Analyzing cycle stealing on synchronous circuits with level-sensitive latches

I. Lin, J. A. Ludwig, K. Eng
{"title":"Analyzing cycle stealing on synchronous circuits with level-sensitive latches","authors":"I. Lin, J. A. Ludwig, K. Eng","doi":"10.1109/DAC.1992.227772","DOIUrl":null,"url":null,"abstract":"The authors present a new method to fully explore cycle steal opportunities in the timing analysis for level-sensitive synchronous circuit designs. The algorithm first constructs a latch graph from a timing analysis on the combinational logic, and then it analyzes cycle stealing based on overlay timing relationships among latch nodes. A breadth-first search examines all possible cycle stealing among latches. The algorithm also considers the fact that cycle stealing is topology dependent. The timing analysis program also takes into account the variation of clock width and leading and training clock edges in each latch, so the data can be used to assist physical design. The program has been implemented on an IBM RISC System/6000 coupled with an IBM IC design system. The results showed the benefit of using cycle steal opportunities in the design.<<ETX>>","PeriodicalId":162648,"journal":{"name":"[1992] Proceedings 29th ACM/IEEE Design Automation Conference","volume":"32 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1992-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"23","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"[1992] Proceedings 29th ACM/IEEE Design Automation Conference","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/DAC.1992.227772","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 23

Abstract

The authors present a new method to fully explore cycle steal opportunities in the timing analysis for level-sensitive synchronous circuit designs. The algorithm first constructs a latch graph from a timing analysis on the combinational logic, and then it analyzes cycle stealing based on overlay timing relationships among latch nodes. A breadth-first search examines all possible cycle stealing among latches. The algorithm also considers the fact that cycle stealing is topology dependent. The timing analysis program also takes into account the variation of clock width and leading and training clock edges in each latch, so the data can be used to assist physical design. The program has been implemented on an IBM RISC System/6000 coupled with an IBM IC design system. The results showed the benefit of using cycle steal opportunities in the design.<>
电平敏感锁存器同步电路的周期窃取分析
提出了一种在电平敏感同步电路设计的时序分析中充分探索周期偷取机会的新方法。该算法首先在组合逻辑的时序分析基础上构造锁存图,然后基于锁存节点间的叠加时序关系分析周期偷取。广度优先搜索检查闩锁之间所有可能的周期窃取。该算法还考虑了周期窃取是拓扑相关的。时序分析程序还考虑了时钟宽度的变化以及每个锁存器的超前和训练时钟边缘,因此这些数据可以用于辅助物理设计。该程序已在IBM RISC系统/6000和IBM集成电路设计系统上实现。结果表明,在设计中使用循环偷取机会是有益的。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信