Power consumption is now the major technical
|
|
|
- Evan Stewart
- 10 years ago
- Views:
Transcription
1 COVER FEATURE Leakage Current: Moore s Law Meets Static Power Microprocessor design has traditionally focused on dynamic power consumption as a limiting factor in system integration. As feature sizes shrink below 0.1 micron, static power is posing new low-power design challenges. Nam Sung Kim Todd Austin David Blaauw Trevor Mudge University of Michigan, Ann Arbor Krisztián Flautner ARM Ltd. Jie S. Hu Mary Jane Irwin Mahmut Kandemir Vijaykrishnan Narayanan Pennsylvania State University Power consumption is now the major technical problem facing the semiconductor industry. In comments on this problem at the 2002 International Electron Devices Meeting, Intel chairman Andrew Grove cited off-state current leakage in particular as a limiting factor in future microprocessor integration. 1 Off-state leakage is static power, current that leaks through transistors even when they are turned off. It is one of two principal sources of power dissipation in today s microprocessors. The other is dynamic power, which arises from the repeated capacitance charge and discharge on the output of the hundreds of millions of gates in today s chips. Until very recently, only dynamic power has been a significant source of power consumption, and Moore s law has helped to control it. Shrinking processor technology has allowed and, below 100 nanometers, actually required reducing the supply voltage. Dynamic power is proportional to the square of supply voltage, so reducing the voltage significantly reduces power consumption. Unfortunately, smaller geometries exacerbate leakage, so static power begins to dominate the power consumption equation in microprocessor design. PROCESS TRENDS Historically, complementary metal-oxide semiconductor technology has dissipated much less power than earlier technologies such as transistortransistor and emitter-coupled logic. In fact, when not switching, CMOS transistors lost negligible power. However, the power they consume has increased dramatically with increases in device speed and chip density. The research community has recognized the significance of this increase for some time. Figure 1 shows total chip dynamic and static power consumption trends based on 2002 statistics normalized to the 2001 International Technology Roadmap for Semiconductors. 2 The ITRS projects a decrease in dynamic power per device over time. However, if we assume a doubling of on-chip devices every two years, total dynamic power will increase on a per-chip basis. Packaging and cooling costs as well as the limited power capacity of batteries make this trend unsustainable. Figure 1 also shows exponential increases projected for the two principal components of static power consumption: subthreshold leakage, a weak inversion current across the device; and gate leakage, a tunneling current through the gate oxide insulation. The ITRS expects the rate of these increases to level out in 2005 but to remain substantial nonetheless. Even today, total power dissipation from chip leakage is approaching the total from dynamic power, and the projected increases in off-state subthreshold leakage show it exceeding total dynamic power consumption as technology drops below the 65-nm feature size. 68 Computer Published by the IEEE Computer Society /03/$ IEEE
2 100 Gate length 300 If they reach mainstream production, emerging techniques to moderate the gate-oxide tunneling effect primarily by using high-k dielectrics to better insulate the gate from the channel could bring gate leakage under control by As leakage current becomes the major contributor to power consumption, the industry must reconsider the power equation that limits system performance, chip size, and cost. POWER BASICS Five equations model the power-performance tradeoffs for CMOS logic circuits. We present them here in simplifications that capture the basics for logic designers, architects, and system builders. The first three are common in the low-power literature. 3 The last two model subthreshold and gate-oxide leakage. Operating frequency and voltage The first relation shows the dependency of operating frequency on supply voltage: f (V V th ) α / V (1) where V is the transistor s supply voltage, V th is its threshold or switching voltage, and the exponent α is an experimentally derived constant that, for current technology, is approximately 1.3. We can use this relation to develop an equation relating frequency and supply voltage. First, consider an operating voltage V norm and frequency f norm, which are normalized to the maximum operating voltage V max and frequency f max. Then approximate a linear relationship of frequency to voltage with the following equation: V norm =β 1 +β 2 f norm (2) where the constants β 1 = V th / V max and β 2 = 1 β 1. From Equation 1 we see that f = 0 corresponds to V norm = V th / V max, which for today s technology is approximately 0.3. The simple relationship that Equation 2 expresses closely matches recent industrial data. 4 Note that f max corresponds to V max and that, as the relation in Equation 1 specifies, the frequency drops to zero when V is reduced to V th. Equation 2 also indicates that reducing the operating frequency by a particular percentage from f max will reduce the operating voltage by a smaller percentage. For instance, if we assume β 1 = 0.3, reducing the frequency by 50 percent (f norm = 0.5) will reduce the operating voltage by 35 percent (V norm = 0.65). Conversely, reducing the voltage by half (V norm = Normalized total chip power dissipation Subthreshold leakage 50 Gate-oxide leakage ) will reduce the operating frequency by more than half (f norm 0.3). Overall power consumption The third equation defines overall power consumption as the sum of dynamic and static power: P = ACV 2 f + VI leak (3) The first term is the dynamic power lost from charging and discharging the processor s capacitive loads: A is the fraction of gates actively switching and C is the total capacitance load of all gates. The second term models the static power lost due to leakage current, I leak. We have ignored power lost to the momentary short circuit at a gate s output whenever the gate switches. The loss is relatively small; it contributes to dynamic power loss, and the equation s first term can absorb it, if necessary. When dynamic power is the dominant source of power consumption as it has been and as it remains today in many less aggressive fabrication technologies we can approximate Equation 3 with just the first term. Its V 2 factor suggests reducing supply voltage as the most effective way to decrease power consumption. In fact, halving the voltage will reduce the power consumption by a factor of four. But Equation 2 shows that halving the voltage will reduce the processor s maximum operating frequency by more than half. To compensate for this performance loss, we can use either parallel or pipelined implementations. If the implementation runs the original serial computation as two parallel subtasks or as two pipelined subtasks, the dynamic power consumption can decrease by more than a factor of two compared to the serial case. Of course, the reduction depends on significant parallelism being pre- Dynamic power Possible trajectory if high-k dielectrics reach mainstream production Physical gate length (nm) Figure 1. Total chip dynamic and static power dissipation trends based on the International Technology Roadmap for Semiconductors. The two power plots for static power represent the 2002 ITRS projections normalized to those for The dynamic power increase assumes a doubling of on-chip devices every two years. December
3 Pipelining is the low-power architectural solution. sent in the computation, but many important code classes approximate this condition, including digital signal processing and image processing. Leakage current But how useful are parallelism and pipelining for reducing power when static power consumption becomes a major component? As noted, leakage current, the source of static power consumption, is a combination of subthreshold and gate-oxide leakage: I leak = I sub + I ox. Subthreshold power leakage. An equation that Anantha Chandrakasan, William Bowhill, and Frank Fox 5 present shows how subthreshold leakage current depends on threshold voltage and supply voltage: (4) K 1 and n are experimentally derived, W is the gate width, and Vθ in the exponents is the thermal voltage. At room temperature, Vθ is about 25 mv; it increases linearly as temperature increases. If I sub grows enough to build up heat, Vθ will also start to rise, further increasing I sub and possibly causing thermal runaway. Equation 4 suggests two ways to reduce I sub. First, we could turn off the supply voltage that is, set V to zero so that the factor in parentheses also becomes zero. Second, we could increase the threshold voltage, which because it appears as a negative exponent can have a dramatic effect in even small increments. On the other hand, we know from Equation 1 that increasing V th will reduce speed. The problem with the first approach is loss of state; the problem with the second approach is the loss of performance. Gate width W is the other contributor to subthreshold leakage in a particular transistor. Designers often use the combined widths of all the processor s transistors as a convenient measure of total subthreshold leakage. Gate-oxide power leakage. Gate-oxide leakage is less well understood than subthreshold leakage. For our purposes, a simplification of equations from Chandrakasan, Bowhill, and Fox 5 is sufficient to illustrate the key factors: (5) K 2 and α are experimentally derived. The term of interest is oxide thickness, T ox. Clearly, increasing T ox will reduce gate leakage. Unfortunately, it also degrades the transistor s effectiveness because T ox must decrease proportionally with process scaling to avoid short channel effects. Therefore, increasing T ox is not an option. The research community is instead pursuing the development of high-k dielectric gate insulators. As with subthreshold leakage, a die s combined gate width is a convenient measure of total oxide leakage. Low-power architectural options Because subthreshold and oxide leakage both depend on total gate width or, approximately, gate count, a pipelined implementation s contribution to leakage is comparable to the simple serial case, apart from the extra gates that latches introduce to separate the pipe stages. Pipelined implementations can run at a lower voltage, which can reduce power consumption for both dynamic and static power compared to the serial case. Parallel implementations can also run at a lower voltage, but only by roughly doubling the amount of hardware. Thus, depending on some of the equations experimental constants, the parallel case could leak more power than the serial case even to the point of offsetting any savings in dynamic power. Pipelining is therefore the low-power solution. It will always leak less power than the parallel case because it has about half the hardware, and it will leak less power than the serial case because it runs at a lower voltage. In fact, pipelining s combined dynamic and static power leakage will be less than that of the serial case. REDUCING STATIC POWER CONSUMPTION Unlike dynamic power, leakage is not activity based, so reducing node switching when there is no work does not help reduce power consumption. Shutting off the inactive part of the system does help, but it results in loss of state. Retention flip-flops When a device is inactive for a long period of time, a snooze mode may help if the save/restore cost is small compared to the power that the snooze time conserves. For shorter inactive periods, researchers have developed balloon logic, also called retention flip-flops. The idea is to use high- V th latches to duplicate those latches that must preserve state. As Equation 4 shows, the high-v th latches have a dramatically reduced subthreshold leakage. In snooze mode, the control logic copies 70 Computer
4 the main latch s state to the retention latch and turns off the main latch to save energy. A transistor s threshold voltage depends on its design and process technology. Typical values are 450 mv in 180-nm processes and 350 mv in 130- nm technologies. Using doping techniques or applying a bias voltage to the substrate can increase threshold voltage by 100 mv. This in turn reduces leakage by a factor of about 10, but it increases switching time by about 15 percent. Thus, lowleakage retention flops are only useful in saving state energy efficiently their use on the processor s critical path would slow it down. They also incur die area increases for the duplicated latches, which can be significant: 20 percent of the logic size and 10 percent of total chip area are not unexpected for small embedded cores. BL (1V) N3 WL (0V) P1 (0V) N1 Bitline leakage path Cell leakage path Controlling memory leakage On-chip caches constitute the major portion of the processor s transistor budget and account for a significant share of leakage. In fact, leakage is projected to account for 70 percent of the cache power budget in 70-nm technology. 6 Figure 2 illustrates the various leakage current paths in a typical memory cell. The current through the access transistor N3 from the bitline is referred to as bitline leakage, while the current flowing through transistors P1 and N2 is cell leakage. Both bitline and cell leakage result from subthreshold conduction current flowing from the source to drain even when gate-source voltage is below the threshold voltage. In addition, gate-oxide leakage current is flowing through the transistor gates. Circuit techniques. Two broad categories of circuit techniques aim to reduce leakage: state-destructive and state-preserving. State-destructive techniques use ground gating, also called gated-v dd. Ground gating adds an NMOS (n-channel metal-oxide semiconductor) sleep transistor to connect the memory storage cell and the power supply s ground. 7-9 Turning a cache line off saves maximum leakage power, but the loss of state exposes the system to incorrect turn-off decisions. Such decisions can in turn induce significant power and performance overhead by causing additional cache misses that off-chip memories must satisfy. State-preserving techniques vary. Drowsy caches multiplex supply voltages according to the state of each cache line or block. The caches use a lowretention voltage level for drowsy mode, retaining the data in a cache region and requiring a high voltage level to access it. 10 Waking up the drowsy cache lines is treated as a pseudo cache miss and incurs one additional cycle overhead. Other proposed state-preserving techniques include gradually decreasing threshold voltages 11 and using preferred data values. 12 All these techniques reduce leakage less than turning a cache line off completely, but accessing the low-leakage state incurs much less penalty. Moreover, while state-preserving techniques can only reduce leakage by about a factor of 10, compared to more than a factor of 1,000 for destructive techniques, the net difference in power consumed by the two techniques is less than 10 percent. When the reduced wake-up time is factored into overall program runtime, state-preserving techniques usually perform better. They have the additional benefit of not requiring an L2 cache. Control techniques. There are two broad categories of control techniques for leakage-saving features: application-sensitive controls, based on runtime performance feedback, 9,13 and application-insensitive controls, which periodically turn off cache lines. 6,7,10 The degree of control varies significantly within each group. For example, an application-sensitive technique 9 may indicate that the processor can turn off 25 percent of the cache because of a very high hit rate, but it provides no guidance about which 75 percent of the cache lines will be used in the near future. On the other hand, an insensitive technique like the cache-decay algorithm 7 keeps track of statistics for each cache line and thus may provide better predictive behavior. Application-insensitive algorithms do not optimize for the specific workload. Instead, they aim for good average behavior and minimize the downside of misprediction. Periodically turning off a cache line is an example of such a scheme. 10 Its success depends on how well the selected period reflects the rate at which the instruction or data working set changes. Specifically, the optimum P2 (1V) N2 N4 WL (0V) BL (1V) Figure 2. Leakage current paths in a memory cell. The bitline leakage current flows through the access transistor N3 from the bitline, while the cell leakage flows through transistors P1 and N2. December
5 Hotspots and Code Sequentiality Researchers at the Pennsylvania State University have developed a scheme to manage instruction cache leakage that is sensitive to changes in temporal and spatial locality during program execution. 1 The scheme builds on drowsy cache techniques. It associates each cache line with a mode bit that controls whether the line is awake and accessible or in low-leakage drowsy mode. Periodically, a global sleep signal resets all the mode bits to put all the cache lines in drowsy mode. This approach is based on the notion that working sets change periodically. In reality, the change is gradual, so asserting the sleep signal will unnecessarily put some lines that are part of the working set into drowsy mode. Identifying hotspots One improvement on this basic idea prevents inadvertent mode transitions by augmenting each cache line with a local voltage-control-mask bit. When set, the VCM masks the influence of the global sleep signal and prevents mode transition. The VCM bits are set based on information from an enhanced branch target buffer. The BTB monitors how often an application accesses the different basic blocks and uses this information to identify whether they belong to a program hotspot. Once the BTB determines that a program is within a hotspot, the processor sets a global mask bit, then sets the VCM bits of all accessed cache lines to indicate the program hotspot. The processor updates the BTB access-frequency counters and the VCM bits periodically to reflect the change in program phase. Predicting transitions A second improvement focuses on predictively transitioning the cache lines that an application program will access next from sleep to normal mode. The predictive strategy avoids the performance and associated leakage penalty incurred from accessing a cache line in sleep mode. Since sequentiality is the norm in code execution, the program counter predictively transitions the next cache line to the normal mode when it accesses the current line. This technique is referred to as just-in-time activation. Tracking access moves Finally, asserting the global sleep signal when accesses move from one cache sub-bank to another enables the processor to identify opportunities for sleep mode transition when spatial locality changes. This differs from asserting the global sleep signal periodically to capture temporal locality changes. Performance improvements When averaged across 14 SPEC2000 benchmarks, these three improvements provide an average leakage energy savings of 63 percent in the instruction cache compared to using no leakage management, 49 percent compared to the bank-based turnoff scheme, and 29 percent over the compiler-based turnoff scheme. Reference 1. J. Hu et al., Exploiting Program Hotspots and Code Sequentiality for Instruction Cache Leakage Management, Proc. Int l Symp. Low-Power Electronics and Design (ISLPED 03), ACM Press, 2003, pp period may change not only across applications but also within the different phases of one application. In such cases, the algorithm must either keep the cache lines awake longer than necessary or turn off the lines that hold the current instruction working set, which slows performance and wastes energy. Addressing the first problem by decreasing the period will exacerbate the second problem. On the plus side, this approach is simple, has little implementation overhead, and works well for data caches. Application-insensitive algorithms can also exhibit pathologically bad behavior on certain code types. For example, one technique 6 wakes up (and puts to sleep) cache subbanks as execution moves between them. If the first part of the loop is in one bank and the latter part in another, the algorithm can cause frequent drowsy-awake transitions that negatively impact the loop s performance. Moreover, the leakage current dissipated by lines that are awake and not accessed can waste significant energy. Compiler techniques Using compiler directives might make it possible to keep some loops within bank boundaries, assuming that the compiler knows the bank structure. However, a typical large application will likely have to divide some loops across banks. The compiler can also provide application-sensitive leakage control. For example, a program s source code could include explicit loop-level cache line turn-off instructions. 13 However, this scheme demands sophisticated program analysis and modification support as well as modifications to the instruction set architecture. The Hotspots and Code Sequentiality sidebar describes a leakage management technique that exploits two main characteristics of instruction access patterns: the confinement of program execution mainly to program hotspots and the sequential access pattern that instructions exhibit. TECHNOLOGY TRENDS AND CHALLENGES Equation 4 shows that subthreshold leakage exhibits a strong dependence on temperature. Therefore, one approach to reducing subthreshold leakage is to actively refrigerate the chip. While this option seems promising for controlling the subthreshold leakage point, it does not address gateoxide leakage. Further, its practical application faces significant technological and cost challenges. Multiple threshold voltages A more promising approach in terms of sub- 72 Computer
6 threshold current employs multiple threshold voltage technologies. Today s processes typically offer two threshold voltages. Designers assign a low threshold voltage to a few performance-critical transistors and a high threshold voltage to the majority of less timing-critical transistors. This approach incurs a high subthreshold leakage current for the performance-critical transistors, but it can significantly reduce the overall leakage. Further, future technologies are likely to offer three threshold voltages low, high, and extra high or even more. This opens the way to new leakage optimizations within different portions of a cache or at different levels of its hierarchy. For instance, the address-decoder and bus-driver circuits in a cache consume a significant portion of total access time, so a designer could construct them from high-v th transistors, while constructing the more numerous bit cells from extra-high-v th devices and reserving low-v th devices for speed-critical parts of the processor core. Furthermore, new tradeoffs become possible between the cache size and its threshold voltage. Another possible power optimization is to significantly reduce leakage by increasing the L2 cache s threshold voltage. To compensate for the increased L2 access time, a designer could increase the L1 cache size or use faster (and leakier) transistors to construct it. Trading off cache size and threshold voltages at different levels of the on-chip cache hierarchy can reduce the total leakage without sacrificing overall performance. These techniques do not address gate-oxide leakage. Gate length As CMOS technology is scaled, variations in gate length, oxide thickness, and doping concentrations are becoming more significant particularly for intradie variations that occur among the devices of a single die. Figure 3a shows the impact of gate length variations on leakage current. Short-channel effects, such as drain-induced barrier lowering, give subthreshold leakage current an exponential dependence on the gate length. Thus, even a 10 percent variation from the nominal length can change the leakage current by a factor of three. Figure 3b shows the expected probability distribution of the leakage current for devices on a chip, given a Gaussian distribution of gate lengths with a standard deviation equal to 5 percent of mean for a 180-nm process. The exponential increase in leakage current generates a log-normal distribution; the Normalized frequency count Leakage current (pa) (a) Drawn gate length (µm) (b) Leakage current (pa) long tail for high-leakage currents corresponds to devices with small gate lengths. This distribution implies that a small set of devices experience significantly more subthreshold leakage current than the average device. Since caches comprise a large number of devices, they have a high probability of containing a few extremely leaky gates. Intradie process variations will require new approaches to reducing cache leakage, specifically targeting bit cells with high-leakage currents. One approach would be to identify such cells at test time and swap them with redundant cells. Oxide tunneling The growing significance of oxide-tunneling current poses another challenge to reducing cache leakage. Process scaling has consistently reduced the gate-oxide layer s thickness to provide sufficient current drive at reduced voltage supplies. The resulting gate-tunneling leakage current is significant, as Equation 5 shows. I ox arises from the finite (nonzero) probability of an electron directly tunneling through the insulating silicon oxide layer. Figure 1 shows that gate-oxide current leakage will catch up to subthreshold leakage in magnitude and in many cases, it already has. The main approach to reduce gate-oxide leakage applies aggressive high-k materials with dielectric constants of 25 to 50, such as hafnium oxide. These materials greatly diminish gate-oxide leakage, but Figure 3. Leakage current and gate length. (a) Impact of gate-length on leakage current, and (b) expected probability distribution of the leakage current for devices on a chip. December
7 they also pose numerous process integration problems. The ITRS does not project them reaching mainstream production until The emerging importance of gate-oxide leakage raises new challenges for leakage reduction in onchip caches. One possible approach employs technologies with dual-oxide thicknesses. Designers could use thick-oxide transistors for cache bit cells, for example, reducing overall gate-oxide leakage in the same way high threshold voltage devices can reduce subthreshold leakage. Other methods of reducing subthreshold leakage may apply to gate-tunneling current as well, but their effects require further research. For example, gate-oxide leakage unlike subthreshold leakage has a very weak dependence on temperature. Thus, as subthreshold leakage decreases with decreases in operating temperature, gate-oxide leakage becomes more dominant. This will require technology and engineering that specifically target gate-oxide reduction in standby mode. Power consumption has become a primary constraint in microprocessor design, along with performance, clock frequency, and die size. Researchers in both industry and academia are focusing on ways to reduce it. This community has become adept at overcoming seemingly insurmountable barriers for example, the supposed feature size limits for optical lithography dictated by the wavelength of visible light. We can expect the community to meet the power challenge in the next few years as well. Acknowledgments This work was supported by ARM, an Intel Graduate Fellowship, the US Defense Advanced Research Projects Agency, the Semiconductor Research Corporation, the Gigascale Silicon Research Center, and the National Science Foundation. References 1. R. Wilson and D. Lammers, Grove Calls Leakage Chip Designers Top Problem, EE Times, 13 Dec. 2002; 2. Semiconductor Industry Assoc., International Technology Roadmap for Semiconductors, 2002 Update; 3. T. Mudge, Power: A First-Class Architectural Design Constraint, Computer, Apr. 2001, pp K. Nowka et al., A 0.9V to 1.95V Dynamic Voltage-Scalable and Frequency-Scalable 32b PowerPC Processor, Proc. Int l Solid-State Circuits Conf. (ISSCC), IEEE Press, 2002, pp A. Chandrakasan, W. Bowhill, and F. Fox, Design of High-Performance Microprocessor Circuits, IEEE Press, N. Kim et al., Drowsy Instruction Caches: Leakage Power Reduction Using Dynamic Voltage Scaling and Cache Sub-bank Prediction, Proc. 35th Ann. Int l Symp. Microarchitecture (MICRO-35), IEEE CS Press, 2002, pp S. Kaxiras, Z. Hu, and M. Martonosi, Cache Decay: Exploiting Generational Behavior to Reduce Cache Leakage Power, Proc. 28th Int l Symp. Computer Architecture (ISCA 28), IEEE CS Press, 2001, pp M. Powell et al., Gated-V dd : A Circuit Technique to Reduce Leakage in Deep-Submicron Cache Memories, Proc. Int l Symp. Low-Power Electronics and Design (ISLPED 00), ACM Press, 2000, pp M. Powell et al., Reducing Leakage in a High-Performance Deep-Submicron Instruction Cache, IEEE Trans. VLSI, Feb. 2001, pp K. Flautner et al., Drowsy Caches: Simple Techniques for Reducing Leakage Power, Proc. 29th Ann. Int l Symp. Computer Architecture (ISCA 29), IEEE CS Press, 2002, pp H. Kim and K. Roy, Dynamic Vth SRAMs for Low Leakage, Proc. Int l Symp. Low-Power Electronics and Design (ISLPED 02), ACM Press, 2002, pp N. Azizi, A. Moshovos, and F.N. Najm, Low-Leakage Asymmetric-Cell SRAM, Proc. Int l Symp. Low-Power Electronics and Design (ISLPED 02), ACM Press, 2002, pp W. Zhang et al., Compiler-Directed Instruction Cache Leakage Optimization, Proc. 35th Ann. Int l Symp. Microarchitecture (MICRO-35), IEEE CS Press, 2002, pp Nam Sung Kim is a PhD candidate at the University of Michigan. His research interests include lowpower and low-complexity microarchitecture design at the circuit and microarchitectural boundary. Kim received an MS in electrical engineering from the Korea Advanced Institute of Science and Technology, Taejon, Korea. He is a student member of the IEEE and the ACM. Contact him at [email protected]. Todd Austin is an associate professor of electrical engineering and computer science at the University of Michigan. His research interests include computer architecture, compilers, computer system ver- 74 Computer
8 ification, and performance analysis tools and techniques. Austin received a PhD in computer science from the University of Wisconsin. Contact him at [email protected]. David Blaauw is an associate professor of electrical engineering and computer science at the University of Michigan. His research interests include VLSI design and CAD with emphasis on circuit analysis and optimization problems for high-performance and low-power microprocessor designs. Blaauw received a PhD in computer science from the University of Illinois, Urbana-Champaign. Contact him at [email protected]. Trevor Mudge is the Bredt Professor of Electrical Engineering and Computer Science at the University of Michigan. In addition, he runs Idiot Savants, a chip design consultancy, and advises several venture firms. His research interests include computer architecture, computer-aided design, and compilers. Mudge received a PhD in computer science from the University of Illinois, Urbana-Champaign. He is a Fellow of the IEEE and a member of the ACM, the IEE, and the British Computer Society. Contact him at [email protected]. Krisztián Flautner is a principal researcher at ARM Limited and the architect of ARM s Intelligent Energy Management technology. His research interests address high-performance, low-power processing platforms to support advanced software environments. Flautner received a PhD in computer science and engineering from the University of Michigan. Contact him at krisztian.flautner@arm. com. Jie S. Hu is a PhD candidate at Pennsylvania State University. His research interests include high-performance, low-power microprocessor design; power-efficient memory architectures; and complexity-effective instruction issue queues. Hu received an ME in signal and information processing from Peking University. He is a student member of the ACM and the IEEE. Contact him at [email protected]. Mary Jane Irwin is the A. Robert Noll Chair in Engineering in the Department of Computer Science and Engineering at Pennsylvania State University. Her research interests include computer architecture, embedded and mobile computing systems design, low-power design, and electronic design automation. Irwin received a PhD in computer science from the University of Illinois. She is an IEEE Fellow, an ACM Fellow, and a member of the National Academy of Engineering. Contact her at [email protected]. Mahmut Kandemir is an assistant professor of computer science and engineering at Pennsylvania State University. His research interests include optimizing compilers, I/O-intensive applications, and power-aware computing. He received a PhD in electrical engineering and computer science from Syracuse University. He is a member of the IEEE and the ACM. Contact him at [email protected]. Vijaykrishnan Narayanan is an associate professor of computer science and engineering at Pennsylvania State University. His research interests are in embedded systems, energy-efficient designs, computer architecture, and VLSI design. Narayanan received a PhD in computer science from the University of South Florida. He has received several awards including the IEEE Computer Society s Richard E. Merwin Award. Contact him at [email protected]. JOIN A THINK TANK Looking for a community targeted to your area of expertise? IEEE Computer Society Technical Committees explore a variety of computing niches and provide forums for dialogue among peers. These groups influence our standards development and offer leading conferences in their fields. Join a community that targets your discipline. In our Technical Committees, you re in good company. computer.org/tcsignup/
DESIGN CHALLENGES OF TECHNOLOGY SCALING
DESIGN CHALLENGES OF TECHNOLOGY SCALING IS PROCESS TECHNOLOGY MEETING THE GOALS PREDICTED BY SCALING THEORY? AN ANALYSIS OF MICROPROCESSOR PERFORMANCE, TRANSISTOR DENSITY, AND POWER TRENDS THROUGH SUCCESSIVE
Static-Noise-Margin Analysis of Conventional 6T SRAM Cell at 45nm Technology
Static-Noise-Margin Analysis of Conventional 6T SRAM Cell at 45nm Technology Nahid Rahman Department of electronics and communication FET-MITS (Deemed university), Lakshmangarh, India B. P. Singh Department
Leakage Power Reduction Using Sleepy Stack Power Gating Technique
Leakage Power Reduction Using Sleepy Stack Power Gating Technique M.Lavanya, P.Anitha M.E Student [Applied Electronics], Dept. of ECE, Kingston Engineering College, Vellore, Tamil Nadu, India Assistant
SRAM Scaling Limit: Its Circuit & Architecture Solutions
SRAM Scaling Limit: Its Circuit & Architecture Solutions Nam Sung Kim, Ph.D. Assistant Professor Department of Electrical and Computer Engineering University of Wisconsin - Madison SRAM VCC min Challenges
McPAT: An Integrated Power, Area, and Timing Modeling Framework for Multicore and Manycore Architectures
McPAT: An Integrated Power, Area, and Timing Modeling Framework for Multicore and Manycore Architectures Sheng Li, Junh Ho Ahn, Richard Strong, Jay B. Brockman, Dean M Tullsen, Norman Jouppi MICRO 2009
Design and analysis of flip flops for low power clocking system
Design and analysis of flip flops for low power clocking system Gabariyala sabadini.c PG Scholar, VLSI design, Department of ECE,PSNA college of Engg and Tech, Dindigul,India. Jeya priyanka.p PG Scholar,
Efficient Interconnect Design with Novel Repeater Insertion for Low Power Applications
Efficient Interconnect Design with Novel Repeater Insertion for Low Power Applications TRIPTI SHARMA, K. G. SHARMA, B. P. SINGH, NEHA ARORA Electronics & Communication Department MITS Deemed University,
Low Power AMD Athlon 64 and AMD Opteron Processors
Low Power AMD Athlon 64 and AMD Opteron Processors Hot Chips 2004 Presenter: Marius Evers Block Diagram of AMD Athlon 64 and AMD Opteron Based on AMD s 8 th generation architecture AMD Athlon 64 and AMD
Low leakage and high speed BCD adder using clock gating technique
Low leakage and high speed BCD adder using clock gating technique Mr. Suri shiva 1 Mr K.R.Anudeep Laxmikanth 2 Mr. Naveen Kumar.Ch 3 Abstract The growing market of mobile, battery powered electronic systems
TRUE SINGLE PHASE CLOCKING BASED FLIP-FLOP DESIGN
TRUE SINGLE PHASE CLOCKING BASED FLIP-FLOP DESIGN USING DIFFERENT FOUNDRIES Priyanka Sharma 1 and Rajesh Mehra 2 1 ME student, Department of E.C.E, NITTTR, Chandigarh, India 2 Associate Professor, Department
International Journal of Electronics and Computer Science Engineering 1482
International Journal of Electronics and Computer Science Engineering 1482 Available Online at www.ijecse.org ISSN- 2277-1956 Behavioral Analysis of Different ALU Architectures G.V.V.S.R.Krishna Assistant
Introduction to CMOS VLSI Design
Introduction to CMOS VLSI esign Slides adapted from: N. Weste,. Harris, CMOS VLSI esign, Addison-Wesley, 3/e, 24 Introduction Integrated Circuits: many transistors on one chip Very Large Scale Integration
ISSCC 2003 / SESSION 13 / 40Gb/s COMMUNICATION ICS / PAPER 13.7
ISSCC 2003 / SESSION 13 / 40Gb/s COMMUNICATION ICS / PAPER 13.7 13.7 A 40Gb/s Clock and Data Recovery Circuit in 0.18µm CMOS Technology Jri Lee, Behzad Razavi University of California, Los Angeles, CA
Intel s Revolutionary 22 nm Transistor Technology
Intel s Revolutionary 22 nm Transistor Technology Mark Bohr Intel Senior Fellow Kaizad Mistry 22 nm Program Manager May, 2011 1 Key Messages Intel is introducing revolutionary Tri-Gate transistors on its
Design Cycle for Microprocessors
Cycle for Microprocessors Raúl Martínez Intel Barcelona Research Center Cursos de Verano 2010 UCLM Intel Corporation, 2010 Agenda Introduction plan Architecture Microarchitecture Logic Silicon ramp Types
SOS: Software-Based Out-of-Order Scheduling for High-Performance NAND Flash-Based SSDs
SOS: Software-Based Out-of-Order Scheduling for High-Performance NAND -Based SSDs Sangwook Shane Hahn, Sungjin Lee, and Jihong Kim Department of Computer Science and Engineering, Seoul National University,
Analyzing Electrical Effects of RTA-driven Local Anneal Temperature Variation
1 Analyzing Electrical Effects of RTA-driven Local Anneal Temperature Variation Vivek Joshi, Kanak Agarwal*, Dennis Sylvester, David Blaauw Electrical Engineering & Computer Science University of Michigan,
Power Reduction Techniques in the SoC Clock Network. Clock Power
Power Reduction Techniques in the SoC Network Low Power Design for SoCs ASIC Tutorial SoC.1 Power Why clock power is important/large» Generally the signal with the highest frequency» Typically drives a
AN1837. Non-Volatile Memory Technology Overview By Stephen Ledford Non-Volatile Memory Technology Center Austin, Texas.
Order this document by /D Non-Volatile Memory Technology Overview By Stephen Ledford Non-Volatile Memory Technology Center Austin, Texas Introduction Today s microcontroller applications are more sophisticated
Use-it or Lose-it: Wearout and Lifetime in Future Chip-Multiprocessors
Use-it or Lose-it: Wearout and Lifetime in Future Chip-Multiprocessors Hyungjun Kim, 1 Arseniy Vitkovsky, 2 Paul V. Gratz, 1 Vassos Soteriou 2 1 Department of Electrical and Computer Engineering, Texas
Alpha CPU and Clock Design Evolution
Alpha CPU and Clock Design Evolution This lecture uses two papers that discuss the evolution of the Alpha CPU and clocking strategy over three CPU generations Gronowski, Paul E., et.al., High Performance
DRG-Cache: A Data Retention Gated-Ground Cache for Low Power 1
DRG-Cache: A Data Retention Gated-Ground Cache for Low Power 1 ABSTRACT In this paper we propose a novel integrated circuit and architectural level techniue to reduce leakage power consumption in high
Test Solution for Data Retention Faults in Low-Power SRAMs
Test Solution for Data Retention Faults in Low-Power SRAMs L. B. Zordan 1 A. Bosio 1 L. Dilillo 1 P. Girard 1 A. Todri 1 A. Virazel 1 N. Badereddine 2 1 LIRMM - Université Montpellier II / CNRS 161, rue
S. Venkatesh, Mrs. T. Gowri, Department of ECE, GIT, GITAM University, Vishakhapatnam, India
Power reduction on clock-tree using Energy recovery and clock gating technique S. Venkatesh, Mrs. T. Gowri, Department of ECE, GIT, GITAM University, Vishakhapatnam, India Abstract Power consumption of
Yaffs NAND Flash Failure Mitigation
Yaffs NAND Flash Failure Mitigation Charles Manning 2012-03-07 NAND flash is one of very few types of electronic device which are knowingly shipped with errors and are expected to generate further errors
A Survey on Sequential Elements for Low Power Clocking System
Journal of Computer Applications ISSN: 0974 1925, Volume-5, Issue EICA2012-3, February 10, 2012 A Survey on Sequential Elements for Low Power Clocking System Bhuvana S ECE Department, Avinashilingam University
Digital Design for Low Power Systems
Digital Design for Low Power Systems Shekhar Borkar Intel Corp. Outline Low Power Outlook & Challenges Circuit solutions for leakage avoidance, control, & tolerance Microarchitecture for Low Power System
RUNAHEAD EXECUTION: AN EFFECTIVE ALTERNATIVE TO LARGE INSTRUCTION WINDOWS
RUNAHEAD EXECUTION: AN EFFECTIVE ALTERNATIVE TO LARGE INSTRUCTION WINDOWS AN INSTRUCTION WINDOW THAT CAN TOLERATE LATENCIES TO DRAM MEMORY IS PROHIBITIVELY COMPLEX AND POWER HUNGRY. TO AVOID HAVING TO
Semiconductor Memories
Semiconductor Memories Semiconductor memories array capable of storing large quantities of digital information are essential to all digital systems Maximum realizable data storage capacity of a single
路 論 Chapter 15 System-Level Physical Design
Introduction to VLSI Circuits and Systems 路 論 Chapter 15 System-Level Physical Design Dept. of Electronic Engineering National Chin-Yi University of Technology Fall 2007 Outline Clocked Flip-flops CMOS
Curriculum for a Master s Degree in ECE with focus on Mixed Signal SOC Design
Curriculum for a Master s Degree in ECE with focus on Mixed Signal SOC Design Department of Electrical and Computer Engineering Overview The VLSI Design program is part of two tracks in the department:
CMOS, the Ideal Logic Family
CMOS, the Ideal Logic Family INTRODUCTION Let s talk about the characteristics of an ideal logic family. It should dissipate no power, have zero propagation delay, controlled rise and fall times, and have
Clocking. Figure by MIT OCW. 6.884 - Spring 2005 2/18/05 L06 Clocks 1
ing Figure by MIT OCW. 6.884 - Spring 2005 2/18/05 L06 s 1 Why s and Storage Elements? Inputs Combinational Logic Outputs Want to reuse combinational logic from cycle to cycle 6.884 - Spring 2005 2/18/05
Intel Labs at ISSCC 2012. Copyright Intel Corporation 2012
Intel Labs at ISSCC 2012 Copyright Intel Corporation 2012 Intel Labs ISSCC 2012 Highlights 1. Efficient Computing Research: Making the most of every milliwatt to make computing greener and more scalable
Module 2. Embedded Processors and Memory. Version 2 EE IIT, Kharagpur 1
Module 2 Embedded Processors and Memory Version 2 EE IIT, Kharagpur 1 Lesson 5 Memory-I Version 2 EE IIT, Kharagpur 2 Instructional Objectives After going through this lesson the student would Pre-Requisite
CMOS Power Consumption and C pd Calculation
CMOS Power Consumption and C pd Calculation SCAA035B June 1997 1 IMPORTANT NOTICE Texas Instruments (TI) reserves the right to make changes to its products or to discontinue any semiconductor product or
Class 18: Memories-DRAMs
Topics: 1. Introduction 2. Advantages and Disadvantages of DRAMs 3. Evolution of DRAMs 4. Evolution of DRAMs 5. Basics of DRAMs 6. Basics of DRAMs 7. Write Operation 8. SA-Normal Operation 9. SA-Read Operation
Lecture 10: Latch and Flip-Flop Design. Outline
Lecture 1: Latch and Flip-Flop esign Slides orginally from: Vladimir Stojanovic Computer Systems Laboratory Stanford University [email protected] 1 Outline Recent interest in latches and flip-flops
Flash Memories. João Pela (52270), João Santos (55295) December 22, 2008 IST
Flash Memories João Pela (52270), João Santos (55295) IST December 22, 2008 João Pela (52270), João Santos (55295) (IST) Flash Memories December 22, 2008 1 / 41 Layout 1 Introduction 2 How they work 3
ECE 410: VLSI Design Course Introduction
ECE 410: VLSI Design Course Introduction Professor Andrew Mason Michigan State University Spring 2008 ECE 410, Prof. A. Mason Lecture Notes Page i.1 Age of electronics microcontrollers, DSPs, and other
Power-Aware High-Performance Scientific Computing
Power-Aware High-Performance Scientific Computing Padma Raghavan Scalable Computing Laboratory Department of Computer Science Engineering The Pennsylvania State University http://www.cse.psu.edu/~raghavan
Automist - A Tool for Automated Instruction Set Characterization of Embedded Processors
Automist - A Tool for Automated Instruction Set Characterization of Embedded Processors Manuel Wendt 1, Matthias Grumer 1, Christian Steger 1, Reinhold Weiß 1, Ulrich Neffe 2 and Andreas Mühlberger 2 1
Photonic Networks for Data Centres and High Performance Computing
Photonic Networks for Data Centres and High Performance Computing Philip Watts Department of Electronic Engineering, UCL Yury Audzevich, Nick Barrow-Williams, Robert Mullins, Simon Moore, Andrew Moore
Evaluating Embedded Non-Volatile Memory for 65nm and Beyond
Evaluating Embedded Non-Volatile Memory for 65nm and Beyond Wlodek Kurjanowicz DesignCon 2008 Sidense Corp 2008 Agenda Introduction: Why Embedded NVM? Embedded Memory Landscape Antifuse Memory evolution
A Taxonomy and Survey of Energy-Efficient Data Centers and Cloud Computing Systems
A Taxonomy and Survey of Energy-Efficient Data Centers and Cloud Computing Systems Anton Beloglazov, Rajkumar Buyya, Young Choon Lee, and Albert Zomaya Present by Leping Wang 1/25/2012 Outline Background
A true low voltage class-ab current mirror
A true low voltage class-ab current mirror A. Torralba, 1a) R. G. Carvajal, 1 M. Jiménez, 1 F. Muñoz, 1 and J. Ramírez-Angulo 2 1 Departamento de Ingeniería Electrónica, Escuela Superior de Ingenieros,
Dynamic Power Variations in Data Centers and Network Rooms
Dynamic Power Variations in Data Centers and Network Rooms By Jim Spitaels White Paper #43 Revision 2 Executive Summary The power requirement required by data centers and network rooms varies on a minute
CHAPTER 16 MEMORY CIRCUITS
CHPTER 6 MEMORY CIRCUITS Chapter Outline 6. atches and Flip-Flops 6. Semiconductor Memories: Types and rchitectures 6.3 Random-ccess Memory RM Cells 6.4 Sense-mplifier and ddress Decoders 6.5 Read-Only
Fault Modeling. Why model faults? Some real defects in VLSI and PCB Common fault models Stuck-at faults. Transistor faults Summary
Fault Modeling Why model faults? Some real defects in VLSI and PCB Common fault models Stuck-at faults Single stuck-at faults Fault equivalence Fault dominance and checkpoint theorem Classes of stuck-at
LOW POWER DESIGN OF DIGITAL SYSTEMS USING ENERGY RECOVERY CLOCKING AND CLOCK GATING
LOW POWER DESIGN OF DIGITAL SYSTEMS USING ENERGY RECOVERY CLOCKING AND CLOCK GATING A thesis work submitted to the faculty of San Francisco State University In partial fulfillment of the requirements for
Dynamic Power Variations in Data Centers and Network Rooms
Dynamic Power Variations in Data Centers and Network Rooms White Paper 43 Revision 3 by James Spitaels > Executive summary The power requirement required by data centers and network rooms varies on a minute
what operations can it perform? how does it perform them? on what kind of data? where are instructions and data stored?
Inside the CPU how does the CPU work? what operations can it perform? how does it perform them? on what kind of data? where are instructions and data stored? some short, boring programs to illustrate the
NAND Flash FAQ. Eureka Technology. apn5_87. NAND Flash FAQ
What is NAND Flash? What is the major difference between NAND Flash and other Memory? Structural differences between NAND Flash and NOR Flash What does NAND Flash controller do? How to send command to
Topics of Chapter 5 Sequential Machines. Memory elements. Memory element terminology. Clock terminology
Topics of Chapter 5 Sequential Machines Memory elements Memory elements. Basics of sequential machines. Clocking issues. Two-phase clocking. Testing of combinational (Chapter 4) and sequential (Chapter
Lecture 11: Sequential Circuit Design
Lecture 11: Sequential Circuit esign Outline Sequencing Sequencing Element esign Max and Min-elay Clock Skew Time Borrowing Two-Phase Clocking 2 Sequencing Combinational logic output depends on current
Computer Systems Structure Main Memory Organization
Computer Systems Structure Main Memory Organization Peripherals Computer Central Processing Unit Main Memory Computer Systems Interconnection Communication lines Input Output Ward 1 Ward 2 Storage/Memory
Testing Low Power Designs with Power-Aware Test Manage Manufacturing Test Power Issues with DFTMAX and TetraMAX
White Paper Testing Low Power Designs with Power-Aware Test Manage Manufacturing Test Power Issues with DFTMAX and TetraMAX April 2010 Cy Hay Product Manager, Synopsys Introduction The most important trend
White Paper Power-Optimized Solutions for Telecom Applications
White Paper Introduction Some telecommunications (telecom) carriers now target a 20 percent power reduction per year on the equipment they deploy. This is a response to increasing power consumption in
Solution: start more than one instruction in the same clock cycle CPI < 1 (or IPC > 1, Instructions per Cycle) Two approaches:
Multiple-Issue Processors Pipelining can achieve CPI close to 1 Mechanisms for handling hazards Static or dynamic scheduling Static or dynamic branch handling Increase in transistor counts (Moore s Law):
Computer Architecture
Computer Architecture Slide Sets WS 2013/2014 Prof. Dr. Uwe Brinkschulte M.Sc. Benjamin Betting Part 11 Memory Management Computer Architecture Part 11 page 1 of 44 Prof. Dr. Uwe Brinkschulte, M.Sc. Benjamin
Chapter 9 Semiconductor Memories. Jin-Fu Li Department of Electrical Engineering National Central University Jungli, Taiwan
Chapter 9 Semiconductor Memories Jin-Fu Li Department of Electrical Engineering National Central University Jungli, Taiwan Advanced Reliable Systems (ARES) Lab. Jin-Fu Li, EE, NCU 2 Outline Introduction
Chapter 10 Advanced CMOS Circuits
Transmission Gates Chapter 10 Advanced CMOS Circuits NMOS Transmission Gate The active pull-up inverter circuit leads one to thinking about alternate uses of NMOS devices. Consider the circuit shown in
PowerPC Microprocessor Clock Modes
nc. Freescale Semiconductor AN1269 (Freescale Order Number) 1/96 Application Note PowerPC Microprocessor Clock Modes The PowerPC microprocessors offer customers numerous clocking options. An internal phase-lock
A 10,000 Frames/s 0.18 µm CMOS Digital Pixel Sensor with Pixel-Level Memory
Presented at the 2001 International Solid State Circuits Conference February 5, 2001 A 10,000 Frames/s 0.1 µm CMOS Digital Pixel Sensor with Pixel-Level Memory Stuart Kleinfelder, SukHwan Lim, Xinqiao
VLSI Design Verification and Testing
VLSI Design Verification and Testing Instructor Chintan Patel (Contact using email: [email protected]). Text Michael L. Bushnell and Vishwani D. Agrawal, Essentials of Electronic Testing, for Digital,
數 位 積 體 電 路 Digital Integrated Circuits
IEE5049 - Spring 2012 數 位 積 體 電 路 Digital Integrated Circuits Course Overview Professor Wei Hwang 黃 威 教 授 Department of Electronics Engineering National Chiao Tung University [email protected] Wei
Class 11: Transmission Gates, Latches
Topics: 1. Intro 2. Transmission Gate Logic Design 3. X-Gate 2-to-1 MUX 4. X-Gate XOR 5. X-Gate 8-to-1 MUX 6. X-Gate Logic Latch 7. Voltage Drop of n-ch X-Gates 8. n-ch Pass Transistors vs. CMOS X-Gates
Programming NAND devices
Technical Guide Programming NAND devices Kelly Hirsch, Director of Advanced Technology, Data I/O Corporation Recent Design Trends In the past, embedded system designs have used NAND devices for storing
Introduction to CMOS VLSI Design (E158) Lecture 8: Clocking of VLSI Systems
Harris Introduction to CMOS VLSI Design (E158) Lecture 8: Clocking of VLSI Systems David Harris Harvey Mudd College [email protected] Based on EE271 developed by Mark Horowitz, Stanford University MAH
Nanocomputer & Architecture
Nanocomputer & Architecture Yingjie Wei Western Michigan University Department of Computer Science CS 603 - Dr. Elise dedonckor Febrary 4 th, 2004 Nanocomputer Architecture Contents Overview of Nanotechnology
Design and Implementation of an On-Chip timing based Permutation Network for Multiprocessor system on Chip
Design and Implementation of an On-Chip timing based Permutation Network for Multiprocessor system on Chip Ms Lavanya Thunuguntla 1, Saritha Sapa 2 1 Associate Professor, Department of ECE, HITAM, Telangana
Nanotechnologies for the Integrated Circuits
Nanotechnologies for the Integrated Circuits September 23, 2015 Dr. Bertrand Cambou Professor of Practice NAU, Cybersecurity School of Informatics, Computing, and Cyber-Systems Agenda The Market Silicon
Chapter 2 Sources of Variation
Chapter 2 Sources of Variation Variations in process, supply voltage and temperature (PVT) have always been an issue in Integrated Circuit (IC) Design. In digital circuits, PVT fluctuations affect the
These help quantify the quality of a design from different perspectives: Cost Functionality Robustness Performance Energy consumption
Basic Properties of a Digital Design These help quantify the quality of a design from different perspectives: Cost Functionality Robustness Performance Energy consumption Which of these criteria is important
Reconfigurable Architecture Requirements for Co-Designed Virtual Machines
Reconfigurable Architecture Requirements for Co-Designed Virtual Machines Kenneth B. Kent University of New Brunswick Faculty of Computer Science Fredericton, New Brunswick, Canada [email protected] Micaela Serra
Two-Phase Clocking Scheme for Low-Power and High- Speed VLSI
International Journal of Advances in Engineering Science and Technology 225 www.sestindia.org/volume-ijaest/ and www.ijaestonline.com ISSN: 2319-1120 Two-Phase Clocking Scheme for Low-Power and High- Speed
Implementation Of High-k/Metal Gates In High-Volume Manufacturing
White Paper Implementation Of High-k/Metal Gates In High-Volume Manufacturing INTRODUCTION There have been significant breakthroughs in IC technology in the past decade. The upper interconnect layers of
Advanced VLSI Design CMOS Processing Technology
Isolation of transistors, i.e., their source and drains, from other transistors is needed to reduce electrical interactions between them. For technologies
NTE2053 Integrated Circuit 8 Bit MPU Compatible A/D Converter
NTE2053 Integrated Circuit 8 Bit MPU Compatible A/D Converter Description: The NTE2053 is a CMOS 8 bit successive approximation Analog to Digital converter in a 20 Lead DIP type package which uses a differential
Lecture 7: Clocking of VLSI Systems
Lecture 7: Clocking of VLSI Systems MAH, AEN EE271 Lecture 7 1 Overview Reading Wolf 5.3 Two-Phase Clocking (good description) W&E 5.5.1, 5.5.2, 5.5.3, 5.5.4, 5.5.9, 5.5.10 - Clocking Note: The analysis
On the Use of Strong BCH Codes for Improving Multilevel NAND Flash Memory Storage Capacity
On the Use of Strong BCH Codes for Improving Multilevel NAND Flash Memory Storage Capacity Fei Sun, Ken Rose, and Tong Zhang ECSE Department, Rensselaer Polytechnic Institute, USA Abstract This paper investigates
Model-Based Synthesis of High- Speed Serial-Link Transmitter Designs
Model-Based Synthesis of High- Speed Serial-Link Transmitter Designs Ikchan Jang 1, Soyeon Joo 1, SoYoung Kim 1, Jintae Kim 2, 1 College of Information and Communication Engineering, Sungkyunkwan University,
Sequential Circuits. Combinational Circuits Outputs depend on the current inputs
Principles of VLSI esign Sequential Circuits Sequential Circuits Combinational Circuits Outputs depend on the current inputs Sequential Circuits Outputs depend on current and previous inputs Requires separating
1. Memory technology & Hierarchy
1. Memory technology & Hierarchy RAM types Advances in Computer Architecture Andy D. Pimentel Memory wall Memory wall = divergence between CPU and RAM speed We can increase bandwidth by introducing concurrency
Energy-Efficient, High-Performance Heterogeneous Core Design
Energy-Efficient, High-Performance Heterogeneous Core Design Raj Parihar Core Design Session, MICRO - 2012 Advanced Computer Architecture Lab, UofR, Rochester April 18, 2013 Raj Parihar Energy-Efficient,
A Dynamic Resource Management with Energy Saving Mechanism for Supporting Cloud Computing
A Dynamic Resource Management with Energy Saving Mechanism for Supporting Cloud Computing Liang-Teh Lee, Kang-Yuan Liu, Hui-Yang Huang and Chia-Ying Tseng Department of Computer Science and Engineering,
Sequential Circuit Design
Sequential Circuit Design Lan-Da Van ( 倫 ), Ph. D. Department of Computer Science National Chiao Tung University Taiwan, R.O.C. Fall, 2009 [email protected] http://www.cs.nctu.edu.tw/~ldvan/ Outlines
NAME AND SURNAME. TIME: 1 hour 30 minutes 1/6
E.T.S.E.T.B. MSc in ICT FINAL EXAM VLSI Digital Design Spring Course 2005-2006 June 6, 2006 Score publication date: June 19, 2006 Exam review request deadline: June 22, 2006 Academic consultancy: June
