{"title":"Analyzing cycle stealing on synchronous circuits with level-sensitive latches","authors":"I. Lin, J. A. Ludwig, K. Eng","doi":"10.1109/DAC.1992.227772","DOIUrl":null,"url":null,"abstract":"The authors present a new method to fully explore cycle steal opportunities in the timing analysis for level-sensitive synchronous circuit designs. The algorithm first constructs a latch graph from a timing analysis on the combinational logic, and then it analyzes cycle stealing based on overlay timing relationships among latch nodes. A breadth-first search examines all possible cycle stealing among latches. The algorithm also considers the fact that cycle stealing is topology dependent. The timing analysis program also takes into account the variation of clock width and leading and training clock edges in each latch, so the data can be used to assist physical design. The program has been implemented on an IBM RISC System/6000 coupled with an IBM IC design system. The results showed the benefit of using cycle steal opportunities in the design.<<ETX>>","PeriodicalId":162648,"journal":{"name":"[1992] Proceedings 29th ACM/IEEE Design Automation Conference","volume":"32 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1992-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"23","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"[1992] Proceedings 29th ACM/IEEE Design Automation Conference","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/DAC.1992.227772","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 23
Abstract
The authors present a new method to fully explore cycle steal opportunities in the timing analysis for level-sensitive synchronous circuit designs. The algorithm first constructs a latch graph from a timing analysis on the combinational logic, and then it analyzes cycle stealing based on overlay timing relationships among latch nodes. A breadth-first search examines all possible cycle stealing among latches. The algorithm also considers the fact that cycle stealing is topology dependent. The timing analysis program also takes into account the variation of clock width and leading and training clock edges in each latch, so the data can be used to assist physical design. The program has been implemented on an IBM RISC System/6000 coupled with an IBM IC design system. The results showed the benefit of using cycle steal opportunities in the design.<>