Investigations of Optimum Tier Architectures for ASICs(VLSI Design Technology and CAD)
スポンサーリンク
概要
- 論文の詳細を見る
The optimum tier architectures for ASICs are investigated by using a methodology for predicting packing efficiency of a logic block (the ratio of total cell area to the block area including space regions between cells). In the methodology based on Rent's rule, (1) the empirical parameters required for the prediction are derived from the results of our ASIC products. (2) The concept of logic distance, which is expressed in units of the number of cells rather than the absolute net length, is introduced. (3) Not only performance constraints but also reliability constraints are incorporated. These allow us to make a quantitative comparison of the packing efficiency between various cell and tier structures. It is found that, for mega-cell blocks, all minimum-pitch layer architecture with buffer insertion is expected to give more than 20% reduction in block areas compared to the minimum-pitch + bi-pitch architecture, while satisfying the performance and reliability constraints.
- 社団法人電子情報通信学会の論文
- 2004-11-01
著者
-
Tanaka T
Kddi R & D Laboratories Inc.
-
YANAGISAWA Kazumasa
Renesas Technology Co.
-
TAKEUCHI Kan
Renesas Technology Corp.
-
SAKAMOTO Kazuko
Renesas Technology Corp.
-
TANAKA Teruya
Renesas Technology Corp.
-
Yanagisawa Kazumasa
Renesas Technology Corp.
関連論文
- Gap Diffie-Hellman署名に基づいた階層表記型多重署名方式(情報セキュリティ,ライフログ活用技術,ライフインテリジェンス,オフィス情報システム,一般)
- 回覧文書閲覧確認に適した階層表記型多重署名方式の提案と実装評価(社会基盤としてのインターネットアーキテクチャ論文)
- B-19-16 ポインタ変数の符号化による難読化方式(B-19.ネットワークソフトウェア,一般セッション)
- A-7-9 SCHにおけるメッセージ入力(A-7.情報セキュリティ,一般セッション)
- Gap Diffie-Hellman署名に基づいた階層表記型多重署名方式(情報セキュリティ,ライフログ活用技術,ライフインテリジェンス,オフィス情報システム,一般)
- ストリーム暗号K2に対するサイドチャネル攻撃と対策手法
- B-19-23 任意型の変数の符号化による難読化方式(B-19.ネットワークソフトウェア,一般セッション)
- B-18-4 非接触型掌紋認証を用いたリモート認証システムの提案(B-18.バイオメトリックシステムセキュリティ,一般セッション)
- A Novel Error Control Algorithm for Reducing Transmission Delay in Real-Time Mobile Video Communication (Special Issue on Multimedia Mobile Communication Systems)
- Characteristics of Video Communication System in Mobile Radio Channel (Special Issue on Mobile Computing)
- A Study on Reducing Transmission Delay in Mobile Video Communication Systems (Special Section on Mutli-dimensional Mobile Information Network)
- A Novel Coherent Preambleless Demodulator Employing Sequential Processing for PSK Packet Signals : AFC and Carrier Recovery Circuits
- A Fast Synchronization Scheme of OFDM Signals for High-Rate Wireless LAN
- Nomadic Computing Environment Employing Wired and Wireless Networks(Special Issue on Multimedia Communications in Heterogeneous Network Environments)
- A Multi-Slot Access Protocol for TDMA-TDD Packet Radio Channel - Application to PHS Packet Data System -
- Universally composable client-to-client general authenticated key exchange (特集:情報システムを支えるコンピュータセキュリティ技術の再考)
- B-19-18 難読化に基づくソフトウェア盗用の検知手法(B-19.ネットワークソフトウェア,一般セッション)
- A-7-9 SCHにおけるメッセージ入力関数の比較(A-7.情報セキュリティ,一般セッション)
- A-7-3 鍵交換プロトコルの安全性検証手法の実装(A-7.情報セキュリティ,一般セッション)
- A-7-2 環境に応じた暗号プロトコルの動的変更方式の提案(A-7. 情報セキュリティ,一般セッション)
- L-035 鍵交換プロトコルの安全性の検証ポイントに関する検討(ネットワーク・セキュリティ,一般論文)
- B-7-31 携帯電話上でのアイデンティティ管理技術に関する検討(B-7.情報ネットワーク,一般セッション)
- Recent Progress in GaInNAs Laser(Special Issue on Advanced Optical Devices for Next Generation Photonic Networks)
- A 1.3-μm GaInNAs/GaAs Single-Quantum-Well Laser Diode with a High Characteristic Temperature over 200 K
- ワンセグ放送向けストリーム認証方式
- μI/O Architecture : A Power-Aware Interconnect Circuit Design for SoC and SiP(Low-Power System LSI, IP and Related Technologies)
- Universally Composable Hierarchical Hybrid Authenticated Key Exchange(Protocols,Cryptography and Information Security)
- Review on Sufficient Conditions of SHA-0
- Proposal of a Transformation Method for Iris Codes in Iris Scanning Verification(Biometrics)(Cryptography and Information Security)
- Investigations of Optimum Tier Architectures for ASICs(VLSI Design Technology and CAD)
- Toward the Practical Uses of Holonic Manufacturing Systems(Concurrent System Technology)
- Toward the Practical Uses of Holonic Manufacturing Systems
- Information Geometry of Mean Field Theory
- Design of Self-Delegation for Mobile Terminals (特集 多様な社会的責任を担うコンピュータセキュリティ技術)
- Design of Security Architecture for Beyond 3G Mobile Terminals (特集:プライバシを保護するコンピュータセキュリティ技術)
- Implementation and Evaluation of a Micropayment System for Mobile Environments (Security and Society)
- New Time-Stamping Scheme Using Mutual Communications with Pseudonymous Clients (Applications) (Cryptography and Information Security)
- New Time-Stamping Scheme Using Mutual Communications with Pseudonymous Clients
- A Study of Access Control Method for Mobile Agents by Using Secure Stubs (特集:新たな脅威に立ち向かうコンピュータセキュリティ技術)
- データ重要度可視化手法の検討
- Improved Subset Difference Method with Ternary Tree
- 端末プラットホーム技術の研究開発について(総合報告)
- 携帯電話におけるペアリング暗号の実装(情報セキュリティ基礎,電子情報通信分野における萌芽的研究論文)
- 携帯電話におけるペアリング暗号の実装