Automated synthesis of interleaved memory systems for custom computing machines

A. Postula, Song Chen, L. Jozwiak, D. Abramson

    Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

    4 Citations (Scopus)

    Abstract

    This paper deals with methods of automated memory synthesis for Custom Computing Machines (CCMs). We focus the presentation on the synthesis of interleaved memory systems, which provide the quickest access to data at the cost of more parallel hardware. The synthesis of an interleaved memory system starts with the analysis of data access patterns in the algorithm, from which a number of possible storage schemes is derived. The storage scheme defines how the array elements can be distributed among different memory banks. The best storage scheme is then chosen according to a complex metric of cost and performance of the required memory system. This metric involves the schedule length of operations, the type and number of required memory chips, the cost and delay of address generation and the interconnection network. Results of our experiments demonstrate that the developed methods are capable to automatically synthesise storage schemes and interleaved memory systems, which are the same or better than those previously conceived by an experienced hardware designer.
    Original languageEnglish
    Title of host publication24th EUROMICRO Conference
    Place of PublicationLos Alamitos, CA
    PublisherIEEE Computer Society
    Pages115-122
    Number of pages8
    ISBN (Print)0-8186-8646-4
    DOIs
    Publication statusPublished - 1998
    Event24th EUROMICRO Conference, August 25-27, 1998, Vasterars, Sweden - Vasterars, Sweden
    Duration: 25 Aug 199827 Aug 1998

    Conference

    Conference24th EUROMICRO Conference, August 25-27, 1998, Vasterars, Sweden
    Country/TerritorySweden
    CityVasterars
    Period25/08/9827/08/98

    Fingerprint

    Dive into the research topics of 'Automated synthesis of interleaved memory systems for custom computing machines'. Together they form a unique fingerprint.

    Cite this