Get 20M+ Full-Text Papers For Less Than $1.50/day. Start a 14-Day Trial for You or Your Team.

Learn More →

Top-k aggressors sets in delay noise analysis

Top-k aggressors sets in delay noise analysis 10.3 Top-k Aggressors Sets in Delay Noise Analysis Ravikishore Gandikota, Kaviraj Chopra, David Blaauw, Dennis Sylvester, Murat Becer* University of Michigan, Ann Arbor, MI. email: {gravkis, kaviraj, blaauw, dennis}@eecs.umich.edu *CLK Design Automation, Littleton, MA. email: murat@clkda.com ABSTRACT We present, in this paper, novel algorithms to compute the set of œtop-k  aggressors in a design. We show that the computation of the set of top-k aggressors is non-trivial, since we must consider all permutations of aggressors that are coupled to a critical path. Also, different sets of aggressors contribute different amounts of noise to each critical path and a brute-force enumeration to obtain the set of top-k aggressors has impractical runtime. Our proposed approach uses two key techniques to reduce the runtime complexity: Firstly, we model the delay noise propagated from a victim net to its fanout net by a so-called pseudo aggressor, which simplifies our problem formulation significantly. Secondly, we define a dominance property for aggressor sets, which imposes a partial ordering on the aggressor sets and allows us to efficiently prune the enumeration space. We then demonstrate the effectiveness of our proposed algorithm on benchmark circuits. a 3 a 2 a 1 v 1 Figure 1. http://www.deepdyve.com/assets/images/DeepDyve-Logo-lg.png

Top-k aggressors sets in delay noise analysis

Association for Computing Machinery — Jun 4, 2007

Loading next page...
 
/lp/association-for-computing-machinery/top-k-aggressors-sets-in-delay-noise-analysis-HBCrnuCIM7

References (15)

Datasource
Association for Computing Machinery
Copyright
Copyright © 2007 by ACM Inc.
ISBN
978-1-59593-627-1
doi
10.1145/1278480.1278523
Publisher site
See Article on Publisher Site

Abstract

10.3 Top-k Aggressors Sets in Delay Noise Analysis Ravikishore Gandikota, Kaviraj Chopra, David Blaauw, Dennis Sylvester, Murat Becer* University of Michigan, Ann Arbor, MI. email: {gravkis, kaviraj, blaauw, dennis}@eecs.umich.edu *CLK Design Automation, Littleton, MA. email: murat@clkda.com ABSTRACT We present, in this paper, novel algorithms to compute the set of œtop-k  aggressors in a design. We show that the computation of the set of top-k aggressors is non-trivial, since we must consider all permutations of aggressors that are coupled to a critical path. Also, different sets of aggressors contribute different amounts of noise to each critical path and a brute-force enumeration to obtain the set of top-k aggressors has impractical runtime. Our proposed approach uses two key techniques to reduce the runtime complexity: Firstly, we model the delay noise propagated from a victim net to its fanout net by a so-called pseudo aggressor, which simplifies our problem formulation significantly. Secondly, we define a dominance property for aggressor sets, which imposes a partial ordering on the aggressor sets and allows us to efficiently prune the enumeration space. We then demonstrate the effectiveness of our proposed algorithm on benchmark circuits. a 3 a 2 a 1 v 1 Figure 1.

There are no references for this article.