skip to main content
10.1145/1016720.1016733acmconferencesArticle/Chapter ViewAbstractPublication PagesesweekConference Proceedingsconference-collections
Article

Memory accesses management during high level synthesis

Authors Info & Claims
Published:08 September 2004Publication History

ABSTRACT

We introduce a new approach to take into account the memory architecture and the memory mapping in behavioral synthesis. We formalize the memory mapping as a set of constraints for the synthesis, and defined a Memory Constraint Graph and an accessibility criterion to be used in the scheduling step. We present a new strategy for implementing signals (ageing vectors). We formalize the maturing process and explain how it may generate memory conflicts over several iterations of the algorithm. The final Compatibility Graph indicates the set of valid mappings for every signal. Several experiments are performed with our HLS tool GAUT. Our scheduling algorithm exhibits a relatively low complexity that permits to tackle complex designs in a reasonable time.

References

  1. HLSynth'92 benchmark information. http://www.cbl.ncsu.edu/CBL_Docs/hls92.html]]Google ScholarGoogle Scholar
  2. ITRS homepage. http://public.itrs.net/]]Google ScholarGoogle Scholar
  3. F. Catthoor, K. Danckaert, C. Kulkarni, and T. Omnès. Data Transfer and Storage (DTS) architecture issues and exploration in multimedia processors. Marcel Dekker Inc., NewYork, 2000.]]Google ScholarGoogle Scholar
  4. P. Ellervee. High-Level Synthesis of Control and Memory Intensive Applications. PhD thesis, Royal Institut of Technology, Jan. 2000.]]Google ScholarGoogle Scholar
  5. D. Knapp, T. Lyand, et al. Behavioral synthesis methodology for HDL-based specification and validation. In Proc. Design Automation Conference DAC'95, June 1995.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. H. Ly, D. Knapp, R. Miller, and D. McMillen. Scheduling using behavioral templates. In Proc. Design Automation Conference DAC'95, pages 101--106, June 1995.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. A. Nicolau and S. Novack. Trailblazing a hierarchical approach to percolation scheduling. In Proc. ICPP'93, pages 120--124, 1993.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. P. Panda et al. Data and memory optimization techniques for embedded systems. Transactions on Design Automation of Electronic Systems, 6(2):149--206, 2001.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. R. Saied and C. Chakrabarti. Scheduling for minimizing the number of memory accesses in low power applications. In Proc. VLSI Signal Processing, pages 169--178, Oct. 1996.]]Google ScholarGoogle ScholarCross RefCross Ref
  10. J. Seo, T. Kim, and P. Panda. An integrated algorithm for memory allocation and assignment in high-level synthesis. In Proc. Design Automation Conference DAC'01, pages 608--611, June 2001.]] Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Memory accesses management during high level synthesis

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Conferences
      CODES+ISSS '04: Proceedings of the 2nd IEEE/ACM/IFIP international conference on Hardware/software codesign and system synthesis
      September 2004
      266 pages
      ISBN:158113 9373
      DOI:10.1145/1016720

      Copyright © 2004 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 8 September 2004

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • Article

      Acceptance Rates

      Overall Acceptance Rate280of864submissions,32%

      Upcoming Conference

      ESWEEK '24
      Twentieth Embedded Systems Week
      September 29 - October 4, 2024
      Raleigh , NC , USA

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader