An efficient approach to hide the run-time reconfiguration from SW applications

Yang Qu, Juha-Pekka Soininen, Jari Nurmi

    Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsScientificpeer-review

    1 Citation (Scopus)

    Abstract

    Dynamically reconfigurable logic is becoming an important design unit in SoC system. A method to make the reconfiguration management transparent to software applications is required in order to make easier the design with such devices. In this paper, we present an efficient approach similar to the cache miss and the data replacement in modern computer system for the task. The main advantage is that the reconfiguration can be correctly issued without extra instructions inserted either manually by SW application programmers or automatically by compilers. The approach was validated in a real case design. In the Virtex2P20 implementation platform, the resource overhead was 2.45% in terms of the number of LUTs. Performance is measured in cycle-accurate simulation environment. The overhead is about equal when compared with an OS-based equivalent design that uses system calls and critical section code to manage the reconfiguration.
    Original languageEnglish
    Title of host publicationProceedings of the 15th International Conference on Field Programmable Logic and Applications
    PublisherIEEE Institute of Electrical and Electronic Engineers
    Pages648-653
    ISBN (Print)0-7803-9362-7
    DOIs
    Publication statusPublished - 2005
    MoE publication typeA4 Article in a conference publication
    Event15th International Conference on Field Programmable Logic and Applications, FPL 2005 - Tampere, Finland
    Duration: 24 Aug 200526 Aug 2005

    Conference

    Conference15th International Conference on Field Programmable Logic and Applications, FPL 2005
    CountryFinland
    CityTampere
    Period24/08/0526/08/05

    Fingerprint Dive into the research topics of 'An efficient approach to hide the run-time reconfiguration from SW applications'. Together they form a unique fingerprint.

  • Cite this

    Qu, Y., Soininen, J-P., & Nurmi, J. (2005). An efficient approach to hide the run-time reconfiguration from SW applications. In Proceedings of the 15th International Conference on Field Programmable Logic and Applications (pp. 648-653). IEEE Institute of Electrical and Electronic Engineers. https://doi.org/10.1109/FPL.2005.1515805