Improving the Efficiency of Run Time Reconfigurable Devices by Configuration Locking

Yang Qu, Juha-Pekka Soininen, Jari Nurmi

    Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsScientificpeer-review

    5 Citations (Scopus)

    Abstract

    Run-time reconfigurable logic is a very attractive alterative in the design of SoC. However, configuration overhead can largely decrease the system performance. In this work, we present a novel configuration locking technique to reduce the effect of the overhead. The idea is to at run-time lock a number of the most frequently used tasks on the configuration memory so that they cannot be evicted by other tasks. With real applications in validation, the results show that using proper amount of resources to lock tasks can significantly outperform simply using more resources. In addition, an algorithm has been developed for estimating the lock ratio. Experimental results show that the estimates are close to optimal results and the measured computer runtime is less than 4 us in a commercial embedded processo
    Original languageEnglish
    Title of host publicationProceedings
    Subtitle of host publicationDesign, Automation & Test in Europe, DATE 2008
    Place of PublicationLos Alamitos CA, Washington, Brussels, Tokyo
    PublisherIEEE Institute of Electrical and Electronic Engineers
    Pages264-267
    ISBN (Print)978-3-9810-8014-8, 978-3-9810-8013-1
    DOIs
    Publication statusPublished - 2008
    MoE publication typeA4 Article in a conference publication
    EventDesign, Automation and Test in Europe, DATE 2008 - Munich, Germany
    Duration: 10 Mar 200814 Mar 2008

    Conference

    ConferenceDesign, Automation and Test in Europe, DATE 2008
    Abbreviated titleDATE 2008
    Country/TerritoryGermany
    CityMunich
    Period10/03/0814/03/08

    Keywords

    • Reconfigurable design
    • configuration locking

    Fingerprint

    Dive into the research topics of 'Improving the Efficiency of Run Time Reconfigurable Devices by Configuration Locking'. Together they form a unique fingerprint.

    Cite this