2003
DOI: 10.1016/s0743-7315(02)00055-2
|View full text |Cite
|
Sign up to set email alerts
|

Real-time wormhole channels

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
31
0

Year Published

2005
2005
2023
2023

Publication Types

Select...
3
3
1

Relationship

0
7

Authors

Journals

citations
Cited by 27 publications
(38 citation statements)
references
References 19 publications
0
31
0
Order By: Relevance
“…Therefore, we also calculate a minimum permitted interval (mIi) between two consecutive packets from the same source, which can be translated into a maximum permitted bandwidth ( MBWi). This approach is similar to previously published method [10] (Real-time wormhole channel feasibility checking or WCFC, which will be briefly described later), but delivers substantially better results in terms of bound tightness. For proper operation, the system must then respect MBWi bounds at runtime.…”
Section: Network Modelmentioning
confidence: 78%
See 3 more Smart Citations
“…Therefore, we also calculate a minimum permitted interval (mIi) between two consecutive packets from the same source, which can be translated into a maximum permitted bandwidth ( MBWi). This approach is similar to previously published method [10] (Real-time wormhole channel feasibility checking or WCFC, which will be briefly described later), but delivers substantially better results in terms of bound tightness. For proper operation, the system must then respect MBWi bounds at runtime.…”
Section: Network Modelmentioning
confidence: 78%
“…To be consistent with the notations from [10] and for convenience, we introduce the uppercase Ui j symbol, which models the hop delay from output buffer to output buffer, instead of from input buffer to input buffer.…”
Section: The Proposed Delay Model Rtb-hbmentioning
confidence: 99%
See 2 more Smart Citations
“…In [12], [21] authors provide realistic bounds for wNoCs without using flit-level virtual channel preemption. The model in [21] requires knowing all communication flows integrated in the system to derive safe upper-bounds, making those bounds not time-composable.…”
Section: Related Workmentioning
confidence: 99%