques are demonstrated individually using the ISCAS benchmark circuits, and then together in a timhg optimization loop.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
25
0

Year Published

1994
1994
2016
2016

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 61 publications
(25 citation statements)
references
References 14 publications
0
25
0
Order By: Relevance
“…Because the delay of P [s, v2, v3, v6] is greater than threshold T, the forward tracing will find the full path P [s, v2, v3, v6, t]. And this path is inserted into MKPATH [1]. The second iteration, backward tracing will trace back to v4.…”
Section: E Extracting the K-most Critical Paths At Multi-corner Multmentioning
confidence: 99%
See 2 more Smart Citations
“…Because the delay of P [s, v2, v3, v6] is greater than threshold T, the forward tracing will find the full path P [s, v2, v3, v6, t]. And this path is inserted into MKPATH [1]. The second iteration, backward tracing will trace back to v4.…”
Section: E Extracting the K-most Critical Paths At Multi-corner Multmentioning
confidence: 99%
“…Detecting and identifying a set of critical paths are crucial steps in timing analysis and optimization. There exist many techniques [1][2][3][4] of extracting critical paths followed by delay analysis of digital circuits. The depth-first search and breadth-first search [1] are two major critical path search algorithms.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…Whether or not a path is long is determined by a designer-specified threshold. In our experiments, we used the efficient path extraction technique in [18], which allowed us to obtain sensitized paths in descending order of path length in a relatively short amount of time. In addition, we used 55% of the length of structurally longest path as the threshold.…”
Section: Sensitized Long Path Identificationmentioning
confidence: 99%
“…The set of critical nets contains edges on the current k-most critical paths. The placement algorithm has an integrated static timing analysis engine as well as a path enumeration algorithm [30]. The delay of the circuit (therefore slacks) and the set of the most critical paths are periodically updated based on the delay assigned to all current cut nets by the partitioning engine.…”
Section: Fig 4 Illustration Of Good and Bad Initial Linear Placementmentioning
confidence: 99%